期刊文献+

国产商用密码算法研究及性能分析 被引量:26

DOMESTIC COMMERCIAL CRYPTOGRAPHIC ALGORITHM AND ITS PERFORMANCE ANALYSIS
下载PDF
导出
摘要 信息时代已经到来,海量信息在方便人们生活的同时,也让信息安全问题层出不穷。密码技术作为信息安全的最大保护手段受到各界的极大重视。结合已有的研究,对国内密码技术的算法特点、性能、安全性和具体应用情况等进行研究和比较,并对我国国产商用密码体系的完善和发展进行了分析。 The information age has come.Massive information not only facilitates people s life,but also makes information security problems emerge endlessly.As the most important means of information security protection,cryptography technology has received great attention from all walks of life.Based on the existing research literature,this paper studied and compared the algorithm characteristics,performance,security and specific application of domestic cryptography technology,and analyzed the improvement and development of domestic commercial cryptography system.
作者 姚键 Yao Jian(State Administration of Taxation Beijing Tax Bureau, Beijing 100026, China)
出处 《计算机应用与软件》 北大核心 2019年第6期327-333,共7页 Computer Applications and Software
关键词 商用密码 信息安全 国密 对称密码 公钥密码 Commercial cryptography Information security National secret Symmetric cryptography Public key cryptography
  • 相关文献

参考文献6

二级参考文献23

  • 1高娜娜,李占才,王沁.一种可重构体系结构用于高速实现DES、3DES和AES[J].电子学报,2006,34(8):1386-1390. 被引量:19
  • 2Boura C,Canteaut A. Zero-sum distinguishers for iterated permutations and application to Keccak-f and Hamsi-256. In: Proceedings of the 17th International Workshop on Selected Areas in Cryptography 2010 Aug 12 13,Waterloo,Ontario,Canada. Waterloo: LNCS Springer Press,2010. 1-17.
  • 3Boura C,Canteaut A,Cannière C D. Higher-order differential properties of Keccak and Luffa,In: Proceedings of the 18th International Workshop on Fast Software Encryption 2011 Feb 14 16,Lyngby, Denmark. Lyngby: LNCS Springer Press,2011. 252-269.
  • 4Lai X J. Higher order derivatives and differential cryptanalysis. In: Communications and Cryptography: Two Sides of One Tapestry 1994,Switzerland. Switzerland: Kluwer Adademic Publishers,1994. 227-233.
  • 5Canteaut A,Videau M. Degree of composition of highly nonlinear functions and applications to higher order differential cryptanalysis. In: Advances in Cryptology-EUROCRYPT 2002,International Conference on the Theory and Applications of Cryptographic Techniques, Apr 28 May 2,Amsterdam,The Netherlands. Amsterdam: LNCS Springer Press,2002. 518-533.
  • 6中国通信标准化协会.ZUC算法公开评估[S/OL].2011.http ://www. cesa. org. cn/zuc, php.
  • 7CCSA. 3GPP Confidentiality and Integrity Algorithms 128- EEA3 & 128-EIA3[ S]. 2011.
  • 8Feng Xiutao, Liu Jun, Zhou Zhaocun, et al. A Byte- based Guess and Determine Attack on SOSEMANUK [ M]//Asia- crypt. [s. 1. ]:[s. n. ] ,2010:146-157.
  • 9Hastad J, Naslund M. The Stream Cipher Polar Bear[ R/OL]. 2005. http ://www. ecrypt, eu. org/stream.
  • 10Mattsson J. A Guess-and-Determine Attack on the Stream Ci- pher Polar Bear[ EB/OL]. 2006. http ://www. ecrypt, eu. org/ strearrCpolarbear, html.

共引文献179

同被引文献244

引证文献26

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部