期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
1
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
Properties of Self-recoverable Mechanoluminescence Phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) and Its Information Encryption Application
2
作者 ZHANG Ting WANG Zhijun +3 位作者 WANG Dawei ZHAO Jinxin YANG Zhiping LI Panlai 《发光学报》 EI CAS CSCD 北大核心 2024年第9期1445-1455,共11页
A novel self-recoverable mechanoluminescent phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) was developed by the high-tem-perature solid-state reaction method,and its luminescence properties were investigated.Ca_(5)Ga_(6)O_(14)... A novel self-recoverable mechanoluminescent phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) was developed by the high-tem-perature solid-state reaction method,and its luminescence properties were investigated.Ca_(5)Ga_(6)O_(14)∶Eu^(3+)can produce red mechanoluminescence,and importantly,it shows good repeatability.The mechanoluminescence of Ca_(5)Ga_(6)O_(14)∶Eu^(3+) results from the piezoelectric field generated inside the material under stress,rather than the charge carriers stored in the traps,which can be confirmed by the multiple cycles of mechanoluminescence tests and heat treatment tests.The mechanoluminescence color can be turned from red to green by co-doping varied concentrations of Tb^(3+),which may be meaningful for encrypted letter writing.The encryption scheme for secure communication was devised by harnessing mechanoluminescence patterns in diverse shapes and ASCII codes,which shows good encryption performance.The results suggest that the mechanoluminescence phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+),Tb^(3+)may be applied to the optical information encryption. 展开更多
关键词 PHOSPHOR MECHANOLUMINESCENCE self-recoverable information encryption
在线阅读 下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
3
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
在线阅读 下载PDF
Repeater jamming suppression method for pulse Doppler fuze based on identity recognition and chaotic encryption 被引量:8
4
作者 Jian Dai Xin-hong Hao +2 位作者 Qiang Liu Xiao-peng Yan Ping Li 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第3期1002-1012,共11页
Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a tradit... Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a traditional PD fuze increasingly emerges. Therefore, a repeater jamming suppression method for a PD fuze based on identity(ID) recognition and chaotic encryption is proposed. Every fuze has its own ID which is encrypted with different chaotic binary sequences in every pulse period of the transmitted signal. The thumbtack-shaped ambiguity function shows a good resolution and distance cutoff characteristic. The ability of anti-repeater jamming is emphatically analyzed, and the results at different signal-to-noise ratio(SNR) show a strong anti-repeater jamming ability and range resolution that the proposed method possesses. Furthermore, the anti-repeater jamming ability is influenced by processing gain, bit error rate(BER) and correlation function. The simulation result validates the theoretical analysis, it shows the proposed method can significantly improve the anti-repeater jamming ability of a PD fuze. 展开更多
关键词 Pulse Doppler fuze ID Chaotic binary code encryption Repeater jamming
在线阅读 下载PDF
Preserving scheme for user’s confidential information in smart grid based on digital watermark and asymmetric encryption 被引量:5
5
作者 WANG Shou-xiang CHEN Hai-wen +4 位作者 ZHAO Qian-yu GUO Lu-yang DENG Xin-yu SIWei-guo SUN Zhi-qing 《Journal of Central South University》 SCIE EI CAS CSCD 2022年第2期726-740,共15页
As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand respons... As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand response.However,there is a growing risk of privacy disclosure with the wide installation of smart meters,for they transmit readings and sensitive data simultaneously.To guarantee the confidentiality of the sensitive information and authenticity of smart meter readings,we proposed a privacy-preserving scheme based on digital watermarking and elliptic-curve cryptography(ECC)asymmetric encryption.The sensitive data are encrypted using the public key and are hidden in the collected readings using digital watermark.Only the authorized user can extract watermark and can decrypt the confidential data using its private key.The proposed method realizes secure end-to-end confidentiality of the sensitive information.It has faster computing speed and can verify the data source and ensure the authenticity of readings.The example results show that the proposed method has little influence on the original data and unauthorized access cannot be completed within a reasonable time.On embedded hardware,the processing speed of the proposed method is better than the existing methods. 展开更多
关键词 sensitive information smart grid smart meter asymmetric encryption
在线阅读 下载PDF
Multi-authority proxy re-encryption based on CPABE for cloud storage systems 被引量:7
6
作者 Xiaolong Xu Jinglan Zhou +1 位作者 Xinheng Wang Yun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期211-223,共13页
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ... The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH). 展开更多
关键词 cloud storage data partition multi-authority security proxy re-encryption attribute-based encryption(ABE).
在线阅读 下载PDF
Novel encryption model for multimedia data 被引量:1
7
作者 Ye Dengpan~(1,2) & Lian Shiguo~3 1.The Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education,Wuhan 430072,P.R.China 2.School of Computer Science,Wuhan Univ.,Wuhan 430072,P.R.China 3.France Telecom R&D Beijing,Beijing 100080,P.R.China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第5期1081-1085,共5页
A novel encryption model is proposed. It combines encryption process with compression process, and realizes compression and encryption at the same time. The model's feasibility and security are analyzed in detail. An... A novel encryption model is proposed. It combines encryption process with compression process, and realizes compression and encryption at the same time. The model's feasibility and security are analyzed in detail. And the relationship between its security and compression ratio is also analyzed. 展开更多
关键词 multimedia encryption MODEL compression FEASIBILITY security.
在线阅读 下载PDF
Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain 被引量:1
8
作者 Ramadan Noha Ahmed HossamEldin H +1 位作者 El-khamy Said E Abd El-Samie Fathi E 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第9期2049-2057,共9页
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomizat... A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks. 展开更多
关键词 Backer map chaotic encryption fractional Fourier transform (FRFT) modified Logistic map
在线阅读 下载PDF
New chaos-based encryption scheme for digital sequence
9
作者 Zhang Zhengwei Fan Yangyu Zeng Li 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期698-703,709,共7页
To enhance the anti-breaking performance of privacy information, this article proposes a new encryption method utilizing the leaping peculiarity of the periodic orbits of chaos systems. This method maps the secret seq... To enhance the anti-breaking performance of privacy information, this article proposes a new encryption method utilizing the leaping peculiarity of the periodic orbits of chaos systems. This method maps the secret sequence to several chaos periodic orbits, and a short sequence obtained by evolving the system parameters of the periodic orbits in another nonlinear system will be the key to reconstruct these periodic orbits. In the decryption end, the shadowing method of chaos trajectory based on the modified Newton-Raphson algorithm is adopted to restore these system parameters. Through deciding which orbit each pair coordinate falls on, the original digital sequence can be decrypted. 展开更多
关键词 encryption scheme LPO (leaping periodic orbits) chaos initial conditions parameter estimation nonlinear system
在线阅读 下载PDF
Broadcast group-oriented encryption secure against chosen ciphertext attack
10
作者 Ma Chunbo Ao Jun Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期811-817,共7页
A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in... A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in the designated group has the ability to independently decrypt a ciphertext. In contrast to traditional broadcast encryption, all the valid receivers in the proposed scheme compose the designated group. To take advantage of this property, a tab for the group is set and the matching private key for each member is generated. In addition, before decrypting a ciphertext, anyone in the scheme can verify the ciphertext, to ensure that the ciphertext is correct. This property is very important for large-scale group communication, as the gateway can filter incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given, to show that the proposed scheme is secure against the adaptively chosen ciphertext attack. 展开更多
关键词 BROADCAST group-oriented encryption chosen ciphertext attack public verification
在线阅读 下载PDF
Secure property of chaotic encryption system based on chaotic synchronization
11
作者 崔光亮 胡国杰 冯正进 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第1期57-62,共6页
The secure property of chaotic encryption system based on chaos synchronization from chosenciphertext attack under Kerckhoff principle is discussed. The key (parameter) of the receiver can be obtained by chosenciphert... The secure property of chaotic encryption system based on chaos synchronization from chosenciphertext attack under Kerckhoff principle is discussed. The key (parameter) of the receiver can be obtained by chosenciphertext attack. The encryption systems based on chaotic synchronization do not have high privacy. 展开更多
关键词 CHAOS chaos synchronization encryption system kerckhoff principle chosenciphertext attack
在线阅读 下载PDF
Image encryption based on a novel memristive chaotic system,Grain-128a algorithm and dynamic pixel masking
12
作者 HUANG Lilian SUN Yi +1 位作者 XIANG Jianhong WANG Linyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第3期534-550,共17页
In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov expon... In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov exponents.In particular,the system has robust chaos in a wide parameter range and the initial value space,which is favourable to the security communication application.Consequently,we further explore its application in image encryption and present a new scheme.Before image processing,the external key is protected by the Grain-128a algorithm and the initial values of the memristive system are updated with the plain image.We not only perform random pixel extraction and masking with the chaotic cipher,but also use them as control parameters for Brownian motion to obtain the permutation matrix.In addition,multiplication on the finite field GF(2^(8))is added to further enhance the cryptography.Finally,the simulation results verify that the proposed image encryption scheme has better performance and higher security,which can effectively resist various attacks. 展开更多
关键词 memristive chaotic system super-wide parameter range image encryption Grain-128a algorithm dynamic pixel masking
在线阅读 下载PDF
Air target recognition method against ISRJ for radio frequency proximity sensors using chaotic stream encryption
13
作者 Jian-feng Li Jian Dai +2 位作者 Xin-hong Hao Xiao-peng Yan Xin-wei Wang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第10期267-279,共13页
The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article propose... The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article proposes a recognition method for RFPSs to identify the false targets caused by ISRJ.The proposed method is realized by assigning a unique identity(ID)to each RFPS,and each ID is a periodically and chaotically encrypted in every pulse period.The processing technique of the received signal is divided into ranging and ID decryption.In the ranging part,a high-resolution range profile(HRRP)can be obtained by performing pulse compression with the binary chaotic sequences.To suppress the noise,the singular value decomposition(SVD)is applied in the preprocessing.Regarding ID decryption,targets and ISRJ can be recognized through the encryption and decryption processes,which are controlled by random keys.An adaptability analysis conducted in terms of the peak-to-side lobe ratio(PSLR)and bit error rate(BER)indicates that the proposed method performs well within a 70-k Hz Doppler shift.A simulation and experimental results show that the proposed method achieves extremely stable target and ISRJ recognition accuracies at different signal-to-noise ratios(SNRs)and jamming-to-signal ratios(JSRs). 展开更多
关键词 Interrupted-sampling repeater jamming(ISRJ) Radio frequency proximity sensors(RFPS) Chaotic stream encryption Air target recognition Identity(ID)decryption
在线阅读 下载PDF
Enhanced biometric encryption algorithm for private key protection in BioPKI system
14
作者 Cheol-Joo Chae Kwang-Nam Choi +2 位作者 Kiseok Choi Jae-Soo Kim Yong Ju Shin 《Journal of Central South University》 SCIE EI CAS 2014年第11期4286-4290,共5页
Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in ... Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in this PKI system. Recently, studies have been conducted on Bio PKI system that uses the biometric information of users in order to replace the password type of private key protection in PKI system. However, Bio PKI system also has vulnerability in that biometric information used for protection of private key cannot be reused once it is stolen or lost. So, we propose the method to protect the private key using FIDSEQi which binds sequence to biometric information. The proposed method enhances reusability of biometric information and presents higher attack complexity than the method of authentication by cross matching single biometric information. 展开更多
关键词 BioPKI system fingerprint biometric encryption secret share
在线阅读 下载PDF
A Fast Federated Learning-based Crypto-aggregation Scheme and Its Simulation Analysis
15
作者 LüBoshen Song Xiao 《系统仿真学报》 CAS CSCD 北大核心 2024年第12期2850-2870,共21页
To solve the problem of increased computation and communication costs caused by using homomorphic encryption(HE) to protect all gradients in traditional cryptographic aggregation(cryptoaggregation) schemes,a fast cryp... To solve the problem of increased computation and communication costs caused by using homomorphic encryption(HE) to protect all gradients in traditional cryptographic aggregation(cryptoaggregation) schemes,a fast crypto-aggregation scheme called RandomCrypt was proposed.RandomCrypt performed clipping and quantization to fix the range of gradient values and then added two types of noise on the gradient for encryption and differential privacy(DP) protection.It conducted HE on noise keys to revise the precision loss caused by DP protection.RandomCrypt was implemented based on a FATE framework,and a hacking simulation experiment was conducted.The results show that the proposed scheme can effectively hinder inference attacks while ensuring training accuracy.It only requires 45%~51% communication cost and 5%~23% computation cost compared with traditional schemes. 展开更多
关键词 federated learning differential privacy homomorphic encryption inference attack hacking simulation
在线阅读 下载PDF
云计算访问控制技术研究综述 被引量:200
16
作者 王于丁 杨家海 +2 位作者 徐聪 凌晓 杨洋 《软件学报》 EI CSCD 北大核心 2015年第5期1129-1150,共22页
随着云计算规模化和集约化的发展,云安全问题成为云计算领域亟待突破的重要问题.访问控制技术是安全问题的重中之重,其任务是通过限制用户对数据信息的访问能力及范围,保证信息资源不被非法使用和访问.主要对目前云计算环境下的访问控... 随着云计算规模化和集约化的发展,云安全问题成为云计算领域亟待突破的重要问题.访问控制技术是安全问题的重中之重,其任务是通过限制用户对数据信息的访问能力及范围,保证信息资源不被非法使用和访问.主要对目前云计算环境下的访问控制问题进行研究,首先介绍访问控制理论;然后分析了云计算环境下的访问控制技术体系框架,重点从云计算访问控制模型、基于ABE(attribute-based encryption)密码体制的云计算访问控制、云中多租户及虚拟化访问控制这3个方面对云计算环境下的访问控制问题进行综述,并且调研了工业界云服务提供商和开源云平台的访问控制机制;最后对未来的研究趋势进行了展望. 展开更多
关键词 云计算 云安全 访问控制 访问控制策略 访问控制模型 ABE(attribute-based encryption)
在线阅读 下载PDF
基于AES的S盒图像置乱算法研究 被引量:3
17
作者 肖华勇 李建辉 边笛 《西北工业大学学报》 EI CAS CSCD 北大核心 2008年第1期74-78,共5页
提出了一种基于密码学最新加密算法AES中的S盒对图像进行置乱的技术。该技术包括灰度置乱、行列置乱、块置乱及3种置乱技术的综合运用。文中对置乱的效果提出了灰度直方图、平均差异度、置乱图与原图的相关系数评价方法,并采用该方法对... 提出了一种基于密码学最新加密算法AES中的S盒对图像进行置乱的技术。该技术包括灰度置乱、行列置乱、块置乱及3种置乱技术的综合运用。文中对置乱的效果提出了灰度直方图、平均差异度、置乱图与原图的相关系数评价方法,并采用该方法对各种置乱技术进行了实验分析。从实验结果来看,达到了很好的效果。文中还对该置乱算法复杂性、置乱的安全性、周期性等进行了分析。结果表明该技术对图像置乱简单高效,安全性高。 展开更多
关键词 AES(Advanced encryption Standard)的S盒 相关系数 图像置乱 周期性 安全性
在线阅读 下载PDF
对DES的Rectangle攻击和Boomerang攻击 被引量:5
18
作者 张蕾 吴文玲 《软件学报》 EI CSCD 北大核心 2008年第10期2659-2666,共8页
作为加密标准,DES(data encryption standard)算法虽然已被AES(advanced encryption standard)算法所取代,但其仍有着不可忽视的重要作用.在一些领域,尤其是金融领域,DES和Triple DES仍被广泛使用着.而近年来又提出了一些新的密码分析方... 作为加密标准,DES(data encryption standard)算法虽然已被AES(advanced encryption standard)算法所取代,但其仍有着不可忽视的重要作用.在一些领域,尤其是金融领域,DES和Triple DES仍被广泛使用着.而近年来又提出了一些新的密码分析方法,其中,Rectangle攻击和Boomerang攻击已被证明是非常强大而有效的.因此,有必要重新评估DES算法抵抗这些新分析方法的能力.研究了DES算法针对Rectangle攻击和Boomerang攻击的安全性.利用DES各轮最优差分路径及其概率,分别得到了对12轮DES的Rectangle攻击和对11轮DES的Boomerang攻击.攻击结果分别为:利用Rectangle攻击可以攻击到12轮DES,数据复杂度为2^(62)个选择明文,时间复杂度为2^(42)次12轮加密;利用Boomerang攻击可以攻击到11轮DES,数据复杂度为2^(58)个适应性选择明密文,时间复杂度为2^(38)次11轮加密.由于使用的都是DES各轮的最优差分路径,所以可以相信,该结果是Rectangle攻击和Boomerang攻击对DES所能达到的最好结果. 展开更多
关键词 DES(data encryption standard)算法 Rectangle攻击 Boomerang攻击 差分路径 区分器
在线阅读 下载PDF
OE在IPSec中的应用 被引量:1
19
作者 李希 刘宏 +1 位作者 姚崎 杨涛 《计算机工程与应用》 CSCD 北大核心 2006年第19期136-139,共4页
OpportunisticEncryption(OE)是基于IPSec协议提出来的一种新的机制。通过OE这种机制使得双方主机在没有预先设置的情况下进行安全的通讯。作为一种标准,只要是使用了OE机制的主机,都可以相互之间任意建立隧道。这就大大增加了建立隧道... OpportunisticEncryption(OE)是基于IPSec协议提出来的一种新的机制。通过OE这种机制使得双方主机在没有预先设置的情况下进行安全的通讯。作为一种标准,只要是使用了OE机制的主机,都可以相互之间任意建立隧道。这就大大增加了建立隧道的灵活性。 展开更多
关键词 OPPORTUNISTIC encryption DNS DNSSEC IKE IPSEC
在线阅读 下载PDF
基于FPGA的信息加密技术在工业网络中的应用(英文) 被引量:3
20
作者 郭耀华 《机床与液压》 北大核心 2015年第24期84-90,共7页
随着工业信息技术的飞速发展,信息加密是信息安全的一种有效手段。阐述了工业领域中基于FPGA的数据加解密系统,介绍了数据采集模块、3DES算法的基本原理及其在FPGA中的实现和PMC总线接口模块。通过对设计结果的功能仿真和测试分析,该方... 随着工业信息技术的飞速发展,信息加密是信息安全的一种有效手段。阐述了工业领域中基于FPGA的数据加解密系统,介绍了数据采集模块、3DES算法的基本原理及其在FPGA中的实现和PMC总线接口模块。通过对设计结果的功能仿真和测试分析,该方案具有可靠性高、算法实现速度快、硬件资源少的特点,可广泛应用于工业网络中。 展开更多
关键词 FPGA DATA transmission encryption technology
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部