期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Permutation Code Encryption—New Achievement Based on Path Encryption
1
作者 WU Jinmu LIU Maohua FU Guiqin GUO Lina 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1581-1584,共4页
By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path ... By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path encryption. We present permutation code encryption which is based on path encryption. Now permutation code encryption is a patent of Chinese invention. In Permutation Code Encryption, we use a pseudo-random sequence of the keys to control the paths. The simulation result shows that for n-bit block the encryption strength is novel higher than 2^n and the algorithm can finish the encryption of one block in 7.5 ns, which is unrelated with the block length. 展开更多
关键词 ATTACK encryption strength path encryption permutation code encryption block cipher
下载PDF
The New Concept of Path Contributing to the Cryptographic Strength Exceeding 2~N
2
作者 WU Jinmu FU Guiqin LIU Yi GUO Lina 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1585-1588,共4页
First this paper introduces the kinds of category of Cipher and the current situation of the Block Cipher. Then it talks about the old concepts holding back the Block Cipher and presents a new concept. Finally, it int... First this paper introduces the kinds of category of Cipher and the current situation of the Block Cipher. Then it talks about the old concepts holding back the Block Cipher and presents a new concept. Finally, it introduces our patent-Permutation Code and the Encipher/Decipher. Its encryption strength exceeds 2^N. With DES having been proved unsafe, we should not enhance the encryption strength just by increasing its block length just as AES does. 展开更多
关键词 CIPHER encryption DECRYPTION Permutation Code encryption block cipher
下载PDF
Application of Polar Code-Based Scheme in Cloud Secure Storage
3
作者 Zhe Li Yiliang Han Yu Li 《国际计算机前沿大会会议论文集》 2020年第1期676-689,共14页
In view of the fact that the quantum computer attack is not considered in the cloud storage environment,this paper selects the code-based public key encryption scheme as the security protection measure in the cloud st... In view of the fact that the quantum computer attack is not considered in the cloud storage environment,this paper selects the code-based public key encryption scheme as the security protection measure in the cloud storage.Based on random linear code encryption scheme,it employs the structure of the RLCE scheme and Polar code polarization properties,using the Polar code as underlying encoding scheme,through the method of RLCEspad,putting forward a kind of improved public key encryption scheme which considers semantic security and is resistant to adaptively chosen ciphertext attacks.The improved scheme is applied to cloud storage to ensure that the storage environment will not be attacked by quantum computer while ensuring the confidentiality,availability and reliability. 展开更多
关键词 Post-quantum cryptography Polar code Random linear code encryption Code-based scheme Cloud storage
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部