期刊文献+

基于双表体制的RSA加密算法 被引量:4

The Analysis of Wimesh Network's Concepts and Key Technologies
下载PDF
导出
摘要 RSA加密算法是比较完善的公开的密钥算法,由于其安全强度高,使用方便,所以受到广泛的应用。其安全性依赖于大素数的选择,但大素数产生技术的限制和RSA幂乘运算的大时间开销,提出一种基于双表体制的RSA加密算法。基于双表体制的RSA加密算法是将前后字符嵌套加密,增加了密文的复杂程度,因此,在大素数的选择上可以相对减少大素数的位数,减少幂乘运算的时间,达到快速加密的效果。结合Eclipse集成开发环境,加密工具采用Eclipse插件形式完成对web文件的加密。 RSA Encryption algorithm is a public key algorithm and also relatively perfect. Its security intensity is high and easily to use,so widely used. The choice of its safety depends on prime number. Because of choosing prime number difficulty and a lot of time overhead on power by computing .This paper presents a double table system of RSA encryption algorithm. Based on double table system of RSA encryption algorithm that uses before and after the nested encryption characters. This way can increased the complexity of the ciphertext,so on the choice of big prime number can decrease relatively large prime Number of digits,reduce the time of power by operation,to achieve the effect of rapid encryption . Combining with the integrated development environment of eclipse,the encryption tool uses the eclipse plug-in form to complete the encryption of web documents.
出处 《火力与指挥控制》 CSCD 北大核心 2014年第S1期179-180,183,共3页 Fire Control & Command Control
关键词 插件 加密 RSA 双表体制 plug-in,encrypt,RSA,double table system
  • 相关文献

参考文献4

二级参考文献19

  • 1陈刚.Eclipse插件体系结构[J].程序员,2005(6):119-121. 被引量:6
  • 2钟楼,张尧弼.并行窗口算法在防御RSA计时攻击中的研究[J].计算机工程与应用,2006,42(12):145-147. 被引量:2
  • 3晏楠,谷大武,丁宁.RSA体制下使用随机算法防御时间攻击的方法[J].计算机工程,2006,32(11):174-176. 被引量:2
  • 4Kocher P.Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS,and Other Systems[C] //Proc.of CRYPTOLOGY'96.Berlin,Germany:Springer-Verlag,1996.
  • 5RSA Laboratories[EB/OL].2007-12-11.http://www.rsasecurity.com/ rsalabs/node.asp?id=2098.
  • 6Intel.Using the RDSTC instruction for performance monitoring[R].America:Intel,1997.
  • 7Montgomery,Peter.Modular multiplication without trial division[J].Mathematics of Computation,1985,44(170):519-521.
  • 8Kaihara M E,Naofumi T.A Hardware Algorithm for Modular Multiplication/Division Based on the Extended Euclidean Algorithm[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2005,88(12):3610-3617.
  • 9代春艳,谢晓尧,辛明军,等.电子商务信息安全技术[M].武汉:武汉大学出版社,2007.
  • 10DIFFIE W, HELLMAN M E. New directrions in cryptog- raphy [ J ]. IEEE Transaction on Information Theory, 1976, 22(6) :644 -654.

共引文献9

同被引文献22

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部