[1]陈延利[],边巴旺堆[],郭晋丞[],等. 应急通信的安全响应体系研究[J].计算机技术与发展,2015,25(04):108-111.
 CHEN Yan-li[],BIAN Ba-wangdui[],GUO Jin-cheng[],et al. Research on Security Response System of Communication Emergency[J].,2015,25(04):108-111.
点击复制

 应急通信的安全响应体系研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年04期
页码:
108-111
栏目:
安全与防范
出版日期:
2015-04-10

文章信息/Info

Title:
 Research on Security Response System of Communication Emergency
文章编号:
1673-629X(2015)04-0108-04
作者:
 陈延利[1]边巴旺堆[1]郭晋丞[2] 李鹏[3]
 1.西藏大学 工学院 电子信息工程系;2.成都国腾电子技术股份有限公司;3.国家202电台
Author(s):
 CHEN Yan-li[1] BIAN Ba-wangdui[1] GUO Jin-cheng[2] LI Peng[3]
关键词:
 应急响应应急通信信息安全中国剩余定理
Keywords:
 emergency response emergency communication information security CRT
分类号:
TN918.91
文献标志码:
A
摘要:
 文中基于中国剩余定理在广播方面的优势,通过对应急响应体系标准和架构需求的分析,将中国剩余定理用于应急响应体系中对信息进行组合,二次加密。加密时的模数是多项式随机数产生器实时产生的随机数,这种安全体系试图通过两种方式提高安全性。一方面通过中国剩余定理进行二次加密,另一方面每次通信时模数随机实时产生。应急体系以期达到抵抗穷尽攻击和时间上的差异化攻击。经过一系列的论证,应急通信的安全响应体系可以有效地为应急通信系统的安全性提供保障。
Abstract:
 Based on the advantages of the Chinese Remainder Theorem ( CRT) in broadcasting,through the analysis on the standards and frameworks of emergency response,CRT is applied to conduct the information combination and twice encryption. The module is genera-ted in polynomial time in real-time and randomly. The security system attempts to make itself more security by two ways. On the one hand,it encrypts ciphertext by CRT,on the other hand,module is generated randomly and in real-time. It expects to resist exhaustive at-tack and differentiation time attack. After a series of arguments,the security response system of emergency communication can be effec-tive to provide emergency communication system with protection.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(04):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(04):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(04):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(04):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(04):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(04):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(04):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(04):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(04):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(04):47.

更新日期/Last Update: 2015-06-04