期刊文献+

对称密码算法专用描述语言算符优先级的设计

Designing for the Operator Priority of the Special Description Language for the Symmetric Cryptographic Algorithm
下载PDF
导出
摘要 对称密码算法专用描述语言以类似专业语言的思维方式描述算法的设计思想。密码算法具有很强的严密性和逻辑性,为了提高算法描述语言的逻辑性和准确性,本文在算法描述语言的语法体制中增加了算符优先级的机制。本文基于ANTLR来实现表达式的语法规则,并根据表达式的语法规则,采用LL分析法创建表达式语法树实现表达式的语法和语义分析,同时为了存储表达式的信息,设计了专门的存储结构来实现算符的优先级。最后通过严格测试验证了算符优先级设计的合理性与实现的正确性。实践结果表明,应用优先级可以更加准确描述密码算法,为SDLSCA推广应用打下了坚实的理论和实际基础。 In this paper, on the basis of the analysis of designing rules and features of a large number of public cryptographic algorithms and according to the thinking patterns and habits of experts in crypto- graphic and with reference to general procedure priority, the operator priority of SDLSCA is designed and implemented. By describing the expression storage structure, grammar rules and the grammar tree, a detailed introduction is given on the implementation principles and methods of tice shows that applying operator priority can make it more precise to describe ope the rator priority. Praccryptographic algo- rithm, which has laid a solid theory and practice foundation for application and dissemination of SDLSCA.
出处 《北京电子科技学院学报》 2013年第2期56-60,共5页 Journal of Beijing Electronic Science And Technology Institute
基金 国家自然科学基金(No.61170251 No.60633020 No.60702059) 教育部重点项目(No.209156) 北京市自然科学基金(No.4102056) 新闻出版重大科技工程项目-数字版权保护技术研发工程(No.GXTC-CZ-1015004/05) 北京电子科技学院工程科研基金(No.YZDJ1003)~~
关键词 对称密码算法专用描述语言 算符 优先级 语法规则 语义分析 存储结构 Special Description Language Symmetric Cryptographic Algorithm Operator Priority
  • 相关文献

参考文献3

二级参考文献25

  • 1J R Lewis,B Martin. Cryptol: high assurance,retargetable crypto development and validation[ A ]. In Proceedings of the 2003 Military Communications Conference [ C ]. IEEE Press, 2003. 820 - 825.
  • 2J R Lewis. Cryptol: specification, implementation and verification of high-grade cryptographic applications[ A ]. In Proceedings of the 2007 ACM workshop on formal methods in security engineering[ C]. Virginia, USA: ACM,2007.41 - 41.
  • 3Cryptoh the language for cryptography, Case Study [ OL ]. Available at http://www. galois. com/files/CryptoL/Cryptol_ casestudy. pdf, Oct 2008.
  • 4Cryptoh the language for cryptography, Programming Guide [ OL ]. Available at http://www. galois. com/files/Cryptol/Cryptol_ Programming_ Guide. pdf, Oct 2008.
  • 5M B Shields. A language for symmetric-key cryptographic algorithms and its implementation[ R]. Galois Connections Technical Report,22 pages,Mar 2006.
  • 6L Pike, M Shields, J Matthews. A verifying core for a cryptographic language compiler[ A]. In Proceedings of the 6th international workshop on the ACL2 theorem prover and its applications[ C]. Washington, USA: ACM,2006.1 - 10.
  • 7M Marjan, H Jan, M S Anthony. When and how to develop Domain Specific Languages [J]. ACM Computing Surveys, 2005,37:316- 344.
  • 8K Toma, E M Pablo, A Pablo. A preliminary study on various implementation approaches of domain-specific language[ J] .Information and Software Technology, 2008,50(5) : 390 - 405.
  • 9A Deursen, P Klint. Domain-specific languages: an annotated bibliography[ J ]. ACM SIGPLAN Notices, 2000,35 (6) : 26 - 36.
  • 10D L Atkins,T Ball,G Bruns,et al. Mawl:A Domain-Specific Language for Form-Based Services[ J]. IEEE Transactions on Software Engineering, 1999,25(3) :334 - 346.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部