期刊文献+

基于混沌数列的文件加密技术研究

File Encryption Technology Research Based on Chaotic Series
下载PDF
导出
摘要 以π值为基序列生成混沌数列,并利用此数列作为密钥序列和生成不规加密轮数序列,从而对文件进行多链分组对称加密,保证信息的安全。 In this paper,the value of π as the base sequence to generate chaos series,then uses this series as a key non-regulatory sequence and generate a number of encryption rounds of sequence.Thus many of the documents sub-chain symmetric encryption to ensure information security.
作者 唐海萍 吕政
出处 《浙江海洋学院学报(自然科学版)》 CAS 2009年第1期110-114,共5页 Journal of Zhejiang Ocean University(Natural Science Edition)
关键词 混沌数列 加密算法 文件加密 chaos series encryption algorithm file encryption
  • 相关文献

参考文献4

二级参考文献15

  • 1[1]Joan Daemen, Vincent Rijmen. AES Proposal: Rijndeal. In AES Round 1 Technical Evaluation CD - 1: Documentation.NIST[EB/OL]. http://www.nist.gov/aes. 1998-8.
  • 2[2]Joan Daemen, Lars Knudsen,Vincent Rijmen. The Block Cipher Square [ J ]. Fast Software Encryption, 1997,1267: 149- 165.
  • 3[3]Stefan Lucks. Attacking Seven Rounds of Rijndael under192-bit and 256-bit Keys. In The Third Advanced Encryption Standard Candidate Conference, NIST [ EB/OL ]. http: //www. nist. gov/aes. 2000-4.
  • 4[4]Eli Biham, Nathan Keller. Cryptanalysis of Reduced Variants of Rijndael[EB/OL] .http: //csrc .nist.gov/encryption/aes/round2/ conf3/papers/AES3Proceedings- 1. pdf.
  • 5[5]Niels FerGuson, John Kelsey, Stefan Lucks, etc. Improved Cryptanalysis of Rijndael [ J ]. Fast Software Encryption,2000,1978:0213 - 0230.
  • 6[1]Daemen J, Rijmen V. AES proposal, Rijndael, In AES Round i Technical Evaluation CD-1,Documentation, NIST, August 1998, See http:∥www.esat.kuleuven.ac.be/~rijmen/rijndael/ or http:∥www. nist. gov/aes.
  • 7[2]Daemen J, Knudsen L, Rijmen V. The block cipher Square. Proc. of FSE'97, lecture notes in conputer science 1267, 1997: 149-165.
  • 8[3]Ferguson N, Kelsey J, Stefan Lucks, Schneier B, Stay M, Wagner D, Whiting D. Improved cryptanalysis of Rijndael, AES Round 3 Technical Evaluation. NIST, August 1999, See http:∥www.esat.kuleuven.ac.be/~rijmen/rijndael/or http:∥www.nist.gov/aes.
  • 9[1]Spillman R J.Classical and Contemporary Cryptology[M].Pearson Education,Inc.,2005.
  • 10[2]Menezes A J,van Oorschot P C,Vanstone S A.Handbook of Applied Cryptography[M].CRC Press LLC,2005.

共引文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部