期刊文献+

RSA跟随式公钥大数算法提高移动通信安全稳定性能的研究

Public-Key Cryptography Algorithm Based on RSA in Improving Security Stability of Mobile Communication
下载PDF
导出
摘要 在移动通信管理中,系统安全性能的稳定性非常重要。在移动系统安全度稳定不变的情况下,由于用户传送信息保密级别的不同,对系统的信息安全需求度经常会呈现出高坡度脉冲形态,从而导致系统安全性能的剧烈波动。本文提出的基于数字签名经典RSA算法体系的跟随式公钥大数算法,仅采用公钥大数位数N单一参数调节系统安全度,从而能方便地控制移动终端的安全复杂度和安全满足度,在更大的使用范围内稳定了系统的安全性能。 In management of mobile communication, stability of the system security is very important.When the security of the mobile system is stable,the demand for the information security of the system will be fre- quently in the shape of high - slope pulse due to the dif- ferent security degrees of information transmitted,this may result in serious fluctuation of the system security. This paper presents a public - key Cryptography algo- rithm based on the typical digital signature RSA algorithm system,using the single parameter Public - Key Cryp- tography bit N to adjust the security of the system so as to easily control the complexity and degree of the securi- ty,stabilizing the security performance in more extended range of utility.
出处 《计算机与数字工程》 2007年第1期14-17,共4页 Computer & Digital Engineering
关键词 移动通信 RSA公钥密码算法 安全性能 Mobile Communication RSA public-key Cryptography algorithm Security
  • 相关文献

参考文献3

  • 1Sami Tabbane.Handbook of Mobile Radio Networks Artech House,Inc 2000
  • 2陈晓峰,王育民.公钥密码体制研究与进展[J].通信学报,2004,25(8):109-118. 被引量:28
  • 3Douglas R.Stinson.Cryptography:Theory and Practice[M].CRC Press LLC,2002

二级参考文献27

  • 1CAVALLAR S, et al. Factorization of a 512-bit RSA modulus[A]. Advances in Cryptology- Eurocrypt 2000[C].LNCS 1807,Springer-Verlag, 2000. 1-18.
  • 2BONEH D. Twenty years of attacks on the RSA cryptosystem[J]. Notices of the American Mathematical Society, 1999, 46(2):203-213.
  • 3DUSSEAND J R, KALISKI B. A cryptographic library for the Motorola DSP56000[A]. Advances in Cryptology-Eurocrypt 1990[C].LNCS 473, Springer-Verlag, 1991.230-244.
  • 4KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987,48:203-209.
  • 5MILLER V. Uses of elliptic curves in cryptography[A]. Advances in Cryptology-Crypto 1985[C].LNCS 218, Springer-Verlag,1986.417 -426.
  • 6KOBLITZ N. Hyperelliptic cryptography[J]. Journal of Cryptology, 1989,1(3):139-150.
  • 7CANTOR D G. Computing in the jacobian of a hyperelliptic curve[J]. Mathematics of Computation, 1987, 48(177): 95-101.
  • 8IEEE P1363. Standard Specifications for Public-Key Cryptography Draft[S].1997.
  • 9BROUWER A E, PELLIKAAN R, VERHEUL E R. Doing more with fewer bits[A]. Advances in Cryptology - Asiacrypt 1999[C].LNCS 1716, Springer-Verlag, 1999. 321-332.
  • 10LENSTRA A K, VERHEUL E R. Key improvements to XTR[A]. Advances in Cryptology Asiacrypt 2000[C].LNCS 1880,Springer-Verlag, 2000. 1-19.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部