首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到10条相似文献,搜索用时 70 毫秒
1.
为了提高图像的加密效率和安全性,提出一种基于指纹密钥的光学双图像加密方法。首先,两幅待加密图像分别经置于输入平面和Gyrator变换域平面的两块指纹随机相位板的调制后,再经1次Gyrator变换,然后将Gyrator变换后的结果合成为一幅复振幅图像。最后,对得到的复振幅图像进行相位截断和振幅截断操作,得到加密图像和两个相位密钥。解密时,指纹、振幅截断得到的相位密钥、混沌系统的初值和控制参数、Gyrator变换参数均可作为解密过程中的密钥。在所提方法中,由于密钥与用户身份关联,加密系统的安全性得以进一步提高。此外,由于无需传输相位板密钥,密钥管理更为便捷。数值模拟结果表明,所提加密方法切实可行,具有较高的安全性和鲁棒性。  相似文献   

2.
The emergence of quantum computer will threaten the security of existing public-key cryptosystems,including the Diffie Hellman key exchange protocol,encryption scheme and etc,and it makes the study of resistant quantum cryptography very urgent.This motivate us to design a new key exchange protocol and encryption scheme in this paper.Firstly,some acknowledged mathematical problems was introduced,such as ergodic matrix problem and tensor decomposition problem,the two problems have been proved to NPC hard.From the computational complexity prospective,NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them.From the algebraic structures prospective,non-commutative cryptography has been considered to resist quantum.The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures,so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures.Secondly,a new problem was constructed based on the introduced problems in this paper,then a key exchange protocol and a public key encryption scheme were proposed based on it.Finally the security analysis,efficiency,recommended parameters,performance evaluation and etc.were also been given.The two schemes has the following characteristics,provable security,security bits can be scalable,to achieve high efficiency,quantum resistance,and etc.  相似文献   

3.
Due to the ubiquitous open air links and complex electromagnetic environment in the satellite communications,how to ensure the security and reliability of the information through the satellite communications is an urgent problem.This paper combines the AES(Advanced Encryption Standard) with LDPC(Low Density Parity Check Code) to design a secure and reliable error correction method — SEEC(Satellite Encryption and Error Correction).This method selects the LDPC codes,which is suitable for satellite communications,and uses the AES round key to control the encoding process,at the same time,proposes a new algorithm of round key generation.Based on a fairly good property in error correction in satellite communications,the method improves the security of the system,achieves a shorter key size,and then makes the key management easier.Eventually,the method shows a great error correction capability and encryption effect by the MATLAB simulation.  相似文献   

4.
基于身份加密机制的光学加密密钥系统   总被引:1,自引:0,他引:1  
徐宁  杨庚 《通信学报》2012,(4):121-128
从非对称的基于身份密钥体系出发,提出了一种适用于光学加密系统密钥管理的方法.首先简要介绍了基于身份密钥体系,特别是Boneh-Franklin算法,然后针对光学加密参数安全传输问题,给出了非对称密钥系统的密钥生成、分配、更新等算法,并从方法的复杂性、安全性等方面对算法进行了分析,最后对二维码加密问题进行了仿真,结果表明算法是正确有效和安全的  相似文献   

5.
本文在分析现有数字信息系统加密技术的基础上,针对用户需求,设计了一套基于指纹特征的数字信息加密系统,并采用“随机码”技术实现“一次一密”的加密算法,进一步提高了系统的安全性。文章详细论述了系统组成和加密算法,分析了其功能、性能特点,并对其应用前景进行了讨论。  相似文献   

6.
量子信息论的研究是量子理论和经典信息论的一个重要交叉领域,量子位不可复制且量子纠缠态不可区分的量子信息特征提供了一种理论上绝对安全的加密术一量子加密。本文对量子必钥分发协议进行了研究,利用点点间量子密钥分发协议和基于传统密钥托管方案,提出多用户、多控制中心网络的环境下量子密钥的分发过程。  相似文献   

7.
杨理  向憧  李宝 《中国通信》2013,10(2):19-26
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme’s security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart’s attack.  相似文献   

8.
This paper reviews and analyses various simplified-RFID (Radio Frequency Identification) indoor location systems, and proposes an improved implementation based on the propagation channel "fingerprinting" principle. The focus of the design aims to provide accurate location estimation, while minimising infrastructural requirements. The proposed approach is based on the LANDMARC (Indoor Location Sensing Using Active RFID) with Virtual Reference tags (VIRE) and implemented with dynamic linear interpolation and ...  相似文献   

9.
原有的云存储模式所存在的问题已经困扰行业多年,在静态数据加密存储的过程中,只有实现真正意义上的数据私有化才能保证数据的安全,保障数据拥有者的利益。针对云存储应用中用户数据安全存储需求的提高,以Amazon S3(simple storage service)为例分析当前云存储模式下静态数据安全存在的普遍问题,设计了一套新的云端静态数据加密存储方案——分离密钥存储服务(separated key S3)解决方案,设计了新的密钥管理方法,从技术上实现了云端静态数据的安全,最后对该方案的数据安全性进行了分析。  相似文献   

10.
数据加密标准(DES)算法是典型的分组对称式私钥密码机制,在加密学研究领域中占据着十分重要的地位,且对于以融合网络和物联网为代表的下一代网络中各类嵌入式加密应用而言具有很好的适用性。本文简单介绍了DES算法原理及其安全性,主要针对DES算法易受穷举攻击法的不足,依据DES算法本身的特点提出了改进措施,采用双密钥交叉加密,提高加密过程中密钥的复杂度,增强抵抗攻击的能力,达到对DES算法安全性的改善。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号