期刊文献+

RSA密钥强度量化与筛选模型的分析与研究 被引量:3

Research and analysis on model of testing and quantitating strength about RSA keys
下载PDF
导出
摘要 RSA算法在信息安全领域应用很广,其安全性经受了数十年的考验。然而,密钥安全不同于算法安全,它常为人们所忽视。在大多数实现中,人们对RSA密钥本身的安全性缺乏认识,这样,即使采用强算法也会引发安全问题。围绕RSA密钥的安全性度量问题,从已知明文的RSA攻击出发,提出了对RSA密钥安全性进行度量的数学模型和密钥安全系数的概念系统,分析了安全强度系数-密钥数量的分布,设计了对密钥强度量化的方法,改进了RSA密钥产生算法。并对其在深腾1800集群平台上进行了仿真分析,对于增强RSA算法实现的安全性有着积极的参考意义。 The RSA algorithm is applied very broadly in the information security domain, its security has undergone examining over dozens of years practice. However the algorithm security and the key safe are two different concepts, the latteroften is neglected by the people, in the big number of realization, when the RSA algorithm is used to generate the key, the people lack the understanding to the key itself security, thus the strong algorithm is aslo used to initiate the security problem. The RSA key the security measure question is revolved, beginning from the known plaintext RSA attack and the mathematical model on the measure of the RSA key security and the key safety coefficient concept system are proposed, strength coefficient-key quantity distribution is analyzed, a method to quantitate the key intensity is designed, the algorithm to generate RSA key is improved, and then the simulation analysis to it in the 1800 clustering computer platforms is carried on, whole of work has a lot of positively value of reference regarding strengthening the RSA algorithm realization the security.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第22期5371-5373,5377,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2002AA135230) 湖南省教育厅基金项目(D5C720)
关键词 公钥密码算法 密钥强度量化 安全系数 密钥筛选 信息安全 安全密钥 public key encryption algorithm quantitating strength of keys security coefficient testing keys information security secure key
  • 相关文献

参考文献6

  • 1曹正军,刘木兰.一个基于强RSA数字签名方案的改进[J].计算机学报,2006,29(9):1617-1621. 被引量:6
  • 2卢开澄.计算机密码学[M].2版.北京:清华大学出版社,2000,142-145.
  • 3冯登国 周永彬 张振峰 译.密码工程实践指南[M].北京:清华大学出版社,2001..
  • 4吴世忠.应用密码学-算法-协议与C源程序[M].北京:机械工业出版社,2000,334-364.
  • 5潘承彪.数论入门[M].北京:高等教育出版社,2000,58-60.
  • 6贺军.数字签名[M].北京:清华大学出版社,2003.

二级参考文献8

  • 1Zhu Hua-Fei. New digital signature scheme attaining immunity to adaptive chosen-message attack. Chinese Journal of Electronics, 2001, 10(4) : 484-486
  • 2Diffie W. , Hellman M. E.. New directions in cryptography.IEEE Transactions on Information Theory, 1976, IT-22 (6):644-654
  • 3Rivest R. L. , Shamir A. , Adleman L. M.. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 21(2): 120-126
  • 4ElGamal T.. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985, 31(4):469-472
  • 5Schnorr C. P.. Efficient identification and signatures for smart cards. In: Proceedings of Advances in Cryptology-Crypto' 89,Berlin: Springer-Verlag, 1990, 239-251
  • 6Schneier B.. Applied Cryptography: Protocols, Algorithms,and Source Code in C. 2nd Edition. New York: Wiley, 1995,521-522
  • 7Cramer R. , Shoup V.. Signature schemes based on the strong RSA assumption. ACM Transactions on Information and System Security, 2000, 3(3): 161-185
  • 8Fischlin M.. The Cramer-Shoup Strong-RSA signature scheme revisited. In:Proceedings of the PKC 2003, Lecture Notes in Computer Science 2567, Berlin: Springer-Verlag, 2003, 116-129

共引文献13

同被引文献15

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部