期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Dynamically Reconfigurable Encryption System of the AES
1
作者 WANG Youren WANG Li YAO Rui ZHANG Zhai CUI Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1569-1572,共4页
Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption S... Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level. 展开更多
关键词 dynamically reconfigurable hardware field programmable gate array (FPGA) advanced encryption standard (AES) algorithm cipher key
在线阅读 下载PDF
Weak generalized self-shrinking generators
2
作者 Dong Lihua Hu Yupu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期407-411,共5页
The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS genera... The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS generators of the class-1, after which two effective key recovery attacks on the GSS generators of the class-1 are developed to evaluate their security. 展开更多
关键词 CRYPTOGRAPHY Stream cipher Key recovery attacks Generalized self-shrinking sequence.
在线阅读 下载PDF
Research on applying physical chaos generator to spacecraft information security 被引量:1
3
作者 ZHAO HePing 《Science China(Technological Sciences)》 SCIE EI CAS 2009年第5期1463-1470,共8页
The effectiveness of a short-length message extension method based on physical chaos generator was analyzed and the entropy of the extended message was calculated in this paper.The analysis demon-strated that with the... The effectiveness of a short-length message extension method based on physical chaos generator was analyzed and the entropy of the extended message was calculated in this paper.The analysis demon-strated that with the mentioned method the entropy of short-length messages,which are repeatedly used in spacecraft data systems,is obviously increased,and the security of transmission is enhanced as well.This paper also presented an improvement of the protocol for secret key agreement presented by M.J.Gander and U.M.Maurer.Instead of depending on characteristics of communication channel,this method takes advantage of the random data produced by physical chaos generator to preset the initial parameters of the procedure on both sides of communication,so that the procedure and quantity of cipher key can be precisely controlled.This method can be used to cipher key management of se-cure communication between long life-span spacecraft and ground system. 展开更多
关键词 physical chaos generator SPACECRAFT information security message extension cipher key management
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部