期刊文献+

基于国密算法的文件安全系统研究与实现 被引量:1

Research on the file security system based on the National commercial cipher algorithm
下载PDF
导出
摘要 针对网络环境下电子文件的安全需求,研究基于国密算法的文件安全系统。提出C/S架构的系统模型,针对公共信道交互的安全性问题,提出"新鲜性标识符+挑战应答模式"的认证及密码协议方案,并完成了算法、密钥体系安全性设计和产品开发,目前已并通过了国密测试。 According to the security requirement of the electronic file in the network environment,Analysis the file security system based on the national commercial cipher algorithm. Present C/S structure of the system model, 'the fresh identifier + challenge response mode'authentication and cryptographic protocol is put forward to solve the problem of the safety of public channel interaction,and gives the algorithm and key security system design and specific implementation process.At present, has passed the testing of National commercial cipher algorithm.
出处 《电子测试》 2016年第9X期60-61,共2页 Electronic Test
基金 吉林省科技攻关计划项目(20140204060SF) 吉林省教育厅科研规划项目(吉教科合字[2014]第337号)
关键词 国密算法 公共信道 挑战应答模式 密钥体系 National commercial cipher algorithm Common channel Challenge response mode Key system
  • 相关文献

参考文献2

二级参考文献24

  • 1蔡皖东,田广利,段琪,任建奇.基于DRM的电子文档保护系统设计与实现[J].微电子学与计算机,2005,22(7):161-164. 被引量:16
  • 2钟勇,秦小麟,郑吉平,林冬梅.一种灵活的使用控制授权语言框架研究[J].计算机学报,2006,29(8):1408-1418. 被引量:15
  • 3Lin E T, Eskieioglu A M, Lagendijk R L, etc. Advanecs in Digital Video Content Protection[J]. Proceedings of the IEEE,2005,93(1):171 -- 183.
  • 4Kuhlmann D, Gehring RA. Trusted platforms, DRM, and beyond[A]. Becket E. Digital Right s Management: Technological, Economic, Legal and Political Aspects, Lecture Notes in Computer Science 2770[C], Berlin: Springer-- Verlag, 2003 : 178-- 205.
  • 5Bettini C,Jajodia S,Wang XS,etc. Provisions and obligations in policy management and security applications [A]. Bernstein PA,Loannidis YE,Ramakrishnan R,ete. Proc. of the 28th Int'l Conf. on Very Large Data Bases [C]. Hong Kong.. Morgan Kaufmann Publishers, 2002: 502--513.
  • 6Barth A,Datta A, Mitchell JC,etc. Privacy and contextual integrity:Framework and application[A]. IEEE Press Proc. of the 27th IEEE Symp. on Security and Privacy [C]. New York: IEEE Press, 2006 : 184-- 198.
  • 7Chong CN,Ren B, Doumen J,ete. Hartel PH,Corin R. License protection with a tamper-resistant token[A]. Chae HL,Moti Y. Proe. of the 5th Int'l Workshop Information Security Applieations[C]. Heidelberg: Springer- Verlag, 2004 : 223-- 227.
  • 8Bruce N,Lee H J.A secure authentication protocol among mobile phone and wireless sensor networks[C]//Proc of the 15th International Conference on Advanced Communication Technology.[S.l.] :IEEE Press,2013:52-59.
  • 9Tyagi S,Kumar N.A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks[J].Journal of Network and Computer Applications,2013,36(2):623-645.
  • 10Turkanovic′ M,Brumen B,Hlbl M.A novel user authentication and key agreement scheme for heterogeneous Ad hoc wireless sensor networks,based on the Internet of things notion[J].Ad hoc Networks,2014,20:96-112.

共引文献10

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部