期刊文献+

基于简易混合选择编码的对称密钥自变动加密

Symmetrical Key Automatic Changing Cryptography Based on Simple Hybrid Selection Coding
在线阅读 下载PDF
导出
摘要 针对安全性要求不太高的加密系统,将单边范式Huffman编码与等长编码相结合,提出一种基于混合选择编码的对称密钥自变动加密方案。通过将明文的统计结果作为自身加密的密钥和编码依据,使方案易于实现,且计算存储成本低。理论分析结果证明,在密钥完全未知的情况下破解该加密体制难度较大。 Aiming at the encryption system with lower security requirements,this paper puts forward a symmetrical key automatic changing cryptography scheme based on simple hybrid selection coding,with the combination of unilateral canonical Huffman coding and fixed-length coding.The statistical results of plaintext are used as their own encrypted key and coding basis,which makes the scheme to be easy to implement and calculate and of cost low.It is proved that when the keys are completely unknown,the cracking of the encryption system has great difficulty.
作者 罗俊 张国平
出处 《计算机工程》 CAS CSCD 2012年第15期16-19,共4页 Computer Engineering
关键词 混合选择编码 对称密钥加密 HUFFMAN编码 等长编码 自变动 hybrid selection coding symmetrical key encryption Huffman coding fixed-length coding automatic changing
  • 相关文献

参考文献8

二级参考文献34

  • 1李伟生,李域,王涛.一种不用建造Huffman树的高效Huffman编码算法[J].中国图象图形学报(A辑),2005,10(3):382-387. 被引量:15
  • 2张全伙,于洪斌,林榆.优化哈夫曼编码数据压缩技术及程序实现[J].华侨大学学报(自然科学版),1995,16(3):344-348. 被引量:4
  • 3刘金岭,刘国香.Huffman编码的优化[J].河北师范大学学报(自然科学版),2006,30(1):29-32. 被引量:2
  • 4王群芳.哈夫曼编码的另一种实现算法[J].安徽教育学院学报,2006,24(6):36-38. 被引量:10
  • 5Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]//Proc, of ASI-ACRYPT'03. [S. l.]: Springer-Verlage, 2003.
  • 6Huang Xinyi, Susilo W, Mu Yi, et al. On the Security of Certificateless Signature Schemes[C]//Proceedings of CANS'05. [S. l.]: Springer- Verlag, 2005.
  • 7Li X, Chen K, Sun L. Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings[J]. Lithuanian Mathematical Journal, 2005, 45(1): 76-83.
  • 8Libert B, Quisquater J J. On Constructing Certificateless Cryptosystems from Identity Based Encryption[C]//Proc. of PKC'06.[S. l.]: Springer-Verlag, 2006.
  • 9Yum D H, Lee P J. Generic Construction of Certificateless Encryption[C]//Proc, of ICCSA'04. [S. 1.]: Springer-Verlag, 2004.
  • 10Shoup V. Using Hash Functions as a Hedge Against Chosen Ciphertext Attack[C]//Proc. of Eurocrypt'00. [S. l.]: Springer- Verlag, 2000.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部