期刊文献+

RSA算法及改进方案的探讨 被引量:2

RESEARCH OF ALGORITHM OF RSA SOFTWARE DEVELOPMENT
下载PDF
导出
摘要 对RSA算法的工作过程进行了介绍,通过对其潜在的密钥中的大素数p,q能被破译等缺点进行分析,提出了一种对密钥的传输再加密的一种改进方案,并对改进前后的性能通过随机数对信息的保护、随机模n5不影响方案的保密性、可以检测秘密密钥的泄漏情况等方面进行了保密性的比较。 This paper describes the working process of RSA and puts forward an ameliorated method of encrypting in the transmission process of cryptography based on an analysis of the defects that the great prime numbers p and q can be decoded. A comparison is made of the performance before and after the amelioration.
作者 秦建 吴春明
出处 《西南农业大学学报(自然科学版)》 CSCD 北大核心 2006年第5期885-888,共4页 Journal of Southwest Agricultural University
基金 重庆市科委自然基金资助项目(CSTC 2005BB1129)
关键词 RSA 工作密钥 数字签名 RSA work key digital signature
  • 相关文献

参考文献5

二级参考文献19

  • 1G.,EV,王玉祥.PRNS──有权剩余数系统[J].计算机学报,1994,17(8):624-629. 被引量:3
  • 2陈运.信息加密原理[M].成都:电子科技大学出版社,1990..
  • 3Thomas H Hinke, Harry S. Protecting databases from inference attacks [ J]. Computer & Security, 2000,16 ( 8 ):687 - 708.
  • 4Li Lixin, Liao Changrong, Chen Weiming, et al. Inference attack analysis of MLS DBMS using rough set theory [ J ].Proceedings of 7th Joint International Computer Conference,Shantou, China, 2001:1 339- 1 452.
  • 5L Wang, D Wijesekera, J Sushil. Cardinality- based inference control in sum - only data cubes [J]. In Proceedings of the 7th European Symposium on Research in Computer Security, 2002.
  • 6J Domingo- Ferrer. Advances in inference control in statistical databases: An overview in inference control in statistical databases: from theory to practice [ J ]. LNCS 2316, Springer - Verlag, 2002:1 -7.
  • 7T Su, G Ozsoyogiu. Data dependencies and inference control in multilevel relational database systems [ J ]. In Proceedings of the IEEE Symposium on Security and Privacy,1987:202-211.
  • 8J Millen. Honesty is the best policy [J]. In Proceedings of the 3rd Rome Laboratory Database Security Workshop, 2001.
  • 9S Rizvi, J Haritsa. Maintaining data privacy in association rule mining [ J ]. In Proceedings of the 28th International Conference on Very Large Data Bases, 2002:682 -693.
  • 10A Evfimievski, J Gehrke, R Srikant. Limiting privacy breaches in privacy preserving data mining [ J ]. In Proceedings of the 22nd Symposium on Principles of Database Systems, ACM Press, 2003:211-222.

共引文献17

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部