期刊文献+
共找到4,626篇文章
< 1 2 232 >
每页显示 20 50 100
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
1
作者 Maher Alharby 《Computers, Materials & Continua》 SCIE EI 2024年第5期2449-2463,共15页
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems. 展开更多
关键词 Cloud storage data secrecy data integrity smart contracts cryptography
下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
2
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation cryptography keys trusted certified auditors data security
下载PDF
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
3
作者 Pawan Kumar Vipin Saxena 《Journal of Computer and Communications》 2024年第2期201-210,共10页
Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an expone... Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an exponential manner. Hybrid cryptography provides a better solution than a single type of cryptographical technique. In this paper, nested levels of hybrid cryptographical techniques are investigated with the help of Deoxyribonucleic Acid (DNA) and Paillier cryptographical techniques. In the first level, information will be encrypted by DNA and at the second level, the ciphertext of DNA will be encrypted by Paillier cryptography. At the decryption time, firstly Paillier cryptography will be processed, and then DAN cryptography will be processed to get the original text. The proposed algorithm follows the concept of Last Encryption First Decryption (LEFD) at the time of decryption. The computed results are depicted in terms of tables and graphs. 展开更多
关键词 ENCRYPTION DECRYPTION DNA Paillier cryptography Nested Levels Hybrid cryptography
下载PDF
Utilizing Certificateless Cryptography for IoT Device Identity Authentication Protocols in Web3
4
作者 WU Zhihui HONG Yuxuan +2 位作者 ZHOU Enyuan LIU Lei PEI Qingqi 《ZTE Communications》 2024年第2期30-38,共9页
Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approac... Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approach by distributing authentication services to edge authentication gateways and servers,facilitated by blockchain technology,thus aligning with the decentralized ethos of Web3 infrastructure.Additionally,we enhance device security against physical and cloning attacks by integrating physical unclonable functions with certificateless cryptography,bolstering the integrity of Internet of Thins(IoT)devices within the evolving landscape of the metaverse.To achieve dynamic anonymity and ensure privacy within Web3 environments,we employ fuzzy extractor technology,allowing for updates to pseudonymous identity identifiers while maintaining key consistency.The proposed protocol ensures continuous and secure identity authentication for IoT devices in practical applications,effectively addressing the pressing security concerns inherent in IoT network environments and contributing to the development of robust security infrastructure essential for the proliferation of IoT devices across diverse settings. 展开更多
关键词 blockchain certificateless cryptography identity authentication IOT
下载PDF
General digital rights management solution based on white-box cryptography
5
作者 Liu Jun Hu Yupu Chen Jie 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第1期52-63,共12页
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of crypto... Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical. 展开更多
关键词 digital rights management(DRM) white-box cryptography traceable white-box program white-box compiler
原文传递
NTRU_SSS:Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing 被引量:1
6
作者 Asma Ibrahim Hussein Abeer Tariq MaoLood Ekhlas Khalaf Gbashi 《Computers, Materials & Continua》 SCIE EI 2023年第7期753-769,共17页
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).... With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency. 展开更多
关键词 Post-quantum cryptography NTRU Shamir’s secret sharing public key
下载PDF
Efficient Technique for Image Cryptography Using Sudoku Keys
7
作者 M.A.P.Manimekalai M.Karthikeyan +4 位作者 I.Thusnavis Bella Mary K.Martin Sagayam Ahmed A Elngar Unai Fernandez-Gamiz Hatıra Günerhan 《Computers, Materials & Continua》 SCIE EI 2023年第10期1325-1353,共29页
This paper proposes a cryptographic technique on images based on the Sudoku solution.Sudoku is a number puzzle,which needs applying defined protocols and filling the empty boxes with numbers.Given a small size of numb... This paper proposes a cryptographic technique on images based on the Sudoku solution.Sudoku is a number puzzle,which needs applying defined protocols and filling the empty boxes with numbers.Given a small size of numbers as input,solving the sudoku puzzle yields an expanded big size of numbers,which can be used as a key for the Encryption/Decryption of images.In this way,the given small size of numbers can be stored as the prime key,which means the key is compact.A prime key clue in the sudoku puzzle always leads to only one solution,which means the key is always stable.This feature is the background for the paper,where the Sudoku puzzle output can be innovatively introduced in image cryptography.Sudoku solution is expanded to any size image using a sequence of expansion techniques that involve filling of the number matrix,Linear X-Y rotational shifting,and reverse shifting based on a standard zig-zag pattern.The crypto key for an image dictates the details of positions,where the image pixels have to be shuffled.Shuffling is made at two levels,namely pixel and sub-pixel(RGB)levels for an image,with the latter having more effective Encryption.The brought-out technique falls under the Image scrambling method with partial diffusion.Performance metrics are impressive and are given by a Histogram deviation of 0.997,a Correlation coefficient of 10−2 and an NPCR of 99.98%.Hence,it is evident that the image cryptography with the sudoku kept in place is more efficient against Plaintext and Differential attacks. 展开更多
关键词 SUDOKU image cryptography PIXELS performance metrics
下载PDF
Design of an E-Administration Platform and Its Cryptography-Based Security Model
8
作者 Ohwobeno Omohwo Iwasokun Gabriel Babatunde +1 位作者 Boyinbode Olutayo Kehinde Gabriel Junior Arome 《Journal of Computer and Communications》 2023年第4期166-189,共24页
E-administration is performing administrative works via computer and its associated technologies such as the Internet. It is administrative efforts that center on the exchange of information and providing services to ... E-administration is performing administrative works via computer and its associated technologies such as the Internet. It is administrative efforts that center on the exchange of information and providing services to people and the business sector at high speed and low cost through computers and networks with the assurance of maintaining information security. It is based on the positive investment in information technology and communication in administrative practices. This paper presents the design of the e-administration platform that adopts the concept of cryptography for identity management. The architectural framework of the platform comprises subcomponents for service and forms identification, business process redesign, service architecture, amalgamation, and deployment. The cryptography model for securing the platform was designed based on the combination of authentication criteria presented in the Rijndael-Advanced Encryption Standard (AES), Lattice-based cryptography (LBC), and Secure Hash Algorithm (SHA512). It is required that a record be encrypted prior to its commitment to the database via a double encryption method. The AES algorithm-based encryption’s output will form the input to the LBC algorithm to obtain the final output. 展开更多
关键词 E-Administration cryptography Management System Encryption and Decryption
下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
9
作者 Muhammad Nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 cryptography symmetric algorithm ENCRYPTION DECRYPTION cipher text cloud security asymmetric algorithm
下载PDF
Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography
10
作者 B.Murugeshwari D.Selvaraj +1 位作者 K.Sudharson S.Radhika 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期839-851,共13页
Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from... Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from numerous remote databases.Mining algorithms can obtain sensitive information once the data is in the data warehouse.Many traditional algorithms/techniques promise to provide safe data transfer,storing,and retrieving over the cloud platform.These strategies are primarily concerned with protecting the privacy of user data.This study aims to present data mining with privacy protection(DMPP)using precise elliptic curve cryptography(PECC),which builds upon that algebraic elliptic curve infinitefields.This approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing techniques.Also,it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the data.Average approximation error,computational cost,anonymizing time,and data loss are considered performance measures.The suggested approach is practical and applicable in real-world situations according to the experimentalfindings. 展开更多
关键词 Data mining cryptography privacy preserving elliptic curve information security
下载PDF
Smart Grid Communication Under Elliptic Curve Cryptography
11
作者 B.Prabakaran T.R.Sumithira V.Nagaraj 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2333-2347,共15页
Smart Grids(SGs)are introduced as a solution for standard power dis-tribution.The significant capabilities of smart grids help to monitor consumer behaviors and power systems.However,the delay-sensitive network faces n... Smart Grids(SGs)are introduced as a solution for standard power dis-tribution.The significant capabilities of smart grids help to monitor consumer behaviors and power systems.However,the delay-sensitive network faces numer-ous challenges in which security and privacy gain more attention.Threats to trans-mitted messages,control over smart grid information and user privacy are the major concerns in smart grid security.Providing secure communication between the service provider and the user is the only possible solution for these security issues.So,this research work presents an efficient mutual authentication and key agreement protocol for smart grid communication using elliptic curve crypto-graphy which is robust against security threats.A trust authority module is intro-duced in the security model apart from the user and service provider for authentication.The proposed approach performance is verified based on different security features,communication costs,and computation costs.The comparative analysis of experimental results demonstrates that the proposed authentication model attains better performance than existing state of art of techniques. 展开更多
关键词 Smart grid elliptic curve cryptography key management mutual authentication
下载PDF
Multi Attribute Case Based Privacy-preserving for Healthcare Transactional Data Using Cryptography
12
作者 K.Saranya K.Premalatha 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2029-2042,共14页
Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge ... Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge with an inten-tion to protect the sensitive details of the patients over getting published in open domain.To solve this problem,Multi Attribute Case based Privacy Preservation(MACPP)technique is proposed in this study to enhance the security of privacy-preserving data.Private information can be any attribute information which is categorized as sensitive logs in a patient’s records.The semantic relation between transactional patient records and access rights is estimated based on the mean average value to distinguish sensitive and non-sensitive information.In addition to this,crypto hidden policy is also applied here to encrypt the sensitive data through symmetric standard key log verification that protects the personalized sensitive information.Further,linear integrity verification provides authentication rights to verify the data,improves the performance of privacy preserving techni-que against intruders and assures high security in healthcare setting. 展开更多
关键词 PRIVACY-PRESERVING crypto policy medical data mining integrity and verification personalized records cryptography
下载PDF
Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT
13
作者 J.R.Arunkumar S.Velmurugan +3 位作者 Balarengadurai Chinnaiah G.Charulatha M.Ramkumar Prabhu A.Prabhu Chakkaravarthy 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2635-2645,共11页
Nowadays,Wireless Sensor Network(WSN)is a modern technology with a wide range of applications and greatly attractive benefits,for example,self-governing,low expenditure on execution and data communication,long-term fu... Nowadays,Wireless Sensor Network(WSN)is a modern technology with a wide range of applications and greatly attractive benefits,for example,self-governing,low expenditure on execution and data communication,long-term function,and unsupervised access to the network.The Internet of Things(IoT)is an attractive,exciting paradigm.By applying communication technologies in sensors and supervising features,WSNs have initiated communication between the IoT devices.Though IoT offers access to the highest amount of information collected through WSNs,it leads to privacy management problems.Hence,this paper provides a Logistic Regression machine learning with the Elliptical Curve Cryptography technique(LRECC)to establish a secure IoT structure for preventing,detecting,and mitigating threats.This approach uses the Elliptical Curve Cryptography(ECC)algorithm to generate and distribute security keys.ECC algorithm is a light weight key;thus,it minimizes the routing overhead.Furthermore,the Logistic Regression machine learning technique selects the transmitter based on intelligent results.The main application of this approach is smart cities.This approach provides continuing reliable routing paths with small overheads.In addition,route nodes cooperate with IoT,and it handles the resources proficiently and minimizes the 29.95%delay. 展开更多
关键词 Wireless sensor network internet of things SECURITY elliptical curve cryptography machine learning regression analysis
下载PDF
Ensuring Information Security in Electronic Health Record System Using Cryptography and Cuckoo Search Algorithm
14
作者 Arkan Kh Shakr Sabonchi Zainab Hashim Obaid 《Journal of Information Hiding and Privacy Protection》 2023年第1期1-18,共18页
In the contemporary era,the abundant availability of health information through internet and mobile technology raises concerns.Safeguarding and maintaining the confidentiality of patients’medical data becomes paramou... In the contemporary era,the abundant availability of health information through internet and mobile technology raises concerns.Safeguarding and maintaining the confidentiality of patients’medical data becomes paramount when sharing such information with authorized healthcare providers.Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers,concerns persist regarding the security of the data.The security of Electronic Health Record Systems(EHRS)can be improved by employing the Cuckoo Search Algorithm(CS),the SHA-256 algorithm,and the Elliptic Curve Cryptography(ECC),as proposed in this study.The suggested approach involves usingCS to generate the ECCprivate key,thereby enhancing the security of data storage in EHR.The study evaluates the proposed design by comparing encoding and decoding times with alternative techniques like ECC-GA-SHA-256.The research findings indicate that the proposed design achieves faster encoding and decoding times,completing 125 and 175 iterations,respectively.Furthermore,the proposed design surpasses other encoding techniques by exhibiting encoding and decoding times that are more than 15.17%faster.These results imply that the proposed design can significantly enhance the security and performance of EHRs.Through the utilization of CS,SHA-256,and ECC,this study presents promising methods for addressing the security challenges associated with EHRs. 展开更多
关键词 Information security electronic health record system cryptography cuckoo search algorithms
下载PDF
Design of a Cryptographic Algorithm in the Form of an API in Order to Secure Monetary Transactions in a Supermarket
15
作者 Atsopmene Tango Vanette Eleonore Gamom Ngounou Ewo Roland Christian Kom Charles Hubert 《Journal of Information Security》 2023年第4期437-453,共17页
Supermarkets and large-scale retail stores are usually subject to huge monetary transactions for certain customers’ purchases. The computerization of these systems is common in supermarkets but the security of these ... Supermarkets and large-scale retail stores are usually subject to huge monetary transactions for certain customers’ purchases. The computerization of these systems is common in supermarkets but the security of these transactions remains a mystery. This article presents an algorithm as an API based on symmetric cryptography that can enable end-to-end encryption of a monetary transaction in a supermarket. This algorithm is the first part of the complete supermarket management system which will be presented in the following article. The Python language and the Flask framework allow us to develop the algorithm as an independent component. Tests have been performed and our algorithm uses 98.49% less memory and 10.18% time saving than the AES algorithm. 展开更多
关键词 Application Programming Interface (API) Symmetric cryptography End-to-End Encryption
下载PDF
适用于智能家居的格上基于身份多方认证密钥协商协议 被引量:1
16
作者 倪亮 刘笑颜 +3 位作者 谷兵珂 张亚伟 周恒昇 王念平 《计算机应用研究》 CSCD 北大核心 2024年第4期1191-1197,共7页
随着物联网应用的日益普及,物联网设备终端数量激增、种类多样、层次复杂,常处于不可控的环境之中,因此,确保数据传输过程的安全性和隐私性至关重要。对基于物联网架构的智能家居服务进行探讨得出,启用智能家居应用需涉及多个方面,如用... 随着物联网应用的日益普及,物联网设备终端数量激增、种类多样、层次复杂,常处于不可控的环境之中,因此,确保数据传输过程的安全性和隐私性至关重要。对基于物联网架构的智能家居服务进行探讨得出,启用智能家居应用需涉及多个方面,如用户、云、物联网智能集线器(the IoT smart hub,ISH)和智能设备,它们需要多方验证以进行安全通信。由此提出了一种针对智能家居应用的格上基于身份多方认证密钥协商协议,并证明在eCK模型下是安全的。其安全性可以归约到环上带误差学习(ring learning with errors,RLWE)问题的困难性,能够抗量子计算攻击。所提协议由一个格上基于身份的加密方案转换而成,无须公钥证书,避免了部署一个庞大的公钥基础设施(public key infrastructure,PKI)。通过信息交互实现显式认证,且可具有一定的匿名性质,与其他相关的后量子格上多方认证密钥协商协议方案相比,该协议在安全性和执行效率方面更具优势。 展开更多
关键词 智能家居 基于身份密码 环上带误差学习 多方认证密钥协商协议 后量子密码 匿名性
下载PDF
第四次浪潮中智慧情报理论探索的摹因呈现 被引量:1
17
作者 王延飞 张佳南 +1 位作者 徐扬 张宇翔 《情报理论与实践》 北大核心 2024年第2期7-14,共8页
在以智能化为特征的第四次浪潮中,“智慧情报”的理论探索需要在做好谱系扫描工作的基础上才能有效把握研究重点。文章通过“感知时代环境”“厘清要素代差”“品评形势利害”“考较策略路径”“擘画理论教育”梳理所涉及的情报事实,将... 在以智能化为特征的第四次浪潮中,“智慧情报”的理论探索需要在做好谱系扫描工作的基础上才能有效把握研究重点。文章通过“感知时代环境”“厘清要素代差”“品评形势利害”“考较策略路径”“擘画理论教育”梳理所涉及的情报事实,将“智慧情报的学科体系”“情报学术的认知谱系”及“科技安全”“信息安全”“密码工具理论构成”的情报解读等重要对象以摹因形式呈现出来。 展开更多
关键词 智慧情报 第四次浪潮 摹因刻画 科技安全 信息安全 密码
下载PDF
混沌密码理论研究与应用新进展
18
作者 赵耿 马英杰 董有恒 《信息网络安全》 CSCD 北大核心 2024年第2期203-216,共14页
混沌密码研究主要包括混沌序列密码、混沌分组密码和混沌公钥密码。混沌序列密码具有软硬件实现简单、加解密处理速度快、没有或只有有限的错误传播等特点。混沌序列密码的设计方面研究成果极为丰硕,但其安全性分析一般停留在统计性验... 混沌密码研究主要包括混沌序列密码、混沌分组密码和混沌公钥密码。混沌序列密码具有软硬件实现简单、加解密处理速度快、没有或只有有限的错误传播等特点。混沌序列密码的设计方面研究成果极为丰硕,但其安全性分析一般停留在统计性验证分析阶段,而对可证明安全性或其他有条件安全性的证明和分析很少,因此证明混沌序列密码的安全性已成为该领域亟需填补的空白。混沌分组密码的研究颇为成熟,但其整体结构一般受限于Feistel结构、SPN结构、Lai-Massey结构及其变形结构。因此,构建突破传统结构的创新性密码架构成为混沌分组密码亟待解决的关键问题之一。混沌公钥密码的研究相对薄弱,利用混沌系统特有的密码特性和公钥密码系统相结合的混沌公钥密码算法不仅具有理论研究意义,而且具有实际应用价值。混沌系统也被广泛应用于通信传输、语音加密、图像加密和扩频通信等保密通信领域。电、光混沌系统实现简便,其计算复杂性不会随着密钥空间的增大而明显增大,能够为无线通信、物理层链路安全、应用层数据安全等不同场景提供安全保护。 展开更多
关键词 保密通信 混沌系统 混沌序列密码 混沌分组密码 混沌公钥密码
下载PDF
密码应用:从安全通信到数据可用不可见
19
作者 任奎 张秉晟 张聪 《密码学报(中英文)》 CSCD 北大核心 2024年第1期22-44,共23页
随着信息革命的浪潮,计算机、互联网、物联网、人工智能等领域飞速发展,网络空间已成为现代社会的重要组成部分,并在各个方面改变着人们的生活生产方式.另一方面,网络空间快速发展导致的信息泄漏、隐私侵犯等问题愈发严峻,人们对数据安... 随着信息革命的浪潮,计算机、互联网、物联网、人工智能等领域飞速发展,网络空间已成为现代社会的重要组成部分,并在各个方面改变着人们的生活生产方式.另一方面,网络空间快速发展导致的信息泄漏、隐私侵犯等问题愈发严峻,人们对数据安全与隐私保护的需求也日益高涨.面向不断增加的安全与隐私需求,相关密码技术持续演进,并广泛应用于金融、医疗、教育、政务等各个领域,以确保对敏感信息和数据资产的安全保护.本文围绕信息技术在不同发展阶段下的重要应用场景及研究热点,聚焦互联网信息传输、云端存储、区块链加密货币、电子投票、Web3.0以及隐私计算,阐释密码技术在相关领域典型应用示范. 展开更多
关键词 密码应用 隐私保护 信息安全
下载PDF
基于模型驱动的密码算法可视化开发平台研究
20
作者 肖超恩 刘昌俊 +2 位作者 董秀则 王建新 张磊 《密码学报(中英文)》 CSCD 北大核心 2024年第2期357-370,共14页
针对密码算法开发平台普适性差、无法跨平台的问题,本文采用模型驱动实现密码算法开发的方法,设计了一种基于模型驱动的密码算法可视化开发平台,提出了一种基于模型驱动的密码算法开发的领域语言—MCL密码元语言;实现了基于模型的代码... 针对密码算法开发平台普适性差、无法跨平台的问题,本文采用模型驱动实现密码算法开发的方法,设计了一种基于模型驱动的密码算法可视化开发平台,提出了一种基于模型驱动的密码算法开发的领域语言—MCL密码元语言;实现了基于模型的代码生成器和代码映射器.实验证明,该开发平台仅需要开发者拖拽图形块的操作就可以实现密码算法模型的建立,然后平台可以根据建立的密码算法模型生成不同编程环境下的代码.平台实现了C和python的代码映射器模块,密码算法模型可快速映射为C、python代码.平台有较好的实用性,开发者的密码算法实现过程简洁、高效,不同编程环境下的代码均可以通过平台自动生成,提高了密码算法实现的跨平台性. 展开更多
关键词 密码算法实现 模型驱动 领域专用语言(DSL) 代码生成技术
下载PDF
上一页 1 2 232 下一页 到第
使用帮助 返回顶部