期刊文献+
共找到2,914篇文章
< 1 2 146 >
每页显示 20 50 100
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing 被引量:1
1
作者 王兴元 王哓丽 +2 位作者 滕琳 蒋东华 咸永锦 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期136-149,共14页
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. First, a dynamic spiral block scrambling is designed to encrypt the sparse matrix generated by performing discrete wavelet transform(DWT)on the plain image. Then, the encrypted image is compressed and quantified to obtain the noise-like cipher image. Then the cipher image is embedded into the alpha channel of the carrier image in portable network graphics(PNG) format to generate the visually meaningful steganographic image. In our scheme, the hyperchaotic Lorenz system controlled by the hash value of plain image is utilized to construct the scrambling matrix, the measurement matrix and the embedding matrix to achieve higher security. In addition, compared with other existing encryption algorithms, the proposed PNG-based embedding method can blindly extract the cipher image, thus effectively reducing the transmission cost and storage space. Finally, the experimental results indicate that the proposed encryption algorithm has very high visual security. 展开更多
关键词 chaotic image encryption compressive sensing meaningful cipher image portable network graphics image encryption algorithm
下载PDF
Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map 被引量:1
2
作者 叶国栋 吴惠山 +1 位作者 黄小玲 Syh-Yuan Tan 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期153-163,共11页
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami... Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8. 展开更多
关键词 three-dimensional improved logistic chaotic map(3D-ILM) Rivest–Shamir–Adleman(RSA)algorithm image encryption CONFUSION ENTROPY
下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
3
作者 Muhammad Nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 CRYPTOGRAPHY symmetric algorithm ENCRYPTION DECRYPTION cipher text cloud security asymmetric algorithm
下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
4
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT encryption DECRYPTION cloud security matrix cipher
下载PDF
Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT
5
作者 M.Suresh Kumar T.Purosothaman 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期925-938,共14页
The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive... The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive power consumption,which constitute a danger to intelligent IoT-based apps.Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member.A centralized trustworthy system,which is in charge of key distribution and upgrades,is used to maintain group keys.To provide longitudinal access controls,Software Defined Network(SDN)based security controllers are employed for group administration services.Cloud service providers provide a variety of security features.There are just a few software security answers available.In the proposed system,a hybrid protocols were used in SDN and it embeds edge system to improve the security in the group communication.Tree-based algorithms compared with Group Key Establishment(GKE)and Multivariate public key cryptosystem with Broadcast Encryption in the proposed system.When all factors are considered,Broadcast Encryption(BE)appears to become the most logical solution to the issue.BE enables an initiator to send encrypted messages to a large set of recipients in a efficient and productive way,meanwhile assuring that the data can only be decrypted by defining characteristic.The proposed method improves the security,efficiency of the system and reduces the power consumption and minimizes the cost. 展开更多
关键词 Internet of things ENCRYPTION DECRYPTION group key software defined network public key security
下载PDF
Algorithms for Pre-Compiling Programs by Parallel Compilers
6
作者 Fayez AlFayez 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2165-2176,共12页
The paper addresses the challenge of transmitting a big number offiles stored in a data center(DC),encrypting them by compilers,and sending them through a network at an acceptable time.Face to the big number offiles,o... The paper addresses the challenge of transmitting a big number offiles stored in a data center(DC),encrypting them by compilers,and sending them through a network at an acceptable time.Face to the big number offiles,only one compiler may not be sufficient to encrypt data in an acceptable time.In this paper,we consider the problem of several compilers and the objective is tofind an algorithm that can give an efficient schedule for the givenfiles to be compiled by the compilers.The main objective of the work is to minimize the gap in the total size of assignedfiles between compilers.This minimization ensures the fair distribution offiles to different compilers.This problem is considered to be a very hard problem.This paper presents two research axes.Thefirst axis is related to architecture.We propose a novel pre-compiler architecture in this context.The second axis is algorithmic development.We develop six algorithms to solve the problem,in this context.These algorithms are based on the dispatching rules method,decomposition method,and an iterative approach.These algorithms give approximate solutions for the studied problem.An experimental result is imple-mented to show the performance of algorithms.Several indicators are used to measure the performance of the proposed algorithms.In addition,five classes are proposed to test the algorithms with a total of 2350 instances.A comparison between the proposed algorithms is presented in different tables discussed to show the performance of each algorithm.The result showed that the best algorithm is the Iterative-mixed Smallest-Longest-Heuristic(ISL)with a percentage equal to 97.7%and an average running time equal to 0.148 s.All other algorithms did not exceed 22%as a percentage.The best algorithm excluding ISL is Iterative-mixed Longest-Smallest Heuristic(ILS)with a percentage equal to 21,4%and an average running time equal to 0.150 s. 展开更多
关键词 COMPILER ENCRYPTION SCHEDULING big data algorithmS
下载PDF
Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM
7
作者 Luoyin Feng Jize Du Chong Fu 《Computers, Materials & Continua》 SCIE EI 2023年第11期1645-1662,共18页
In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image data.However,there has been limited research on combining deep learning neural networks with chao... In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image data.However,there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images.So,this paper addresses this gap by studying the generation of pseudo-random sequences(PRS)chaotic signals using dual logistic chaotic maps.These signals are then predicted using long and short-term memory(LSTM)networks,resulting in the reconstruction of a new chaotic signal.During the research process,it was discovered that there are numerous training parameters associated with the LSTM network,which can hinder training efficiency.To overcome this challenge and improve training efficiency,the paper proposes an improved particle swarm optimization(IPSO)algorithm to optimize the LSTM network.Subsequently,the obtained chaotic signal from the optimized model training is further scrambled,obfuscated,and diffused to achieve the final encrypted image.This research presents a digital image encryption(DIE)algorithm based on a double chaotic map(DCM)and LSTM.The algorithm demonstrates a high average NPCR(Number of Pixel Change Rate)of 99.56%and a UACI(Unified Average Changing Intensity)value of 33.46%,indicating a strong ability to resist differential attacks.Overall,the proposed algorithm realizes secure and sensitive digital image encryption,ensuring the protection of personal information in the Internet environment. 展开更多
关键词 Digital image encryption LSTM particle swarm optimization algorithm DCM
下载PDF
An Anti-Physical Attack Scheme of ARX Lightweight Algorithms for IoT Applications
8
作者 Qiang Zhi Xiang Jiang +3 位作者 Hangying Zhang Zhengshu Zhou Jianguo Ren Tong Huang 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期389-402,共14页
The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for phys... The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm.The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost.This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes.Firstly,we specify a hierarchical security framework by quantitatively evaluating the indicators based on side-channel attacks.Then,optimize the masking algorithm to achieve a trade-off balance by leveraging the software-based local masking strategies and non-full-round masking strategies.Finally,refactor the assembly instruction to improve the leaks by exploring the leakage cause at assembly instruction.To illustrate the feasibility of the proposed scheme,we further conducted a case study by designing a software-based masking method for Chaskey.The experimental results show that the proposed method can effectively weaken the impact of physical attacks. 展开更多
关键词 IoT security lightweight encryption anti-physical attack ARX algorithms
下载PDF
Optimizing Region of Interest Selection for Effective Embedding in Video Steganography Based on Genetic Algorithms
9
作者 Nizheen A.Ali Ramadhan J.Mstafa 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1451-1469,共19页
With the widespread use of the internet,there is an increasing need to ensure the security and privacy of transmitted data.This has led to an intensified focus on the study of video steganography,which is a technique ... With the widespread use of the internet,there is an increasing need to ensure the security and privacy of transmitted data.This has led to an intensified focus on the study of video steganography,which is a technique that hides data within a video cover to avoid detection.The effectiveness of any steganography method depends on its ability to embed data without altering the original video’s quality while maintaining high efficiency.This paper proposes a new method to video steganography,which involves utilizing a Genetic Algorithm(GA)for identifying the Region of Interest(ROI)in the cover video.The ROI is the area in the video that is the most suitable for data embedding.The secret data is encrypted using the Advanced Encryption Standard(AES),which is a widely accepted encryption standard,before being embedded into the cover video,utilizing up to 10%of the cover video.This process ensures the security and confidentiality of the embedded data.The performance metrics for assessing the proposed method are the Peak Signalto-Noise Ratio(PSNR)and the encoding and decoding time.The results show that the proposed method has a high embedding capacity and efficiency,with a PSNR ranging between 64 and 75 dBs,which indicates that the embedded data is almost indistinguishable from the original video.Additionally,the method can encode and decode data quickly,making it efficient for real-time applications. 展开更多
关键词 Video steganography genetic algorithm advanced encryption standard SECURITY effective embedding
下载PDF
可撤销属性加密的区块链数据访问控制方法 被引量:4
10
作者 李健 戚湧 《计算机工程与设计》 北大核心 2024年第2期348-355,共8页
针对区块链数据共享中存在的粗粒度访问控制问题,提出一种基于属性撤销密文策略属性基加密的区块链数据访问控制方法。在现有方案基础上进行改造,引入预解密过程,结合属性撤销列表实现属性实时撤销;基于非对称群下的DBDH困难问题假设进... 针对区块链数据共享中存在的粗粒度访问控制问题,提出一种基于属性撤销密文策略属性基加密的区块链数据访问控制方法。在现有方案基础上进行改造,引入预解密过程,结合属性撤销列表实现属性实时撤销;基于非对称群下的DBDH困难问题假设进行安全性证明;基于超级账本Fabric进行系统设计,结合星际文件系统采用链上链下存储方式解决区块链容量不足和系统效率问题。实验结果表明,所提方案撤销属性时无需更新密钥密文重复上链,仅需要6次Pairing操作进行预解密和解密,且在大规模属性集下,预解密时间和解密时间平均保持在百毫秒左右的常量级上,实现区块链数据高效、细粒度的访问控制。 展开更多
关键词 区块链 数据共享 访问控制 属性基加密 预解密 属性撤销 星际文件系统
下载PDF
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
11
作者 Peter Awonnatemi Agbedemnab Mohammed Akolgo Moses Apambila Agebure 《Journal of Information Security》 2023年第4期422-436,共15页
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen... Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes. 展开更多
关键词 Discrete Wavelet Transform (DWT) Digital Watermarking Encryption Genetic algorithm (GA) Residue Number System (RNS) GARN
下载PDF
基于混沌理论与DNA动态编码的卫星图像加密算法 被引量:3
12
作者 肖嵩 陈哲 +2 位作者 杨亚涛 马英杰 杨腾 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第3期1128-1137,共10页
针对卫星图像在传输、存储过程中涉及的信息安全问题,该文提出一种新型的基于混沌理论与DNA动态编码的卫星图像加密算法。首先,提出一种改进型无限折叠混沌映射,拓宽了原有无限折叠混沌映射的混沌区间。之后,结合改进型Chebyshev混沌映... 针对卫星图像在传输、存储过程中涉及的信息安全问题,该文提出一种新型的基于混沌理论与DNA动态编码的卫星图像加密算法。首先,提出一种改进型无限折叠混沌映射,拓宽了原有无限折叠混沌映射的混沌区间。之后,结合改进型Chebyshev混沌映射与SHA-256哈希算法,生成加密算法的密钥流,提升算法的明文敏感性。然后,利用混沌系统的状态值对Hilbert局部置乱后的像素进行DNA编码,实现DNA动态编码,解决了DNA编码规则较少所带来的容易受到暴力攻击的弱点。最后,使用混沌序列完成进一步混沌加密,从而彻底混淆原始像素信息,增加加密算法的随机性与复杂性,得到密文图像。实验结果表明,该算法具有较好的加密效果和应对各种攻击的能力。 展开更多
关键词 卫星图像加密 混沌理论 DNA动态编码 哈希算法
下载PDF
基于全同态加密优化的云数据隐私保护方法 被引量:1
13
作者 王雪飞 王鹏 佟良 《计算机仿真》 2024年第5期522-526,共5页
为了提升云数据的安全性,改善数据加密时间长以及加密效果较差等问题,提出一种基于全同态加密优化的云数据隐私保护方法。通过生成对抗网络模型学习原始数据中的重要特征,确保合成的数据和初始数据之间具有较高的相似度,使其能够满足差... 为了提升云数据的安全性,改善数据加密时间长以及加密效果较差等问题,提出一种基于全同态加密优化的云数据隐私保护方法。通过生成对抗网络模型学习原始数据中的重要特征,确保合成的数据和初始数据之间具有较高的相似度,使其能够满足差分隐私特征。引入PKI对数据所有者和用户身份认证处理,完成密钥的产生和分发,根据差分隐私特征将用户所有者的数据划分为不同类型,获取用户访问特征向量。构建全同态加密机制,同时引入代理重加密机制,通过密钥转换完成数据加密处理,最终实现云数据全同态加密优化。实验对比结果表明,上述加密方案能够快速完成数据加密处理,有效确保数据的安全性。 展开更多
关键词 云数据 隐私保护 全同态加密算法 对抗网络生成 代理重加密机制
下载PDF
基于区块链加密技术的云会计数据安全探究 被引量:1
14
作者 吴花平 刘自豪 《重庆理工大学学报(社会科学)》 CAS 2024年第2期96-105,共10页
云会计因投入成本低、数据处理高效和业务效率高等优势而受到用户的青睐,但储在云端的数据所面临的安全问题已经成为云会计发展亟待解决的问题之一。为应对云会计数据安全问题,构建了基于区块链加密技术的云会计数据安全模型。首先,通... 云会计因投入成本低、数据处理高效和业务效率高等优势而受到用户的青睐,但储在云端的数据所面临的安全问题已经成为云会计发展亟待解决的问题之一。为应对云会计数据安全问题,构建了基于区块链加密技术的云会计数据安全模型。首先,通过对云会计与区块链的回顾,明确云会计发展所面临的数据安全问题以及区块链技术与云会计融合发展的可行性;然后,引入非对称加密技术和哈希算法,以实现对云会计数据的加密安全存储和完整性检查;最后,通过分析得出区块链技术能够加强用户对其数据的控制、保障数据传输安全和增进用户与云会计服务提供商之间信任的结论。 展开更多
关键词 区块链 云会计 数据安全 非对称加密 哈希算法
下载PDF
支持密码逆向防火墙的基于SM9的属性基可搜索加密方案
15
作者 高改梅 段明博 +2 位作者 荀亚玲 刘春霞 党伟超 《计算机应用》 CSCD 北大核心 2024年第11期3495-3502,共8页
针对属性基可搜索加密(ABSE)方案大都基于非国密算法设计,且无法抵抗内部算法替换攻击(ASA)的问题,提出一种支持密码逆向防火墙的基于SM9的属性基可搜索加密方案(SM9ABSE-CRF)。该方案将国密算法SM9扩展至ABSE领域,实现了细粒度数据访... 针对属性基可搜索加密(ABSE)方案大都基于非国密算法设计,且无法抵抗内部算法替换攻击(ASA)的问题,提出一种支持密码逆向防火墙的基于SM9的属性基可搜索加密方案(SM9ABSE-CRF)。该方案将国密算法SM9扩展至ABSE领域,实现了细粒度数据访问控制,并引入密码逆向防火墙(CRF)技术有效抵御ASA。分析了SM9ABSE-CRF在判定性Diffie-Hellman(DBDH)假设下满足了选择关键词下的不可区分性,并形式化证明了CRF的部署满足维持功能性、保留安全性以及抵抗泄漏性。理论分析和仿真实验结果表明,与提供CRF的ABSE方案cABKSCRF(consistent Attribute-Based Keyword Search system with CRF)相比,SM9ABSE-CRF具有更高的安全性,并且在索引与陷门生成阶段也表现出显著的性能优势。 展开更多
关键词 密码逆向防火墙 可搜索加密 属性基加密 SM9算法 算法替换攻击
下载PDF
用户恶意跨域数据安全加密共享算法仿真
16
作者 王葵 吴玲红 戴仕明 《计算机仿真》 2024年第10期200-203,361,共5页
在跨域数据共享场景下,涉及到多个组织或多个域的用户参与,为了保证数据安全,避免隐私信息泄露,提出了支持恶意用户追踪的跨域数据安全共享算法。将基于密文策略的属性基加密方法与白盒追踪算法和黑盒追踪算法结合。设计恶意用户追踪机... 在跨域数据共享场景下,涉及到多个组织或多个域的用户参与,为了保证数据安全,避免隐私信息泄露,提出了支持恶意用户追踪的跨域数据安全共享算法。将基于密文策略的属性基加密方法与白盒追踪算法和黑盒追踪算法结合。设计恶意用户追踪机制,实现对恶意用户的有效追踪。将对称加密算法和非对称加密算法相结合,生成公钥、私钥和密钥,对数据展开加解密处理,实现跨域数据安全共享。实验结果表明,所提算法的数据安全共享效果较高,在不同实验环境下均能够保持较低的内存,且信息熵较高,能够确保数据的安全性。 展开更多
关键词 恶意用户追踪 跨域数据 数据安全共享 对称加密算法 非对称加密算法
下载PDF
基于AES与ECC混合算法的计算机网络通信数据安全加密方法 被引量:1
17
作者 石小兵 《常州工学院学报》 2024年第3期6-10,共5页
为了提高通信数据在计算机网络中的安全性,提出一种基于AES与ECC混合算法的计算机网络通信数据安全加密方法。通过时域分析,得到通信数据在计算机网络边缘的频率分布情况,根据通信数据中冗余信息的密度,离散化处理通信数据内的噪声,提... 为了提高通信数据在计算机网络中的安全性,提出一种基于AES与ECC混合算法的计算机网络通信数据安全加密方法。通过时域分析,得到通信数据在计算机网络边缘的频率分布情况,根据通信数据中冗余信息的密度,离散化处理通信数据内的噪声,提取出通信数据的特征向量。根据通信数据的明文空间进行加密处理,计算出待加密通信数据的密文值,将计算机网络通信数据的加密过程约束成加密函数的计算,设定通信数据安全加密的约束条件,采用AES算法加密通信数据的明文,利用ECC算法加密AES密钥,将AES与ECC结合,生成通信数据的密钥密文,实现通信数据的安全加密。实验结果表明,所提方法能够保证通信数据在计算机网络中的安全,可以将通信数据加密后的受攻击指数控制在0.1以内,提高通信数据的加密效果。 展开更多
关键词 AES加密算法 ECC加密算法 通信数据 特征向量 计算机网络 安全加密
下载PDF
任务匹配系统中高效可撤销属性加密方案
18
作者 董国芳 张楚雯 +2 位作者 常远 鲁烨堃 刘兵 《云南民族大学学报(自然科学版)》 CAS 2024年第4期478-485,共8页
针对传统任务匹配系统中数据处理存在的安全隐私和成本开销问题,提出了一种适用于资源有限系统的高效可撤销外包密文策略属性加密方案.通过将传统的加密分为用户离线和在线加密阶段两部分实现快速加密,并将密文外包给云服务器再与区块... 针对传统任务匹配系统中数据处理存在的安全隐私和成本开销问题,提出了一种适用于资源有限系统的高效可撤销外包密文策略属性加密方案.通过将传统的加密分为用户离线和在线加密阶段两部分实现快速加密,并将密文外包给云服务器再与区块链建立联系以降低用户计算成本,最后利用变色龙哈希函数更新用户私钥进行属性撤销和用户撤销两类细粒度撤销.最后通过实验表明,该方案与现有可撤销属性加密方案相比,可以抵御密钥泄露和共谋攻击,且具有更低的时间开销. 展开更多
关键词 变色龙哈希函数 外包解密 可撤销 属性加密 任务匹配
下载PDF
基于AES的车联网通信加密算法
19
作者 许小伟 程宇 +2 位作者 钱枫 祝能 邓明星 《计算机与现代化》 2024年第9期45-51,共7页
随着V2X技术发展得越来越快,车辆与其他设备的通信量以及信息重要度都在急速增长,车载信息遭到攻击从而被截取或者发生泄漏的风险也相应地大大增加,因此信息交互安全性成为了一个不可避免的研究课题。本文针对车联网传输数据量大、数据... 随着V2X技术发展得越来越快,车辆与其他设备的通信量以及信息重要度都在急速增长,车载信息遭到攻击从而被截取或者发生泄漏的风险也相应地大大增加,因此信息交互安全性成为了一个不可避免的研究课题。本文针对车联网传输数据量大、数据加解密操作频繁等问题,通过分析经典加密算法,进而改进传统AES加密算法,使用RC4加密算法生成伪随机密钥代替AES加密算法的密钥生成模块,优化加密时间的同时提升安全性能,并开展实验验证了其加密效率以及安全性。 展开更多
关键词 V2X 通信安全 AES RC4 加密算法 混合加密
下载PDF
融合物联网技术与混合加密算法的医疗数据信息优化框架设计研究
20
作者 徐澄 李民 东单锋 《微型电脑应用》 2024年第10期186-190,共5页
目前,医疗数据信息系统存在安全性低、共享难度大等问题,对此,提出一种融合物联网技术与混合加密算法的医疗数据信息优化框架,以提升医疗数据的安全。在此基础上,结合物联网的相关技术,对医疗数据采集方法进行设计。基于超级账本搭建完... 目前,医疗数据信息系统存在安全性低、共享难度大等问题,对此,提出一种融合物联网技术与混合加密算法的医疗数据信息优化框架,以提升医疗数据的安全。在此基础上,结合物联网的相关技术,对医疗数据采集方法进行设计。基于超级账本搭建完整的医疗数据信息框架。实验结果显示,高级加密标准(AES)算法的加密速度随着数据量的增大而增大,从而使用户能够根据要求传输任意长度的数据。利用非对称加密(RSA)算法对密码进行10次加密实验,得到了15 ms、94 ms的平均加密效果,系统加密效率较高。研究算法具有较好的工作稳定性,在功能和性能方面能够满足实际的医疗环境需要。 展开更多
关键词 物联网 混合加密算法 医疗数据 优化管理
下载PDF
上一页 1 2 146 下一页 到第
使用帮助 返回顶部