期刊文献+

oracle数据库中RSA算法的应用 被引量:1

Application of RSA Algorithm in Oracle Database
下载PDF
导出
摘要 随着计算机网络和Internet的发展,全球信息化己成为人类社会发展的大趋势。在今天的信息社会里,科学技术的研究和发展十分快速,数据安全保密问题也日益突出。RSA作为非对称加密算法,算法强度复杂、安全性依赖于算法与密钥,能够很好地将信息进行加密。而人们通常对加密后的内容摸不清头绪,更直观明白的是加密前的内容,因此,解密工作很有必要。解密需要对应相应的解密算法,找到相应的解密密钥,并且在很短的时间内将此工作完成,是十分困难的事情,而又快又准进行解密工作,更是难上加难,因此解密也是非常有技术含量的事情。 With the development of computer network and Internet,the global informatization has become the general trend of human society development. In today's information society,the research and development of science and technology is very fast,and the problem of data security and security is becoming increasingly prominent.RSA,as an asymmetric encryption algorithm,has complex strength and security. It relies on algorithms and keys that can encrypt the information well. People usually do not understand the encrypted content,and what is more intuitive is the content before encryption. Therefore,decryption is necessary. The corresponding decryption requires the corresponding decryption algorithm,finds the corresponding decryption key and this work should be completed in a very short period of time,so it is very difficult thing,and quickly and accurately to decrypt is even more difficult. Therefore,the decryption is also very technical matter.
作者 任彦燕
出处 《山西电子技术》 2017年第6期66-67,76,共3页 Shanxi Electronic Technology
关键词 数据安全 RSA 解密 data security RSA decryption
  • 相关文献

参考文献1

二级参考文献9

  • 1王贵林,卿斯汉.一个证实数字签名方案的安全缺陷[J].软件学报,2004,15(5):752-756. 被引量:18
  • 2Okamoto T.Designated Confirmer Signatures and Public-key Encryption Are Equivalent[C].Proc.of the Advances in Crypto-raphy,LNCS 839.Berlin:Springer-Verlag,1994:61-74.
  • 3Michels M,Stadler M.Generic Constructions for Secure and Efficient Confirmer Signature Schemes[C].Proc.of the Advances in Cryptography,LNCS 1403.Berlin:Springer-Verlag,1998:406-421.
  • 4Camenisch J,Michels M.Confirmer Signature Schemes Secure Against Adaptive Adversaries (Extended Abstract)[C].Proc.of the Advances in Cryptography,LNCS 1807.Berlin:Springer-Verlag,2000:243-258.
  • 5Rivest R,Shamir A,Adleman L.A Method of Obtaining Digital Signatures and Public-key Cryptosystems[J].Communications of the ACM,1978,21 (2):120-126.
  • 6Chaum D,Van Antwerpen H.Undeniable Signatures[C].Proc.of the Advances in Cryptography-CRYPTO'89,LNCS 435.Berlin:Springer-Verlag,1989:212-216.
  • 7National Institute of Standard and Technology.Secure Hash Standard[S].NIST FIPS PUB 180-1,Washington:Department of Commerce,NIST,http://csrc.nist.gov/cryptval/html,1995.
  • 8Chaum D.Designated Confirmer Signatures[C].Proc.of the Advances in Cryptography,LNCS 950.Berlin:Springer-Verlag,1994:86-89.
  • 9王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J].软件学报,2003,14(3):588-593. 被引量:43

共引文献5

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部