期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Wrapping Encryption Based on Double Randomness Mechanism
1
作者 Yi-Li Huang Fang-Yie Leu +2 位作者 Ruey-Kai Sheu Jung-Chun Liu Chi-Jan Huang 《Computers, Materials & Continua》 SCIE EI 2023年第10期1143-1164,共22页
Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite commun... Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite communications,and so on.In these environments,a fixed password or channel key(e.g.,PW/SKCH)is often adopted to encrypt different data,resulting in security risks since thisPW/SKCH may be solved after hackers collect a huge amount of encrypted data.Actually,the most popularly used security mechanism Advanced Encryption Standard(AES)has its own problems,e.g.,several rounds have been solved.On the other hand,if data protected by the same PW/SKCH at different time points can derive different data encryption parameters,the system’s security level will be then greatly enhanced.Therefore,in this study,a security scheme,named Wrapping Encryption Based on Double Randomness Mechanism(WEBDR),is proposed by integrating a password key(or a system channel key)and an Initialization Vector(IV)to generate an Initial Encryption Key(IEK).Also,an Accumulated Shifting Substitution(ASS)function and a three-dimensional encryption method are adopted to produce a set of keys.Two randomness encryption mechanisms are developed.The first generates system sub-keys and calculates the length of the first pseudo-random numbers by employing IEK for providing subsequent encryption/decryption.The second produces a random encryption key and a sequence of internal feedback codes and computes the length of the second pseudo-random numbers for encrypting delivered messages.A wrapped mechanism is further utilized to pack a ciphertext file so that a wrapped ciphertext file,rather than the ciphertext,will be produced and then transmitted to its destination.The findings are as follows.Our theoretic analyses and simulations demonstrate that the security of the WEBDR in cloud communication has achieved its practical security.Also,AES requires 176 times exclusive OR(XOR)operations for both encryption and decryption,while the WEBDR consumes only 3 operations.That is why the WEBDR is 6.7∼7.09 times faster than the AES,thus more suitable for replacing the AES to protect data transmitted between a cloud system and its users. 展开更多
关键词 Initial encryption key accumulated shifting substitution three-dimensional operation wrapped ciphertext file
在线阅读 下载PDF
基于eCryptfs的多用户加密文件系统设计和实现 被引量:9
2
作者 唐晓东 付松龄 何连跃 《计算机应用》 CSCD 北大核心 2010年第5期1236-1238,1242,共4页
加密文件系统eCryptfs能有效防止存储介质在丢失或失窃情况下导致的信息泄露隐患。它的不足在于:不支持多用户环境下的联机数据保护,即一个用户一旦成功授权访问加密文件系统中的数据,则系统中的其他用户都可以访问加密文件系统中的数... 加密文件系统eCryptfs能有效防止存储介质在丢失或失窃情况下导致的信息泄露隐患。它的不足在于:不支持多用户环境下的联机数据保护,即一个用户一旦成功授权访问加密文件系统中的数据,则系统中的其他用户都可以访问加密文件系统中的数据。提出了以密钥为权能的加密文件系统访问控制机制,并基于eCryptfs设计和实现了多用户加密文件系统,确保只有拥有合法密钥的用户才能访问密文数据。 展开更多
关键词 加密文件系统 文件加密密钥 密钥加密密钥 访问控制 权能
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部