期刊文献+

基于RSA的安全应用及漏洞分析 被引量:1

Secure Applications and Leak Analysis of RSA System
下载PDF
导出
摘要 目前 ,公钥密码系统在网络安全中的应用越来越广泛 ,尤其在典型代表RSA系统得到大量使用。将系统地介绍和阐述RSA公钥密码系统的基本原理 ,介绍目前在计算机网络安全领域的几类基本应用 ,并针对其设置和应用的漏洞分析 ,提出安全应用RSA的参数选取和避免攻击的解决办法 ,最后还探讨了RSA的发展趋势。 At present,application of public key cryptographic systems in the field of computer network security becomes wider and wider。Specially, RSA,which is the typical representation, has been widely used.The basic principle of the RSA public key cryptographic system will be introduced and clarified systematically in this paper. At the same time, some kinds of basic applications in the field of computer network security will be introduced also.How to select the RSA system parameters and how to avoid attack will be put forward through leak analysis of its settings and application.Finally, the developing trend of the RSA is discussed.
出处 《计算机与数字工程》 2005年第3期34-38,共5页 Computer & Digital Engineering
关键词 RSA 加密 数字签名 密钥交换 安全 RSA,encryption,digital signature,secret key exchange,security
  • 相关文献

参考文献2

二级参考文献10

  • 1HULE H, MULLER W B. On the RSA cryptosystem with wrong keys[A]. Contributions to General Algebra 6[C].Vienna: Verlag Holdeer-Pichler-Tempsky, 1988.103-109.
  • 2DESMEDT Y, ODLYKZO A M. A chosen text attack on the RSA cryptosystem and ssome discrete logarithm problems[A]. Advances in Cryptology- CRYPTO' 85Proceedings[C]. New York: Springer-Verlag, 1986.21-39.
  • 3HASTAD J. On using RSA with low exponent in a public key network[A]. Advances in Cryptology-CRYPTO'85 Proceedings[C]. New York: Springer-Verlag, 1986.403-408.
  • 4DELAURENTIS J M. A further weakness in the common modulus protocol for the RSA cryptosystem[J].Cryptologia, 1984,8(3): 253-259.
  • 5SHANNON C E. Communication theory of secrecy systems[J]. Bell System Technical Joumal, 1949, 28: 656-715.
  • 6KAHN D. The codebreakers: the story of secrete writing [M]. New York: Macmillan Publishing Co, 1967.
  • 7RIVEST R L, SHAMIR A, ADLEMAN L M. Amethod for obtaining digital signatures and public-key cryptosysterns[J]. Communications of the ACM, 1978, 21(2):120-126.
  • 8WU C K, WANG X M. Determination of the true value of the euler totient function in the RSA cryptosystem from a set of possibilities[J]. Electronics Letters, 1993,29(1): 84-85.
  • 9POMERANCE C, SMITH J W, TUIER R. A piple-line architecture for factoring large integers with the quadratic sieve algorithm[J]. Siam Journal on Computing,1988, 17(2):387-403.
  • 10LENSTRA A K, LENSTRA H W. Lecture notes in mathematics 1554: The development of the number field sieve[ D]. New York: Springer-Verlag, 1993.

共引文献42

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部