期刊文献+

DES与AES数据加密算法探讨 被引量:7

Discussion on DES and AES Data Encryption Algorithm
下载PDF
导出
摘要 当今信息安全日趋重要,计算机加密技术被广泛应用。DES数据加密算法作为第一个官方认定的数据加密标准,对计算机密码学和数据通信的发展起到了巨大的作用。本文对当今主流的加密算法DES与AES进行概括性的介绍,并对两种算法进行测试分析,其结果可为使用者提供参考。 The security of information is becoming more and more important today. The DES data encryption algorithm made a great contribution to the development of computer cryptography and data communication as the first official identified Data Encryption Standard. The paper makes a general introduction of DES and AES data encryption algorithm, and make testing and analysis of two kinds of algorithms. We hope this result can provide reference to every user.
作者 隋涛
出处 《湖北第二师范学院学报》 2013年第8期66-68,共3页 Journal of Hubei University of Education
关键词 计算机加密算法 DES算法 AES算法 computer encryption algorithm DES AES
  • 相关文献

参考文献5

二级参考文献11

  • 1[美]BruceSchneier.吴世忠 祝世雄 张文正 等译.应用密码学[M].北京:机械工业出版社,2000..
  • 2SchneierB 吴世忠译.应用密码学[M].北京:机械工业出版社,2000.181-182.
  • 3DAEMEN J, RJMEN V. AES Proposal.. Rijndael [DB/OL] httpL//citeseer. nj. nec. com/daemen98nes. html.1999- 09 - 03/2003- 10- 26.
  • 4Daemen J, Rijrnen J. AES Proposal, Rijndael, Version[EB/OL]. http://www. esat. kuleuvan. be/~ riindael,1999-10-05.
  • 5Courtois N T,Pieprayk J. Cryptanalysis of Block ciphers with overdefined Systems of Equations [A]. AsisCrypt2002[C]. Berlin :Sprnger-Verlag, 20002. 267- 287.
  • 6Murphy s, Robshaw M. Essential Algebraic Structure Within the AES [ A ]. Advances in Crytology:CRYPTO'02[C]. Berlin :Springer-Verlag, 2002.1 - 16.
  • 7Knudsen L R,Wagner D. Integral cryptanalysis (extended abatract). In:Proceedings of Fast Software EncryptionFSE'02,Leuven,Belgium ,February, 2002
  • 8Lucks S. Attacking seven rounds of Rijndael under 192-bit and 256-bit keys[A]. In:Proceedings of the Third Advanced Encryption Stadard Conference, [C ]. New York, USA, April, 2000
  • 9Murphy S,Robshaw M J B. Essential algebraic Structure within the AES [A]. In: Proceedings of Crypto'02 [C],Santa Barbara, California, USA, 2002.
  • 10马银华,刘明生,王书海,左锦宇.提高DES加密强度的密钥选位方法研究[J].计算机工程,2000,26(3):68-69. 被引量:9

共引文献90

同被引文献45

引证文献7

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部