期刊文献+

一种基于网络安全的复合加密算法的研究 被引量:1

Research of a Mixed Data Encryption Algorithm TRA Based on Network Security
下载PDF
导出
摘要 加密技术是保护网络安全的主要手段之一.在传统的DES+RSA复合加密算法中,DES不仅存在着弱密钥和半弱密钥,而且在代数结构上存在着互补对称性,在一定程度上降低了破解密文的难度.文中提出一种新的复合加密算法TRA,在提高加密强度的前提下,解决以上问题.描述了TRA的模型和加密过程,并通过相关数据对该算法进行测试,分析了该算法的正确性、复杂度、安全性和效率等,并与传统的复合加密算法进行比较. Encryption technique is one of the most important methods in protecting network security. As for the traditional mixed encryption algorithm (DES+RSA), some problems exist in DES, such as weak key, half-weak key and complementary symmetry of algebraic structure, which reduce difficulty of decryption to some degree. So this paper proposes a new mixed encryption algorithm (TRA) that can solve these problems and improve intensity of eneryption. The paper first describes the model and process of TRA, and then tests the algorithm, analyzes its correctness.complexity,security and efficiency, and at last compares TRA with the traditional mixed algorithm.
出处 《武汉理工大学学报(交通科学与工程版)》 2008年第5期845-848,共4页 Journal of Wuhan University of Technology(Transportation Science & Engineering)
基金 国家自然科学基金项目(批准号:90304018 60672137) 教育部高等学校博士点基金项目(批准号:20060497015)资助
关键词 迭代 TEA RSA 加密 iterative TEA RSA eneryption
  • 相关文献

参考文献4

二级参考文献23

  • 1Schneier B.Applied Cryptography:protocols,algorithms,and source code in C.2nd ed.,New York:John Wiley and Sons,1999.515~620.
  • 2Diffie W.The first ten years of public-key cryptology.Proceedings of the IEEE,1988,76: 560~577.
  • 3Dolev D,Yao A.Onthe security of public key protocols.IEEE Transactions on Information Theory,IT29,1983.198~208.
  • 4Beauregard D. Efficient algorithms for implementing elliptic curve public-Key schemes :[Master's Thesis].Worcester Polytechnic Institute, 1999.
  • 5Beauregard D. Efficient algorithms for implementing elliptic curve public-Key schemes :[Master's Thesis].Worcester Polytechnic Institute, 1999.
  • 6Schneier B.Applied Cryptography:protocols,algorithms,and source code in C.2nd ed.,New York:John Wiley and Sons,1999.515-620
  • 7Diffie W.The first ten years of public-key cryptology.Proceedings of the IEEE,1988,76: 560-577
  • 8Dolev D,Yao A.Onthe security of public key protocols.IEEE Transactions on Information Theory,IT29,1983.198-208
  • 9G Grassi and D A Miller. Theory and experimental realization of observer-based discrete-time hyperchaos synchronization [J]. IEEE Trans. Circuit Syst. I,2002,49 (3) : 373-378.
  • 10G Baier and M Klein. Maximum hyperchaos in generalized Henon maps[J]. Phys. Left. A. 1990,151(6/7)281-284.

共引文献6

同被引文献11

  • 1王茜,倪建伟.一种基于RSA的加密算法[J].重庆大学学报(自然科学版),2005,28(1):68-72. 被引量:14
  • 2佟晓筠,姜伟.基于混合加密技术的电子商务安全体系研究[J].微处理机,2006,27(2):44-47. 被引量:7
  • 3陈兴波,王晓明.一种快速RSA算法的改进[J].计算机工程与设计,2006,27(22):4243-4244. 被引量:4
  • 4Ashrafi M Z,Ng S K. Privacy-preserving e-payments using one-time payment details[J].Computer Standards and Interfaces,2009,(02):321-328.
  • 5段钢.加密与解密[M]北京:电子工业出版社,2004.
  • 6李迈勇.网络安全:加密原理、算法与协议[M]北京:清华大学出版社,2007.
  • 7李海泉;李健.计算机网络安全与加密技术[M]北京:科学出版社,2001.
  • 8Castagnos G. An efficient probabilistic public-key cryptosystem over quadratic fields quotients[J].Finite Fields and Their Applications,2007,(03):563-576.
  • 9Bao Feng,Lee Chengchi,Hwang Min-Shiang. Cryptanalysis and improvement on batch verifying multiple RSA digital signature[J].Applied Mathematics and Computation,2006,(02):1195-1200.
  • 10孙国梓,林清秀,陈丹伟.密钥加密实验平台的研究与实现[J].计算机技术与发展,2009,19(8):144-147. 被引量:3

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部