期刊文献+

基于AES和RSA的网络数据加密方案 被引量:8

Network data encryption scheme based on AES and RSA
下载PDF
导出
摘要 随着计算机应用广度与深度的增加,信息安全问题越来越受到广泛关注,为确保网络传输数据的安全性,保障信息安全,网络数据加密技术获得较快发展,新型的数据加密标准AES逐渐取代传统的DES数据加密标准。在认知AES与RSA加密算法及其实现的基础上,分析两者优缺点,提出基于AES和RSA的网络数据加密方案,以实现对网络传输数据的加密保护,保障信息安全,实现其应用价值。 With the increase of computer application in breadth and depth,the problem of information security is received extensive attention. How to ensure the security of the network transmission data and information security,the network data en-cryption technology has gained rapid development,the traditional DES data encryption standard is gradually replaced by the new AES data encryption standard. Based on the cognition of AES and RSA encryption algorithm and its realization,the advantages and disadvantages of the two encryption algorithms are analyzed,the network data encryption scheme is proposed based on AES and RSA to implement the encryption protect of network transmission data and ensure the information security,its application value is realized.
作者 罗光明
出处 《现代电子技术》 北大核心 2015年第9期87-89,95,共4页 Modern Electronics Technique
关键词 AES RSA 网络数据 加密方案 AES RSA network data encryption scheme
  • 相关文献

参考文献8

二级参考文献47

  • 1张述平,杨国明,时武略.数字加密技术与应用[J].福建电脑,2006,22(7):44-45. 被引量:3
  • 2王化丰,张桂香,邵勇.基于Logistic映射的混沌流密码设计[J].计算机工程,2007,33(10):164-165. 被引量:13
  • 3Weng Yifang, Zheng Rong, Chen Yi. A Self-synchronous Stream Cipher based on Composite Discrete Chaos[ C ]. Proceedings of 8th IEEE International Conference on Cognitive Informatics, 2009. 210 -214.
  • 4蒋波.一种基于三重DES和RSA的综合加密方案[J].微计算机信息,2007(18):52-53. 被引量:17
  • 5陈谊.DVE关键技术及其在复杂系统仿真中的应用研究.通信学报,2004,25(4):124-131.
  • 6INTANAGONWlWAT C, GOVINDAN R, ESTRIN D, et al. Directed diffusion for wireless sensor networking[J]. IEEE/ACM Transactions on Networking, 2003, 11 ( 1):2-16.
  • 7BARTOSZ P, DAWN S, ADRIAN E SIA:secure information aggrega- tion in sensor networks[A]. Proceedings of ACM SenSys Confer- ence[C]. Los Angeles, USA, 2003.255-265.
  • 8WAGNER D. Resilient aggregation in sensor networks[A]. Proceed- ings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks[C]. Washington, DC, USA, 2004.78-87.
  • 9CAM H, OZDEMIR S. Energy-efficient security protocol for wireless sensor networks[A]. Proceedings of IEEE VTC Fall 2003 Confer- ence[C]. New York, USA, 2003.2981-2984.
  • 10ACHARYA M, GIRAO J. Secure comparison of encrypted data in wireless sensor networks[A]. 3rd International Symposium on Model- ing and Optimization in Mobile, Ad Hoc, and Wireless Networks[C]. Trentino, Italy, 2005.47-53.

共引文献14

同被引文献57

引证文献8

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部