期刊文献+
共找到470篇文章
< 1 2 24 >
每页显示 20 50 100
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
1
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions
2
作者 Seo Yeon Moon Byung Hyun Jo +2 位作者 Abir El Azzaoui Sushil Kumar Singh Jong Hyuk Park 《Computers, Materials & Continua》 2025年第7期25-55,共31页
With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these t... With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these technologies face critical security challenges,exacerbated by the emergence of quantum computing,which threatens traditional encryption methods.The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust,quantum-resistant security solutions.To address these challenges,researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography,which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity.This paper reviews the current security practices in IoT and Edge/Fog environments,explores the latest advancements in QKD and PQC technologies,and discusses their integration into distributed computing systems.Additionally,this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations.Finally,we highlight future research directions aimed at improving the scalability,efficiency,and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats. 展开更多
关键词 Edge computing fog computing quantum key distribution security post-quantum cryptography cascade protocol
在线阅读 下载PDF
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
3
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random Numbers algorithm post-quantum cryptography
暂未订购
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks 被引量:1
4
作者 Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita 《Digital Communications and Networks》 SCIE CSCD 2024年第4期989-1000,共12页
The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to secur... The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment. 展开更多
关键词 Internet of things AUTHENTICATION post-quantum cryptography Lattice-based cryptography Cloud computing Fog computing FAIL-SAFE
在线阅读 下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
5
作者 Muhammad Nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 cryptography symmetric algorithm ENCRYPTION DECRYPTION cipher text cloud security asymmetric algorithm
在线阅读 下载PDF
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
6
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2010年第12期901-906,共6页
Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorit... Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorithm, for modular multiplicative inverse (MMI). Analysis of the proposed algorithm shows that it is more efficient than the Extended Euclid algorithm (XEA). In addition, if a MMI does not exist, then it is not necessary to use the Backtracking procedure in the proposed algorithm;this case requires fewer operations on every step (divisions, multiplications, additions, assignments and push operations on stack), than the XEA. Overall, XEA uses more multiplications, additions, assignments and twice as many variables than the proposed algorithm. 展开更多
关键词 Extended-Euclid algorithm MODULAR MULTIPLICATIVE INVERSE Public-Key cryptography RSA Cryptocol Rabin Information Hiding algorithm ELGAMAL ENCRYPTION/DECRYPTION NTRU Cryptosystem Computer Simulation Low Memory Devices
在线阅读 下载PDF
Ensuring Information Security in Electronic Health Record System Using Cryptography and Cuckoo Search Algorithm
7
作者 Arkan Kh Shakr Sabonchi Zainab Hashim Obaid 《Journal of Information Hiding and Privacy Protection》 2023年第1期1-18,共18页
In the contemporary era,the abundant availability of health information through internet and mobile technology raises concerns.Safeguarding and maintaining the confidentiality of patients’medical data becomes paramou... In the contemporary era,the abundant availability of health information through internet and mobile technology raises concerns.Safeguarding and maintaining the confidentiality of patients’medical data becomes paramount when sharing such information with authorized healthcare providers.Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers,concerns persist regarding the security of the data.The security of Electronic Health Record Systems(EHRS)can be improved by employing the Cuckoo Search Algorithm(CS),the SHA-256 algorithm,and the Elliptic Curve Cryptography(ECC),as proposed in this study.The suggested approach involves usingCS to generate the ECCprivate key,thereby enhancing the security of data storage in EHR.The study evaluates the proposed design by comparing encoding and decoding times with alternative techniques like ECC-GA-SHA-256.The research findings indicate that the proposed design achieves faster encoding and decoding times,completing 125 and 175 iterations,respectively.Furthermore,the proposed design surpasses other encoding techniques by exhibiting encoding and decoding times that are more than 15.17%faster.These results imply that the proposed design can significantly enhance the security and performance of EHRs.Through the utilization of CS,SHA-256,and ECC,this study presents promising methods for addressing the security challenges associated with EHRs. 展开更多
关键词 Information security electronic health record system cryptography cuckoo search algorithms
在线阅读 下载PDF
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
8
作者 Vincent Mbonigaba Fulgence Nahayo +1 位作者 Octave Moutsinga Okalas-Ossami Dieudonné 《Journal of Information Security》 2024年第1期53-62,共10页
In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has beco... In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys. 展开更多
关键词 KEY Wave ELECTROMAGNETIC cryptography POST Quantum Network Protocol Propagation algorithm
在线阅读 下载PDF
基于后量子密码改进算法的FPGA设计优化 被引量:2
9
作者 田洪亮 王馨语 张海武 《粘接》 2025年第2期155-157,共3页
为了提高硬件整体的运算效率,研究提出了一种可以降低Crystals-Kyber算法复杂度的改进算法,硬件实现方式采用基于频率抽取的数论变换(NTT)算法。通过合并NTT计算层减少需要的的内存量,设计了一种迭代型NTT和流水型NTT相结合的硬件结构... 为了提高硬件整体的运算效率,研究提出了一种可以降低Crystals-Kyber算法复杂度的改进算法,硬件实现方式采用基于频率抽取的数论变换(NTT)算法。通过合并NTT计算层减少需要的的内存量,设计了一种迭代型NTT和流水型NTT相结合的硬件结构。与之前其他的设计相比较,基于Crystals-Kyber算法的可编程门阵列(FPGA)优化实现了高效的NTT多项式乘法。实验结果表明,所提方案优化算法使用了较快的计算速度和较少的计算周期,以及较小的面积时间乘积(Area Time,AT),改进的Crystals-Kyber算法与其他算法相比,至少缩短了39.13%的NTT计算周期,并缩短了47.50%计算时间,优化了基于格密码的执行时间和硬件资源开销。 展开更多
关键词 后量子密码 NTT算法 FPGA
在线阅读 下载PDF
基于区块链的MEC环境身份认证与密钥协商
10
作者 邓昀 刘瑾 陈守学 《计算机工程与设计》 北大核心 2025年第7期1959-1966,共8页
针对移动边缘计算环境中存在的边缘安全和用户隐私问题,提出一种基于区块链的轻量级密钥身份认证协议。结合区块链技术和预分配密钥方法,采用椭圆曲线加密算法和哈希消息认证码,解决用户与边缘端之间的相互认证与密钥协商问题。充分考... 针对移动边缘计算环境中存在的边缘安全和用户隐私问题,提出一种基于区块链的轻量级密钥身份认证协议。结合区块链技术和预分配密钥方法,采用椭圆曲线加密算法和哈希消息认证码,解决用户与边缘端之间的相互认证与密钥协商问题。充分考虑边缘服务器低安全性问题,边缘密钥的存储与认证都在区块链完成,通过智能合约实现对密钥的高效安全管理。实验结果表明,该协议不仅满足基本的安全要求,提高了边缘安全性,相对于现有方案还具有一定效率优势。 展开更多
关键词 移动边缘计算 区块链 智能合约 椭圆曲线加密算法 智能移动设备 身份认证 边缘安全
在线阅读 下载PDF
Markov矩阵的广义可逆性
11
作者 陆成刚 《高校应用数学学报(A辑)》 北大核心 2025年第3期281-293,共13页
对不确定性的输入输出系统,考虑输入和输出随机变量的概率分布矢量之间的状态转移概率矩阵(即Markov矩阵)的存在性以及唯一性和可逆性,并且其中的广义可逆性与一次一密理论及公钥密码系统的安全性的一致性关系.将Markov矩阵视作通信信道... 对不确定性的输入输出系统,考虑输入和输出随机变量的概率分布矢量之间的状态转移概率矩阵(即Markov矩阵)的存在性以及唯一性和可逆性,并且其中的广义可逆性与一次一密理论及公钥密码系统的安全性的一致性关系.将Markov矩阵视作通信信道,则当信道容量非零,则Markov矩阵存在且不唯一且秩不小于2以及不存在广义逆;当信道容量为零,则Markov矩阵存在以及唯一且其秩为1,存在广义逆.尤其,当输入输出均为等概率分布时,Markov矩阵存在Moore-Penrose广义逆,更进一步,当输入输出的状态数目一致,则输入或输出的概率分布为该Markov矩阵的平衡态分布.并且存在广义逆的Markov矩阵恰是公私钥密码体制的非对称加解密的信道,结合RSA和Elgamal算法给出了正反两方面的示例. 展开更多
关键词 Markov矩阵 MOORE-PENROSE广义逆 一次一密 公私钥密码体制 RSA算法 Elgamal算法
在线阅读 下载PDF
基于区块链的电子病历安全高效共享方法 被引量:3
12
作者 谷占新 马利民 +1 位作者 王佳慧 张伟 《信息安全研究》 北大核心 2025年第1期74-80,共7页
针对医疗机构之间共享电子病历所面临的挑战,如隐私泄露风险和低效的检索问题,提出一种基于区块链的电子病历高效加密检索与共享方案.首先,该方案一方面通过在云服务器上存储加密后的电子病历,并在联盟链上实施检索过程,有效地实现了存... 针对医疗机构之间共享电子病历所面临的挑战,如隐私泄露风险和低效的检索问题,提出一种基于区块链的电子病历高效加密检索与共享方案.首先,该方案一方面通过在云服务器上存储加密后的电子病历,并在联盟链上实施检索过程,有效地实现了存储与检索的分离;另一方面加入混淆陷门集合,从而显著降低了关键字猜测攻击的风险.其次,考虑到医疗数据的特殊性,提出一种优化的倒排索引结构,有效解决了处理大量电子病历时的检索效率问题.最后,基于此索引结构,开发了一种密文检索算法,该算法通过结合可搜索加密中的陷门技术和倒排索引中的关键字密文,实现了高效的密文检索.实验结果显示,该方案在实现隐私保护的前提下,成功解决了医疗行业电子病历共享的问题,同时显著提升了系统的运行效率. 展开更多
关键词 区块链 可搜索加密 隐私保护 国密算法 数据共享
在线阅读 下载PDF
基于国密的工业物联网门限签密方案
13
作者 李斯琦 田有亮 彭长根 《计算机工程》 北大核心 2025年第7期210-222,共13页
针对工业物联网(IIoT)中数据采集与监视控制(SCADA)系统和终端设备之间通信易受篡改、窃听、假冒等攻击的问题,提出一种基于国密的门限签密方案(SM-TSC)。首先,对终端设备进行注册、分组,基于Shamir秘密共享设计群组秘密值分配方法,防止... 针对工业物联网(IIoT)中数据采集与监视控制(SCADA)系统和终端设备之间通信易受篡改、窃听、假冒等攻击的问题,提出一种基于国密的门限签密方案(SM-TSC)。首先,对终端设备进行注册、分组,基于Shamir秘密共享设计群组秘密值分配方法,防止IIoT场景下终端设备节点权力过于集中所造成的密钥泄露、签密伪造等问题;其次,将国密SM2签名算法作为基础,结合国密SM3算法、国密SM4算法以及群组秘密值分配方法,设计一种安全高效的面向群组的门限签密算法,保障SCADA系统与终端设备群组之间通信消息的真实性和机密性;最后,在随机谕言机模型下,利用安全归约方法对SM-TSC方案进行安全性分析。分析结果表明,SM-TSC方案在自适应选择密文攻击下能达到语义安全,在自适应选择消息攻击下是存在性不可伪造的,可以有效保障群组通信中数据的机密性和真实性。实验结果表明,与现有的基于椭圆曲线的门限签密方案相比,SM-TSC方案在门限签密阶段和解签密阶段的计算开销分别降低了75%与79.66%,其在IIoT群组通信中具有更高的适用性。 展开更多
关键词 签密 国密算法 门限密码学 可证明安全 工业物联网
在线阅读 下载PDF
基于国密算法SM9的撤销加密方案
14
作者 谢振杰 张万里 +2 位作者 张耀 赵方方 刘胜利 《通信学报》 北大核心 2025年第5期65-76,共12页
针对现有标识撤销加密方案存在的系统公钥冗长和解密效率低的问题,基于我国自主研发的标识密码算法SM9,提出一种高效的撤销加密方案。通过在加密阶段指定被撤销用户名单,被撤销用户无法解密,而系统内其余用户均可正常解密。方案实现了... 针对现有标识撤销加密方案存在的系统公钥冗长和解密效率低的问题,基于我国自主研发的标识密码算法SM9,提出一种高效的撤销加密方案。通过在加密阶段指定被撤销用户名单,被撤销用户无法解密,而系统内其余用户均可正常解密。方案实现了恒定长度的密文和精简的系统公钥,针对撤销加密“一次加密、多次解密”的应用场景,通过重构双线性对运算优化了解密效率。在随机预言机模型下,基于广义判定性Diffie-Hellman指数(GDDHE)困难问题证明了方案的选择明文安全性。理论分析和实验测试表明,相较于现有同类方案,所提方案以密钥封装密文长度扩张50%为代价,系统公钥长度缩减约66.7%,当撤销用户数量在4~64个时,解密效率提升65.0%~85.2%。结果表明,所提方案有效增强了SM9密码体系在大规模访问控制场景中的实用性。 展开更多
关键词 撤销加密 国密算法 SM9算法 广播加密 基于标识的密码
在线阅读 下载PDF
基于国密算法SM9的可追踪环签名方案 被引量:1
15
作者 谢振杰 尹小康 +1 位作者 蔡瑞杰 张耀 《通信学报》 北大核心 2025年第3期199-211,共13页
为解决数字签名用户的隐私保护问题,并防止恶意用户滥用完全匿名性,提出一种基于国密算法SM9的可追踪环签名方案。国密算法SM9是我国自主研发的标识密码算法,具有较高的安全性和良好的性能,避免了公钥基础设施的建设成本和证书管理开销... 为解决数字签名用户的隐私保护问题,并防止恶意用户滥用完全匿名性,提出一种基于国密算法SM9的可追踪环签名方案。国密算法SM9是我国自主研发的标识密码算法,具有较高的安全性和良好的性能,避免了公钥基础设施的建设成本和证书管理开销。通过引入密码累加器,环签名的生成和验证过程的计算量以及签名数据大小均降低至常数级。在随机预言机模型下,基于q-SDH困难问题证明了该方案具有EUF-CMIA安全性,并证明了在出现争议时可追踪实际签名者的条件匿名性。理论分析和测试结果表明,该方案的签名和验证效率分别达到现有同类方案的7.3倍和3.3倍,签名数据大小约为其1/5,在计算效率和通信开销方面具有显著优势。 展开更多
关键词 可追踪环签名 国密算法 SM9算法 密码累加器 基于标识的密码
在线阅读 下载PDF
基于变分量子算法的简化版DES密码攻击
16
作者 范珈诚 廉熙哲 +1 位作者 秦素娟 高飞 《中国电子科学研究院学报》 2025年第4期331-336,共6页
变分量子算法是有望在近期量子计算设备上实现的算法,因此,评估变分量子算法对现行密码算法的攻击能力是密码学领域非常关注的问题。本文聚焦于变分量子算法对简化版DES(SDES)的攻击性能并探索对末态测量得到正确密钥概率更高的攻击方案... 变分量子算法是有望在近期量子计算设备上实现的算法,因此,评估变分量子算法对现行密码算法的攻击能力是密码学领域非常关注的问题。本文聚焦于变分量子算法对简化版DES(SDES)的攻击性能并探索对末态测量得到正确密钥概率更高的攻击方案,首先,探究了不同哈密顿量设计、不同Ansatz选择对密钥正确率的影响,发现迭代次数最少的哈密顿量得到正确密钥的概率并不是最高,说明迭代次数与成功率之间需要有所权衡;随后,给出叠加攻击与求和攻击两种利用多组明密对攻击SDES密码的方案,并用两组明密对的攻击为例进行了数值实验。实验结果表明,叠加攻击方案得到正确密钥的概率并不高;而求和攻击方案得到正确密钥的概率显著提高;最后,将多组明密对的攻击留作开放问题以待研究。 展开更多
关键词 量子计算 密码学 分组密码 简化版DES 变分量子算法
在线阅读 下载PDF
基于NTT/INTT优化的LAC格密码高速专用硬件实现
17
作者 朱益宏 王汉宁 +4 位作者 朱文平 韩栋钧 罗一杰 张奥扬 刘雷波 《微电子学与计算机》 2025年第10期187-195,共9页
随着量子计算机和量子算法的发展,抗量子密码算法(又称后量子密码算法)被提出用来抵抗潜在的量子攻击。目前,对于LAC(Lattice-based Asymmetric Cryptography)算法的硬件实现与性能评估的研究工作仍相对缺乏。对LAC算法进行了硬件评估,... 随着量子计算机和量子算法的发展,抗量子密码算法(又称后量子密码算法)被提出用来抵抗潜在的量子攻击。目前,对于LAC(Lattice-based Asymmetric Cryptography)算法的硬件实现与性能评估的研究工作仍相对缺乏。对LAC算法进行了硬件评估,提出了一种适应LAC小素数的数论变换硬件结构以及一系列BCH解码电路模块。基于28 nm工艺完成了电路实现,芯片面积为1.7 mm^(2),密钥生成、加封、解封分别达到了12561、15614、21072时钟周期,频率为500 MHz,是目前唯一一个面向LAC算法的全硬件实现。 展开更多
关键词 抗量子密码算法 硬件实现 数论变换 密码芯片
在线阅读 下载PDF
一种应用于BIKE的基于Karatsuba算法的大尺寸多项式乘法器
18
作者 杨柳 张永真 +2 位作者 田静 宋苏文 王中风 《电子学报》 北大核心 2025年第1期84-93,共10页
当前美国国家标准与技术研究院(National Institute of Standards and Technology,NIST)对后量子密码(Post-Quantum Cryptography,PQC)标准化方案的评估已进入第四轮,位翻转密钥封装(Bit Flipping Key Encapsulation,BIKE)协议是目前被... 当前美国国家标准与技术研究院(National Institute of Standards and Technology,NIST)对后量子密码(Post-Quantum Cryptography,PQC)标准化方案的评估已进入第四轮,位翻转密钥封装(Bit Flipping Key Encapsulation,BIKE)协议是目前被评估的四个候选方案之一.在BIKE的密钥生成算法中,多项式乘法作为众多密码系统中特别耗时的操作之一,耗费了大量的时间和面积资源.针对此问题,本文设计了一种基于Karatsuba算法(Karatsuba Algorithm,KA)的无交叠多项式乘法器,可高效实现万级比特位宽的多项式乘法,具有低时延、高性能和面积小的特点.同时,本文将该优化乘法器应用于BIKE密钥生成算法中,并基于现场可编程门阵列(Field Programmable Gate Array,FPGA)对其进行硬件架构实现,改进了原有的紧凑多项式乘法和多项式求逆算法.本文提出的乘法器通过采用不同的操作数位宽,可适应对面积和延时的不同需求.与BIKE原本的设计相比,改进的设计使密钥生成模块的延时减小了36.54%,面积延迟积(Area Delay Production,ADP)减小了10.4%. 展开更多
关键词 后量子密码(PQC) 多项式乘法器 Karatsuba算法(KA) 位翻转密钥封装(BIKE)
在线阅读 下载PDF
基于量子密钥分发的安全浏览器设计与实现 被引量:1
19
作者 许敏 周鹏 +4 位作者 戚伟强 杨帆 王红艳 吴辉 蒋学芹 《东华大学学报(自然科学版)》 北大核心 2025年第1期155-161,共7页
商业浏览器主要依赖基于数学复杂度的公钥密码体系对数据进行传输加密,而具备强大计算能力量子计算机的发展给主流公钥密码体系带来了极大的安全冲击。为应对浏览器中敏感数据访问的潜在安全性问题,提出一种基于量子密钥分发(QKD)技术... 商业浏览器主要依赖基于数学复杂度的公钥密码体系对数据进行传输加密,而具备强大计算能力量子计算机的发展给主流公钥密码体系带来了极大的安全冲击。为应对浏览器中敏感数据访问的潜在安全性问题,提出一种基于量子密钥分发(QKD)技术的安全浏览器实现方法,以保障浏览器访问敏感数据的高安全性。同时,设计浏览器数据量子安全传输方案,提出基于量子密钥的安全套接层(SSL)新型协议,以及浏览器的数据模块量子安全加密方案,并在国网浙江省电力有限公司信息通信分公司进行实地验证。提出的量子安全浏览器加密方案有效提升了浏览器数据通信以及存储数据过程的安全性,可为浏览器系统中敏感数据的访问提供强有力的安全保障。 展开更多
关键词 量子密钥分发 浏览器 SSL协议 公钥密码 对称量子密钥加解密算法
在线阅读 下载PDF
基于抗量子算法的通信安全机制研究与应用 被引量:1
20
作者 李湘宁 陈霖 《电信工程技术与标准化》 2025年第2期53-58,共6页
本文聚焦于量子计算时代的通信安全问题,提出了基于抗量子算法的安全机制设计方案。文章分析了量子计算对现有密码体系的潜在威胁,重点关注了通信环节密钥交换和身份认证等关键环节的安全风险。针对这些挑战,通过引入Kyber和Dilithium... 本文聚焦于量子计算时代的通信安全问题,提出了基于抗量子算法的安全机制设计方案。文章分析了量子计算对现有密码体系的潜在威胁,重点关注了通信环节密钥交换和身份认证等关键环节的安全风险。针对这些挑战,通过引入Kyber和Dilithium等后量子密码算法来增强协议的抗量子攻击能力,从安全性、计算复杂度和通信开销等方面分析研究可行性。 展开更多
关键词 抗量子算法 通信安全 后量子密码
在线阅读 下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部