首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
混沌系统在网络信息保密中的应用   总被引:4,自引:0,他引:4  
提出一种利用混沌这种确定性系统的随机性实现对网络信息进行加密的策略,实验结果表明,这种保密方法在网络信息传输中可以很好完成加密和解密过程。  相似文献   

2.
Georgiou [4] proposed a method to strengthen ciphers based on a combination of an enciphering transformation and a multiplication. If the enciphering transformation is a homomorphism and the multiplication in the domain is used in the A cipher and the multiplication in the range is known to the cryptanalyst, his method does not strengthen the cipher at all.  相似文献   

3.
本文针对磁盘文件内容的加密.介绍了一个实用加密程序的DOS功能调用、加密算法及程序特点.  相似文献   

4.
基于双密钥的三维Vigenere密码的研究与应用   总被引:2,自引:0,他引:2       下载免费PDF全文
分析了经典维吉尼亚密码及维吉尼亚方阵的相关概念,在此基础上提出了一个三维维吉尼亚立方体模型。该模型使用双密钥对明文进行二次加密,削弱了密文的统计频率特征。理论分析表明,该算法在两个短密钥控制下达到了单个长密钥的加密效果,可以对明文进行一次一密加密,极大地提高了解密难度。  相似文献   

5.
Recent years have witnessed a significantly increased interest in computer security. Efforts in the area of design of ciphers and their attacks have progressed at almost competing rates. Though brute force attack is successful for simple ciphers, cryptanalysis of complex ciphers warrants specialised techniques and powerful computing systems. Several heuristic techniques have assumed significance over the past few years, in the context of attacks of simple stages of certain ciphers. This paper presents a systematic study of efficient heuristics in the successful attacks of some block ciphers which though simple are representative ones in computer security parlance.  相似文献   

6.
Evolutionary techniques such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Cuckoo Search (CS) are promising nature-inspired meta-heuristic optimization algorithms. Cuckoo Search combined with Lévy flights behavior and Markov chain random walk can search global optimal solution very quickly. The aim of this paper is to investigate the applicability of Cuckoo Search algorithm in cryptanalysis of Vigenere cipher. It is shown that optimal solutions obtained by CS are better than the best solutions obtained by GA or PSO for the analysis of the Vigenere cipher. The results show that a Cuckoo Search based attack is very effective on the Vigenere cryptosystem.  相似文献   

7.
一种基于工业以太网的监控系统的设计与应用   总被引:8,自引:4,他引:8  
本文在介绍工业以太网系统的总体设计的基础上,重点阐述了工业以太网监视控制管理平台的软件设计与应用。主要包括上位机监控组态控制平台的数据通讯、数据管理、组态控制各模块以及网络管理平台的设计思路,并介绍了该系统在实验室的具体应用实例。  相似文献   

8.
An indefinite Lyapunov test matrix for closed-loop dissipativeness using LQG (linear quadratic Gaussian) design is presented. The application of this test to relaxation systems, lossless systems, Hamiltonian systems, positive real systems, and second-order systems with collocated rate sensors and actuators is explored. The Lyapunov test also helps clarify the role of collocated sensors and actuators in LQG design. A set of duality theorems based on the indefinite Lyapunov test matrix is derived  相似文献   

9.
This paper presents a design methodology for a class of behaviour-based control systems, arguing its potential for application to safety critical systems. We propose a formal basis for subsumption architecture design based on two extensions to Lyapunov stability theory, the Second Order Stability Theorems, and interpretations of system safety and liveness in Lyapunov stability terms. The subsumption of the new theorems by the classical stability theorems serves as a model of dynamical subsumption, forming the basis of the design methodology. Behaviour-based control also offers the potential for using simple computational mechanisms, which will simplify the safety assurance process.  相似文献   

10.
11.
One of the most important problems when considering the design of manufacturing systems based on SOA paradigms is the integration of shop floor devices in the business processes at the enterprise level. This paper presents the design and implementation of the Customer Order Management (COM) module based on SOA architecture in the context of holonic manufacturing systems. The COM module is integrating with SOA enabled shop floor devices using industry standards. The implementation leverages a multi agent system suited for industrial applications integrated in a SOA environment capable of dynamic BPEL workflow generation and execution. The prototype consists in a SCA application for core COM module functionality and an extension for NetLogo MAS platform for SOA integration. The COM module interacts with the MES layer using real time events handled by the BPEL process implementation in the execution stage. A web based portal frontend for the COM module has been developed to allow real time tracking of customer orders, providing data about product batch execution and individual progress of each product on the production line.  相似文献   

12.
随着信息化技术的发展,数据库系统运用越来越广泛。在众多的数据库系统中,存在一些相同或者相似的功能模块,例如:用户登陆验证、系统用户管理、用户权限管理等。在实际的应用系统开发过程中,这些模块被重复开发,浪费了大量的人力、物力,并且会影响系统的开发进度。针对这种情况,文中提出了一个基于.Net的可复用软件开发框架WebFrameWork,对数据库系统开发过程中的一些常用功能模块进行集成,从而提高数据库系统的开发效率;并且详细阐述了WebFrameWork的设计方法;最后通过应用实例来说明WebFrameWork的使用方法。通过多个应用系统开发证明,该框架能够加快应用目标系统的开发速度,提高软件质量,节约成本,并且在稳定性和效率上能够满足实际需要。  相似文献   

13.
随着无线局域网的广泛应用,为了在嵌入式系统中整合无线局域网宽带通信技术进行视频传输;提出一种基于ARM11硬件平台和嵌入式Linux操作系统的无线视频终端系统的设计方案,给出系统的总体设计和主要功能模块的实现,其中包括视频采集模块、无线视频传输模块的硬件设计,嵌入式Linux的驱动程序移植、H.264数字视频压缩及应用程序实现等;该系统实现了802.11无线局域网内的视频传输,实时监测网络的数据流量和拥塞状况,提高网络传输质量,保证视频播放流畅性,可靠性高且易于使用;实践证明本系统稳定性高,实时性好,运行可靠,可应用于视频监控领域。  相似文献   

14.
本文以分组密码算法为研究对象,结合微处理器体系结构的特点,研究能够高效灵活实现多种分组密码算法的处理器体系结构。论文通过分析现有分组密码算法结构特点,从实现方式的灵活性和高性能角度出发,提出了一种基于专用指令集的分组密码微处理器的设计思路,并给出了分组密码微处理器的运算单元设计方案及整体系统架构。  相似文献   

15.
本文以分组密码算法为研究对象,结合微处理器体系结构的特点,研究能够高效灵活实现多种分组密码算法的处理器体系结构。论文通过分析现有分组密码算法结构特点,从实现方式的灵活性和高性能角度出发,提出了一种基于专用指令集的分组密码微处理器的设计思路,并给出了分组密码微处理器的运算单元设计方案及整体系统架构。  相似文献   

16.
嵌入式系统可信虚拟化技术的研究与应用   总被引:1,自引:0,他引:1  
嵌入式系统在生活中的应用日益广泛,传统的安全增强手段已无法有效应对各种安全问题,增强嵌入式系统的安全性成为目前亟需解决的问题。为提高嵌入式系统及其应用程序的安全性,结合嵌入式系统的虚拟化技术与可信计算技术,设计并实现基于虚拟TCM的可信计算平台框架,实现了虚拟TCM和基于虚拟TCM的可信增强技术,提出并实现了一个基于虚拟TCM的会话认证方法,将信任链从硬件操作系统层扩展到了虚拟域的应用软件层。实验结果表明,虚拟TCM与物理TCM相结合能够有效保证嵌入式系统、虚拟域和应用程序的安全可信。  相似文献   

17.
The ANSI Data Encryption Algorithm (DEA) X3.92-1981, is probably a Feistel cipher. In considering how to expand the key of the DEA from 56 to 64 bits two similar ciphers are examined, and several design criteria inferred. As an example of their application, a 64-bit key schedule for the DEA is presented.  相似文献   

18.
随着计算机网络和信息通信技术的发展,网络信息安全已经成为不可忽视的领域,密码技术则是保护信息安 全的核心技术。维吉尼亚(Vigenere)密码算法是古典加密算法中的最典型的算法之一,是在单一的“凯撒密码”基础上扩充出 的多表密码。本文介绍了维吉尼亚加密算法的原理及实现方法。  相似文献   

19.
用户的管理是各类应用程序都必须涉及到的问题,给出一种采用组件方式,针对C/S模式的统一模式用户管理模块的设计方法,此模块可以方便地进行系统用户的管理。  相似文献   

20.
The purpose of this article is to illustrate the potential interest of the control theory framework for cryptographic applications. It is shown that under the properties of left invertibility and flatness, dynamical systems are structurally equivalent to some specific cryptographic primitives called self-synchronising stream ciphers. After having motivated the interest of considering hybrid systems for such ciphers, the development is particularised for the special class of switched linear systems. We also show that identifiability is a necessary condition for security, and we describe an identification procedure as a possible attack and assess its complexity.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号