期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
束晕-混沌同步控制及若干加密方法研究进展 被引量:5
1
作者 刘强 方锦清 +1 位作者 赵耿 李永 《复杂系统与复杂性科学》 EI CSCD 北大核心 2014年第1期23-40,共18页
构造了具有小世界(WS)和无标度(BA)特性的束流输运网络,提出多种束晕-混沌的同步控制方法和3种保密通信的电路设计方案,并进行了仿真试验。在混沌复杂性研究的基础上,探索了一种混沌密码新算法,并成功地研制了链路混沌密码样机。同时研... 构造了具有小世界(WS)和无标度(BA)特性的束流输运网络,提出多种束晕-混沌的同步控制方法和3种保密通信的电路设计方案,并进行了仿真试验。在混沌复杂性研究的基础上,探索了一种混沌密码新算法,并成功地研制了链路混沌密码样机。同时研制了一种基于混沌加密算法和传统加密算法相结合的混沌加密系统,采用FPGA技术进行了硬件开发,已在互联网上实现了文件加密和解密的通信实验。在信息隐藏技术研究方面,实现了将加密信息隐藏到JPEG格式图片之中,实验和工程应用信息隐藏效果良好。 展开更多
关键词 束晕-混沌 同步控制 混沌保通信 ()算法
下载PDF
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
2
作者 Ding Ning Gu Dawu Liu Zhiqiang 《China Communications》 SCIE CSCD 2010年第6期56-63,共8页
In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are ... In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes. 展开更多
关键词 symmetric encryption OBFUSCATION ANTI-FORENSICS
下载PDF
A low-cost compact AES architecture for wireless sensor network
3
作者 易立华 Zou Xuecheng Liu Zhenglin Dan Yongping Zou Wanghui 《High Technology Letters》 EI CAS 2010年第2期184-188,共5页
The implementation of small size cryptography algorithm is a critical problem for wireless sensor network. A low cost compact intellectual property (IP) core of the entire advanced encryption standard (AES) algori... The implementation of small size cryptography algorithm is a critical problem for wireless sensor network. A low cost compact intellectual property (IP) core of the entire advanced encryption standard (AES) algorithm for wireless sensor network is presented in this paper. A compact encryption and decryption system using only four sharing S-Boxes is obtained, employing sharing between the encryption and decryption processes. Our design proposes use of composite field data path for the SubBytes and InvSubBytes transformations. With an implementation of the AES block cipher with Virtex Ⅱ Pro FPGA using0.13μm and 90nm process technology, our area optimized consumes 16.8k equivalent gates. The speed of this implementation is also reduced to 0.45Gbits/s. Compared with previous implementations, our design achieves significant low-cost area with acceptable throughput. 展开更多
关键词 advanced encryption standard (AES) S-Boxes key expansion implement
下载PDF
Research on General Permutation Encryption Module Based on Chaos Theory
4
作者 Sun Wenjie 《International Journal of Technology Management》 2014年第7期58-61,共4页
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For examp... Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system. 展开更多
关键词 chaos theory general substitution encryption.
下载PDF
基于Niederreiter纠错码的公钥密码体制的研究 被引量:3
5
作者 梅挺 代群 《通信技术》 2007年第6期36-39,共4页
二十多年来,纠错码成功地用于构造诸多纠错码公钥密码体制。文中首先研究了N公钥体制的性能指标,给出了它的计算机模拟曲线;通过分析N公钥体制的安全性,给出了一种攻击N公钥体制的新方法;然后探讨M公钥体制与N公钥体制的内在关系,揭示... 二十多年来,纠错码成功地用于构造诸多纠错码公钥密码体制。文中首先研究了N公钥体制的性能指标,给出了它的计算机模拟曲线;通过分析N公钥体制的安全性,给出了一种攻击N公钥体制的新方法;然后探讨M公钥体制与N公钥体制的内在关系,揭示了它们之间安全性等价的事实,给出了M公钥与N公钥体制性能比较的结果。 展开更多
关键词 纠错码 公钥码体制 ()算法 性能指标
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部