期刊文献+
共找到4,862篇文章
< 1 2 244 >
每页显示 20 50 100
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
1
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random Numbers ALGORITHM post-quantum cryptography
暂未订购
Performance Evaluation of TLS1.3 Based on Post-Quantum Cryptography
2
作者 SONG Zhen-Yu ZHENG Jie-Yu ZHAO Yun-Lei 《密码学报(中英文)》 2026年第1期199-218,共20页
Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computat... Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computational overhead may result in a significant performance reduction compared with conventional TLS.In this paper,we present a systematic evaluation of PQ-TLS performance across diverse deployment scenarios to address the following critical research questions.(1)What is the performance behavior of PQ-TLS across different TLS modes?(2)How does PQ-TLS perform across varying client scales?(3)Which network topology is most suitable for PQ-TLS?(4)How does PQ-TLS perform on personal computers(PCs)compared to embedded IoT devices?To the best of our knowledge,this is the first work to comprehensively address these issues,offering implementers some insights into PQ-TLS performance and guidance for optimizing it across diverse scenarios. 展开更多
关键词 quantum security post-quantum cryptography transport layer security network emulation Internet measurement
在线阅读 下载PDF
Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions
3
作者 Seo Yeon Moon Byung Hyun Jo +2 位作者 Abir El Azzaoui Sushil Kumar Singh Jong Hyuk Park 《Computers, Materials & Continua》 2025年第7期25-55,共31页
With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these t... With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these technologies face critical security challenges,exacerbated by the emergence of quantum computing,which threatens traditional encryption methods.The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust,quantum-resistant security solutions.To address these challenges,researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography,which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity.This paper reviews the current security practices in IoT and Edge/Fog environments,explores the latest advancements in QKD and PQC technologies,and discusses their integration into distributed computing systems.Additionally,this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations.Finally,we highlight future research directions aimed at improving the scalability,efficiency,and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats. 展开更多
关键词 Edge computing fog computing quantum key distribution security post-quantum cryptography cascade protocol
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
4
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption
5
作者 Fatima Asiri Wajdan Al Malwi 《Computer Modeling in Engineering & Sciences》 2025年第5期2053-2077,共25页
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica... Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications. 展开更多
关键词 Information security chaotic map modeling post-quantum security quantum image encryption chaotic map image encryption
在线阅读 下载PDF
Sine-Polynomial Chaotic Map(SPCM):A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks
6
作者 David S.Bhatti Annas W.Malik +1 位作者 Haeung Choi Ki-Il Kim 《Computers, Materials & Continua》 2025年第10期2157-2177,共21页
Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a n... Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions,leveraging a piecewise function to achieve a broad chaotic range()and a high Lyapunov exponent(5.04).Validated through nine benchmarks,including standard randomness tests,Diehard tests,and Shannon entropy(3.883),SPCM demonstrates superior randomness and high sensitivity to initial conditions.Applied to image encryption,SPCM achieves 0.152582 s(39%faster than some techniques)and 433.42 KB/s throughput(134%higher than some techniques),setting new benchmarks for chaotic map-based methods in WSNs.Chaos-based permutation and exclusive or(XOR)diffusion yield near-zero correlation in encrypted images,ensuring strong resistance to Statistical Attacks(SA)and accurate recovery.SPCM also exhibits a strong avalanche effect(bit difference),making it an efficient,secure solution for WSNs in domains like healthcare and smart cities. 展开更多
关键词 Chaos theory chaotic system image encryption cryptography wireless sensor networks(WSNs)
在线阅读 下载PDF
Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms
7
作者 Ehan Sohn Sangmyung Lee +3 位作者 Sunggon Kim Kiwook Sohn Manish Kumar Yongseok Son 《Computer Modeling in Engineering & Sciences》 2025年第11期2761-2785,共25页
With the accelerated growth of the Internet of Things(IoT),real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local.Since these d... With the accelerated growth of the Internet of Things(IoT),real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local.Since these devices often handle personal information under limited resources,cryptographic algorithms must be executed efficiently.Their computational characteristics strongly affect system performance,making it necessary to analyze resource impact and predict usage under diverse configurations.In this paper,we analyze the phase-level resource usage of AES variants,ChaCha20,ECC,and RSA on an edge device and develop a prediction model.We apply these algorithms under varying parallelism levels and execution strategies across key generation,encryption,and decryption phases.Based on the analysis,we train a unified Random Forest model using execution context and temporal features,achieving R2 values up to 0.994 for power and 0.988 for temperature.Furthermore,the model maintains practical predictive performance even for cryptographic algorithms not included during training,demonstrating its ability to generalize across distinct computational characteristics.Our proposed approach reveals how execution characteristics and resource usage interacts,supporting proactive resource planning and efficient deployment of cryptographic workloads on edge devices.As our approach is grounded in phase-level computational characteristics rather than in any single algorithm,it provides generalizable insights that can be extended to a broader range of cryptographic algorithms that exhibit comparable phase-level execution patterns and to heterogeneous edge architectures. 展开更多
关键词 Internet of Things(IoT) cryptography power efficient computing performance modeling
在线阅读 下载PDF
Consensus⁃Based Cryptographic Framework for Side⁃Channel Attack Resilience in Cloud Environments
8
作者 I.Nasurulla K.Hemalatha +1 位作者 P.Ramachandran S.Parvathi 《Journal of Harbin Institute of Technology(New Series)》 2025年第2期90-104,共15页
Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we... Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we propose SecureCons Framework(SCF),a novel consensus-based cryptographic framework designed to enhance resilience against SCAs in cloud environments.SCF integrates a dual-layer approach combining lightweight cryptographic algorithms with a blockchain-inspired consensus mechanism to secure data exchanges and thwart potential side-channel exploits.The framework includes adaptive anomaly detection models,cryptographic obfuscation techniques,and real-time monitoring to identify and mitigate vulnerabilities proactively.Experimental evaluations demonstrate the framework's robustness,achieving over 95%resilience against advanced SCAs with minimal computational overhead.SCF provides a scalable,secure,and efficient solution,setting a new benchmark for side-channel attack mitigation in cloud ecosystems. 展开更多
关键词 Cloud computing side channel attacks HAVAL cryptographic hash Wilcoxon signed⁃rank test consensus mechanism improved schmidt⁃samoa cryptography
在线阅读 下载PDF
OFD版式文档体系在智慧医疗中的创新应用与优化路径探讨
9
作者 张晓东 杨丰华 《中国数字医学》 2026年第2期66-71,共6页
探讨了OFD版式文档体系在智慧医疗领域的应用,阐述了OFD版式文档体系的特点及其在智慧医疗中的具体应用场景,包括智慧病案无纸化全生命周期管理、跨医疗机构病历共享和长期安全保存。分析了其在智慧医疗实践中的优势,针对现存问题提出... 探讨了OFD版式文档体系在智慧医疗领域的应用,阐述了OFD版式文档体系的特点及其在智慧医疗中的具体应用场景,包括智慧病案无纸化全生命周期管理、跨医疗机构病历共享和长期安全保存。分析了其在智慧医疗实践中的优势,针对现存问题提出优化策略,并展望未来发展前景。 展开更多
关键词 智慧医疗 OFD版式文档 国密算法
在线阅读 下载PDF
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks 被引量:1
10
作者 Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita 《Digital Communications and Networks》 SCIE CSCD 2024年第4期989-1000,共12页
The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to secur... The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment. 展开更多
关键词 Internet of things AUTHENTICATION post-quantum cryptography Lattice-based cryptography Cloud computing Fog computing FAIL-SAFE
在线阅读 下载PDF
NTRU_SSS:Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing 被引量:1
11
作者 Asma Ibrahim Hussein Abeer Tariq MaoLood Ekhlas Khalaf Gbashi 《Computers, Materials & Continua》 SCIE EI 2023年第7期753-769,共17页
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).... With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency. 展开更多
关键词 post-quantum cryptography NTRU Shamir’s secret sharing public key
在线阅读 下载PDF
格上困难问题量子求解算法综述
12
作者 曹金政 罗向阳 +1 位作者 陈晓峰 程庆丰 《软件学报》 北大核心 2026年第1期398-424,共27页
随着基于格的后量子密码体制快速发展,格上困难问题求解算法已成为评估后量子密码方案安全性的关键技术.当前,经典计算模型下已存在枚举、筛法、格基约化等格上困难问题求解算法,同时量子筛法、量子枚举等格上困难问题量子求解算法正逐... 随着基于格的后量子密码体制快速发展,格上困难问题求解算法已成为评估后量子密码方案安全性的关键技术.当前,经典计算模型下已存在枚举、筛法、格基约化等格上困难问题求解算法,同时量子筛法、量子枚举等格上困难问题量子求解算法正逐步引起关注.围绕后量子密码研究中涉及的格上困难问题,对格上困难问题量子求解算法给出综述.首先,分类整了格上困难问题量子求解算法研究现状.其次,梳理各类格上困难问题量子求解算法的设计思路和应用的量子计算技术,并总结各类格上困难问题量子求解算法的复杂度.最后,展望格上困难问题量子求解算法的未来发展趋势. 展开更多
关键词 格公钥密码 格上困难问题 量子算法
在线阅读 下载PDF
基于对抗网络的可配置加解密硬件优化设计
13
作者 涂江涛 张会红 张跃军 《宁波大学学报(理工版)》 2026年第1期1-7,共7页
随着神经密码学的出现,越来越多研究使用神经网络来训练加解密算法,其中采用对抗网络可实现端到端的高安全加解密,但存在开销大、速度慢等问题。通过对运算单元核心、数据存储架构和数据流行为进行协同优化设计,提出一种面向神经网络的... 随着神经密码学的出现,越来越多研究使用神经网络来训练加解密算法,其中采用对抗网络可实现端到端的高安全加解密,但存在开销大、速度慢等问题。通过对运算单元核心、数据存储架构和数据流行为进行协同优化设计,提出一种面向神经网络的可配置加解密硬件设计方案。该方案首先对加解密模型进行硬件友好型优化,完成网络训练和量化;然后,采用Winograd+DSP48的卷积加速方法,将所需96个乘法器降低到32个;最后,设计CPU控制与调度系统架构,结合动态控制加速器的操作模式,实现高性能可配置加解密硬件电路。实验结果表明,所提方案最高工作频率为133 MHz,功耗为32.4 m W,吞吐量为17.06 GOPs。加解密网络的正确率达100%,破解网络正确率接近50%,硬件电路具备可配置和高安全特性。 展开更多
关键词 神经密码学 对抗神经网络 可配置 电路优化设计
在线阅读 下载PDF
基于BGV密码的密文模式匹配协议
14
作者 郭琦 张猛 《信息技术》 2026年第1期15-21,共7页
字符串搜索有着较为广泛的应用场景,在当前云计算环境下,将检索计算外包给第三方服务器存在数据安全问题。因此,文中设计了两种密文模式匹配协议,在保护用户隐私的同时实现高效的密文计算。协议基于BGV同态密码构建加密环境,并利用SIMD... 字符串搜索有着较为广泛的应用场景,在当前云计算环境下,将检索计算外包给第三方服务器存在数据安全问题。因此,文中设计了两种密文模式匹配协议,在保护用户隐私的同时实现高效的密文计算。协议基于BGV同态密码构建加密环境,并利用SIMD技术加快同态操作。设计高效的密文判等函数,采用朴素密文字符串搜索方式完成密态模式匹配协议的实现。实验结果表明,所提出的两种协议在加密时仅需较小的加密参数,且在密文计算效率上优于同类工作。 展开更多
关键词 密码学 隐私计算 模式匹配
在线阅读 下载PDF
面积高效的格密码多项式乘法硬件实现
15
作者 谢家兴 蒲金伟 +2 位作者 方伟钿 郑欣 熊晓明 《计算机工程》 北大核心 2026年第1期282-292,共11页
基于格的后量子密码算法在公钥密码领域具有广泛的应用前景,多项式乘法的计算复杂性是其硬件实现的主要性能瓶颈。针对多项式乘法实现存在的面积效率低和内存映射冲突等问题,提出一种基于部分数论变换(PNTT)和系数交叉运算(CCO)的多项... 基于格的后量子密码算法在公钥密码领域具有广泛的应用前景,多项式乘法的计算复杂性是其硬件实现的主要性能瓶颈。针对多项式乘法实现存在的面积效率低和内存映射冲突等问题,提出一种基于部分数论变换(PNTT)和系数交叉运算(CCO)的多项式乘法结构。首先,将数论变换(NTT)最后一轮、系数相乘和逆数论变换(INTT)第一轮融合成CCO,减少2轮蝶形运算和50%的旋转因子存储空间,降低内存访问开销;其次,采用轻量级硬件分别实现模加、模减、除2运算以及优化后的基于Barrett的模乘运算,有效减少逻辑资源开销,同时采用流水线、分时复用技术设计可重构运算单元(PE)阵列,使得各运算单元可以在不同变换下进行高效重组连接;此外,在内存映射方案上引入系数分组存储和特殊内存映射方法,利用地址映射规律对数据和旋转因子实现高效调度,避免内存映射冲突问题,以低成本实现内存访问;最后,采用先入先出(FIFO)结构实现数据重组,提升数据访问效率。实验结果显示,所提出的PM结构在Slices和数字信号处理器(DSP)的面积延时积(ATP)指标上相比于现有相关工作分别降低21.7%和61.1%以上,具有更高的面积效率。 展开更多
关键词 格密码 多项式乘法 数论变换 模约简 无冲突内存映射
在线阅读 下载PDF
低轨卫星互联网安全接入机制:认证算法与挑战
16
作者 吕政威 肖丽霞 +2 位作者 姚壮 曹越 周家喜 《移动通信》 2026年第1期146-154,共9页
随着星地一体化网络成为6G通信的关键推动力量,低轨卫星互联网凭借广覆盖、低成本及低时延优势,在偏远地区通信、全球无缝连接等场景中展现出重要价值。然而,低轨卫星网络高动态拓扑、长传播时延、资源受限及开放信道等特性,导致传统地... 随着星地一体化网络成为6G通信的关键推动力量,低轨卫星互联网凭借广覆盖、低成本及低时延优势,在偏远地区通信、全球无缝连接等场景中展现出重要价值。然而,低轨卫星网络高动态拓扑、长传播时延、资源受限及开放信道等特性,导致传统地面网络接入认证算法面临实时性不足、切换中断、安全风险高等挑战,构建适配的安全接入认证体系成为关键需求。基于此,总结了低轨卫星互联网接入认证算法,包括物理层认证、基于密码学的认证、基于区块链的认证、跨网络集成认证和轻量级身份认证,并探讨了低轨卫星互联网接入认证的未来研究方向。 展开更多
关键词 低轨卫星互联网 接入认证 密码学
在线阅读 下载PDF
探索整数格的拓扑图编码实现
17
作者 张明军 张玉婧 +1 位作者 张小慧 姚兵 《浙江大学学报(理学版)》 北大核心 2026年第1期47-56,62,共11页
在后量子时代,格密码具有多学科交叉性且研究方法多样性的特点,极有可能成为后量子密码。拓扑编码中的图格是多学科交叉的产物,其中的图通过矩阵进行存储并在计算机中运行,其主要理论来自离散数学、数论、代数学等数学学科。由于拓扑编... 在后量子时代,格密码具有多学科交叉性且研究方法多样性的特点,极有可能成为后量子密码。拓扑编码中的图格是多学科交叉的产物,其中的图通过矩阵进行存储并在计算机中运行,其主要理论来自离散数学、数论、代数学等数学学科。由于拓扑编码含有大量的数学猜想和计算NP-问题,因此其产生的数字串具有不可逆性和计算安全性。本文定义了新的标号和着色,并给出了实现这些标号和着色的算法,确定了承认这几种标号和着色的图类。同时,建立了毛毛虫树图格及其互补图格,探讨了这些图格与传统的整数格之间的关系。所用技术方法均基于有效且可行的算法实现。 展开更多
关键词 格密码 拓扑编码 全标号 全着色 图格 着色图格同态 非对称拓扑加密
在线阅读 下载PDF
基于国产深度计算单元的SPHINCS^(+)-SM3高性能优化
18
作者 宁祎静 董建阔 +4 位作者 周思源 林璟锵 孙思维 郑昉昱 葛春鹏 《计算机研究与发展》 北大核心 2026年第2期405-418,共14页
数字签名在信息安全中扮演着至关重要的角色,但传统的数字签名算法在后量子时代面临失效的风险。SPHINCS^(+)作为一种能够抵抗量子计算攻击的数字签名框架,将在后量子时代发挥越来越重要的作用。然而,SPHINCS^(+)的计算速度较慢,难以满... 数字签名在信息安全中扮演着至关重要的角色,但传统的数字签名算法在后量子时代面临失效的风险。SPHINCS^(+)作为一种能够抵抗量子计算攻击的数字签名框架,将在后量子时代发挥越来越重要的作用。然而,SPHINCS^(+)的计算速度较慢,难以满足现代密码算法对于高吞吐量和低延时的需求,极大地限制了其实用性。提出了一种基于国产深度计算单元(deep computing unit,DCU)的高效优化方案,以加速由国产哈希算法SM3实例化的SPHINCS^(+)算法。通过提高内存拷贝效率、优化SM3、改进SPHINCS^(+)的计算流程以及采用最佳计算并行度,在DCU上实现了SPHINCS^(+)-SM3的128-f模式。实验结果表明,与传统CPU实现相比,DCU上的实现显著提高了签名生成和验证的吞吐量,分别达到了2603.87倍和1281.98倍的提升,极大地增强了SPHINCS^(+)的计算效率和实用性,并推进了后量子密码算法的国产化进程。在数据流量和大量签名请求的场景下,DCU实现展现出显著优于CPU实现的性能优势。 展开更多
关键词 SPHINCS^(+) SM3 后量子密码 并行计算 DCU加速
在线阅读 下载PDF
基于ChatGPT实现格密码与全同态加密
19
作者 陈智罡 宋新霞 CHEN Liqun 《计算机工程与应用》 北大核心 2026年第3期303-312,共10页
基于ChatGPT实现了环LWE上的格密码以及BFV全同态加密。这是使用ChatGPT来实现这两种加密算法。全同态加密曾经是密码学界的一个开放难题,有广泛的理论与实际应用。当前的全同态加密实现仍然面临挑战,尤其是在计算复杂度和计算效率上。C... 基于ChatGPT实现了环LWE上的格密码以及BFV全同态加密。这是使用ChatGPT来实现这两种加密算法。全同态加密曾经是密码学界的一个开放难题,有广泛的理论与实际应用。当前的全同态加密实现仍然面临挑战,尤其是在计算复杂度和计算效率上。ChatGPT能够根据用户的具体要求生成加密算法的源代码。然而,使用ChatGPT实现高度复杂的程序仍具有挑战性,尤其是全同态加密算法,其以复杂性著称。提出一种新颖的方法,从算法层次和代码层次来设计ChatGPT对格加密和全同态加密的实现方法。从算法层次来说,ChatGPT准确掌握了环LWE格加密算法,但是没有完全掌握BFV全同态加密算法。从代码层次来说,ChatGPT都能完整给出两种加密算法的C++实现代码,而且无需人工编写代码,但是都需要进一步调试和改错才能够正确运行。由于BFV全同态加密算法要比格加密算法复杂,因此所花费的调试工作更多。ChatGPT为实现密码算法提供了新思路,这方面值得进行深入而广泛的研究。该研究结果为ChatGPT在密码算法代码实现方面提供指南。 展开更多
关键词 ChatGPT 全同态加密 格密码 代码实现
在线阅读 下载PDF
一种基于商用密码的核电DCS过程监控层内生网络安全数据存储和传输设计
20
作者 邓泽凡 刘松 石桂连 《核动力工程》 北大核心 2026年第1期151-158,共8页
随着信息技术在关键基础设施核电数字化控制系统(DCS)中的进一步应用,在核电DCS起到操作监视和管理作用的过程监控层内生网络安全需求日益凸显。本文首先分析了核电DCS过程监控层的内生网络安全需求,并开展技术调研,以商用密码技术为基... 随着信息技术在关键基础设施核电数字化控制系统(DCS)中的进一步应用,在核电DCS起到操作监视和管理作用的过程监控层内生网络安全需求日益凸显。本文首先分析了核电DCS过程监控层的内生网络安全需求,并开展技术调研,以商用密码技术为基础,提出一种内生网络安全设计以实现关键数据存储和传输的完整性和机密性保护。该设计选用合适的商用密码算法和设备,开发存储安全组件和传输安全组件。在此基础上部署原型进行了性能验证。验证结果表明此设计实现了核电DCS过程监控层的数据存储和传输内生网络安全防护功能,满足原系统性能要求的同时对原系统性能影响较小。 展开更多
关键词 核电数字化控制系统(DCS) 商用密码 内生网络安全
原文传递
上一页 1 2 244 下一页 到第
使用帮助 返回顶部