期刊文献+

一种基于硬件指纹的混合加密文件保护系统 被引量:2

An Hybrid Encryption File System Based on Hardware Fingerprinting
下载PDF
导出
摘要 文章在对现代密码学技术研究的基础上,结合硬件指纹技术的特点,提出了一种新的混合加密文件保护系统。为了保护用户信息未经授权的加密和解密,提取U盘具体信息的MD5值作为硬件指纹;在进行信息加密时,采用了3DES对称加密技术,同时使用了RSA非对称算法对3DES密钥进行了二次加密,提高了安全性。最后,为了防止U盘和密码的丢失,增加了管理员权限,实现了自动解密功能。 Based on the research of modern cryptography technology and the characteristics of hardware fingerprint technology,this paper proposes a new hybrid encryption file system.To preventunauthorized encryption or decryption,the MD5 value of the specific information of the USBflash disk is extracted as a hardware fingerprint.During theencrypting of files,Triple-DEScryptography algorithm is used,and the Triple-DES keys is encrypted by the RSA cryptography algorithm to enhance the security.Finally,in order to prevent the loss of the USBflash diskor password,the administrator role is added to realize the automatic decryption.
作者 刘庆俞 陈磊 刘磊 LIU Qingyu;CHEN Lei;LIU Lei(College of Biology and Food Engineering Chuzhou University,Huainan Anhui 232038)
机构地区 淮南师范学院
出处 《山东农业工程学院学报》 2019年第1期53-56,共4页 The Journal of Shandong Agriculture and Engineering University
基金 淮南师范学院2018年度科学研究一般项目(2018xj40)
关键词 硬件指纹 3DES RSA MD5 hardware fingerprinting triple-DES RSA MD5
  • 相关文献

参考文献3

二级参考文献37

  • 1吴文玲.Pseudorandomness of Camellia-Like Scheme[J].Journal of Computer Science & Technology,2006,21(1):82-88. 被引量:5
  • 2卢开澄.组合数学[M](第2版)[M].北京:清华大学出版社,2000.. 被引量:1
  • 3卢开澄.计算机密码学[M](第2版)[M].北京:清华大学出版社,1998.. 被引量:7
  • 4MENEZES A, VANORSCHOT P, VANSTONE S. Handbook of Applied Cryptography [ M ]. [ s. 1. ] : CRC Press, 1996. 被引量:1
  • 5SCHNEIER B. Applied Cryptography Second Edition: Protocols, Algorithms, and Source Code in C [ M ]. [ s. 1. ] : John Wiley & Sons, Inc,1996. 被引量:1
  • 6ODLYZKO A M . The Future of Integer Factorization ,[ EB/OL]. http://www. dte. umn. edu/- odlyzko/doc/future. of. factoring. pdf,2003 - 11 -08. 被引量:1
  • 7STALLINGS W. Cryptography and Network Security Principles and Practice Second Edition [ M ]. [ s. 1. ] : Prentice -Hall Inc, 1999. 被引量:1
  • 8Andreas Enge. Computing discrete logarithms in high-genus hyperelliptic Jacobians in provably subexponential time. Mathematics of Computation, 2002, 71(238): 729-742(elec tronic). MR 1885624 (2003b: 68083). 被引量:1
  • 9Arita S. An addition algorithm in Jacobian of C34 curve// Proceedings of the Information Security and Privacy, ACISP 2003. Lecture Notes in Computer Science 2727. Spriffger- Verlag, 2003:93-105. 被引量:1
  • 10Boneh D, Franklin M K. Identity-based encryption from the weil pairing//Kilian J ed. Proceedings of the CRYPTO. Lec- ture Notes in Computer Science 2139. Springer, 2001:213-229. 被引量:1

共引文献52

同被引文献18

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部