期刊文献+

基于旋转矩阵的加密解密算法

Encryption and Decryption Algorithm Based on Rotation Matrix
下载PDF
导出
摘要 利用舍入误差分析的方法及计算机浮点运算的特性,构造一种基于旋转矩阵的加密解密算法,并提出了保证算法有效的充分条件.应用实例验证了算法的可行性. Using the method of round-off error analysis and the characteristics of computer-floating-point operation,we constructed a new kind of encryption and decryption algorithm based on rotation matrix. Then we proposed sufficient conditions for the validity of the algorithm. Finally,we used some numerical examples to verify the feasibility of the algorithm.
出处 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2016年第2期229-233,共5页 Journal of Jilin University:Science Edition
基金 国家自然科学基金(批准号:J1310022 11371171)
关键词 加密解密算法 旋转矩阵 舍入误差分析 encryption and decryption algorithm rotation matrix round-off error analysis
  • 相关文献

参考文献9

  • 1Shannon C E. Communication Theory of Secrecy Systems J. Bell System Technical Journal, 1949, 28(4). 656-715.
  • 2高献伟,周玉坤,路而红,冼立勤.DES算法硬件实现的研究[J].北京电子科技学院学报,2001,9(1):11-16. 被引量:3
  • 3Diffie W, Hellman M E. New Directions in Cryptography [J]. IEEE Transactions on Information Theory, 1976, 22(6) . 644-654.
  • 4GU Lize, ZHENG Shihui. Conjugacy Systems Based on Nonabelian Faetorization Problems and Their Applications in Cryptography J/OLd. Journal of Applied Mathematics, 2014-04-28. http://dx, doi. org/10. 1155/2014/630607.
  • 5Rivest R L, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public Key Cryptosystems EJ. Communications of theACM, 1978, 21(2): 120-126.
  • 6张焕国,刘金会,贾建卫,毛少武,吴万青.矩阵分解在密码中应用研究[J].密码学报,2014,1(4):341-357. 被引量:6
  • 7冯果忱,黄明游,刘停战,等.数值分析:上册[M].北京:高等教育出版社,2011:4-16;31-32.
  • 8杨晓元,苏光伟,张敏情.基于Kerckhoffs原则的图像隐密算法[J].武汉大学学报(理学版),2009,55(1):67-70. 被引量:4
  • 9杜现昆,原永久,牛凤文,等.高等代数[M].北京:高等教育出版社,2012:45.

二级参考文献26

  • 1Aura T. Practical Invisibility in Digital Communication [C]//Proceedings of First International Workshop on Information Hiding. London: Springer-Verlag, 1996 : 265-278.
  • 2Cox J I, Miller L M, Bloom A J. Digital Watermarking [M]. New York : Academic Press, 2002 : 198-204.
  • 3Zllner J, Federrath H, Klimant H,et al. Modeling the Security of Steganographic Systerns[C]//Proceedings of the Second International Workshop on Information Hiding. Berlin : Springer-Verlag, 1998 : 344-354.
  • 4Chandramouli R,Memon N. Steganography Capacity: A Steganalysis Perspective [C]//Proceedings of SPIE on Security and Watermarking of Multimedia Contents. Bellingham : SPIE, 2003 : 173-177.
  • 5周琳娜,白金茹,郭云彪.数理统计特性与信息隐藏系统的安全性[C].见:全国第四届信息隐藏学术研讨会论文集,北京,2002:28~33
  • 6Srinivasan Krishnaswamy,Harish K. Pillai.On the number of special feedback configurations in linear modular systems[J].Systems & Control Letters.2013
  • 7Claude-Pierre Jeannerod,Clément Pernet,Arne Storjohann.Rank-profile revealing Gaussian elimination and the CUP matrix decomposition[J].Journal of Symbolic Computation.2013
  • 8Lize Gu,Licheng Wang,Kaoru Ota,Mianxiong Dong,Zhenfu Cao,Yixian Yang.New public key cryptosystems based on non‐Abelian factorization problems[J].Security Comm Networks.2013(7)
  • 9D. J. Jeffrey.LU factoring of non-invertible matrices[J].ACM Communications in Computer Algebra (/).2010(1/2)
  • 10Andrius Raulynaitis,Eligijus Sakalauskas,Saulius Japertas.Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem[J].Informatica.2010(2)

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部