首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 109 毫秒
1.
基于混沌序列的密钥生成新方法   总被引:1,自引:0,他引:1  
设计了一种从混沌序列生成密钥的新方法.其基本原理是从混沌序列依次取若干数据构成实值序列,将其按非线性规则映射成二值序列,再用实值序列和任意指定序列分别置乱这个二值序列,被置乱后的二值序列即为所生成密钥.实验表明,在混沌密码体制研究中,这种密钥较一般序列密钥更具有独立性、均匀性和不可预测性.  相似文献   

2.
在基于ID的无证书签名方案的基础上,通过模糊提取器获取生物特征信息来构造密钥,结合CL-PKC私钥生成原理,提出了一种基于生物特征的无证书签名方案.新方案在随机预言模型下是可证安全的,而且能够抵抗适应性选择消息攻击和ID攻击下的存在性伪造.该方案不仅解决了密钥托管问题而且与传统的方案相比具有较高的效率.  相似文献   

3.
提出一种基于Hash函数、小波变换和相对小波系数相对模糊关系的三维地形数据数字水印算法.该算法拓展了视觉系统小波域量化噪声的视觉权重分析方法使其能应用于三维地形数据.并且通过自适应的构造模糊关系矩阵,在水印的提取过程中实现了盲检测.本方法与经典的密码理论以及高级加密算法相结合,嵌入三维水印的DEM数据和没有嵌入水印的D...  相似文献   

4.
多级混沌映射变参数伪随机序列产生方法研究   总被引:4,自引:0,他引:4  
针对单混沌系统因计算机有限精度效应产生的混沌退化问题,提出了一种多级混沌映射变参数伪随机序列产生方法,基于该方法构建的混沌系统较单混沌系统具有伪随机序列周期大,密钥数量多,密钥空间大等优势,所产生的密码具有更高的安全性能.仿真结果表明,该方法在低复杂度条件下可以生成大量具有良好自相关和互相关特性的混沌序列,在安全领域具有良好的应用前景.  相似文献   

5.
无证书密码体制结合了基于身份密码体制和传统公钥密码体制的优点,受到了密码和信息安全研究者的极大关注.对梁景玲等提出的消息可恢复的无证书签名方案和侯红霞等提出的无证书短签名方案进行安全性分析,发现两个方案都不能抵抗公钥替换攻击.通过修改签名者密钥生成算法,增加对用户公钥的有效性验证,提高了梁等方案的安全性.通过在签名阶段将用户公钥绑定进HaSh函数,弥补了侯等方案的安全缺陷.  相似文献   

6.
量子Grover算法及其应用   总被引:3,自引:1,他引:2  
深入剖析了G rover算法,最后将其应用于经典密码学,对序列密码和分组密码等进行了攻击和分析.  相似文献   

7.
本文研究了带二次耦合项的二维Logistic映射的性质和分岔行为,数值模拟了混沌的生成过程.若控制一个参数值近似为1,则产生近乎满的混沌区.这种混沌区产生的随机序列所生成的流密码具有很好的0-1分布、高线性复杂性、密钥敏感性等.最后给出了用于保密通信的模型.  相似文献   

8.
提出一种基于带参数整数小波变换和相对小波系数模糊关系的数字水印算法.应用基于视觉系统小波域量化噪声的视觉权重分析方法,自适应的构造模糊关系矩阵,在水印的提取过程中实现了盲检测.本方法与经典的密码理论以及高级加密算法相结合.应用Rabin方法生成单向Hash函数,信息隐藏算法可以完全公开.水印算法不可感知性好,鲁棒性强,是一种有效的版权保护方法.  相似文献   

9.
<正>公钥密码体制是1976年由笛费(Diffie),海尔曼(Hellman)以及默克勒(Merkle)提出的新型密码体制,是对传统密码体制的重大突破.一、提出公钥密码体制的背景和基本思路传统密码体制的一个基本缺点是,在任何密文未发送之前,发方和收方之间必须利用安全通道,预先进行通信,将解密密钥通知对方.在实际应用中这是非常困难的.在战争年代,传送密码的人可能被敌方识破,密码也可能被敌方截获.  相似文献   

10.
PRINCE是Borgho等学者于2012年提出的低延时轻量级密码算法,轻量级密码算法的自身安全性一直是研究热点.研究PRINCE算法代数攻击安全问题,提出用Mathematica软件列出S盒的方程,将其表示为单项式个数较少的无冗余等效方程组,将PRINCE的S盒表示为由8个单项式个数均小于等于5的8元布尔方程构成的等效方程组,并基于不同的已知明文量,利用CryptoMiniSAT2.9.6软件对PRINCE进行代数攻击实验.实验结果表明,在已知明文条件下可以求出5轮PRINCE的全部密钥位,在选择明文条件下可以求出6轮PRINCE的全部密钥比特.相关研究结果可以给PRINCE密码算法的优化提供一定参考.  相似文献   

11.
生物学研究表明,指纹在胎儿时期发育形成,并且其脊线结构在人的一生中从不改变,除非当指尖处深度擦伤之类的事故发生而导致指纹损伤.指纹的这种特性使得指纹作为生物特征进行身份认证非常有吸引力.指纹自动识别系统包括指纹图像的获取和存储、指纹图像数据的再表达和特征提取、指纹分类和索引、指纹匹配等模块.针对大库容量指纹自动识别系统各个模块中的一些关键技术,建立了最优化模型,设计了快速准确的求解算法,使得指纹自动识别系统的各项指标均能够达到国际先进水平,并应用到我国一些省市和公安部刑侦领域指纹自动识别系统中.  相似文献   

12.
In the last few years the security of the user’s identity has become of paramount importance. In this paper we investigate the opportunity of using a multimodal biometric system as input of a fuzzy controller designed with the aim of preventing user substitution after the initial authentication process.  相似文献   

13.
针对JPEG2000图像压缩标准所具有的渐进传输、一次编码多次解码等特性,提出了一种基于图像特征的鲁棒性图像认证算法.该算法在JPEG2000编码过程中,先根据图像不变特征,生成认证水印,再根据实际的鲁棒性认证需求,在量化后的小波系数中确定每个子带的认证水印嵌入位平面,最后基于小波系数位平面的特征嵌入认证水印.算法不仅能适应JPEG2000各种灵活的编码方式,还能定位图像篡改的位置.实验结果验证了图像认证算法对可允许图像操作的鲁棒性以及对图像篡改的敏感性.  相似文献   

14.
Authentication plays an important role in dealing with security. Securing sensitive data and computer systems by allowing easy access for authenticated users and withstanding the attacks of imposters is one of the major challenges in the field of computer security. Nowadays, passwords have become the trend to control access to computer systems. Biometrics are used to measure and analyze an individual's unique behavioral or physiological patterns for authentication purposes. Keystroke dynamics have emerged as an important method in analyzing the typing rhythm in biometric techniques, as they provide an ease of use and increased trustworthiness associated with biometrics for creating username and password schemes. In this experiment, we measure the Hausdorff timing values, mean, standard deviation, and median of keystroke features, such as latency, duration, digraph, and their combinations, and compare their performance. The stochastic diffusion search is used for feature subset selection.  相似文献   

15.
针对车载自组网中存在的安全隐患,提出一种身份认证机制.将门限RSA签名技术应用到车载自组网中,从而保证了车载自组网中节点通信信息的保密性、真实性、完整性及不可否认性.实验结果表明,在成员数量和门限值不断变换下,分发时间和合成时间变换比较稳定,说明此模型是稳定性较好的模型,所以将门限RSA签名技术应用于保证车载自组网节点通信的信息安全性是正确可行的.  相似文献   

16.
The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system’s resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature.  相似文献   

17.
We consider the authentication problem, using the model described by Simmons. Several codes have been constructed using combinatorial designs and finite geometries. We introduce a new way of constructing authentication codes using LFSR-sequences. A central part of the construction is an encoding matrix derived from these LFSR-sequences. Necessary criteria for this matrix in order to give authentication codes that provides protection aginst impersonation and substitution attacks will be given. These codes also provide perfect secrecy if the source states have a uniform distribution. Moreover, the codes give a natural splitting of the key into two parts, one part used aginst impersonation attacks and a second part used against substitution attacks and for secrecy simultaneously. Since the construction is based on the theory of LFSR-sequences it is very suitable for implementation and a simple implementation of the construction is given.  相似文献   

18.
Certificateless signature and proxy signature schemes from bilinear pairings   总被引:18,自引:0,他引:18  
Due to avoiding the inherent escrow of identity-based cryptography and yet not requiring certificates to guarantee the authenticity of public keys, certificateless public key cryptography has received a significant attention. Due to various applications of bilinear pairings in cryptography, numerous pairing-based encryption schemes, signature schemes, and other cryptographic primitives have been proposed. In this paper, a new certificateless signature scheme based on bilinear pairings is presented. The signing algorithm of the proposed scheme is very simple and does not require any pairing computation. Combining our signature scheme with certificateless public key cryptography yields a complete solution of certificateless public key system. As an application of the proposed signature scheme, a certificateless proxy signature scheme is also presented. We analyze both schemes from security point of view.__________Published in Lietuvos Matematikos Rinkinys, Vol. 45, No. 1, pp. 95–103, January–March, 2005.  相似文献   

19.
在基于身份的密钥提取过程中,使密钥生成器在私钥中嵌入随机数,从而使得密钥提取具有较好的灵活性,使得用户对一个身份可具备多个私钥,这无疑会增加密钥使用的安全性;基于这种新的密钥提取思路,给出一个基于身份的签名体制,新的密钥提取方式使得它具有更好的安全性和灵活性;新的基于身份的签名体制中具有最少对运算,因此,与类似的方案相比,其具备较好的计算效率;新签名体制的安全性依赖于k-合谋攻击问题(k-CAAP)的困难性,其在适应性选择消息和ID攻击下具备强不可伪造性,并且其安全性证明具有紧规约性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号