期刊文献+

一种安全的即时通信解决方案 被引量:3

Solution to secure instant messaging
下载PDF
导出
摘要 针对即时通信中存在的各种安全问题,提出一种基于椭圆曲线密码体制的安全解决方案。方案使用了椭圆曲线密码体制进行密钥管理和会话密钥协商,保证客户端与服务器端,客户端与客户通信的确认性、机密性和完整性。实验结果表明,该方案具有较好的安全性和执行性能。 This paper proposes a solution to the secure Instant Messaging(IM) based on Elliptic Curve Cryptosystem(ECC) for a verity of security issues in IM.The solution applies ECC to key management and session key negotiation.So it can ensure the authentication,confidentiality and integrity of the communication in client-server and client-client.Experimental results show that the solution has high security and performance.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第3期82-83,93,共3页 Computer Engineering and Applications
关键词 即时通信 椭圆曲线 证书 安全密钥 Instant Messaging(IM) elliptic curve certificate security key
  • 相关文献

参考文献9

  • 1Mannan M,van Oorschot P C.Secure public instant messaging A survey[C]//Proceedings of International Conference on Privacy,Securing and Trust(PST'04),2004.
  • 2IT Strategy Center Staff.The coming IM threat[EB/OL].[2009-03].http://www.itstrategyeenter.com/itworld/Threat/viruses/coming im threat.
  • 3李玮,侯整风.SSL协议安全缺陷分析[J].计算机技术与发展,2006,16(12):224-226. 被引量:4
  • 4Maansn M,van Oorschot P C.A protocol for secure public instant messaging[C]//Proccedings of Financial Cryptography and Data Security,2006.
  • 5秦志光.密码算法的现状和发展研究[J].计算机应用,2004,24(2):1-4. 被引量:54
  • 6Pollard J M.Monte Carlo methods for index computation mod p[J].Mathematics of Computation,1978,32(143):918-924.
  • 7Pohlig S,Hellman M.An improved algorithm for computing logarithms over GF(P)and its cryptographic significance[J].IEEE Transactions on Information Theory,1978,24:106-110.
  • 8Adams C,Steve L.公开密钥基础设施--概念、标准和实施[M].北京:人民邮电出版社,2001.
  • 9SchneierB.应用密码学-协议、算法与C源程序[M].北京:机械工业出版社,2000..

二级参考文献6

共引文献62

同被引文献30

  • 1刘淳,张凤元,张其善.基于智能卡的RSA与ECC算法的比较与实现[J].计算机工程与应用,2007,43(4):96-98. 被引量:10
  • 2于少山,卡米力.毛依丁.基于XML的即时通信系统的研究与实现[J].重庆邮电大学学报(自然科学版),2007,19(B06):59-61. 被引量:8
  • 3Nagel C,Evjen B,Glynn J.C抖高级编程.第6版.北京:清华大学出版社,2008.854-862.
  • 4Evjen B, Hanselman S, Rader D. ASP. NET 3.5高级编程.第5版.北京:清华大学出版社,2008.849—881.
  • 5PETHE H B,PANDE S R.A survey on different secret key cryp-tographic algorithms[J].Ibmrds Journal of Management&Research,2014,3(1):142-150.
  • 6Zhang Haibin,Ji Xiaoping,Wu Boying,et al.Fast elliptic curve point multiplication algorithm optimization[J].Applied Mechanics and Materials,2014,441:1044-1048.
  • 7江志祥,蔺志青.椭圆曲线密码体制[EB/OL].(2008-01-02)[2015-12-10].//www.paper.edu.cn/html/releasepaper/2008/01/21.
  • 8PAAR C,PELZL J.Understanding cryptography:a textbook for students and practitioners[M].Berlin:Springer-Verlag,2009-12.
  • 9CRYPTOGRAPHY E C.The advantages of elliptic curve cryptography for wireless security[J].IEEE Wireless Communications,2004,2:62-67.
  • 10莫佳.XPath在XML查询中的应用[J].重庆三峡学院学报,2008,24(3):51-53. 被引量:6

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部