期刊文献+

网络资源交流信息传输单向加密仿真研究 被引量:7

Research on the Simulation of Network Resource Exchange Information Transmission Based on One-Way Encryption
下载PDF
导出
摘要 对网络资源交流信息传输单向加密方法的研究,能有效提高网络资源存储的安全性。对信息传输的单向加密,需要获得单向传输加密的信息编码的散列值,分别恢复出网络信源的编码矢量,完成交流信息传输单向加密。传统方法生成伪随机序列,对数据块的数值进行变换,但忽略了恢复出网络信源的编码矢量,导致加密效果差。提出基于椭圆曲线加密的网络资源交流信息传输单向加密方法。通过按组加密形式将信息映射为加密源演进结构后,将加密后的网络信息数据作为种子衍生集合,对该组加密信息进行二次离散化优化,产生加密所需的一个参数密钥,获得网络单向传输加密的信息编码的散列值,分别恢复出网络信源的编码矢量,得到网络资源交流信息传输单向加密密钥排列图,由此实现网络信息优化加密传输。实验结果表明,所提方法具有较好的信息加密传输性能,拥有较低的密文破译度。 An one-way encryption method of exchange information transmission of network resource is presented based on elliptic curve encryption. The information is mapped to evolution structure of encryption source via encryp- tion form by group, then the encrypted network information data are used as spanning set of seed, and quadratic dis- to generate a parameter secret key. The hashed value of is obtained, and encoder vector of network information secret key of the one-way encryption is obtained. Thus, the optimization encryption transmission of network information is completed. Simulation results show that the method has good transmission performance of information encryption and low degree of cryptograph encoding.
作者 贺令亚
出处 《计算机仿真》 北大核心 2017年第9期183-186,共4页 Computer Simulation
关键词 网络资源 通信信息传输 单向加密 Network resource Exchange information transmission One-way encryption
  • 相关文献

参考文献10

二级参考文献120

  • 1黄道林,杨军.RC4加密算法的FPGA设计与实现[J].云南大学学报(自然科学版),2009,31(S1):80-83. 被引量:5
  • 2刘珍桢.AES加密算法的一种优化的FPGA实现方法[J].现代电子技术,2007,30(23):103-106. 被引量:4
  • 3王继峰.基于可达性的交通规划方法研究[D].北京:清华大学,2010.
  • 4Wikipedia.Comparison of online backup services[EB/OL],(2014-01-27)[2014-01-28].http://en.wikipedia.org/wiki/Comparison of online backup services.
  • 5Dropbox Corporation.Dropbox cloud service[EB/OL],2007[2014-01-28].http://www.dropbox.com/.
  • 6Wuala Corporation.Wuala[EB/OL].2009[2014-01-28].http://www.wuala.com/.
  • 7Dutch M.Understanding data de-duplication ratios[EB/OL].(2009-02-01)[2014-01-28].http://www.snia.org/.
  • 8Harnik D,Pinkas B,Shulman-Peleg A.Side channels incloud services,the case of deduplication in cloud storage[J].IEEE Security and Privacy Magazine,2010,8(6):40-47.
  • 9Halevi S,Harnik D,et al.Proofs of ownership in remotestorage systems[C]//Proc of the 18th ACM Conf on Computer and Communications Security.New York:ACM,2011:491-500.
  • 10Mulazzani M,Schrittwieser S,et al.Dark clouds on thehorizon:Using cloud storage as attack vector and online slackspace[C]//Proc of the 20th USENIX Security Symposium.Berkeley:USENIX Association,2011:5-15.

共引文献76

同被引文献71

引证文献7

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部