期刊文献+

基于Blowfish和MD5的混合加密方案 被引量:15

Hybrid encryption scheme based on Blowfish and MD5
下载PDF
导出
摘要 针对Blowfish算法在实际应用中存在的等价密钥、重复初始化等问题,提出Blowfish与MD5算法相结合,将MD5算法的生成值作为密钥的一部分对Blowfish算法进行初始化,使用概率统计方法证明该方案弥补了Blowfish算法的实际应用缺陷。计算结果表明,混合加密方案具有更高的安全性、更快的速度。 In order to deal with the practical application problems of the Blowfish algorithm such as equivalent key, repeat initialization and so on, this paper proposed to combine with MD5 algorithm, and used MD5 output as a part of key to initialize Blowfish algorithm, used probability statistics to prove that the scheme could make up for the Blowfish algorithm drawbacks in practical application. The research shows that the hybrid encryption scheme has a higher security and faster speed than Blowfish.
出处 《计算机应用研究》 CSCD 北大核心 2010年第1期231-233,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60773083) 省部产学研资助项目(2008B090500201)
关键词 BLOWFISH算法 MD5算法 等价密钥 重复初始化 概率统计 Blowfish algorithm MD5 algorithm equivalent key repeat initialization probability statistics
  • 相关文献

参考文献14

  • 1SCHNEIER B. Description of a new variable-length key,64 bit block cipher (Blowfish) [ C ]//Proc of FastSoftware Encryption, the Cambridge Security Workshop. London : Springer-Verlag, 1994 : 191-204.
  • 2Stallings W.密码编码学与网络安全:原理与实践[M].孟庆树,王丽娜,傅建明,等译.北京:电子工业出版社,2006.
  • 3SCHNEIER B.应用密码学[M].吴世忠,译.北京:机械工业出版社,2000.
  • 4MANZANARES A I,SIERRA C J M, MARQUEZ J T. On the implementation of security policies with adaptative encryption [J]. Computer Communications ,2006,29 ( 2 ) :2750-2758.
  • 5姚亮,陈克非,朱学正.一种基于混合密码体制的网络数据安全方案[J].计算机工程,2003,29(2):174-176. 被引量:4
  • 6HARRIS S, ADAMS C. Key-dependent S-box manipulations [ C ]// Proc of the Selected Areas in Cryptography. Berlin: Springer-Verlag, 1999:631-632.
  • 7SCHNEIER B. The Blowfish encryption algorithm[ EB/OL]. (1995- 09 ). http ://www. schneier, com/paper-blowfish-oneyear, html.
  • 8BIRYUKOV A, WAGNER D. Slide attacks [ C ]//Proc of FastSoftware Encryption. Berlin : Springer-Verlag, 1999:245- 259.
  • 9NAKAHARA J. A linear analysis of Blowfish and Khufu [ C ]//Proc of Information Security Practice and Experience. Berlin : Springer-Verlag, 2007 : 20- 32.
  • 10VAUDENAY S. On the weak keys of Blowfish[ C]//Proc of the 3rd International Workshop on FastSoftware Encryption. London:SpringerVerlag, 1996 : 27- 32.

二级参考文献4

  • 1[美]STALLINGS W.密码编码学与网络安全:原理与实践[M].刘玉珍,王丽娜,傅建明,译.3版.北京:电子工业出版社,2004:132-136.
  • 2BIRYUKOV A, WAGNER D. Slide attacks[C]// Fast Software EncryptionFSE'99, LNCS 1636. Berlin: Springer-Verlag, 1999: 245 - 259.
  • 3VAUDENAY S. On the weak keys of blowfish[C]//Proceedings of the Third International Workshop on Fast Software Eneryption, LNCS 1039. London: Springer-Verlag, 1996:28-32.
  • 4SCHNEIER B. Description of a new variable-length Key, 64 bit block cipher (Blowfish) [C]//Fast Software Encryption, Proceedings of the Cambridge Security Workshop, LNCS 809. London: Springer-Verlag, 1994; 191 -204.

共引文献36

同被引文献84

引证文献15

二级引证文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部