期刊文献+

基于AES和ECC的混合密码体制 被引量:2

A Hybrid Cryptosystem Based on AES and ECC
下载PDF
导出
摘要 近年来,有不少专家和学者致力于密码学的研究,并研发出相关的安全产品,为推动网络通信、数字签名等的发展作出了巨大的贡献.对称加密算法具有高速,高效和便于实现的特点,但它存在密钥分配和管理上的缺陷.而非对称加密算法具有密钥分发和管理简单,但是速度比较慢的特点.本文使用AES对称加密算法加密报文数据,ECC非对称加密算法生成数字签名,从而既保障了数据在网络传输过程中的安全性,又完成了数字签名.这种基于AES和ECC的混合体制可以有效提高信息传输的安全性和高效性. In recent years, many experts and scholars have worked at the study of cryptography and have developed related security products, which make the enormous contribution to the development of network communication and digital signature. Symmetric algorithm is characterized with high speed, high efficiency and easy implementation, but it has defects in key distribution and management. Asymmetric algorithm has simple key distribution and management, but its speed is slow. This paper uses AES and ECC to encrypt messages and create digital signatures respectively, which not only provide strong security guarantee in the course of data transmission, but also realize digital signature. This hybrid cryptosystem based on AES and ECC can effectively enhance the security and efficiency in data transmission.
出处 《科技信息》 2011年第9期39-41,共3页 Science & Technology Information
关键词 AES ECC 混合密码体制 AES ECC Hybrid cryptosystem
  • 相关文献

参考文献7

  • 1B.schneier.应用密码学协议、算法与c源程序[M].北京:机械工业出版社,2000.
  • 2W.Trappe,L.C.Washington.密码学概论[M].北京:人民邮电出版社,2004.
  • 3W. Diffie, E. Henman. New directions in cryptography [J]. IEEE Transactions on information Theory, 1976,22(5):644-654.
  • 4肖国镇,白恩健,刘晓娟.AES密码分析的若干新进展[J].电子学报,2003,31(10):1549-1554. 被引量:31
  • 5V.S. Miller. Use of elliptic curves in cryptography [C]. In: Advances in Cryptology -Crypto' 98, LNCS 128, Springer-Verlag, 1986, 128:417-426.
  • 6杨成卫.基于AES和ECC的混合密码系统研究[J].河南科学,2006,24(2):274-276. 被引量:3
  • 7T. ElGamal. A public key eryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Transactions on information Theory,1985,31:469-472.

二级参考文献30

  • 1M Matsui. Linear cryptanalysis method for DES cipher[ A]. Advances in Cryptology, Proceedings of Eurocrypt ' 93 [ C ].Lofthus, Norway:Spfinger-Verlag. 1994.386 - 397.
  • 2J Daemen,L Knudsen, V Rijnmen. The block cipher Square[ A]. Fast So-ftware Encryption, Fourth International Workshop[ C]. Haifa, Israel:Springer-Verlag. 1997.149 - 165.
  • 3L R Knudsen. Block ciphers: state of the art[ R]. Copies of transparencies for lecture at the International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography. Katholieke Unive-rsiteit Leuven, Belgium, 1997.
  • 4Y Hu, Y Zhang, G Xiao. Integral cryptanalysis of SAFER + [ J]. Electroni-es Letters, 1999,35(17) : 1458 - 1459.
  • 5L R Knudsen, D Wagner. Integral cryptanalysis [ EB ]. Available:https://www. cosic. esat. kuleuven, ac. be/nessie.
  • 6N Ferguson, J Kelsey, et al. Improv-ed cryptanalysis of Rijndael[ A].Fast Software Encryption, 7th lnternat-ional Workshop, FSE 2000[ C ].NewYork, USA: Springer-Verlag, 2001.213 - 230.
  • 7T Jakobsen, L Knudsen. The interpolation attack on block ciphers[ A].Fast software encryption, fouth international workshop[ C ]. Haifa, Israel: Springer-Verlag. 1997.28 - 40.
  • 8Paul Kocher, Joshua Jaffe, Benjamin Jun, Introduction to differential power analysis and related attacks[ EB]. Available: http://www. cryptography. com/dpa./technical.
  • 9P Kocher, J Jatte, B Jun. Differential power analysis[A]. Advanced in Cryptology-CRYPTO' 99 [ C ]. California, USA: Springer Verlag. 1999.388 - 397.
  • 10J Damen, V Rijmen. Resistance againstimplementation attacks, a comparative study of the AES proposals[A] .Second AES Conference[C].Rome, Itary, 1999. Available: http://csrc. nist. gov/CryptoTcolkit/aes/roundl/conf2/aes2conf, htm.

共引文献32

同被引文献20

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部