首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 62 毫秒
1.
本文讨论了椭圆曲线公钥体制中的一些问题,并举出了几个有意义的例子。  相似文献   

2.
RSA是著名的公钥密码体制之一,其安全性是基于大整数因子分解困难性假设的,求解RSA问题的最直接方法是分解RSA的模数.由于云计算的大规模分布式计算能力,一些使用分布式计算模型MapReduce的大整数分解手段已经实现,针对大整数因子分解的问题,提出了给定范围内搜索因子的新方法,并对相应的实验数据和结果进行了分析.结果表明,在云中的分布式计算的运行时间远小于单台机器.  相似文献   

3.
本文给出了与随机选取置换有关的一类随机变量的方差和r阶矩,求得了这类随机变量的分布律,并证明了关于全向置换计数的猜想的一部分,对吕述望教授等的步的补充和完善.  相似文献   

4.
RSA公开密钥体制及其主要数学基础   总被引:1,自引:0,他引:1  
在密码学发展的历史上,1976年是一个值得纪念的年份.这一年,美国斯坦福大学年轻的数学家狄菲(Diffie)和计算机专家海尔曼(Hellman)联名发表了<密码学的新方向>一文,开创了现代密码学的新领域--公开密钥体制(简称公钥体制).  相似文献   

5.
提出一种针对有限自动机公钥密码系统的攻击算法,它可在多项式时间内破译有限自动机公钥密码方案FAPKCO.这一算法的基本思想,原则上也可用来攻击其他有限自动机公钥密码方案,因而在设计新的有限自动机公钥密码系统时,必须讨论它是否经得住这种方法的攻击.  相似文献   

6.
针对一民间游戏建立了相应的数学模型,给出了一般算法,讨论了相关性质和应用前景,设计了一个应用实例.  相似文献   

7.
基于Rabin算法的超递增背包公钥密码体制的研究与改进   总被引:2,自引:0,他引:2  
超递增背包公钥密码体制是基于超递增背包问题的密码体制,它使得加密解密的过程变得相对简单.但是,由于该体制本身存在一定的弱点,不少国内外学者都提出了破解方案.在超递增背包公钥的基础上,结合了Rabin算法,使得原先的密码体制变得更为灵活.改进后的算法不但在性能上保持了高效率,而且将原先的密钥变为公钥,可以根据用户需求动态地改变公钥,实现安全性的成倍提高.  相似文献   

8.
本讨论了用数学建模的方法计算心肌梗塞面积,是数学应用于医学的又一成功的实例。该方法是:在急性心肌梗塞初期,由电体表面电位分布状态得出心脏的局部电现象,建立数学模型,编写计算机程序实现梗塞面积的计算。  相似文献   

9.
利用模元素n在整环Z[ω]中的相伴元将复平面分为六部分,并指定其中一部分为消息的有效域,将RSA密码体制及其数字签名方案推广到了Z[ω]中,并给出了一个实例.在安全性方面,所提出的推广体制比原RSA体制具有一定的优势.  相似文献   

10.
本文基于MH-KPKC体系和HILL密码体系的构建思想,提出了基于单模数线性同余方程组设计的公钥密码体系.该体制无需利用超递增序列和贪心算法恢复明文.算例说明了该体制的可行性。  相似文献   

11.
本文研究了RSA密码系统一个初步的动力分析.利用M(o)bius反转公式,我们给出了RSA密码系统的k阶不动点的数目公式,从而解决了文献[8,9]中的问题.  相似文献   

12.
An RSA modulus is a product M=pl of two primes p and l. We show that for almost all RSA moduli M, the number of sparse exponents e (which allow for fast RSA encryption) with the property that gcd(e,?(M))=1 (hence RSA decryption can also be performed) is very close to the expected value.  相似文献   

13.
An approximate expression related with RSA fixed points   总被引:1,自引:0,他引:1  
Let T=T(n,e,a)be the number of fixed points of RSA(n,e)that are co-prime with n=pq,and A,B be sets of prime numbers in (1,x)and(1,y) respectively.An estimation on the mean-value M(A,B,e,a)=1/(#A)(#B)∑p∈A,q∈B,(p.q)=1 logT(pq,e,a)is given.  相似文献   

14.
One fundamental difference between the use of symmetric and publickey cryptosystems is that the former requires trust between sender and receiver. Typically they will share a secret key and neitherhas any protection from the other. However, many users are nowfinding that they want keys to be used for 'one purpose only'and are relying on hardware functionality to introduce the conceptof unidirectional keys for symmetric algorithms. (So, for instance,the hardware functionality might ensure that a key used for encryptingmessages from user A to user B cannot be used for encrypting messages in the opposite direction.) For public key systems this concept of unidirectional keys is automatically satisfied. However,when the encrypting key is made public, the exposure of this key means that the deciphering key is only safe from compromise when the keys are very large. If, on the other hand, both keys were kept secret then it might be possible to use much smallerkeys. In this paper we investigate ways of using the primitives of an RSA public key cryptosystem in a symmetric key 'setting'i.e. where neither key is made public.  相似文献   

15.
At Crypto ’85, Desmedt and Odlyzko described a chosen-ciphertext attack against plain RSA encryption. The technique can also be applied to RSA signatures and enables an existential forgery under a chosen-message attack. The potential of this attack remained untapped until a twitch in the technique made it effective against two very popular RSA signature standards, namely iso/iec 9796-1 and iso/iec 9796-2. Following these attacks, iso/iec 9796-1 was withdrawn and ISO/IEC 9796-2 amended. In this paper, we explain in detail Desmedt and Odlyzko’s attack as well as its application to the cryptanalysis of iso/iec 9796-2. AMS Classification: 11T71, 14G50, 94A60  相似文献   

16.
We give a polynomial time probabilistic algorithm that constructs an RSA modulus M=pl, where p and l are two n-bit primes, which has about n/2 bits, on certain positions, prescribed in advance. Although the number of prescribed bits is less than in other constructions, this algorithm can be rigorously analyzed while the other approaches remain heuristic. The proof is based on bounds of exponential sums. We also show that this algorithm can be used for finding 2n-bit RSA moduli whose binary expansions are of Hamming weight about 3n/4. Finally, similar arguments are also applied to smooth integers.  相似文献   

17.
We show that using character sum estimates due to H. Iwaniec leads to an improvement of recent results about the distribution and finding RSA moduli M=pl, where p and l are primes, with prescribed bit patterns. We are now able to specify about n bits instead of about n/2 bits as in the previous work. We also show that the same result of H. Iwaniec can be used to obtain an unconditional version of a combinatorial result of W. de Launey and D. Gordon that was originally derived under the Extended Riemann Hypothesis.  相似文献   

18.
This paper proposes three new attacks. In the first attack we consider the class of the public exponents satisfying an equation e X-N Y +(ap~r+ bq~r)Y = Z for suitably small positive integers a, b. Applying continued fractions we show thatY/Xcan be recovered among the convergents of the continued fraction expansion of e/N. Moreover, we show that the number of such exponents is at least N~(2/(r+1)-ε)where ε≥ 0 is arbitrarily small for large N. The second and third attacks works upon k RSA public keys(N_i, e_i) when there exist k relations of the form e_ix-N_iy_i +(ap_i~r + bq_i~r )y_i = z_i or of the form e_ix_i-N_iy +(ap_i~r + bq_i~r )y = z_i and the parameters x, x_i, y, y_i, z_i are suitably small in terms of the prime factors of the moduli. We apply the LLL algorithm, and show that our strategy enables us to simultaneously factor k prime power RSA moduli.  相似文献   

19.
VaR风险控制体系的建立与应用   总被引:3,自引:0,他引:3  
目前VaR作为一种新的风险控制工具得到越来越广泛的应用,投资组合理论则一直沿用经典的σ2风险控制体系,虽说有人已经将VaR引入到了投资组合应用中来,但其风险控制尚未脱离对σ2的分解.将在引入股票相对价格的基础上构建了VaR风险控制体系,将投资风险VaRP分解为大盘指数风险VaRI和股票相对价格的风险VaRS之和,并给出了此风险控制体系在投资组合方面的基本应用方法.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号