期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Symmetric-key cryptosystem with DNA technology 被引量:14
1
作者 LU MingXin LAI XueJia +1 位作者 XIAO GuoZhen QIN Lei 《Science in China(Series F)》 2007年第3期324-333,共10页
DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into crypto... DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC, both encryption and decryption keys are formed by DNA probes, while its ciphertext is embedded in a specially designed DNA chip (microarray). The security of this system is mainly rooted in difficult biology processes and problems, rather than conventional computing technology, thus it is unaffected by changes from the attack of the coming quantum computer. The encryption process is a fabrication of a specially designed DNA chip and the decryption process is the DNA hybridization. In DNASC, billions of DNA probes are hybridized and identified at the same time, thus the decryption process is conducted in a massive, parallel way. The great potential in vast parallelism computation and the extraordinary information density of DNA are displayed in DNASC to some degree. 展开更多
关键词 symmetric-key encryption DNA cryptography DNA computing
原文传递
Reference Encryption for Access Right Segregation and Domain Representation
2
作者 Lanfranco Lopriore 《Journal of Information Security》 2012年第2期86-90,共5页
With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solu... With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solution based on protected references, each consisting of the identifier of an object and the specification of a collection of access rights for this object. The protection system associates an encryption key with each object and each domain. A protected reference for a given object is always part of a domain, and is stored in memory in the ciphertext form that results from application of a double encryption using both the object key and the domain key. 展开更多
关键词 ACCESS RIGHT DOMAIN Protection symmetric-key CRYPTOGRAPHY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部