期刊文献+

融合多重加解密算法的保密通信系统 被引量:11

Secure communication system with combination of multiple encryption algorithm
下载PDF
导出
摘要 针对移动电子商务中的信息安全需求,提出一种融合AES、RSA和CPRS混沌3种加解密方式的保密通信系统。分析系统实现原理,设计三层密钥模型和3种加密算法在系统中的优化实现过程,发挥3种加密算法各自的优势,对程序执行代码、用户身份和语音等信息进行多重加密。实验结果表明,该方法可以克服传统单一方法在密钥管理上的缺陷,增加了加密的安全性,可有效用于移动电子商务等保密传输系统,具有良好的数据保密通信效果。 For information security needs in mobile E-commerce, a secure communication system was proposed, which integrated three kinds of encryption and decryption methods including AES, RSA and CPRS. The system implementation principles, three key models and three encryption algorithms were described respectively in optimized implementation of the system, three encryp- tion algorithms of their respective advantages were fully taken advantage of by the system, multiple encryption was conducted on program execution code, the user identity and voice information etc. Experimental results show that the method can overcome the de- fects of traditional single method of the key management, greatly increasing the security of the encryptiora The method can be effectively used for mobile electronic commerce security transmission system. It has good effect on data encrvDtion communication.
出处 《计算机工程与设计》 北大核心 2017年第4期936-940,共5页 Computer Engineering and Design
关键词 加密算法 通信系统 混沌伪随机序列(AES) 循环冗余加密(RSA) 单向祸合环状迭代(CPRS) encryption algorithm communication system AES RSA CPRS
  • 相关文献

参考文献6

二级参考文献49

  • 1王继林,伍前红,陈德人,王育民.匿名技术的研究进展[J].通信学报,2005,26(2):112-118. 被引量:16
  • 2吴振强,马建峰.一种无线Ad Hoc网络动态混淆匿名算法[J].计算机研究与发展,2007,44(4):560-566. 被引量:8
  • 3林闯,雷蕾.下一代互联网体系结构研究[J].计算机学报,2007,30(5):693-711. 被引量:64
  • 4赵佳,曾晓洋,韩军,陈俊.简化的抗零值功耗分析的AES算法及其VLSI实现[J].计算机工程,2007,33(16):220-222. 被引量:1
  • 5崔建琪,姚丹霖.新的基于WAP的移动电子商务安全解决方案[J].计算机应用研究,2007,24(9):99-101. 被引量:5
  • 6I Alioto M,Poli M, Rocchi S.A general power model of differ- ential power analysis attacks to static logic circuits [ J ]. W.EF. Transactiom on Very Large Scale Integration (VLSI) Systems, 2010,18(5) :711 - 724.
  • 7Wu K, Li H,Yu F. Relrieving lost efficiency of scalar multipli- cations for resisting against side-channel attacks [ J 1. Journal of computers,2010,5(12) : 1878 - 1884.
  • 8Akkar M L, Giraud C. An implementation of DES and AES, secure against some attacks[ A] . of the 3rd Internation- al Workshop on Cryptographic Hardware and Emded Systems[ C]. Paris:2001.309 - 318.
  • 9Golic J D, Tymen C. Multiplicative masking and power analysis of AES [ A ]. Proceed of the 4th International Workshop on Cryptographic Hardware and Embedded Systems[ C]. Cologne: 2003. 198 - 212.
  • 10Ors S B, Gurkaynak F, Oswald E, et al. Power analysis attack on an ASIC AES implementation[ A ]. Proceed of International Conference on Information Technology:Coding and Computing EC]. as Vegas:2004.546 - 552.

共引文献72

同被引文献87

引证文献11

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部