期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Designing a Secure Round Function Based on Chaos 被引量:1
1
作者 Bin Lu Xin Ge Fenlin Liu 《China Communications》 SCIE CSCD 2020年第5期29-37,共9页
A round function based on chaos is designed combining Feistel structure’s pseudo-randomness, chaotic system’s parameter sensitivity and image data characteristics. The round function composes of two parts--data tran... A round function based on chaos is designed combining Feistel structure’s pseudo-randomness, chaotic system’s parameter sensitivity and image data characteristics. The round function composes of two parts--data transformation based on Feistel(abbreviated as FST) and sampling output based on chaos(abbreviated as SMP). FST bases on Feistel structure and several efficient operations including bitwise xor, permutation and circulating shift. SMP is a chaos based pseudo-random sampling algorithm. It is from theoretical analysis that the round function is a pseudo-random function. The upper bounds of the average maximum differential probability and average maximum linear probability are p^2 and q^2 respectively. Finally, the good pseudo-randomness of the round function is examined with the NIST random test. The design of this round function provides an important cryptographic component for the design of chaotic image encryption algorithm. 展开更多
关键词 image encryption round function CHAOS pseudo-random function
下载PDF
STRUCTURE OF COMPUTATIVE TREE FOR COMPUTABLE FUNCTION
2
作者 李传湘 《Acta Mathematica Scientia》 SCIE CSCD 1992年第3期346-354,共9页
In this paper, we study the computative structure of computable function - a structure of computative tree, and, by analysis on it, got the most general algorithm and model for computation on computable functions.
关键词 STRUCTURE OF COMPUTATIVE TREE FOR COMPUTABLE function NODE PRO prf
下载PDF
基于中国剩余定理的NFC安全认证算法 被引量:1
3
作者 邹同浩 《计算机应用与软件》 北大核心 2024年第1期322-327,共6页
针对近场通信技术在应用中出现的安全隐患问题,给出一种基于中国剩余定理的算法。算法利用中国剩余定理实现对传送信息进行加密,中国剩余定理基于数学中大素数分解难题,使得攻击者无法进行破解;所有信息加密过程中混入随机数,用于保证... 针对近场通信技术在应用中出现的安全隐患问题,给出一种基于中国剩余定理的算法。算法利用中国剩余定理实现对传送信息进行加密,中国剩余定理基于数学中大素数分解难题,使得攻击者无法进行破解;所有信息加密过程中混入随机数,用于保证消息的新鲜性;算法在进行信息更新时采用伪随机函数计算,因伪随机函数具备的单向性,使得攻击者无法分析出有用隐私信息。将不同算法对比安全分析,表明该算法能够抵抗重放攻击、异步攻击等多种攻击。通过性能角度及仿真实验对多个算法进行分析,结果表明该算法计算时间复杂度低于其他算法。 展开更多
关键词 近场通信 中国剩余定理 伪随机函数 大素数 安全认证 GNY逻辑形式化分析
下载PDF
一种新的一次性口令机制及其应用 被引量:9
4
作者 王敏 戴宗坤 方勇 《计算机应用研究》 CSCD 北大核心 2005年第1期108-110,共3页
针对现有的一次性口令机制存在的缺陷,对独立一次性口令机制的工作原理和优势进行了分析,并应用在数据库加密系统中,从而增强了身份鉴别服务的安全性能。
关键词 独立一次性口令 伪随机函数 数据库加密
下载PDF
基于伪随机函数的RFID双向认证协议 被引量:7
5
作者 李希元 孙超 郑薇 《计算机工程与应用》 CSCD 北大核心 2018年第17期67-70,共4页
针对在物联网应用中,现有的RFID安全认证协议存在安全缺陷和认证效率低等问题,提出了一种改进的基于PRF的RFID双向认证协议,通过对读写器产生的随机数进行加密的方法,来解决原协议存在的安全隐患问题;采用随机数使标签保持信息的新鲜性... 针对在物联网应用中,现有的RFID安全认证协议存在安全缺陷和认证效率低等问题,提出了一种改进的基于PRF的RFID双向认证协议,通过对读写器产生的随机数进行加密的方法,来解决原协议存在的安全隐患问题;采用随机数使标签保持信息的新鲜性。通过和已有的此类安全认证协议进行安全性比较,结果表明改进的协议不仅具有防跟踪、抗暴力破解、防重放攻击等特点,而且保证了标签没有大幅增加计算量。 展开更多
关键词 物联网 伪随机函数 射频识别 标签标识符
下载PDF
蓄意攻击下城市电力网络毁伤韧性评估 被引量:6
6
作者 韩林 赵旭东 +2 位作者 陈志龙 龚华栋 侯本伟 《中国安全科学学报》 CAS CSCD 北大核心 2021年第6期161-169,共9页
为提升蓄意攻击威胁下城市电力网络毁伤韧性评估的有效性,采用性能时程响应函数(PRF)法,结合攻防双方策略博弈模型,建立蓄意攻击下城市电力网络毁伤韧性评估方法及流程;同时,融合电力潮流分析设计新型性能PRF,使韧性评估结果更符合电力... 为提升蓄意攻击威胁下城市电力网络毁伤韧性评估的有效性,采用性能时程响应函数(PRF)法,结合攻防双方策略博弈模型,建立蓄意攻击下城市电力网络毁伤韧性评估方法及流程;同时,融合电力潮流分析设计新型性能PRF,使韧性评估结果更符合电力网络实际功能需求;以我国某市电力网络为例,依托策略博弈模型求解出纳什均衡状态下攻防双方策略,并评估不同恢复条件下该电力网络毁伤韧性。研究结果表明:纳什均衡策略为攻防双方最有可能采取的攻击和防护策略,城市电力网络的毁伤韧性受恢复资源和恢复预算2个条件共同控制,恢复资源决定网络的恢复速度,恢复预算决定网络的恢复程度。 展开更多
关键词 蓄意攻击 城市电力网络 毁伤韧性评估 策略博弈模型 时程响应函数(prf) 恢复资源
下载PDF
地震灾害下城市供水网络韧性评估及优化研究 被引量:11
7
作者 韩林 赵旭东 +1 位作者 陈志龙 龚华栋 《中国安全科学学报》 CAS CSCD 北大核心 2021年第2期135-142,共8页
为提升城市供水网络应对地震灾害的能力,基于性能响应函数(PRF)方法,引入基础设施网络均衡理论,设计综合考虑城市供水网络物理状态和输送能力的性能时程响应函数,构建贯穿结构和功能双维度的地震灾害下城市供水网络韧性评估方法;从灾害... 为提升城市供水网络应对地震灾害的能力,基于性能响应函数(PRF)方法,引入基础设施网络均衡理论,设计综合考虑城市供水网络物理状态和输送能力的性能时程响应函数,构建贯穿结构和功能双维度的地震灾害下城市供水网络韧性评估方法;从灾害概率、灾害后果、恢复速度、恢复程度等4个关键因素出发,提出城市供水网络网状扩张、管道延性改造、增加恢复资源和提升恢复储备等韧性优化策略;以我国华东某市供水网络为例,定量评估不同优化策略下的韧性提升效果,提出不同决策场景下恢复资源r和恢复储备b的优化配置方法。结果表明:管网延性改造是提升供水网络韧性的有效措施,网状扩张能提升供水网络性能,但对韧性提升无明显作用,网状扩张后要注意增加网络恢复资源和恢复储备。 展开更多
关键词 地震灾害 供水网络 韧性评估 优化策略 性能响应函数(prf)
下载PDF
Design for Vibrator Field Experiment Based-on Vibrator-earth System 被引量:8
8
作者 Chen Zubin Lin Jun +1 位作者 Liang Tiecheng Zhang Linhang 《Global Geology》 2000年第1期107-113,共7页
Source-generated energy in seismic vibrator records high frequency harmonic behavior. Conventional vibrator-earth coupling model was set up on the linear system. Some assumptions in the application of linear theory to... Source-generated energy in seismic vibrator records high frequency harmonic behavior. Conventional vibrator-earth coupling model was set up on the linear system. Some assumptions in the application of linear theory to the vibrator problem play an insignificant role in the overall coupling structure. Obviously, non-linear behaviors can be modeled using a “hard-spring” form of the Duffing equation. Model dedicates that a qualitatively similar harmonic component is present for a broad range of possible mathematical descriptions. After some qualitative analysis about the non-linear system, some conclusion can be drawn. Firstly, The design of the vibrator weight should be abided by two points as followed: In order to avoid decoupling for the vibrator to the earth, the weight should be greater than the peak of the driving force amplitude as to keep the resultant force pointing to the earth’s core. On the other hand, for the limited energy output, the vibrator overweight may damage the system high-frequency ability.Secondly, as the driving force frequency approaching to the ground hard-spring inherent frequency, the energy transmission was found to climb its peak from the system energy absorbed curve. At last, due to the non-linear coupling model system, its load curve would come into unstable frequency range, which might limit the application of the Vibroseis conventional sweeping pattern-linear sweep. A new sweeping pattern was listed: the driving signal was the pseudo-random sequence modulated by a fixed frequency cosine signal satisfying with the exploration precision and absorbing efficiency. The synthesized signal was ready to be realized by the electromagnetic driven system. Even the side-lobes noise of its auto-correlation function was restrained well. The theory coming from the Vibrator-earth coupling model was applied to the design of the Portable High-frequency Vibrator System (PHVS), and the good result was obtained. By the analysis of the vibrator base plate signal, the model was proved to be true. The exploration research on PHVS made a first step on its following optimal design. 展开更多
关键词 Portable High-frequency Vibrator System(PHVS) Coupling model Seismic prospecting Auto-correlation function Linear sweep pseudo-random sequence
下载PDF
A Secure Session Key Distribution Scheme for Group Communications
9
作者 林仁宏 詹进科 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期192-196,共5页
In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or join... In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or joins the group, group center (GC) immediately changes the common encryption key and sends the new key to all valid members for forward and backward secrecy. If valid members are not on-line, they will miss the re-keying messages and will not be able to decrypt any ciphertext. Therefore, group members must be able to store the state of the system. In some applications, like global positioning systems (GPS) or pay-per-view systems, it is not reasonable to ask group members to stay on-line all the time and save the changes to the system. A hierarchical binary tree-based key management scheme are proposed for a secure group communication. This scheme reduces the key storage requirement of GC to a constant size and the group members are not required to be on-line constantly (stateless). 展开更多
关键词 key management symmetric encryption group communication pseudo-random function
下载PDF
Multi-Value Sequence Generated over Sub Extension Field and Its Properties
10
作者 Md. Arshad Ali Yuta Kodera +3 位作者 Takuya Kusaka Satoshi Uehara Yasuyuki Nogami Robert H. Morelos-Zaragoza 《Journal of Information Security》 2019年第3期130-154,共25页
Pseudo-random sequences with long period, low correlation, high linear complexity, and uniform distribution of bit patterns are widely used in the field of information security and cryptography. This paper proposes an... Pseudo-random sequences with long period, low correlation, high linear complexity, and uniform distribution of bit patterns are widely used in the field of information security and cryptography. This paper proposes an approach for generating a pseudo-random multi-value sequence (including a binary sequence) by utilizing a primitive polynomial, trace function, and k-th power residue symbol over the sub extension field. All our previous sequences are defined over the prime field, whereas, proposed sequence in this paper is defined over the sub extension field. Thus, it’s a new and innovative perception to consider the sub extension field during the sequence generation procedure. By considering the sub extension field, two notable outcomes are: proposed sequence holds higher linear complexity and more uniform distribution of bit patterns compared to our previous work which defined over the prime field. Additionally, other important properties of the proposed multi-value sequence such as period, autocorrelation, and cross-correlation are theoretically shown along with some experimental results. 展开更多
关键词 pseudo-random SEQUENCE Trace function Power RESIDUE Symbol SUB Extension Field AUTOCORRELATION CROSS-CORRELATION Linear Complexity Distribution of Bit Patterns
下载PDF
A Lightweight Secure Network Coding Scheme against Wiretapping 被引量:3
11
作者 LIU Guangjun LIU Ximeng +1 位作者 XIONG Jinbo ZHOU Hang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第2期156-160,共5页
Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks... Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks, an efficient secure coding scheme is proposed in conjunction with the inherent mix- ing characteristic of network coding. The key idea is to minimize the randomizing operations to the entire plaintext data. The pro- posed scheme is shown to have properties of lightweight security complexity and lower communication overhead compared with the existing traditional solutions, and can be easy in implementation and combination with classical cryptography techniques. 展开更多
关键词 network coding security wiretapping algebraic coding pseudo-random function
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部