期刊文献+

基于圆性质的加密算法 被引量:1

Encryption Algorithm Based on Circle Property
下载PDF
导出
摘要 原有对称加密算法采用置换与替换技术。该文提出一种基于圆性质的对称密钥加密算法,采用随机数技术与密码学杂凑函数,使加密后的密文随机分布于n维几何空间,实现了抗密码分析攻击,而穷举攻击在计算上是不可行的。该算法适用于带时间戳加密、短明文加密等应用环境,实验结果验证了其可行性。 The former symmetric encryption algorithms use substitution and transposition techniques. Ibis paper presents a symmemc encryption algorithm based on circle property. The techniques of random number and cryptographic hash function are used in this algorithm. So the cipher text randomly distributes in the n-dimensional space and led to cryptanalysis being difficult. From the security analysis the brute-force attacks are infeasible. It is applicable for encryptions with timestamp and short plain text encryptions. Experimental results verify that this algorithm is feasible.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第4期180-182,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60572139) 教育部新世纪优秀人才支持计划基金资助项目(NCET-06-0744) 霍英东教育基金资助项目(101069)
关键词 对称密码 加/解密算法 圆性质 symmetric cryptogram encryption and decryption algorithm circle property
  • 相关文献

参考文献11

  • 1Wu Tzone-chen Remote Login Authentication Scheme Based on a Geometric Approach[J]. Computer Communications, 1995, 18(12): 959-963. 被引量:1
  • 2Wu Tzone-chen, He Weihua. A Geometric Approach for Sharing Secrets[J]. Computer & Security, 1995, 14(2): 135-145. 被引量:1
  • 3Hwang Min-shiang. Cryptanalysis of a Remote Login Authentication Scheme[J]. Computer Communications, 1999, 22(8): 742-744. 被引量:1
  • 4Chien Hung-yu, Jan Jinn-ke, Tseng Yuh-min. A Modified Remote Login Authentication Scheme Based on Geometric Approach[J]. Journal of Systems and Software, 2001, 55(3): 287-290. 被引量:1
  • 5Wang Shiuh-jeng. Yet Another Login Authentication Using N-dimensional Construction Based on Circle Property[J]. IEEE Trans. on Consumer Electronics, 2003, 49(2): 337-341. 被引量:1
  • 6Wang Shuhong, Bao Feng, Wang Jie. Comments on Yet Another Log-in Authentication Using N-dimensional Construction[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 606-608. 被引量:1
  • 7Yang Fuw-yi, Jan Jinn-ke. Cryptanalysis of Log-in Authentication Based on Circle Property[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 625-628. 被引量:1
  • 8万涛,马建峰.基于几何方法的远程登录认证方案的密码分析[J].西安电子科技大学学报,2003,30(3):378-380. 被引量:2
  • 9李颖,刘金刚,李锦涛.远程登录几何认证方案的安全漏洞分析和解决办法[J].微电子学与计算机,2003,20(6):46-50. 被引量:3
  • 10毛文波.现代密码学理论与实践[M].北京:电子工业出版社,2004:165-190. 被引量:23

二级参考文献15

  • 1Brace Schneier.应用密码学:协议、算法和C源程序(第二版)[M].北京:机械工业出版社,2000.. 被引量:1
  • 2Chien H Y, Jan J K, Tseng Y M. A Modified Remote Login Authentication Scheme Based on Geometric Approach [ J]. Journal of Systems and Software, 2001, 55(3): 287-290. 被引量:1
  • 3Li G, Lomas M A, Needham R M, et al. Protecting Poorly Chosen Secrets from Guessing Attacks[J] . IEEE Journal on Selected Areas in Communications, 1993, 11(5) : 648-656. 被引量:1
  • 4Chang C C, Liao W Y. A Remote Password Authentication Scheme Based Upon ElGamal's Signature Scheme[ J]. Computer & Security,1994, 13(2): 137-144. 被引量:1
  • 5Chang C C, Wu T C. Remote Password Authentication With Smart Cards[J]. IEE Proc E, 1991, 138(3): 165-168. 被引量:1
  • 6Wu T C. Remote Login Authentication Scheme Based on a Geometric Approach[J]. Computer Communications, 1995, 18( 12): 959-963. 被引量:1
  • 7Hwang M S. Cryptanalysis of a Remote Login Authentication Scheme[J]. Computer Communications, 1999, 22(8): 742-744. 被引量:1
  • 8Wu T C. Remote Login Authentication Scheme Based on a Geometric Approach. Computer Communications, 1995,18(12):959-963. 被引量:1
  • 9Hwang M S. Cryptanalysis of a Remote Login Authentication Scheme. Computer Communications, 1999,22:742-744. 被引量:1
  • 10Chien H Y, Jan J K, Tseng Y M. A Modified Remote Login Authentication Scheme Based on Geometric Approach. The Journal of Systems and Software, 2001, 55:287-290. 被引量:1

共引文献24

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部