期刊文献+

实现DES加密算法安全性的分析与研究 被引量:10

Analysis and research on realizing the security of DES encryption algorithm
下载PDF
导出
摘要 文章主要研究探析了DES加密算法安全性问题,首先介绍了实现DES加密算法安全性的过程,主要包括两个方面的内容:DES算法的工作流程以及DES算法的加密过程,并通过这两个方面的内容,分析了DES算法的IP变换以及逆变换和S盒换位表等问题,并找出了其中存在的换位规则。之后在此基础上,探讨了DES算法实现方法的改进方法,希望能够为以后相关方面的研究工作提供一些参考。 The article mainly studies and analyzes the security problem of the DES encryption algorithm.First,it introduces the process of implementing the security of the DES encryption algorithm,which mainly includes two aspects:the workflow of the DES algorithm and the encryption process of the DES algorithm,and through these two aspects The content of the DES algorithm is analyzed,such as IP transformation,inverse transformation and S box transposition table,and the transposition rules existing therein are found.After that,the improvement method of the DES algorithm implementation method is discussed.Provide some reference for the related research work in the future.
作者 潘建生 孔苏鹏 程实 Pan Jiansheng;Kong Supeng;Cheng Shi(Nantong University Xinglin College,JiangsuNantong 226000;School of Information Science and Technology,Nantong University,JiangsuNantong 226000)
出处 《网络空间安全》 2020年第4期104-107,共4页 Cyberspace Security
基金 教育部协同育人项目(项目编号:201901164001)。
关键词 DES 安全性 加密 DES security encryption
  • 相关文献

参考文献6

二级参考文献29

  • 1BruceEckel.Java编程思想[M].第4版.北京:机械工业出版社.2007.
  • 2Wang Aan, Zheng Xuexin, Wang Zongyue. Power analysis attacks and countermeasures on NTRU-based wireless body area networks [J]. KSII Trans on Internet and Information Systems, 2013, 7 (5) : 1094-1107.
  • 3Li Chunta, I.ee Chengchi, Weng Chiyao, et al. An extended multi- server-based user authentication and key agreement scheme with user anonymity [ J]. KSII Trans on Internet and Information Systems,2013, 7(1): 119-131.
  • 4Ullah S, Imran M, Alnuem M. A hybrid and secure priority-guaran- teed MAC protocol for wireless body area network [ J ]. International Journal of Distributed Sensor Networks, 2014, 29 (24) : 1257- 1253.
  • 5Saleem S, Ullah S, Kwak K S. A study of IEEE 802.15. 4 security framework for wireless body area networks [ J ]. Sensors, 2011, 11 (2) : 1383-1395.
  • 6Rezvani S S, Ghorashi A. A novel WBAN MAC protocol with im- proved energy consumption and data rate [ J ]. KSII Trans on Inter- net and Information Systems, 2012, 6(9) : 2302-2322.
  • 7Liu Qin, Wang Guojun, Wu Jie. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment [J]. Informa- tion Sciences, 2014, 258(19):355-370.
  • 8Li Ming, Lou Wenjing, Ren Kui. Data security and privacy in wire- less body area networks [ J]. Wireless Communications, 2010, 17 (1) : 51-58.
  • 9Chen Min. NDNC-BAN: supporting rich media healthcare services via named data networking in cloud-assisted wireless body area net- works [J]. Information Sciences, 2014, 28(4) : 142-156.
  • 10Boopathy D, Sundaresan M. Data encryption framework model with watermark security for data storage in public cloud model [ C ]//Proc of 2014 International Conference on Computing for Sustainable Global Development. [ S. 1. ] :IEEE Press,2014: 903-907.

共引文献48

同被引文献64

引证文献10

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部