期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
Image Encryption Application of Chaotic Sequences Incorporating Quantum Keys 被引量:3
1
作者 Bin Ge Hai-Bo Luo 《International Journal of Automation and computing》 EI CSCD 2020年第1期123-138,共16页
This paper proposes an image encryption algorithm LQBPNN(logistic quantum and back propagation neural network)based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic cha... This paper proposes an image encryption algorithm LQBPNN(logistic quantum and back propagation neural network)based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic chaotic sequence is used as the basic key sequence. After the quantum key is introduced, the quantum key is incorporated into the chaotic sequence by nonlinear operation. Then the pixel confused process is completed by the neural network. Finally, two sets of different mixed secret key sequences are used to perform two rounds of diffusion encryption on the confusing image. The experimental results show that the randomness and uniformity of the key sequence are effectively enhanced. The algorithm has a secret key space greater than 2182. The adjacent pixel correlation of the encrypted image is close to 0, and the information entropy is close to 8. The ciphertext image can resist several common attacks such as typical attacks, statistical analysis attacks and differential attacks. 展开更多
关键词 Logistic chaotic system quantum key nonlinear operation sequence performance image encryption algorithm
原文传递
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
2
作者 Mohammad Anwar Hossain Ahsan Ullah +1 位作者 Newaz Ibrahim Khan Md Feroz Alam 《Journal of Information Security》 2019年第4期199-236,共38页
Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s no... Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud. 展开更多
关键词 Data Security Cloud Computing encryption decryption Secret key symmetric algorithm 192 BITS HASHING PERMUTATION SHA-512
在线阅读 下载PDF
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm
3
作者 Omer K. Jasim Safia Abbas +1 位作者 El-Sayed M. Horbaty Abdel-Badeeh M. Salem 《Journal of Information Security》 2015年第2期82-91,共10页
With the rapid evolution of data exchange in network environments, information security has been the most important process for data storage and communication. In order to provide such information security, the confid... With the rapid evolution of data exchange in network environments, information security has been the most important process for data storage and communication. In order to provide such information security, the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a new emerging trend of modern symmetric encryption algorithm by development of the advanced encryption standard (AES) algorithm. The new development focuses on the integration between Quantum Key Distribution (QKD) and an enhanced version of AES. A new quantum symmetric encryption algorithm, which is abbreviated as Quantum-AES (QAES), is the output of such integration. QAES depends on generation of dynamic quantum S-Boxes (DQS-Boxes) based quantum cipher key, instead of the ordinary used static S-Boxes. Furthermore, QAES exploits the specific selected secret key generated from the QKD cipher using two different modes (online and off-line). 展开更多
关键词 AES encryption/decryption quantum COMPUTATIONS QKD symmetric algorithm
在线阅读 下载PDF
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds 被引量:1
4
作者 Muhammad Akram Muhammad Waseem Iqbal +3 位作者 Syed Ashraf Ali Muhammad Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali 《Computers, Materials & Continua》 SCIE EI 2022年第9期6061-6077,共17页
In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext ot... In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples. 展开更多
关键词 encryption decryption CIPHER symmetric key cryptography single key attack
在线阅读 下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
5
作者 Muhammad Nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 CRYPTOGRAPHY symmetric algorithm encryption decryption cipher text cloud security asymmetric algorithm
在线阅读 下载PDF
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
6
作者 Muhammad Ariful Islam Md. Ashraful Islam +1 位作者 Nazrul Islam Boishakhi Shabnam 《Journal of Computer and Communications》 2018年第3期78-90,共13页
Cryptography is the study that provides security service. It concerns with confidentiality, integrity, and authentication. Public key cryptography provides an enormous revolution in the field of the cryptosystem. It u... Cryptography is the study that provides security service. It concerns with confidentiality, integrity, and authentication. Public key cryptography provides an enormous revolution in the field of the cryptosystem. It uses two different keys where keys are related in such a way that, the public key can use to encrypt the message and private key can be used to decrypt the message. This paper proposed an enhanced and modified approach of RSA cryptosystem based on “n” distinct prime number. This existence of “n” prime number increases the difficulty of the factoring of the variable “N” which increases the complexity of the algorithm. In this approach, two different public key and private key generated from the large factor of the variable “N” and perform a double encryption-decryption operation which affords more security. Experiment on a set of a random number provided that the key generation time, analysis of variable “N”, encryption and decryption will take a long time compared to traditional RSA. Thus, this approach is more efficient, highly secured and not easily breakable. 展开更多
关键词 RSA algorithm encryption decryption CRYPTOSYSTEM Security PUBLIC key PRIVATE key
在线阅读 下载PDF
Navigating the Quantum Threat Landscape: Addressing Classical Cybersecurity Challenges
7
作者 Sabina Sokol 《Journal of Quantum Information Science》 2023年第2期56-77,共22页
This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are dis... This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture. 展开更多
关键词 quantum Computing Post-quantum Cryptography (PQC) quantum Hacking CYBERSECURITY Internet of Things (IoT) Shor’s algorithm quantum Random Number Generators (QRNGs) Pseudorandom Number Generators (RNGs) quantum key Distribution (QKD) symmetric key Cryp-tography Asymmetric key Cryptography
在线阅读 下载PDF
基于量子密钥分发的安全浏览器设计与实现 被引量:1
8
作者 许敏 周鹏 +4 位作者 戚伟强 杨帆 王红艳 吴辉 蒋学芹 《东华大学学报(自然科学版)》 北大核心 2025年第1期155-161,共7页
商业浏览器主要依赖基于数学复杂度的公钥密码体系对数据进行传输加密,而具备强大计算能力量子计算机的发展给主流公钥密码体系带来了极大的安全冲击。为应对浏览器中敏感数据访问的潜在安全性问题,提出一种基于量子密钥分发(QKD)技术... 商业浏览器主要依赖基于数学复杂度的公钥密码体系对数据进行传输加密,而具备强大计算能力量子计算机的发展给主流公钥密码体系带来了极大的安全冲击。为应对浏览器中敏感数据访问的潜在安全性问题,提出一种基于量子密钥分发(QKD)技术的安全浏览器实现方法,以保障浏览器访问敏感数据的高安全性。同时,设计浏览器数据量子安全传输方案,提出基于量子密钥的安全套接层(SSL)新型协议,以及浏览器的数据模块量子安全加密方案,并在国网浙江省电力有限公司信息通信分公司进行实地验证。提出的量子安全浏览器加密方案有效提升了浏览器数据通信以及存储数据过程的安全性,可为浏览器系统中敏感数据的访问提供强有力的安全保障。 展开更多
关键词 量子密钥分发 浏览器 SSL协议 公钥密码 对称量子密钥加解密算法
在线阅读 下载PDF
Establishment and Application of Cryptographic Library Model
9
作者 Tie-Ming Liu Lie-Hui Jiang +1 位作者 Jing Jing Yuan-Yuan Zhang 《Journal of Computer and Communications》 2015年第5期21-32,共12页
When doing reverse analysis of program’s binary codes, it is often to encounter the function of cryptographic library. In order to reduce workload, a cryptographic library model has been designed by analysts. Models ... When doing reverse analysis of program’s binary codes, it is often to encounter the function of cryptographic library. In order to reduce workload, a cryptographic library model has been designed by analysts. Models use formalized approach to describe the frame of cryptology and the structure of cryptographic function, complete the mapping from cryptographic function property to its architecture, and accomplish the result presentation of data analysis and mapping at last. The model can solve two problems: the first one is to know the hierarchy of the cryptographic function in the library well;the second one is to know some kinds of information, such as related cryptology algorithm and protocol, etc. These function implements can display the result graphically. The model can find relevant knowledge for the analysts automatically and rapidly, which is helpful to the learning of the overall abstract structure of cryptology. 展开更多
关键词 CRYPTOGRAPHIC LIBRARY Model CRYPTOGRAPHIC LIBRARY Architecture CRYPTOGRAPHIC algorithm encryption and decryption keyS encryption and decryption Data Information Recovery
暂未订购
基于Twofish算法的标书加解密研究 被引量:3
10
作者 刘知贵 杨立春 蒲洁 《计算机应用》 CSCD 北大核心 2004年第6期25-26,29,共3页
详细探讨了Twofish算法的加解密过程,分析了Twofish的特点和性能。通过对Twofish算法原理的研究来实现电子标书的安全保护。给出了实现其加解密算法的主要Java程序模块。同时,根据电子标书的特殊性,用基于公钥基础结构的技术实现了电子... 详细探讨了Twofish算法的加解密过程,分析了Twofish的特点和性能。通过对Twofish算法原理的研究来实现电子标书的安全保护。给出了实现其加解密算法的主要Java程序模块。同时,根据电子标书的特殊性,用基于公钥基础结构的技术实现了电子标书的混合加解密实现,并通过了程序测试。 展开更多
关键词 TWOFISH 标书 加解密 对称算法
在线阅读 下载PDF
基于圆性质的加密算法 被引量:1
11
作者 葛丽娜 贺忠华 江焯林 《计算机工程》 CAS CSCD 北大核心 2009年第4期180-182,共3页
原有对称加密算法采用置换与替换技术。该文提出一种基于圆性质的对称密钥加密算法,采用随机数技术与密码学杂凑函数,使加密后的密文随机分布于n维几何空间,实现了抗密码分析攻击,而穷举攻击在计算上是不可行的。该算法适用于带时间戳... 原有对称加密算法采用置换与替换技术。该文提出一种基于圆性质的对称密钥加密算法,采用随机数技术与密码学杂凑函数,使加密后的密文随机分布于n维几何空间,实现了抗密码分析攻击,而穷举攻击在计算上是不可行的。该算法适用于带时间戳加密、短明文加密等应用环境,实验结果验证了其可行性。 展开更多
关键词 对称密码 加/解密算法 圆性质
在线阅读 下载PDF
基于51核的AES算法高速硬件设计与实现 被引量:7
12
作者 曾小波 易志中 焦歆 《电子科技》 2016年第1期36-39,共4页
为提高算法的效率,降低密钥运算的复杂度,提升密钥抵抗强力攻击和时间攻击能力,提出一种AES的算法方案。阐述了AES算法原理及片上系统执行AES的工作流程,基于8051软核AES算法IP原理、设计流程以及硬件模块的实现方案,并给出了效率分析... 为提高算法的效率,降低密钥运算的复杂度,提升密钥抵抗强力攻击和时间攻击能力,提出一种AES的算法方案。阐述了AES算法原理及片上系统执行AES的工作流程,基于8051软核AES算法IP原理、设计流程以及硬件模块的实现方案,并给出了效率分析及在硬件平台上的验证结果。仿真结果显示,用查表法实现AES,其IP核具有高效性,并可为密码So C产品的开发体统算法引擎支持。相比较于以往的算法模型,该方案用少量面积换取速度,大幅提高了算法的效率,因此具备良好的应用价值。 展开更多
关键词 对称加密 AES算法 IP核 片上系统 解密
在线阅读 下载PDF
组合算法在软件加密系统中的实现 被引量:1
13
作者 卜晓燕 张根耀 《计算机与数字工程》 2012年第8期77-79,共3页
通过对现有数据加密技术的分析,提出了一种将AES和RSA相结合的组合加密系统。利用AES算法加密速度快,而RSA安全性高这一特点,从而有效的解决了速度和安全二者不能兼顾的问题。提高了软件的加密处理速度与加密强度。
关键词 算法 软件 加密 解密 对称密码体制 非对称密码体制
在线阅读 下载PDF
对称密码的流密码
14
作者 宋维平 《吉林建筑工程学院学报》 CAS 2005年第1期60-62,共3页
讨论一种可能被广泛推广的对称流密码.介绍流密码的整体结构,设计流密码需要考虑的主要因素.探讨了一种具体的对称流密码RC4算法及RC4算法的建立过程和它的强度.
关键词 对称密码 流密码 加密 解密 算法
在线阅读 下载PDF
电子招标系统的加密方案设计与实现 被引量:7
15
作者 陈定力 陈福生 《计算机应用与软件》 CSCD 北大核心 2007年第4期159-161,共3页
在分析比较当前较为流行的加密算法的基础上,针对建设工程施工电子招标系统的实际应用,提出了对于电子招标系统的两种不同的加密方案,并基于.NET技术进行了实践。
关键词 电子招标 加密 解密 非对称算法 对称算法 .NET
在线阅读 下载PDF
基于AES加解密系统的设计与实现 被引量:1
16
作者 曾炜 王科怀 《软件导刊》 2014年第6期132-134,共3页
基于Windows XP操作系统,利用VC++编程语言,实现了一个基于AES的加解密系统,该系统能对字符串和文件使用AES算法进行正确的加密和解密。
关键词 数据加密解密 RIJNDAEL算法 对称加密标准
在线阅读 下载PDF
一种改进的AES算法及其性能分析 被引量:3
17
作者 刘晓陆 《长江信息通信》 2021年第11期27-29,共3页
随着万物互联的程度不断加深,计算机计算能力的不断发展和进步,人们对数据的安全性的要求也在不断地提高,尽管AES算法具有接口简单、实现方便和安全性高等特点,然而,传统的AES算法已不能满足当下发展环境下的安全需求,急需探究如何在保... 随着万物互联的程度不断加深,计算机计算能力的不断发展和进步,人们对数据的安全性的要求也在不断地提高,尽管AES算法具有接口简单、实现方便和安全性高等特点,然而,传统的AES算法已不能满足当下发展环境下的安全需求,急需探究如何在保证加密算法的安全性以及所占用的计算资源基本保持不变的前提下,使得加密算法的实现过程更加简洁高效。基于此,文章提出了一种改进的AES算法,实验表明,该算法具有很好的加密性能。 展开更多
关键词 对称加密算法 非对称解密算法 AES算法 密钥空间 移位运算
在线阅读 下载PDF
流密码与RC4算法 被引量:7
18
作者 宋维平 《吉林师范大学学报(自然科学版)》 2005年第2期71-72,共2页
本文讨论一种可能被广泛推广的对称流密码.首先介绍流密码的整体结构,设计流密码需要考虑的主要因素,然后探讨了RC4算法.
关键词 对称密码 流密码 加密 解密 算法
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部