本文主要介绍湖南省疾控中心利用开源的企业级网络管理平台OpenNMS实现对数据中心的网络设备、服务器、应用实时监控.特别是在经费有限,并且还缺少短信网关、私有邮件服务器的情况下,以最少代价实现及时发现网络瓶颈和故障报警.HP Data ...本文主要介绍湖南省疾控中心利用开源的企业级网络管理平台OpenNMS实现对数据中心的网络设备、服务器、应用实时监控.特别是在经费有限,并且还缺少短信网关、私有邮件服务器的情况下,以最少代价实现及时发现网络瓶颈和故障报警.HP Data Protector(以下简称DP)是惠普公司提供的一款备份软件,本文同时也介绍了HPDP的报告和报警功能的使用,并且以HPDP报警为例演示OpenNMS邮件报警功能.展开更多
In this paper, we analyse a new chaos-based cryptosystem with an embedded adaptive arithmetic coder, which was proposed by Li Heng-Jian and Zhang J S (Li H J and Zhang J S 2010 Chin. Phys. B 19 050508). Although thi...In this paper, we analyse a new chaos-based cryptosystem with an embedded adaptive arithmetic coder, which was proposed by Li Heng-Jian and Zhang J S (Li H J and Zhang J S 2010 Chin. Phys. B 19 050508). Although this new method has a better compression performance than its original version, it is found that there are some problems with its security and decryption processes. In this paper, it is shown how to obtain a great deal of plain text from the cipher text without prior knowledge of the secret key. After discussing the security and decryption problems of the Li Heng-Jian et al. algorithm, we propose an improved chaos-based cryptosystem with an embedded adaptive arithmetic coder that is more secure.展开更多
In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induc...In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induction to prove that the algorithm can be attacked by a chosen plaintext attack successfully and give an example to show how to attack it. According to the cryptanalysis of the originM Mgorithm, we improve the originM Mgorithm, and make a brief cryptanalysis. Compared with the original algorithm, the improved algorithm is able to resist a chosen plaintext attack and retain a considerable number of advantages of the original algorithm such as eneryption speed, sensitive dependence on the key, strong anti-attack capability, and so on.展开更多
We extend a class of a one-dimensional smooth map.We make sure that for each desired interval of the parameter the map’s Lyapunov exponent is positive.Then we propose a novel parameter perturbation method based on th...We extend a class of a one-dimensional smooth map.We make sure that for each desired interval of the parameter the map’s Lyapunov exponent is positive.Then we propose a novel parameter perturbation method based on the good property of the extended one-dimensional smooth map.We perturb the parameter𝑟in each iteration by the real number xi generated by the iteration.The auto-correlation function and NIST statistical test suite are taken to illustrate the method’s randomness finally.We provide an application of this method in image encryption.Experiments show that the pseudo-random sequences are suitable for this application.展开更多
文摘本文主要介绍湖南省疾控中心利用开源的企业级网络管理平台OpenNMS实现对数据中心的网络设备、服务器、应用实时监控.特别是在经费有限,并且还缺少短信网关、私有邮件服务器的情况下,以最少代价实现及时发现网络瓶颈和故障报警.HP Data Protector(以下简称DP)是惠普公司提供的一款备份软件,本文同时也介绍了HPDP的报告和报警功能的使用,并且以HPDP报警为例演示OpenNMS邮件报警功能.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 60573172 and 60973152)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No. 20070141014)the Natural Science Foundation of Liaoning Province of China (Grant No. 20082165)
文摘In this paper, we analyse a new chaos-based cryptosystem with an embedded adaptive arithmetic coder, which was proposed by Li Heng-Jian and Zhang J S (Li H J and Zhang J S 2010 Chin. Phys. B 19 050508). Although this new method has a better compression performance than its original version, it is found that there are some problems with its security and decryption processes. In this paper, it is shown how to obtain a great deal of plain text from the cipher text without prior knowledge of the secret key. After discussing the security and decryption problems of the Li Heng-Jian et al. algorithm, we propose an improved chaos-based cryptosystem with an embedded adaptive arithmetic coder that is more secure.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61173183, 60573172, and 60973152)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No. 20070141014)the Natural Science Foundation of Liaoning Province, China (Grant No. 20082165)
文摘In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induction to prove that the algorithm can be attacked by a chosen plaintext attack successfully and give an example to show how to attack it. According to the cryptanalysis of the originM Mgorithm, we improve the originM Mgorithm, and make a brief cryptanalysis. Compared with the original algorithm, the improved algorithm is able to resist a chosen plaintext attack and retain a considerable number of advantages of the original algorithm such as eneryption speed, sensitive dependence on the key, strong anti-attack capability, and so on.
基金by the National Natural Science Foundation of China under Grant Nos 60573172 and 60973152the Superior University Doctor Subject Special Scientific Research Foundation of China(No 20070141014)the Natural Science Foundation of Liaoning Province(No 20082165).
文摘We extend a class of a one-dimensional smooth map.We make sure that for each desired interval of the parameter the map’s Lyapunov exponent is positive.Then we propose a novel parameter perturbation method based on the good property of the extended one-dimensional smooth map.We perturb the parameter𝑟in each iteration by the real number xi generated by the iteration.The auto-correlation function and NIST statistical test suite are taken to illustrate the method’s randomness finally.We provide an application of this method in image encryption.Experiments show that the pseudo-random sequences are suitable for this application.