期刊文献+

SM3算法在导弹数据数字化登记系统中的应用

Application of SM3 Algorithm in the Digital Registration of Missile Data
下载PDF
导出
摘要 为解决目前部队在导弹数据记录、存储中经常出现的数据篡改、描涂、字迹不清等问题,设计一种基于Hash函数的导弹数据数字化登记系统。介绍Hash函数验证数据完整性的原理,对比几种常用的Hash函数,介绍我国自主研发的SM3算法,对其实现效率进行改进,设计导弹数据完整性验证方案,并使用C#语言进行导弹数据数字化登记系统的开发。测试结果表明:该系统能有效检验数据是否完整,且具有可行性与可推广性。 In order to solve these problems such as data tampering,tracing and handwriting is not clear that often occur in the missile data recording and storage,to design a digital data registration system of missile based on Hash function.This paper introduces the principle of Hash function validation data integrity,compares of several common Hash functions,describes SM3 algorithm which designs by our country,improve the efficiency of its implementation,design missile data integrity verification plan,and use C#language to research and develop the missile data digital registration system.The test results show that the system can effectively test data integrity,and has the feasibility and extension.
作者 丛林虎 方轶 Cong Linhu;Fang Yi(College of Coastal Defense,Navy Aviation University,Yantai 264001,China)
出处 《兵工自动化》 2020年第5期12-14,27,共4页 Ordnance Industry Automation
基金 国家自然科学基金(516054870)。
关键词 HASH函数 SM3算法 数据完整性 导弹数据 Hash function SM3 algorithm data integrity missile data
  • 相关文献

参考文献6

二级参考文献49

  • 1杨晓辉,戴紫彬.基于FPGA的SHA-256算法实现[J].微计算机信息,2006(04Z):146-148. 被引量:12
  • 2何朝勋,戴宗妙.同心筒式发射装置燃气排导研究[J].舰船科学技术,2007,29(A01):71-75. 被引量:21
  • 3Wang Xiao-Yun, Wang Lei, Jia Ke-Ting, Wang Mei-Qin. New distinguishing attack on MAC using secret-prefix method //Proceedings of Fast Software Encryption 2009. Leuven, Belgium, 2009:363-374.
  • 4Leurent G, Peyrin T, Wang Lei. New generic attacks against hash-based MACs//Proceedings of Advances in Cryptology-ASIACRYPT 2013, Part II. Bengaluru, India, 2013:1-20.
  • 5Shannon C. Communication theory o secrecy systems. Bell System Technical Journal, 1949, 28(4): 656-715.
  • 6Goldwasser S, Micali S. Probabilistic encryption. Journal of Computer and System Sciences, 1984, 28(2) : 270-299 B.
  • 7Bellare M, Kiliarty J, Rogaway P. The security o{ the cipher block chaining message authentication code. Journal of Computer and System Sciences, 2000, 61(3):362-399.
  • 8Bellare M, Kilian J, Rogaway P. The security of cipher block ehaining//Proceedings of Advances in Cryptology CRYPTO 1994. Santa Barbara, USA, 1994: 341-358.
  • 9Bellare M, Desai A, Jokipii E, Rogaway P. A concrete secu- rity treatment of symmetric encryption: Analysis of the DES modes of operation//Proceedings of the 38th Symposium on Foundations of Computer Science. Miami Beach, USA, 1997:394-403.
  • 10Rogaway P, Bellare M, Black J, Krovetz T. OCB: A block- cipher mode of operation for efficient authenticated encryption //Proceedings of the 8th ACM Conference on Computer and Communications Security. Philadelphia, USA, 2001:196-205.

共引文献110

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部