期刊文献+

非对称加密算法在身份认证中的应用研究 被引量:30

Application Research of Asymmetric Encryption Algorithm in Identity Authentication
下载PDF
导出
摘要 随着计算机网络以及智能终端应用的不断普及,特别是网络金融以及二维码的快速普及,信息安全问题越来越突出。文中研究了对称加密算法数据加密标准DES,主要研究了公开密钥基础设施体系PKI,这是确保信息在传输过程中安全性的第三方平台,它主要负责颁发带有CA中心数字签名的证书以及管理RSA算法中需要的公钥和私钥;研究了几种非对称加密算法并分析了它们的性能;重点研究了CEE中基于有限域上的椭圆曲线离散对数算法和RSA非对称加密算法,提出了用私钥加密公钥解密方案来解决信息真伪鉴别即身份认证问题,编程实现了RSA的公钥生成以及信息的加密和解密,主要实现了RSA密钥生成器模块、加密模块和解密模块,设计了加解密图形界面,完成了文件路径加密和整个文件的加密。实验结果表明RSA算法的可行性和安全性是较高的。 With the popularization of computer network and intelligent terminal application,especially network finance and QR code,the problem of information security is becoming more and more prominent.DES,the data encryption standard of symmetric encryption algorithm,is studied,and PKI,the public key infrastructure system,is mainly studied,which is a third-party platform to ensure the security of information during transmission.It is mainly responsible for issuing certificates with CA central digital signatures and managing the public and private keys required in RSA algorithms.Several asymmetric encryption algorithms are studied and their performance is analyzed.We focus on the elliptic curve discrete logarithm algorithm and RSA asymmetric encryption algorithm based on the finite domain in CEE,and propose a private key encryption public key decryption scheme to solve the problem of authentication of authenticity of information,namely identity authentication.The programming implements RSA's public key generation and encryption and decryption of information.It mainly implements three modules:RSA key generator module,encryption module,and decryption module.A encryption and decryption graphical interface is designed to complete file path encryption and the entire file encryption.Experiment shows that RSA algorithm is feasible and safe.
作者 王煜 朱明 夏演 WANG Yu;ZHU Ming;XIA Yan(School of Electronics and Information Engineering,Anhui University,Hefei 230601,China;School of Computer Science and Engineering,Anhui University of Science and Technology,Huainan 232001,China)
出处 《计算机技术与发展》 2020年第1期94-98,共5页 Computer Technology and Development
基金 国家自然科学基金(61501003)
关键词 身份认证 PKI公钥体系 非对称加密 RSA算法 identity authentication PKI public key system asymmetric encryption RSA algorithm
  • 相关文献

参考文献9

二级参考文献42

  • 1庚桂平.二维条码技术及主要标准介绍[J].航空标准化与质量,2008(4):43-48. 被引量:9
  • 2曹建国,王丹,王威.基于RSA公钥密码安全性的研究[J].计算机技术与发展,2007,17(1):172-173. 被引量:22
  • 3[美]SchneierB 吴世忠 祝世雄 张文政译.应用密码学协议,算法与C源程序[M].北京:机械工业出版社,2000..
  • 4[美]StallingsW 杨明 胥光辉 齐望东译.密码编码学与网络安全原理与实践(第二版)[M].北京:电子工业出版社,2001..
  • 5Koc C K,Acar T,Burton S.Analyzing and Comparing Montgomery Multiplication Algorithms[J].IEEE Micro,1996,16(3):26-33.
  • 6RIVEST R, SHAMIR A, ALDEMAN L. A method for obtaining digital signatures and public-key cryptosystems [ J]. Communications of the ACM, 1978, 21(2) : 120 - 126.
  • 7COLLINS T, HOPKINS D, LANGFORD S, et al. Public key cryptographic apparatus and method: US, 4218582 [ P]. 1997.
  • 8BONEH D, SHACHAM H. Fast variants of RSA [ J]. RSA Laboratories Crypto-bytes, 2002, 5(1): 1-8.
  • 9MATSUMOTO T, KATO K. Speeding up secret computations with insecure auxiliary devices [ C] //Proceedings of the gth Annual International Crypto Conference on Advances in Cryptology. London: Springer-Verlag, 1988:497-506.
  • 10PAXSON V, SOMMER R. An architecture for exploiting multi-core processors to parallelize network intrusion prevention [ C]//Proceedings of the IEEE Saruoff Symposium. Washington, DC: IEEE Computer Society, 2007:1 -7.

共引文献71

同被引文献233

引证文献30

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部