期刊文献+

电商环境中安全密钥交换算法的应用研究

The Security of Key Exchange Algorithm and Its Application Study in E-Commerce
在线阅读 下载PDF
导出
摘要 分析目前网络安全通信中采用的各种密钥交换的算法原理,接着对各种算法的优缺点进行对比分析,最后指出CA与Diffie-Hellman相结合的混合密钥交换算法更适合在电子商务中使用,能更好地保证电子商务活动中密钥的安全交换,确保电子商务活动的安全。 This paper analyzes the key exchange algorithm theory used in the current security communications network, then compares the advantages and disadvantages of various algorithms, and finally concludes that mixed key exchange algorithm which combines CA and Diffie-Hellman is more suitable for e-commerce. It guaranteed the safety of key exchange activities in e-commerce,and ensured the security of e-commerce activities.
作者 施建华
出处 《山东商业职业技术学院学报》 2016年第6期103-104,108,共3页 Journal of Shandong Institute of Commerce and Technology
关键词 CA DIFFIE-HELLMAN 非对称加密 混合密钥交换算法 CA Diffie-Hellman asymmetric encryption Mixed Key Exchange Algorithm
作者简介 施建华(1979-),男,江苏东台人,经質管理学院讲师,硕士,研究方向为企业信息化与电子商务、网络安全.
  • 相关文献

参考文献3

二级参考文献29

  • 1李艳.电子商务信息安全策略研究[J].甘肃科技,2005,21(6):53-54. 被引量:17
  • 2刘丽梅.电子商务信息安全问题探讨[J].物流科技,2007,30(3):127-129. 被引量:14
  • 3李晖,牛少彰.无线通信安全理论与技术[M].北京:北京邮电大学出版社,2012:104-107.
  • 4Gaubatz G,Kaps J P,Ozturk E,et al.State of the art in ultra-low power public key cryptography for wireless senor networks[C]//Proceedings of the 3rd IEEE International Workshop on Pervasive Computing and Communication Security-PerS ec 2005,Washington DC,USA.IEEE press,2005:146-150.
  • 5Jie R S,Yongbo H,Ming C H,et al.Securing M2M With Post-Quantum Public-Key Cryptography[C]//Emerging and Selected Topics in Circuits and Systems,IEEE Journal on VOL:3,NO 1,2013,2156-3357:106-116.
  • 6EPCglobal.EPCglobal Tag Data Standards(TDS),Version 1.3[S].Ratifi-ed Specification,March 2006.http://www.epcglobalinc.Org/gsmp/kc/ep-cglobal/tds/tds_1_3-standard-20060308.pdf.
  • 7Joseph H S.NTRU Cryptosystems Technical Report 11,Wraps,Version 2.Gaps,and Lattice Constants[R].NTRU Cryptosystems Inc,March 2001.
  • 8Atici A C,Batina L,Fan J F,et al.Low-cost implementations of NTRU for pervasive security[C]//19th IEEE Int Conf on Application Specific systems,Architectures and Processors.Leuven,2008:79-84.
  • 9Khan G N,Moessner M B.Secure Authentication Protocol for RFID Systems[C]//Computer Communications and Networks,2011 Proceeding of 20th International Conference on.IEEE,2011:1-7.
  • 10徐淑彩.信息安全与技术[Z].连云港:连云港市环境信息中心,2012.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部