期刊文献+
共找到565篇文章
< 1 2 29 >
每页显示 20 50 100
A New Method for Impossible Differential Cryptanalysis of 8-Round Advanced Encryption Standard
1
作者 CHEN Jie HU Yupu WEI Yongzhuang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1559-1562,共4页
This paper first presents an impossible differential property for 5-round Advanced Encryption Standard (AES) with high probability. Based on the property and the impossible differential cryptanalytic method for the ... This paper first presents an impossible differential property for 5-round Advanced Encryption Standard (AES) with high probability. Based on the property and the impossible differential cryptanalytic method for the 5-round AES, a new method is proposed for cryptanalyzing the 8-round AES-192 and AES-256. This attack on the reduced 8-round AES-192 demands 2^121 words of memory, and performs 2^148 8-round AES-192 encryptions. This attack on the reduced 8-round AES-256 demands 2^153 words of memory, and performs 2^180 8-round AES-256 encryptions. Furthermore, both AES-192 and AES-256 require about 2^98 chosen plaintexts for this attack, and have the same probability that is only 2^-3 to fail to recover the secret key. 展开更多
关键词 impossible differential cryptanalysis eryptanalysis advanced encryption standard
在线阅读 下载PDF
A Modern Method for Constructing the S-Box of Advanced Encryption Standard
2
作者 W. Eltayeb Ahmed 《Applied Mathematics》 2019年第4期234-244,共11页
The substitution table (S-Box) of Advanced Encryption Standard (AES) and its properties are key elements in cryptanalysis ciphering. We aim here to propose a straightforward method for the non-linear transformation of... The substitution table (S-Box) of Advanced Encryption Standard (AES) and its properties are key elements in cryptanalysis ciphering. We aim here to propose a straightforward method for the non-linear transformation of AES S-Box construction. The method reduces the steps needed to compute the multiplicative inverse, and computes the matrices multiplication used in this transformation, without a need to use the characteristic matrix, and the result is a modern method constructing the S-Box. 展开更多
关键词 advanced encryption standard S-BOX Extended Euclidean algorithm GREATEST Common DIVISOR XOR Operation
在线阅读 下载PDF
Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi
3
作者 Doaa Sami Khafaga Sarah M.Alhammad +3 位作者 Amal Magdi Osama ElKomy Nabil ALashin Khalid M.Hosny 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1967-1986,共20页
Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentica... Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentication increases.Many techniques,such as watermarking and encryption,are used for securing images transmitted via the Internet.The majority of watermarking systems are PC-based,but they are not very portable.Hardwarebased watermarking methods need to be developed to accommodate real-time applications and provide portability.This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the transmitted color images using multi-channel orthogonal Legendre Fourier moments of fractional orders(MFrLFMs)and the advanced encryption standard(AES)algorithm on a low-cost Raspberry Pi.In order to increase embedding robustness,the watermark picture is scrambled using the Arnold method.Zero watermarking is implemented on the Raspberry Pi to produce a real-time ownership verification key.Before sending the ownership verification key and the original image to the monitoring station,we can encrypt the transmitted data with AES for additional security and hide any viewable information.The receiver next verifies the received image’s integrity to confirm its authenticity and that it has not been tampered with.We assessed the suggested algorithm’s resistance to many attacks.The suggested algorithm provides a reasonable degree of robustness while still being perceptible.The proposed method provides improved bit error rate(BER)and normalized correlation(NC)values compared to previous zero watermarking approaches.AES performance analysis is performed to demonstrate its effectiveness.Using a 256×256 image size,it takes only 2 s to apply the zero-watermark algorithm on the Raspberry Pi. 展开更多
关键词 Zero watermarking Raspberry Pi advanced encryption standard
在线阅读 下载PDF
A High Efficiency Hardware Implementation of S-Boxes Based on Composite Field for Advanced Encryption Standard
4
作者 Yawen Wang Sini Bin +1 位作者 Shikai Zhu Xiaoting Hu 《Journal of Computer and Communications》 2024年第4期228-246,共19页
The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization... The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization implementation of the S-box is proposed based on the composite field inverse operation in this paper. This proposed S-box implementation is modeled using Verilog language and synthesized using Design Complier software under the premise of ensuring the correctness of the simulation result. The synthesis results show that, compared to several current S-box implementation schemes, the proposed implementation of the S-box significantly reduces the area overhead and critical path delay, then gets higher hardware efficiency. This provides strong support for realizing efficient and compact S-box ASIC designs. 展开更多
关键词 advanced encryption standard (aes) S-BOX Tower Field Hardware Implementation Application Specific Integration Circuit (ASIC)
在线阅读 下载PDF
A Complex Encryption System Design Implemented by AES 被引量:1
5
作者 Zhimao Lu Houmed Mohamed 《Journal of Information Security》 2021年第2期177-187,共11页
With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security pr... With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs. 展开更多
关键词 aes algorithm RSA algorithm encryption Key Management
在线阅读 下载PDF
Dynamically Reconfigurable Encryption System of the AES
6
作者 WANG Youren WANG Li YAO Rui ZHANG Zhai CUI Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1569-1572,共4页
Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption S... Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level. 展开更多
关键词 dynamically reconfigurable hardware field programmable gate array (FPGA) advanced encryption standard (aes algorithm cipher key
在线阅读 下载PDF
A Joint Encryption and Error Correction Method Used in Satellite Communications 被引量:3
7
作者 LINing LIN Kanfeng LIN Wenliang DENG Zhongliang 《China Communications》 SCIE CSCD 2014年第3期70-79,共10页
Due to the ubiquitous open air links and complex electromagnetic environment in the satellite communications,how to ensure the security and reliability of the information through the satellite communications is an urg... Due to the ubiquitous open air links and complex electromagnetic environment in the satellite communications,how to ensure the security and reliability of the information through the satellite communications is an urgent problem.This paper combines the AES(Advanced Encryption Standard) with LDPC(Low Density Parity Check Code) to design a secure and reliable error correction method — SEEC(Satellite Encryption and Error Correction).This method selects the LDPC codes,which is suitable for satellite communications,and uses the AES round key to control the encoding process,at the same time,proposes a new algorithm of round key generation.Based on a fairly good property in error correction in satellite communications,the method improves the security of the system,achieves a shorter key size,and then makes the key management easier.Eventually,the method shows a great error correction capability and encryption effect by the MATLAB simulation. 展开更多
关键词 data encryption error correctingcipher advanced encryption standard LDPCchannel coding satellite communications
在线阅读 下载PDF
A Novel Image Encryption Technique Based on Inter Block Difference 被引量:1
8
作者 THAMANAM Srinivasa Rao Potti Nagaraja +1 位作者 B.Balaji Naik K.Manjunathachari 《Journal of Shanghai Jiaotong university(Science)》 EI 2021年第4期488-493,共6页
Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic device... Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic devices. Among all the forms of data, image is an important aspect that still needs methodologies to be stored securely. This work focuses on a novel technique to secure images using inter block difference and advanced encryption standard (AES). The AES algorithm is chosen for encryption since there is no prevalent attack that is successful in analyzing it. Instead of encrypting the entire image, only a part of the image is encrypted. The proposed work is found to reduce the encryption overhead in a significant way and at the same time preserves the safety of the image. It is also observed that the decryption is done in an efficient and time preserving manner. 展开更多
关键词 encryption DECRYPTION inter block difference advanced encryption standard(aes)
原文传递
AES Encrypted FSK Generation at X-Band Frequency using a Single Reflex Klystron
9
作者 Mohuya Chakraborty Amiya Kumar Mallick 《China Communications》 SCIE CSCD 2010年第3期1-9,共9页
This paper describes a high security data transmission system over X-band microwave frequency. The paper has two parts. The first part deals with encryption of binary data by Advanced Encryption Standard (AES) using V... This paper describes a high security data transmission system over X-band microwave frequency. The paper has two parts. The first part deals with encryption of binary data by Advanced Encryption Standard (AES) using VHDL modeling of Field Programmable Gate Array (FPGA). The second part deals with a novel idea of transmitting the encrypted data by using a single klystron. This requires the simultaneous generation of a pair of two independent RF frequencies from a reflex klystron working for X-band frequency range. In this scheme, the klystron is suitably biased on the repeller terminal and superimposed on a train of AES encrypted binary data so as to create two RF frequencies one corresponding to negative peaks and the other one to the positive peaks of the data resulting in an Frequency Shift Keying (FSK) signal. The results have been verified experimentally. 展开更多
关键词 advanced encryption standard (aes dual frequency generation FSK modulation FPGA Reflex Klystron VHDL
在线阅读 下载PDF
Vulnerability Analysis of MEGA Encryption Mechanism
10
作者 Qingbing Ji Zhihong Rao +2 位作者 Lvlin Ni Wei Zhao Jing Fu 《Computers, Materials & Continua》 SCIE EI 2022年第10期817-829,共13页
MEGA is an end-to-end encrypted cloud storage platform controlled by users.Moreover,the communication between MEGA client and server is carried out under the protection of Transport Layer Security(TLS)encryption,it is... MEGA is an end-to-end encrypted cloud storage platform controlled by users.Moreover,the communication between MEGA client and server is carried out under the protection of Transport Layer Security(TLS)encryption,it is difficult to intercept the key data packets in the process of MEGA registration,login,file data upload,and download.These characteristics of MEGA have brought great difficulties to its forensics.This paper presents a method to attack MEGA to provide an effective method for MEGA’s forensics.By debugging the open-source code of MEGA and analyzing the security white paper published,this paper first clarifies the encryption mechanism of MEGA,including the detailed process of registration,login,and file encryption,studies the encryption mechanism of MEGA from the perspective of protocol analysis,and finds out the vulnerability of MEGA encryption mechanism.On this basis,a method to attack MEGA is proposed,and the secret data stored in the MEGA server can be accessed or downloaded;Finally,the efficiency of the attack method is analyzed,and some suggestions to resist this attack method are put forward. 展开更多
关键词 TLS advanced encryption standard FORENSICS protocol analysis VULNERABILITY
在线阅读 下载PDF
Reconfigurable implementation of AES algorithm IP core based on pipeline structure 被引量:6
11
作者 李冰 夏克维 梁文丽 《Journal of Southeast University(English Edition)》 EI CAS 2010年第1期21-25,共5页
In order to improve the data throughput of the advanced encryption standard (AES) IP core while reducing the hardware resource consumption and finally achieving a tradeoff between speed and area, a mixed pipeline ar... In order to improve the data throughput of the advanced encryption standard (AES) IP core while reducing the hardware resource consumption and finally achieving a tradeoff between speed and area, a mixed pipeline architecture and reconfigurable technology for the design and implementation of the AES IP core is proposed. The encryption and decryption processes of the AES algorithm are achieved in the same process within the mixed pipeline structure. According to the finite field characterizations, the Sbox in the AES algorithm is optimized. ShiftRow and MixColumn, which are the main components in AES round transformation, are optimized with the reconfigurable technology. The design is implemented on the Xilinx Virtex2p xc2vp20-7 field programmable gate array (FPGA) device. It can achieve a data throughput above 2.58 Gbit/s, and it only requires 3 233 slices. Compared with other related designs of AES IP cores on the same device, the proposed design can achieve a tradeoff between speed and area, and obtain satisfactory results in both data throughput and hardware resource consumption. 展开更多
关键词 advanced encryption standard (aes algorithm RECONFIGURABLE PIPELINE finite field round transformation
在线阅读 下载PDF
基于FPGA的高速AES实现与列混合改进 被引量:1
12
作者 申锦尚 张庆顺 宋铁锐 《计算机工程与科学》 北大核心 2025年第4期612-620,共9页
提出了一种基于FPGA的AES高速通信实现方案。通过将加密过程拆分为30级并行流水线结构,提高了通信速度和加密效率。同时,根据AES中列混合部分特殊的GF(28)有限域运算规则和FPGA并行运算的结构特点,设计了中间量交叉列混合结构。该结构... 提出了一种基于FPGA的AES高速通信实现方案。通过将加密过程拆分为30级并行流水线结构,提高了通信速度和加密效率。同时,根据AES中列混合部分特殊的GF(28)有限域运算规则和FPGA并行运算的结构特点,设计了中间量交叉列混合结构。该结构可以有效地减少列混合与逆列混合部分的运算延迟和使用面积,提高了加密效率。从逻辑代数的角度,分析了传统列混合结构、较新的列混合结构和中间量交叉计算结构之间计算资源使用量的不同。最终在Xilinx公司的XC5VSX240T芯片上进行了验证,验证结果表明,此方案实现了吞吐量为60.928 Gbps和加密效率为14.875 Mbps/LUT的性能。 展开更多
关键词 FPGA aes加密算法 列混合 流水线
在线阅读 下载PDF
融合AES算法和Hopfield ANN的网络数据加密传输技术
13
作者 孟轩 昝风彪 刘昕 《电子设计工程》 2025年第4期174-178,共5页
为有效保障网络数据的传输安全性,提出融合AES算法和Hopfield ANN的网络数据加密传输技术。在AES算法下实现基于AES算法的数据密钥生成。设计Hopfield ANN网络架构,利用AES算法的数据密钥定义传输序列,标定目标传输位置,实现网络数据加... 为有效保障网络数据的传输安全性,提出融合AES算法和Hopfield ANN的网络数据加密传输技术。在AES算法下实现基于AES算法的数据密钥生成。设计Hopfield ANN网络架构,利用AES算法的数据密钥定义传输序列,标定目标传输位置,实现网络数据加密传输技术方法的设计。实验结果表明,经上述方法加密后再向外传输的数据只能得到目标主机的认证,其他开放主机对于该类传输数据始终保持非响应状态,有效控制计算机网络的运行风险,提高了数据传输安全性。 展开更多
关键词 aes算法 Hopfield ANN网络 网络数据 加密传输 字节代换
在线阅读 下载PDF
基于混沌映射和AES算法的嵌入式远程数据加密自动化传输方法 被引量:2
14
作者 陈奕航 刘登强 《电子设计工程》 2025年第2期106-111,共6页
针对保障嵌入式远程数据安全的目的,研究基于混沌映射和AES算法的嵌入式远程数据加密自动化传输方法。通过构建混沌映射和AES算法的嵌入式远程数据加密自动化传输模型,结合扫描技术聚合数据并使用混沌映射优化AES算法的密钥机制,实现安... 针对保障嵌入式远程数据安全的目的,研究基于混沌映射和AES算法的嵌入式远程数据加密自动化传输方法。通过构建混沌映射和AES算法的嵌入式远程数据加密自动化传输模型,结合扫描技术聚合数据并使用混沌映射优化AES算法的密钥机制,实现安全连接和加密传输。实验结果表明,该方法敏感度均在3.0~3.5之间,有效实现不同数据类型的加密和保障数据安全;窃取后数据量较少,降低破解概率;平均节点丢失率为0.98%,提升了嵌入式远程数据加密自动化传输能力。 展开更多
关键词 混沌映射 aes算法 嵌入式 远程数据加密 自动化传输方法 二维混沌映射
在线阅读 下载PDF
云计算环境下基于AES算法的会计信息加密共享方法 被引量:1
15
作者 王盼 《办公自动化》 2025年第5期8-10,共3页
由于云计算环境具有开放性与分布式特性,导致企业会计信息存在数据泄露、非法访问等安全风险,提出云计算环境下基于AES算法的会计信息加密共享方法。基于AES算法加密处理会计信息数据,在云计算环境下构建一个数据共享模型,共享加密后的... 由于云计算环境具有开放性与分布式特性,导致企业会计信息存在数据泄露、非法访问等安全风险,提出云计算环境下基于AES算法的会计信息加密共享方法。基于AES算法加密处理会计信息数据,在云计算环境下构建一个数据共享模型,共享加密后的会计信息。实验结果表明,在恶意攻击下,设计方法加密共享前、后的会计信息数据平均绝对百分比误差仅0.66%,验证该方法能确保信息安全性。 展开更多
关键词 云计算环境 aes算法 会计信息 信息加密 加密共享
在线阅读 下载PDF
Novel Frequency Hopping Sequences Generator Based on AES Algorithm 被引量:2
16
作者 李振荣 庄奕琪 +1 位作者 张博 张超 《Transactions of Tianjin University》 EI CAS 2010年第1期22-27,共6页
A novel frequency hopping(FH) sequences generator based on advanced encryption standard(AES) iterated block cipher is proposed for FH communication systems.The analysis shows that the FH sequences based on AES algorit... A novel frequency hopping(FH) sequences generator based on advanced encryption standard(AES) iterated block cipher is proposed for FH communication systems.The analysis shows that the FH sequences based on AES algorithm have good performance in uniformity, correlation, complexity and security.A high-speed, low-power and low-cost ASIC of FH sequences generator is implemented by optimizing the structure of S-Box and MixColumns of AES algorithm, proposing a hierarchical power management strategy, and applying ... 展开更多
关键词 frequency hopping sequences advanced encryption standard LOW-POWER LOW-COST application specific integrated circuit
在线阅读 下载PDF
基于改进AES算法的计算机数据接口加密方法
17
作者 于小婷 《电子设计工程》 2025年第11期36-40,45,共6页
针对传统AES算法在计算机数据加密过程中安全性不足的问题,提出一种基于改进AES算法的加密设计;结合混沌映射理论,对传输数据进行初步加密,将加密后的数据作为明文数据输入改进AES算法,通过Bernoulli混沌映射以及Kent混沌映射进行轮密... 针对传统AES算法在计算机数据加密过程中安全性不足的问题,提出一种基于改进AES算法的加密设计;结合混沌映射理论,对传输数据进行初步加密,将加密后的数据作为明文数据输入改进AES算法,通过Bernoulli混沌映射以及Kent混沌映射进行轮密钥生成的改进,期望提高加密的随机性和安全性,以改进AES算法提高计算机数据加密的加密性能以及抗攻击能力;设计了验证改进AES算法的计算机数据接口加密测试实验,结合基于区块链技术的加密与基于RSA算法的数据加密进行对比验证;通过实验验证了基于改进AES算法的计算机数据接口加密能够通过NIST测试且具有较高加密性能。 展开更多
关键词 改进aes算法 轮密钥 混沌映射 数据加密 NIST测试
在线阅读 下载PDF
融合AES与ECC算法的病案信息多重加密防护系统
18
作者 钱大禹 魏亚明 《电子设计工程》 2025年第21期21-25,31,共6页
为解决电子病案信息管理中用户权限分配宽泛、密钥管理不当导致信息泄露的问题,文中构建了融合AES与ECC算法的病案信息多重加密防护系统。采用等级访问控制策略,对用户、文件及密钥分级管理;运用AES算法加密病案信息,结合ECC算法对AES... 为解决电子病案信息管理中用户权限分配宽泛、密钥管理不当导致信息泄露的问题,文中构建了融合AES与ECC算法的病案信息多重加密防护系统。采用等级访问控制策略,对用户、文件及密钥分级管理;运用AES算法加密病案信息,结合ECC算法对AES密钥进行二次加密。性能测试表明,高等级用户可有效加解密,低等级用户无法随意查看高等级文件;密钥分布频率差异度超过25%,降低了系统敏感性;面对恶意节点,病案信息查询交易时延最大值控制在2 s内。该系统为病案提供多重保护,提升医疗机构自动化加密管理能力,具有应用价值。 展开更多
关键词 等级访问控制 病案信息管理 多重加密防护 aes算法 ECC算法 密钥管理
在线阅读 下载PDF
A Novel Key Scheduling Scheme for AES Algorithm 被引量:1
19
作者 HU Zhihua XIONG Kuanjiang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第2期110-114,共5页
This paper examines the theory of AES key scheduling and its potential problems.We propose a novel key scheduling scheme.The scheme improves the speed of key expansion without increasing computational complexity,reduc... This paper examines the theory of AES key scheduling and its potential problems.We propose a novel key scheduling scheme.The scheme improves the speed of key expansion without increasing computational complexity,reduces the dependency of output key on input key during key expansion,and improves the avalanche effect of key expansion. 展开更多
关键词 advanced encryption standard key expansion avalanche effect
原文传递
面向供电公司的改进AES加密算法财务软件设计
20
作者 杜伟 刘筱 +2 位作者 郑晓阳 郭智慧 杨勇 《自动化技术与应用》 2025年第11期185-188,共4页
研究针对公司财务软件安全性不足和效率不高等问题,提出了一种改进高级加密标准算法。改进后的高级加密标准算法通过改进漏洞以提升软件的安全性,改进密钥空间以提高软件的运行效率,增强了算法在数据处理过程中的安全性。研究结果表明,... 研究针对公司财务软件安全性不足和效率不高等问题,提出了一种改进高级加密标准算法。改进后的高级加密标准算法通过改进漏洞以提升软件的安全性,改进密钥空间以提高软件的运行效率,增强了算法在数据处理过程中的安全性。研究结果表明,改进后的模型数据处理效果符合雪崩效应。新模型的平均传输时间相较于未加密数据低了20 ms,相较于未改进模型低了10.8 ms。同时新模型加密时间未超过20 ms,解密时间未超过25 ms,其运行时间更短效率更高。由此可见新模型能够提升财务软件的处理能力和安全性,这对提升财务软件的运行效率和安全性有很好的指导作用。 展开更多
关键词 供电公司 财务数据 aes算法 安全性
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部