期刊文献+

对称密码加密系统与公钥密码加密系统 被引量:3

Analysis of the Differentials between Private And Public Key Cryptography
在线阅读 下载PDF
导出
摘要 介绍了在信息安全中起到重要作用的加密技术及其算法,比较了对称密码加密系统与公钥密码加密系统各自的优缺点,并探讨了改进的几种方法及其应用。密钥分配是保证安全性的关键。应从密钥的简单性、成本的低廉性,管理的简易性,算法的复杂性、保密的安全性及计算的快速性等方面综合考虑加密系统技术的改进。 This paper mainly discusses the realizable way of the recoding technology, analyzing the advantages and disadvantages of the secret key cryptography system, comparing the features of private key cryptography with those of public key cryptography encoding technology to show their different suitable limits, and presenting some improved encoding technology algorithms as well as their application.
出处 《上海电机学院学报》 2005年第2期49-52,74,共5页 Journal of Shanghai Dianji University
关键词 加密系统 对称密码加密系统 公钥密码加密系统 RSA算法 secret key cryptography system private key cryptography public key cryptography RSA algorithm
  • 相关文献

参考文献12

二级参考文献47

  • 1Shamir A. Identity-based Cryptosystem and Signature Schemes[A]. Blakley G R, chaum D CRYPTO 84[C]. Berlin: Springer-Verlag, 1984. 47-53.
  • 2Boneh D, Franklin M. Identity based Encryption from Weil Pairing[A]. Kilian J CRYPTO 2001[C]. Berin: Springer-Verlag, 2001. 213-229.
  • 3Boneh D, Franklin M. Short Signatures from Weil Pairing[A]. Boyd C ASIACRYPT 2001[C]. Berlin: Springer-Verlag, 2001. 514-532.
  • 4Gentry C, Silerberg A. Hierarchical ID-based Cryptography[A]. Zheng Y ASICCRYPT 2002[C]. Berlin: Springer-Verlag, 2002. 548-566.
  • 5Horwitz J, Lynn B. Toward Hierarchical Identity-based Encryption[A]. Knudsen L EUROCRYPT 2002[C]. Berlin: Springer-Verlag, 2002. 466-481.
  • 6Al-Riyami S S, Paterson K G. Tripartite Athenticated Key Agreement Protocols from Pairings[EB/OL]. http://eprint.iacr.org/2002/035/, 2002-07-21.
  • 7Smart N P. An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing[J]. Electronics Letters, 2002, 38(13): 630-632.
  • 8Paterson K G. ID-based Signatures from Pairings on Elliptic Curves[J]. Electronics Letters, 2003, 38(18): 1025-1026.
  • 9Menezes A, Okamoto T, Vanstone S. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field[J]. IEEE Trans on Information Theory, 1993, 39(5): 1639-1646.
  • 10Gennaro R, Jarecki S, Krawczyk H. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems[A]. Stern J EUROCRYPT99[C]. Berlin: Springer-Verlag, 1999. 295-310.

共引文献49

同被引文献21

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部