期刊文献+
共找到168篇文章
< 1 2 9 >
每页显示 20 50 100
Image Encryption and Decryption Based on Chaotic Algorithm
1
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos algorithm Image encryption and decryption Two-Stage Logistic Mapping M Sequence
下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
2
作者 Muhammad Nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 CRYPTOGRAPHY symmetric algorithm encryption decryption cipher text cloud security asymmetric algorithm
下载PDF
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
3
作者 Mohammad Anwar Hossain Ahsan Ullah +1 位作者 Newaz Ibrahim Khan Md Feroz Alam 《Journal of Information Security》 2019年第4期199-236,共38页
Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s no... Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud. 展开更多
关键词 Data Security Cloud Computing encryption decryption Secret Key SYMMETRIC algorithm 192 BITS HASHING PERMUTATION SHA-512
下载PDF
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
4
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2010年第12期901-906,共6页
Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorit... Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorithm, for modular multiplicative inverse (MMI). Analysis of the proposed algorithm shows that it is more efficient than the Extended Euclid algorithm (XEA). In addition, if a MMI does not exist, then it is not necessary to use the Backtracking procedure in the proposed algorithm;this case requires fewer operations on every step (divisions, multiplications, additions, assignments and push operations on stack), than the XEA. Overall, XEA uses more multiplications, additions, assignments and twice as many variables than the proposed algorithm. 展开更多
关键词 Extended-Euclid algorithm MODULAR MULTIPLICATIVE INVERSE Public-Key Cryptography RSA Cryptocol Rabin Information Hiding algorithm ELGAMAL encryption/decryption NTRU Cryptosystem Computer Simulation Low Memory Devices
下载PDF
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm
5
作者 Omer K. Jasim Safia Abbas +1 位作者 El-Sayed M. Horbaty Abdel-Badeeh M. Salem 《Journal of Information Security》 2015年第2期82-91,共10页
With the rapid evolution of data exchange in network environments, information security has been the most important process for data storage and communication. In order to provide such information security, the confid... With the rapid evolution of data exchange in network environments, information security has been the most important process for data storage and communication. In order to provide such information security, the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a new emerging trend of modern symmetric encryption algorithm by development of the advanced encryption standard (AES) algorithm. The new development focuses on the integration between Quantum Key Distribution (QKD) and an enhanced version of AES. A new quantum symmetric encryption algorithm, which is abbreviated as Quantum-AES (QAES), is the output of such integration. QAES depends on generation of dynamic quantum S-Boxes (DQS-Boxes) based quantum cipher key, instead of the ordinary used static S-Boxes. Furthermore, QAES exploits the specific selected secret key generated from the QKD cipher using two different modes (online and off-line). 展开更多
关键词 AES encryption/decryption QUANTUM COMPUTATIONS QKD SYMMETRIC algorithm
下载PDF
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
6
作者 Gulain Mugaruka Buduge Jérémie Ndikumagenge Justin Buhendwa Nyenyezi 《Journal of Information Security》 2022年第4期312-322,共11页
This paper deals with the implementation of algorithms and tools for the security of academic data protection in the Democratic Republic of the Congo. It consists principally in implementing two algorithms and two dis... This paper deals with the implementation of algorithms and tools for the security of academic data protection in the Democratic Republic of the Congo. It consists principally in implementing two algorithms and two distinct tools to secure data and in this particular case, academic data of higher and university education in the Democratic Republic of the Congo. The design of algorithms meets the approach that any researcher in data encryption must use during the development of a computer system. Briefly, these algorithms are steps to follow to encrypt information in any programming language. These algorithms are based on symmetric and asymmetric encryption, the first one uses Christopher Hill’s algorithm, which uses texts in the form of matrices before they are encrypted and RSA as one of the asymmetric algorithms, it uses the prime numbers that we have encoded on more than 512 bits. As for tools, we have developed them in php which is only a programming language taken as an example because it is impossible to use all of them. The tools implemented are based on the algorithms of Caesar, Christopher Hill, and RSA showing how the encryption operations are carried out thanks to graphical interfaces. They are only tools for pedagogical reasons to help students and other researchers learn how to use developed algorithms. We have not developed them for pleasure but rather to be used in any information system, which would prevent and limit unauthorized access to computer systems. They will not be used only for the management of academic fees but for any other information system, which explains and shows the complexity of the tools developed. We have not been able to solve the problems of versions for the developed prototype, because if there is a new version later some functions may be obsolete, which would constitute the limitation of these tools. This work targets primarily the Ministry of Higher Education and Universities, which will make these results its own and implement them in order to solve the problem of intrusions, and unauthorized access to developers and researchers who will use tools already made instead of thinking about their development. We are trying to demonstrate the steps and the methodology that allowed us to reach our results, in the following lines. 展开更多
关键词 COMPUTER SECURITY Crypto Systems and Analysis algorithmS encryption/decryption
下载PDF
语音实验室端到端即时通信认证协议设计
7
作者 何锴 《现代电子技术》 北大核心 2024年第11期18-21,共4页
为保证语音实验室端到端即时通信安全,确保语音内容不被窃听和篡改,提出一种基于混合加解密的语音实验室端到端即时通信认证协议的设计方法。利用RSA方法加解密发送方传输的即时通信会话密钥,通过3DES方法将发送方发送的明文语音信息进... 为保证语音实验室端到端即时通信安全,确保语音内容不被窃听和篡改,提出一种基于混合加解密的语音实验室端到端即时通信认证协议的设计方法。利用RSA方法加解密发送方传输的即时通信会话密钥,通过3DES方法将发送方发送的明文语音信息进行加解密。在加解密过程中,加密信息打包为加密包后发送至信息接收方,信息接收方获取加密包后,使用RSA方法、3DES方法进行有效的密钥解密认证、明文语音消息解密,获取语音实验室端到端的明文语音信息。实验结果显示,此协议使用下,语音实验室端到端即时通信的认证加速比提升,且仅在密钥输入内容准确的情况下,信息接收方才可得到准确的明文语音消息内容,且不存在内容失真问题。 展开更多
关键词 语音实验室 端到端 即时通信 认证协议 RSA算法 3DES方法 密钥加解密 明文加解密
下载PDF
策略动态更新的变电站安全通信体系研究
8
作者 徐广辉 高诗航 +2 位作者 马玉龙 滕春涛 刘汝华 《电气技术》 2024年第7期32-38,共7页
针对变电站单一固定的加解密算法应对第三方截取和暴力破解能力不足的问题,本文梳理变电站网络通信构架特点,提出动态更新安全策略的变电站安全体系方案:首先构建全站统一的安全策略库,通过证书授权机和密钥代理机进行管理,为每个设备... 针对变电站单一固定的加解密算法应对第三方截取和暴力破解能力不足的问题,本文梳理变电站网络通信构架特点,提出动态更新安全策略的变电站安全体系方案:首先构建全站统一的安全策略库,通过证书授权机和密钥代理机进行管理,为每个设备建立与其通信能力匹配的策略库子集;通信设备在线动态选择适合自身能力的安全策略,并对当前安全策略进行时效管理,实现安全策略的自适应动态更新,提升变电站信息安全主动防护的能力。通过设计测试平台,对策略动态更新功能、通信性能及设备功能进行实测,证明策略动态更新机制不影响设备核心功能的正常运行,对设备通信实时性有轻微影响。 展开更多
关键词 变电站信息安全 安全策略动态更新 加解密算法 证书授权机 密钥代理机
下载PDF
基于区块链技术的物流供应链信息加密算法优化研究
9
作者 彭易杭 《佳木斯大学学报(自然科学版)》 CAS 2024年第7期56-59,共4页
传统供应链平台往往由于中心化的特性导致信息不对称,用户数据容易面临泄露的风险。针对这一问题,提出结合区块链技术对物流供应链信息进行加密解密。区块链技术具有匿名性、去中心化等特点,能够更好的保证物流供应链中用户信息的安全,... 传统供应链平台往往由于中心化的特性导致信息不对称,用户数据容易面临泄露的风险。针对这一问题,提出结合区块链技术对物流供应链信息进行加密解密。区块链技术具有匿名性、去中心化等特点,能够更好的保证物流供应链中用户信息的安全,通过非对称加密以及对称加密混合的方式,并设计相应的环签名算法以及PoA共识机制。经算例验证,以区块链技术为依据的物流供应链信息加密算法相比ECC算法在加密解密的速度上大幅提升,同时CPU占有率更低,加密解密的安全性更高。 展开更多
关键词 区块链技术 物流供应链 加密解密算法 环签名算法 共识机制
下载PDF
一种双主节点的PBFT共识算法
10
作者 陈珩 黄世成 郑明辉 《湖北民族大学学报(自然科学版)》 CAS 2024年第2期185-190,共6页
针对区块链中拜占庭类共识算法主节点权限过高导致中心化集权与共识效率低下的问题,提出了一种双主节点的实用拜占庭容错(dual-master node practical Byzantine fault tolerance,DMNPBFT)共识算法。首先确定了区块链节点之间双主节点... 针对区块链中拜占庭类共识算法主节点权限过高导致中心化集权与共识效率低下的问题,提出了一种双主节点的实用拜占庭容错(dual-master node practical Byzantine fault tolerance,DMNPBFT)共识算法。首先确定了区块链节点之间双主节点的权力,通过双主节点的交互模式减少中心化带来的权力集中影响。在信息交易传播过程中将双主节点与秘密分享技术相结合,确保联盟链中所有节点对交易信息达成一致,解决了节点之间为确认共识而造成的由复杂信息传播引起的共识效率较低的问题。双主节点利用秘密分享中的聚合算法生成主密钥并将主密钥与原密钥进行一致性比较,从而完成共识交易。DMNPBFT算法在计算上具备安全性与健壮性,共识轮数量仅有3轮。实验表明,相较于传统PBFT算法,DMNPBFT算法的共识一致性与容错处理能力均显著增强,共识时延减少了97.7%。该算法提高了联盟链节点处理数据的能力,能够在大数据流量下完成联盟链中数据的安全性共识传输操作。 展开更多
关键词 区块链 共识算法 加解密算法 联盟链 秘密分享 子密钥 签名算法
下载PDF
超高清显示接口芯片的软件及认证算法设计
11
作者 张立新 张俊 +2 位作者 马静 郭晓旭 阚希 《电子设计工程》 2024年第11期146-150,共5页
针对超高清显示接口芯片产业应用时客户提出的内容保护需求,该文通过研究HDCP所涉及到的加解密算法,分析HDCP1.4、HDCP2.2认证流程,结合具体的高清接口转换芯片应用方案,设计了MCU软件的下载及调试方法,采用软硬件结合并主要由软件实现... 针对超高清显示接口芯片产业应用时客户提出的内容保护需求,该文通过研究HDCP所涉及到的加解密算法,分析HDCP1.4、HDCP2.2认证流程,结合具体的高清接口转换芯片应用方案,设计了MCU软件的下载及调试方法,采用软硬件结合并主要由软件实现的方式,设计了认证算法。通过搭建系统测试平台并使用专用的协议分析工具,对HDCP认证过程进行试验,抓取通信协议过程,结果显示,复杂计算的响应时间在100 ms以内,通过I2C下载32k程序用时在32 s以内,满足了规范和客户需求。 展开更多
关键词 HDCP 加解密算法 认证 接口芯片
下载PDF
一种基于TrustZone机制的安全加解密及存储系统设计
12
作者 梁祖丹 龙荣平 +1 位作者 陆彬 陶健军 《广西水利水电》 2024年第4期124-127,132,共5页
针对传统加解密技术在安全存储领域面临的挑战,提出了一种基于TrustZone机制的安全加解密以及存储系统设计。TrustZone是一种硬件安全技术,它通过在处理器中集成安全内核,为用户提供一个安全执行环境。在TrustZone环境下,应用程序可以... 针对传统加解密技术在安全存储领域面临的挑战,提出了一种基于TrustZone机制的安全加解密以及存储系统设计。TrustZone是一种硬件安全技术,它通过在处理器中集成安全内核,为用户提供一个安全执行环境。在TrustZone环境下,应用程序可以执行安全敏感操作,如密钥管理和加密算法实现等。详细介绍了该方案的设计、安全加解密流程和应用场景,并对方案安全性分析和评估。实验结果验证了本方案系统的安全性能和效率,展示了与传统加解密方法对比的优越性,为加解密技术的研究和发展提供了新思路。 展开更多
关键词 安全加解密 TrustZone机制 安全架构 密钥管理 加解密算法 硬件加密 防篡改
下载PDF
电力系统通信网络的信息安全与防护机制研究
13
作者 高利达 张颖 张钦雪 《通信电源技术》 2024年第7期150-152,共3页
深入研究电力系统通信网络的信息安全与防护机制,以应对不断增长的网络威胁。文章详细分析电力系统通信网络的结构、拓扑、协议与标准以及恶意攻击的类型和潜在路径,并在认证与授权、加密与解密算法、安全协议应用以及网络入侵检测与防... 深入研究电力系统通信网络的信息安全与防护机制,以应对不断增长的网络威胁。文章详细分析电力系统通信网络的结构、拓扑、协议与标准以及恶意攻击的类型和潜在路径,并在认证与授权、加密与解密算法、安全协议应用以及网络入侵检测与防御等方面,提出具有创新性的安全机制。实施和优化已有的防护机制,对网络监控与日志记录以及攻击应对与应急响应进行实验和案例研究,以验证其在真实场景下的有效性。调研结果表明,所提出的安全机制可有效增强电力系统通信网络的安全防范能力,对各类恶意攻击起到有效的防御作用,为保持电力系统的稳定运行提供有力保障。 展开更多
关键词 电力系统通信网络 信息安全 防护机制 认证与授权 加密与解密算法
下载PDF
基于AES加密算法的数据库透明加解密系统的设计与实现 被引量:1
14
作者 赵中军 杨阳 +1 位作者 杨兴 邓雷升 《通信技术》 2023年第3期377-382,共6页
随着计算机和通信技术的快速发展,与之紧密相关的信息安全问题也愈加被人们所重视。作为主要信息系统要素的数据库,确保其安全则成为关注焦点。设计并实现了一种基于高级加密标准(Advanced Encryption Standard,AES)加密算法的数据库透... 随着计算机和通信技术的快速发展,与之紧密相关的信息安全问题也愈加被人们所重视。作为主要信息系统要素的数据库,确保其安全则成为关注焦点。设计并实现了一种基于高级加密标准(Advanced Encryption Standard,AES)加密算法的数据库透明加解密系统,将加解密算法集成到硬件加解密机上,最后在Linux操作系统平台下针对SQLite3数据库进行了透明加解密实验。实验结果验证了所提出的数据库透明加解密系统设计方案的可行性,并验证了所设计出的数据库透明加解密系统的性能。 展开更多
关键词 AES加密算法 数据库透明加解密 硬件加解密 数据库安全性
下载PDF
FPGA实现Hadamard矩阵的通信信号加解密算法
15
作者 宋华军 刘禹清 +2 位作者 吴晏奇 高琳惠 张顺 《现代电子技术》 2023年第15期13-19,共7页
扩频通信技术一直是通信领域的研究热点,在军事和民用通信中被广泛应用,它具有良好的抗干扰能力、加密能力。现有的扩频加密算法在实际应用时往往会遇到软件和信道计算量大等限制,Hadamard变换简便的结构使其在数字信号通信方面有着广... 扩频通信技术一直是通信领域的研究热点,在军事和民用通信中被广泛应用,它具有良好的抗干扰能力、加密能力。现有的扩频加密算法在实际应用时往往会遇到软件和信道计算量大等限制,Hadamard变换简便的结构使其在数字信号通信方面有着广泛的应用,但其在软件实现上速度较慢,且延时大。FPGA的并行计算能力和其独特的结构可以提供一种新的高速实现方案。为此,研究运用FPGA实现一种基于Hadamard变换矩阵的直接序列扩频解扩、加密解密算法。在Xilinx Virtex⁃7690T的板级测试表明,对于32路的32位IQ两路语音复信号,解密后系统输出波形与加密前波形无明显失真,输出延迟约0.615μs,具有很好的准确性和实时性,满足实际工程要求。 展开更多
关键词 HADAMARD矩阵 FPGA并行化 扩频通信 抗干扰 高速算法 加解密算法 通信系统
下载PDF
基于位逻辑运算的文件加密算法设计
16
作者 魏宝广 《软件》 2023年第2期112-115,共4页
将文件内容读取并转换为字符串,然后按照一定的策略规则将字符串中的部分或全部字符提取出来,利用原文和密钥之间比特位的逻辑运算关系对字符编码加密,可实现磁盘文件的加密。根据实际需要对加密策略加以调整,通过在安全性和效率之间进... 将文件内容读取并转换为字符串,然后按照一定的策略规则将字符串中的部分或全部字符提取出来,利用原文和密钥之间比特位的逻辑运算关系对字符编码加密,可实现磁盘文件的加密。根据实际需要对加密策略加以调整,通过在安全性和效率之间进行权衡取舍,可以对加密算法进行增强或减弱,从而满足不同场景的应用需要。 展开更多
关键词 加密 解密 密钥 算法 比特位 字符串 文件
下载PDF
基于GMSSL公共库应用的测试研究
17
作者 常卫 浮明军 +2 位作者 徐亚超 黄显果 刘静静 《微型电脑应用》 2023年第10期176-180,共5页
国家电网公司新一代变电站二次系统系列技术规范DL/T860《通信报文技术规范》中要求具备国密TLS协议通信功能,加解密算法和数据安全传输为该通信装置的核心。因此,文章首先阐述了TLS通信机制及国密SM2、SM3、SM4算法;其次,从功能封装实... 国家电网公司新一代变电站二次系统系列技术规范DL/T860《通信报文技术规范》中要求具备国密TLS协议通信功能,加解密算法和数据安全传输为该通信装置的核心。因此,文章首先阐述了TLS通信机制及国密SM2、SM3、SM4算法;其次,从功能封装实现的角度对源代码进行了测试环境搭建,按照《自主可控新一代变电站二次系统技术规范通用类系列规范6二次设备安全防护》对数据安全、通信安全的要求设计了测试项目及测试方法。结果表明,GMSSL库函数的调用漏洞,将会导致TLS通信初始化时证书与私钥匹配错误、不加密的私钥文件与P12文件对密码的错误使用,库函数输入参数的异常传入将导致加解密与预期不符等问题。对不同长度数据加解密速度研究也为GMSSL库在Windows平台上的时间消耗提供了一定的参考。 展开更多
关键词 GMSSL库 国密算法 TLS通信 加解密
下载PDF
Establishment and Application of Cryptographic Library Model
18
作者 Tie-Ming Liu Lie-Hui Jiang +1 位作者 Jing Jing Yuan-Yuan Zhang 《Journal of Computer and Communications》 2015年第5期21-32,共12页
When doing reverse analysis of program’s binary codes, it is often to encounter the function of cryptographic library. In order to reduce workload, a cryptographic library model has been designed by analysts. Models ... When doing reverse analysis of program’s binary codes, it is often to encounter the function of cryptographic library. In order to reduce workload, a cryptographic library model has been designed by analysts. Models use formalized approach to describe the frame of cryptology and the structure of cryptographic function, complete the mapping from cryptographic function property to its architecture, and accomplish the result presentation of data analysis and mapping at last. The model can solve two problems: the first one is to know the hierarchy of the cryptographic function in the library well;the second one is to know some kinds of information, such as related cryptology algorithm and protocol, etc. These function implements can display the result graphically. The model can find relevant knowledge for the analysts automatically and rapidly, which is helpful to the learning of the overall abstract structure of cryptology. 展开更多
关键词 CRYPTOGRAPHIC LIBRARY Model CRYPTOGRAPHIC LIBRARY Architecture CRYPTOGRAPHIC algorithm encryption and decryption KEYS encryption and decryption Data Information Recovery
下载PDF
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
19
作者 Muhammad Ariful Islam Md. Ashraful Islam +1 位作者 Nazrul Islam Boishakhi Shabnam 《Journal of Computer and Communications》 2018年第3期78-90,共13页
Cryptography is the study that provides security service. It concerns with confidentiality, integrity, and authentication. Public key cryptography provides an enormous revolution in the field of the cryptosystem. It u... Cryptography is the study that provides security service. It concerns with confidentiality, integrity, and authentication. Public key cryptography provides an enormous revolution in the field of the cryptosystem. It uses two different keys where keys are related in such a way that, the public key can use to encrypt the message and private key can be used to decrypt the message. This paper proposed an enhanced and modified approach of RSA cryptosystem based on “n” distinct prime number. This existence of “n” prime number increases the difficulty of the factoring of the variable “N” which increases the complexity of the algorithm. In this approach, two different public key and private key generated from the large factor of the variable “N” and perform a double encryption-decryption operation which affords more security. Experiment on a set of a random number provided that the key generation time, analysis of variable “N”, encryption and decryption will take a long time compared to traditional RSA. Thus, this approach is more efficient, highly secured and not easily breakable. 展开更多
关键词 RSA algorithm encryption decryption CRYPTOSYSTEM Security PUBLIC KEY PRIVATE KEY
下载PDF
基于前缀码的DES算法改进研究 被引量:13
20
作者 谢志强 高鹏飞 杨静 《计算机工程与应用》 CSCD 北大核心 2009年第9期92-94,119,共4页
DES算法自出现以来便面对许多威胁,根据DES算法易受穷举攻击法、选择明文攻击法等方法攻击的缺陷,提出了一种新的基于前缀码的改进方案。通过改变子密钥的顺序来提高抵抗某些攻击的能力,在基本不影响DES算法效率的前提下,很好地提高了DE... DES算法自出现以来便面对许多威胁,根据DES算法易受穷举攻击法、选择明文攻击法等方法攻击的缺陷,提出了一种新的基于前缀码的改进方案。通过改变子密钥的顺序来提高抵抗某些攻击的能力,在基本不影响DES算法效率的前提下,很好地提高了DES算法的安全性。 展开更多
关键词 数据加密标准算法 前缀码 加密 解密 改进
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部