期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
从完美保密到完美安全:基于密码学的内生安全分析
1
作者 金梁 胡晓言 邬江兴 《Security and Safety》 2023年第3期4-19,共16页
In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of i... In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain.Then,we inherit and apply the established ideas and means of Perfect Secrecy,and propose the concept,definition and corollaries of the perfect instinct function security(PIFS)corresponding to Perfect Secrecy.Furthermore,we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem.Finally,we prove that the DHR satisfying the“OneTime Reconstruction”constraint is the sufficient and necessary condition to achieve perfect security.This means that the existence of PIFS is also proven.The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the oneway transparent superiority of the attacker into a double-blind problem for both the attacker and the defender,which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks.Since the attackers are required to have the new powerful ability to crack the structure cryptogram,the threshold of cyber security is raised to at least the same level as cryptogram deciphering,thereafter the ubiquitous cyber threats are destined to be significantly reduced. 展开更多
关键词 perfect instinct function security perfect secrecy DHR endogenous security One-Time Reconstruction generalized safety and security perfect security
原文传递
6G网络安全发展趋势和关键技术分析 被引量:1
2
作者 季新生 游伟 黄开枝 《信息通信技术》 2022年第6期7-14,共8页
6G网络将实现全场景的万物互联,实现虚拟世界与真实世界的深度融合,这对网络的安全能力提出了更高要求。对于6G网络,需在注重传统信息安全的机密性、完整性、可用性和隐私保护基础之上,还特别重视其广义功能安全,以便能有效应对高强度... 6G网络将实现全场景的万物互联,实现虚拟世界与真实世界的深度融合,这对网络的安全能力提出了更高要求。对于6G网络,需在注重传统信息安全的机密性、完整性、可用性和隐私保护基础之上,还特别重视其广义功能安全,以便能有效应对高强度网络攻击威胁。文章首先梳理6G安全国内外研究现状,然后揭示6G安全总体发展趋势,最后指出6G必须内置安全基因,大力加强内生安全、人工智能(AI)安全、抗量子密码、机密计算等安全技术研究,为6G提供更强大的安全保证。 展开更多
关键词 6G安全 广义功能安全 内生安全 人工智能安全 抗量子密码 机密计算
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部