期刊文献+

基于智能IC卡的高速流加密系统研究 被引量:1

Research of High-speed Stream Encryption System Base on Smart IC Card
下载PDF
导出
摘要 本文设计并实现了一种以流加密算法为思想并结合智能IC卡技术的高速加密系统.通过矩阵群和基于地址的取数方法,本文设计并实现了伪随机序列产生算法,并将伪随机序列产生算法和智能IC卡结合在一起,将发生器的矩阵群及算法内置于智能IC中,为整个系统提供了安全保证.所产生的随机序列通过了FIPS140-2标准测试,智能IC卡芯片通过USB接口连接计算机,软、硬结合的方式保障了加密系统的安全和加密速度. A high--speed encryption system base on a stream encryption algorithm and smart IC card technology was proposed firstly and the pseudorandom series algorithms were designed and realized by matrix group and an address method in this paper. And then we have combined the pseudo--random series algorithm with smart IC card by putting the matrix group into the smart IC card. Doing it provides a security guarantee for the entire system. Finally, the pseudo--random series generator created in this paper was passed the FIPS140--2 standard test and the smart card IC chip was connected to the computer via the USB interface. An innovative method to combine a soft and hard design in cryptographic technology provides a tool to protect system security and encryption speed.
出处 《微电子学与计算机》 CSCD 北大核心 2013年第4期53-57,62,共6页 Microelectronics & Computer
基金 国家自然科学基金项目(61162010)
关键词 智能IC卡 伪随机序列 流加密 高速加密系统 Smart IC card pseudo--random series stream encryption high--speed encryption system
  • 相关文献

参考文献9

  • 1RichardSpillman.经典密码学与现代密码学[M].叶阮健,曹英,张长富,译.北京:清华大学出版社,2005.
  • 2卿斯汉.密码环境中的伪随机数生成器[J].计算机研究与发展,1987,24(9):17-22.
  • 3Matsumoto M, Nishimura T. Mersenne twister: a 623 -dimensionally equidistributed uniform pseudo-random number generator[J]. ACM transaction on modeling and computer simulation, 1998,8( 1 ): 3-30.
  • 4Blum L, Blum M, Shub M. A simple unpredictable pseudo-random number generator[J]. SIAM Journal on Computing, 1986,15(2):364-383.
  • 5王蕾,汪芙平,王赞基.一种新型的混沌伪随机数发生器[J].物理学报,2006,55(8):3964-3968. 被引量:31
  • 6Chunhua Yang,Qing Xue, Lijun Tian. An encryption algorithm based on transformed logistic map[C]//International Conference on Networks Security, Wireless Communications and Trusted Computing. Changsha, China, 2009:111-114.
  • 7Lian Li, Mingyu Chen. An improved BMP image encryption algorithm based on logistic map[C]//International conference on computer and communication technologies in agriculture engineering. Yantai, China, 2010:576-578.
  • 8Gang Zhang, Zeng shantian. A chaotic secure communication scheme based on logistic map[C]//International Conference on Computer Application and System Modeling. Chongqing, China, 2010 : 589- 591.
  • 9National institute of standards and technology. FIPS 140-2-2001 security requirements for cryptographic modules [S]. Washington DC: American National Standards Institute, 2001.

二级参考文献8

共引文献38

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部