期刊文献+

动态对称密钥加密算法下终端升级文件安全传输 被引量:4

Secure transfer of terminal upgraded files based on dynamic symmetric key encryption
下载PDF
导出
摘要 为了提高终端升级文件的安全传输能力,需要进行文件加密设计,提出基于动态对称密钥设计的终端升级文件加密安全传输方法。采用无代理密钥发布协议进行终端升级文件的访问控制,构建终端升级文件的动态对称密钥;结合双线性映射方法进行终端升级文件安全加密过程中的密钥构造和算术编码设计;根据明文攻击的强度对终端升级文件进行置乱度重排,采用随机线性编码方法完成终端升级文件的动态对称密钥加密,实现文件的安全传输。仿真测试结果表明,采用该方法进行终端升级文件加密和传输的安全性较好,抗攻击能力较强,提高了文件的安全传输性能。 In order to improve the security transmission capability of the file,a file encryption design is needed,and a method for secure transmission of the terminal upgrade file based on the dynamic symmetric key design is proposed.The agentless key publishing protocol is used to control the access of the terminal upgrade file,and the dynamic symmetric key of the terminal upgrade file is constructed.Key construction and arithmetic coding design in terminal security file security encryption process combined with bilinear mapping method.The terminal upgrade file is rearranged according to the strength of the plaintext attack,and the random symmetric coding method is used to complete the dynamic symmetric key encryption of the terminal upgrade file to implement secure file transmission.The simulation test results show that the security of the terminal upgrading file encryption and transmission is good,the anti-attack capability is strong,and the security transmission performance of the file is improved.
作者 翟峰 付义伦 ZHAI Feng;FU Yi-lun(China Electric Power Research Institute,Beijing 100192,China)
出处 《信息技术》 2019年第12期91-94,共4页 Information Technology
关键词 动态对称密钥 加密算法 终端升级文件 安全传输 dynamic symmetric key encryption algorithm terminal upgrade file secure transmission
  • 相关文献

参考文献11

二级参考文献69

  • 1马东堂,魏急波,庄钊文.大气激光通信中多光束传输性能分析和信道建模[J].光学学报,2004,24(8):1020-1024. 被引量:49
  • 2史文中,李必军,李清泉.基于投影点密度的车载激光扫描距离图像分割方法[J].测绘学报,2005,34(2):95-100. 被引量:90
  • 3王英俭,吴毅,龚知本.大气湍流相干长度和Strehl比的统计特征[J].光学学报,1996,16(8):1109-1113. 被引量:13
  • 4孙中伟,冯登国,武传坤.基于加同态公钥密码体制的匿名数字指纹方案[J].软件学报,2005,16(10):1816-1821. 被引量:9
  • 5Nathan E, Alex P. Reality mining: Sensing complex social systems. Journal of Personal and Ubiquitous Computing, 2006,10(4): 255-268. [doi: 10.1007/s00779-005-0046-3].
  • 6Le MA, Tatem A J, Cohen JM, Hay SI, Randell H, Patil AP, Smith DL. Travel risk, malaria importation and malaria transmission in Zanzibar. Scientific Reports, 2011,1(7364):271-275. [doi:10.1038/srep00093].
  • 7Wesolowski A, Eagle N, Tatem AJ, Smith DL, Noor AM, Snow RW, Buckee CO. Quantifying the impact of human mobility on malaria. Science, 2012,338(6104):267-270. [doi: 10.1126/science. 1223467].
  • 8Hill S, Banser A, Berhan G, Eagle N. Reality mining Africa. In: Proc. of the AAAI Spring Symp. on Artificial Intelligence for Development. 2010. http://www.seas.upenn.edu/-ngns/docs/References/Hill%202010%20realityminingafrica.pdf.
  • 9Yuan J, Zheng Y, Xie X. Discovering regions of different functions in a city using human mobility and POls. In: Yang Q, Agarwal D, Pei J, eds. Proc. of the KDD. New York: ACM Press, 2012. 186-194. [doi: 10.1145/2339530.2339561].
  • 10Zheng K, Shang S, Yuan J, Yang Y. Towards efficient search for activity trajectories. In: Jensen CS, Jermaine CM, Zhou XF, eds. Pro~. of the ICDE. Washington: IEEE Computer Society, 2013.230-241. [doi: 10.1109/ICDE.2013.6544828].

共引文献151

同被引文献32

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部