期刊文献+

基于密钥分解理论的文件安全分割算法 被引量:2

Algorithm about safe file-splitting based on theory of key assignment
下载PDF
导出
摘要 提出了密钥分解问题的向量空间投影理论,由此给出了密钥分解算法,并且将该理论和算法引入文件分割问题的研究中,给出了一种应用于实际保密场合的文件安全分割及恢复算法,并与传统文件分割算法进行了比较。利用分组密码的原理,将文件先分组再分存。实现了将文件分割成个子文件,而利用其中任意(1≤≤)个子文件可以恢复原文件,为重要文件的存储和传输提供了安全保证。同时对在通信保密中实现信息的分解保密提出了建议。 The vector space projection theory about key assignment problem is proposed first, then the key assignment algorithm is produced. Furthermore this theory and algorithm is used to study file-splitting, and an algorithm about file splitting and recovering is given in the actual situation of information security. It is compared with the traditional file-splitting. According to the principle of block cipher, a file is distributed before divided into some groups. In the algorithm one file is split into to n sub files, and is recovered from any m (1≤m≤n) sub files. Thus the safety guarantee for the important files store and transmission is provided. At the same time, some advice is given to the information assignment and confidentiality in the field of communication encryption.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第2期315-317,322,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60672001)
关键词 密钥分解 向量空间投影 文件分割 分组密码 载体加密 通信加密 key assignment vector space projection file splitting block cipher carder encryption communication encryption
  • 相关文献

参考文献8

二级参考文献8

共引文献29

同被引文献12

  • 1Rittinghouse J W,Ransome J F. Cloud computing:implementation,management and security[M].Boca Raton,FL,USA:CRC Press,Taylor & Francis,2009. 被引量:1
  • 2卢开澄.计算机密码学[M]{H}北京:清华大学出版社,2003. 被引量:1
  • 3Ristenpart T, Tromer E, Sbacham H, et al. Hey, You, Get off of My Cloud : Exploring Information I:akage in Third- Party Compute Clouds [J]. In Proceedings of the 16th ACM Conference on Computer and Communications Seeurity, ACM, 2009, 51(1):199-212. 被引量:1
  • 4ZHANG Y, JUELS A, REITER M, et al. Cross-VM Side Channels and Their Use to Extract Private Keys [ J ]. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, ACM, 2012, 51 ( 1 ) : 305-316. 被引量:1
  • 5Frankel Y. A Practical Protocol for Large Group Oriented Networks [ JT. In Advances in Cryptology EUROCRYPT 1989 Springer, 1990,1 ( 343 ) :56-61. 被引量:1
  • 6Shoup V. Practical Threshold Signatures [ J ]. Advances in Cryptology EUROCRYPT 2000 Springer, 2000, 1 (1807) : 207-220. 被引量:1
  • 7钱文静,邓仲华.云计算与信息资源共享管理[J].图书与情报,2009(4):47-52. 被引量:161
  • 8孙磊,戴紫珊,郭锦娣.云计算密钥管理框架研究[J].电信科学,2010,26(9):70-73. 被引量:13
  • 9冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1070
  • 10闫鸿滨.网络密钥管理关键技术研究[J].计算机应用与软件,2011,28(12):68-70. 被引量:3

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部