期刊文献+

新型混合加密方案XHES的研究 被引量:2

Research on Xiao's Hybrid Encryption Scheme
在线阅读 下载PDF
导出
摘要 将公钥密钥分配技术和对称密码加密体制结合起来 ,提出并实现了一类高效快捷的混合密码加密方案 XHES.该方法兼有两类加密体制的优点 :既有对称密码加密体制的加密速度快 ,强度高的优点 ,又拥有公钥密码体制在密钥分发与管理上的优势 .与之前的各种加密技术相比 ,不仅具有快速的加密速度 ,安全高效的密钥管理优势 ,而且无需各种烦琐的鉴别认证过程以及昂贵的专用保密信道 ,能够抵抗各种已知的攻击方案 ,安全性很高 ,操作简单、高效 。 This paper combines advantages of the public key key distribution technique and symmetry encryption scheme, educes a kind of speedy high effect public key encryption scheme called as XHES(Xiao's hybrid key encryption scheme). It has strongpoint of symmetry encryption scheme such as encryption speed and encrypt intensity, but also has advantage of public key encryption scheme on key distribution and key management. It has been applied for a patent of China. Compared with the pervious encryption technique, it has both advantages on encryption speed, encrypt intensity and key management, and the complex process or the costly special secret channel on differentiate and authentication is not needed again. So the XHES scheme has excellent security and practicability.
出处 《武汉理工大学学报(交通科学与工程版)》 北大核心 2004年第2期278-280,共3页 Journal of Wuhan University of Technology(Transportation Science & Engineering)
基金 湖北省自然科学基金项目资助 (批准号 :2 0 0 0 J15 4)
关键词 数据加密 离散对数同题 安全协议 XHES data encryption discrete logarithm problem security protocol
  • 相关文献

参考文献9

  • 1肖攸安,李腊元.数字签名技术的研究[J].武汉理工大学学报(交通科学与工程版),2002,26(6):737-740. 被引量:27
  • 2Schneier B.Applied Cryptography:protocols,algorithms,and source code in C.2nd ed.,New York:John Wiley and Sons,1999.515~620.
  • 3Diffie W.The first ten years of public-key cryptology.Proceedings of the IEEE,1988,76: 560~577.
  • 4Dolev D,Yao A.Onthe security of public key protocols.IEEE Transactions on Information Theory,IT29,1983.198~208.
  • 5Beauregard D. Efficient algorithms for implementing elliptic curve public-Key schemes :[Master's Thesis].Worcester Polytechnic Institute, 1999.
  • 6Beauregard D. Efficient algorithms for implementing elliptic curve public-Key schemes :[Master's Thesis].Worcester Polytechnic Institute, 1999.
  • 7Schneier B.Applied Cryptography:protocols,algorithms,and source code in C.2nd ed.,New York:John Wiley and Sons,1999.515-620
  • 8Diffie W.The first ten years of public-key cryptology.Proceedings of the IEEE,1988,76: 560-577
  • 9Dolev D,Yao A.Onthe security of public key protocols.IEEE Transactions on Information Theory,IT29,1983.198-208

二级参考文献6

共引文献26

同被引文献12

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部