期刊文献+

后量子密码体制在信息安全等级保护中的运用分析 被引量:2

Analysis of the Application of Post-Quantum Cryptosystem in Information Security Level Protection
下载PDF
导出
摘要 密码体制是信息安全等级保护的重要技术,公钥密码体制作为信息安全保护密码体制中的重要组成部分,目前已被普遍应用到计算机系统中。后量子密码体制的提出与应用,加强了计算机信息安全等级保护。对此,从后量子密码算法概述出发,对后量子密码体制在信息安全等级保护中的运用进行分析,以供参考。 Password system is an important technology of information security rank protection,public key cryptosystem as an important sector in the system of information security protection password,has been widely applied to the computer system.The development and application of the quantum cryptographic system enhances the protection of information security of quantum computer.In this paper,starting from an overview of post quantum cryptography algorithms,the author analyzes the application of the post-quantum cryptography system in the protection of information security level for reference.
作者 潘峰 Pan Feng(China Shipbuilding Industry Corporation 722 Research Institute,Wuhan Hubei 430205,China)
出处 《信息与电脑》 2017年第18期211-212,共2页 Information & Computer
关键词 后量子密码 信息安全等级保护 密码学 post-quantum password information security level protection cryptography
  • 相关文献

参考文献1

二级参考文献11

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Weis S,Sarma S,Rivest R. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[A].Berlin,Germany,2003.454-469.
  • 3Ohkubo M,Suzuki K,Kinoshita S. Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID[A].Sendai,Japan,2004.719-724.
  • 4Henrici D,Muller P. Hash-based Enhancement of Location Privacy for Radiofrequency Identification Devices Using Varying Identifiers[A].Orlando,USA,2004.149-153.
  • 5Molnar D,Wagner D. Privacy and Security in Library RFID:Issues, Practices and Architectures[A].Washington D.C.,USA:ACM Press,2004.210-219.
  • 6Feldhofer M,Dominikus S,Wolkerstorfer J. Strong Autenti-cation for RFID Systems Using the AES Algorithm[A].Berlin,Germany,2004.357-370.
  • 7张焕国;管海明;王后珍.抗量子密码体制的研究现状[A]北京:中国密码学会,20111-31.
  • 8Chen Yuyi,Lu Junchao,Chen Shini. A Low-cost RFID Authentication Protocol with Location Privacy Protection[A].Xi’an,China,2009.109-113.
  • 9Kang S Y,Lee D G,Lee I Y. A Study on Secure RFID Mutual Authentication Scheme in Pervasive Computing Environ-ment[J].Computer Communications,2008,(18):4248-4254.
  • 10步山岳.NTRU公开密钥体制算法分析与实现[J].计算机工程,2002,28(6):111-113. 被引量:10

共引文献6

同被引文献9

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部