期刊文献+

基于SCA安全规范的无线电加密子系统设计

DESIGNING RADIO CRYPTOGRAPHIC SUB-SYSTEM BASED ON SCA SECURITY SPECIFICATION
下载PDF
导出
摘要 针对无线电信息传输存在的安全性问题,通过对无线通信系统中加密体系结构的深入研究,结合软件通信体系结构安全规范执行措施,对加密体系结构的核心模块加密子系统进行了设计,并详细描述了该子系统内部各结构模块的工作原理和主要功能。设计的加密子系统为用户与无线电之间的传输信道实施加密,达到了安全通信的目的。 Aiming at the security problem in transmission of radio information,in the paper we designed a cryptographic sub-system which is the core module of cryptographic architecture after studying thoroughly the cryptographic architecture in wireless communication system and in conjunction with the implementation measures of software communication architecture(SCA) security specification.The working principle and major function of each structure module in the sub-system are also described in detail.The designed cryptographic sub-system encrypts the transmission channel between user and radio,and the goal of safe communication is achieved.
作者 王赢 汪立新
出处 《计算机应用与软件》 CSCD 2010年第10期284-287,共4页 Computer Applications and Software
关键词 软件通信体系结构 安全规范 加密体系结构 加密子系统 Software communication architecture Security specification Cryptographic architecture Cryptographic sub-system
  • 相关文献

参考文献8

  • 1Joint Tactical Radio System (JTRS) Joint Program Office (JPO).Software Communications Architecture,MSRC-5000 SCAV2.2[EB/OL].http://sca.jpeojtrs.mil/_downloads.asp?folder=SCAv2_2&file=SCA_v2_2.zip,2001-11-17.
  • 2Joint Tactical Radio System (JTRS) Joint Program Office (JPO).Security Supplement to the Software Communications Architecture Specification,MSRC-5000 SEC V1.1[EB/OL].http://sca.jpeojtrs.mil/downloads.asp?ID=2.2,2001-11.
  • 3Joint Tactical Radio System (JTRS) Joint Program Office (JPO).Functional Security Requirements for JTRS,MSRC-5000 SEC Appendix A to the Security Supplement (Functional Requirements) v1.1[EB/OL].http://sca.jpeojtrs.mil/downloads.asp?ID=2.2/SCA Version 2.2,2001-11.
  • 4[美]Wendy Boggs,Michael Boggs.UML与Rational Rose 2002入门到精通[M].邱仲潘,译.北京:电子工业出版社,2002.
  • 5于增贵.数字签名和数字签名标准[J].四川通信技术,2001,31(5):51-53. 被引量:3
  • 6李春光,孙朝霞.基于安全散列算法的口令安全机制及其java实现[J].青岛理工大学学报,2005,26(5):67-70. 被引量:2
  • 7范慧霞,郑喜珍,杨静.循环冗余码校验原理及其实现[J].科技资讯,2007,5(36):246-246. 被引量:2
  • 8Glen Nakamoto,Lisa Higgins,Justin Richer.Scalable HAIPE discovery using a DNS-like referral model[J/OL].MITRE Coporation,2005.http://www.mitre.org/work/tech_papers/tech_papers_05/05_0966/05_0966.pdf.

二级参考文献4

  • 1William Stallings. Network Security Essentials: Applications and Standards. Prentice Hall inc, 2000.
  • 2James H. Burrows. Secure Hash Algorithm (SHA-1) http://www.itl.nist.gov/fipspubs/fip 180-1.htm.
  • 3David K Black.The Digital Signature Standard: Overview and Current Status[].Computers and Security.1993
  • 4张秀虹,栾淑杰,韩彦稳.网络安全与数字签名技术[J].青岛建筑工程学院学报,2003,24(1):57-59. 被引量:2

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部