共查询到16条相似文献,搜索用时 62 毫秒
1.
2.
RSA算法是一种公钥密码算法。RSA是一个基于数论的非对称密码体制,RSA的安全性是依赖于大整数素因子分解的困难性问题。其经历了各种攻击,至今未能被完全攻破。 相似文献
3.
4.
廖卫民 《信息技术与标准化》2005,(1):20-23
RSA公钥密码体制是当今最流行的公钥密码体制,它具有很多优点,但是在实际应用中由于它的代数性质会让攻击者积累有效信息,而且在加密大量消息的情况下,加解密速度非常慢。针对这两个缺陷,提出了一种加载随机预言模型的RSA公钥密码体制,这种体制不但保留了原来体制的保密性,而且还大大降低了攻击者对信息的积累,提高了加解密的效率。最后还将改进的方案推广到私钥密码体制和公钥密码体制的结合的方案。 相似文献
5.
6.
7.
针对网上通信安全的重要性 ,提出了利用RSA加密技术实现数字签名的方法 ,通过深入研究RSA的安全性和模幂算法 ,并编程予以实现 ,为网络通信安全技术提供参考。 相似文献
8.
RSA算法实现数字签名时,对处理信息有〔0,r-1〕的限制,因此实现数字签名时很容易产生错误。本文利用重新分组的方法对此进行了改进,并通过实践证明了该方法的正确性。 相似文献
9.
RSA公钥加密算法当今十分受欢迎,它的特点就是能够实在数据加密的,同时在数字签名的算法中也得到了广泛的应用。更主要的是软件更容易操作与理解。本文首先对RSA算法的现状进行分析,进一步论述文件加密应用RSA算法的可行性和意义。对RSA算法深入研究,设计出一套非常实用的加密文件解决方案,从常规RSA算法出发,用C++实现RSA加密算法类库,在.Net平台引用此组件,实现可以对任意文件进行RSA加密操作的窗体应用程序。 相似文献
10.
Based on the microprocessor structure,an RSA coprocessor
for improved Montgomery algorithm has been designed.The functional units of this
coprocessor operate concurrently,and up to three instructions can be issued in one cycle.A
mixed form of three-stage and two-stage pipelined structure is used for instruction
execution,and the coprocessor and CPU core can share a common RAM memory through a set
of switches under control.The structure of the coprocessor can be expanded to contain
more than one multiplier-accumulator units for higher performance. 相似文献
11.
12.
首先利用RSA加密算法对数据进行加密和解密,实现了数据的安全传输;然后针对RSA加密算法时间开销大和算法设计复杂的缺点,提出基于乘同余对称特性的SMM算法。通过对该改进RSA加密算法的实现发现加密运算速度明显提高且算法更简单,从而证明了本文所提改进算法的有效性。 相似文献
13.
本文研究了组成RSA模数的两个素数p和q其低位比特相同,RSA公开密钥密码系统的安全性。其结果表明若RSA模数的两个素因子p和q共享低位比特,则当私钥d较小时这样的体制相对于模数不平衡的RSA更易受到攻击。本文的研究结果表明,当组成RSA模数的两个素数p和q仅有少量比特不相同时,使用规模较小的私钥d必须十分慎重。 相似文献
14.
15.
S. Appavualias Balamurugan S. Senthil Kumar 《International Journal of Communication Systems》2020,33(6)
Enabling a reliable and secure communication in cognitive radio networks (CRNs) is one of the interesting and demanding research areas and these days, it is used in wide range of applications. The traditional works mainly aimed to improve the spectrum efficiency and bandwidth utilization of the CRN. Moreover, it focused on attack detection in the network for improving the reliability. Thus, this work intended to secure the CRN by considering the objectives of both attack detection and quality of service (QoS) improvement. For this purpose, an integrated digital signature and mutual authentication (IDsMA) mechanism is proposed in this paper, which incorporates the benefits of both security and reliability. Also, the Rivest‐Sharmir‐Adlemann (RSA) algorithm is utilized to encrypt and decrypt the data at the transmitter and receiver side. Here, the unique user ID is generated by the service eNodeB based on the hash function, which is validated at the server side for validating the authenticity of the user. Furthermore, the particle swarm optimization (PSO) and relevant vector machine (RVM) techniques are utilized for optimal channel selection and attack classification. The simulation results evaluate the performance of the proposed technique by using various performance measures. Also, its superiority is proved by comparing the proposed technique with the existing techniques . 相似文献
16.
LiuJingen WuZhipeng LiuShangqian 《电子科学学刊(英文版)》2003,20(3):189-193
A creepy hotoelectric endoscopy system with good performance is studied,and an expansion and correction algorithm for a compressed photoelectric image with serious geometric distortion is presented.The algorithm can not only correct the geometric geometric distortion,but also restore the gray-level distribution by means of ternary convolution algorithm.The details and the outline in the image are very clear.It is proved to be of high performance in practice. 相似文献