[1]陈春玲,齐年强,余瀚. RSA算法的研究和改进[J].计算机技术与发展,2016,26(08):48-51.
 CHEN Chun-ling,QI Nian-qiang,YU Han. Research and Improvement of RSA Algorithm[J].,2016,26(08):48-51.
点击复制

 RSA算法的研究和改进()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年08期
页码:
48-51
栏目:
智能、算法、系统工程
出版日期:
2016-08-10

文章信息/Info

Title:
 Research and Improvement of RSA Algorithm
文章编号:
1673-629X(2016)08-0048-04
作者:
 陈春玲齐年强余瀚
 南京邮电大学 计算机学院
Author(s):
 CHEN Chun-lingQI Nian-qiangYU Han
关键词:
 RSA 安全性公钥私钥时间
Keywords:
 RSAsecuritypublic keyprivate keytime
分类号:
TP301.6
文献标志码:
A
摘要:
 为了提高RSA算法的安全性,避免RSA密码体制中的模n被因子分解,导致私钥d泄露,采取消除密钥中n的分布方法以及对三个因素因子的加密方法。采用消除密钥中n的分布方法可以成功避免在公布的公钥和保密的私钥中出现n,防止攻击者通过因子分解法分解出公钥中n的因子,推导出解密密钥d;采用三因子的加密算法,即使攻击者知道了渍( n),但对于分解n的三个素数没有一个具体的公式,所以加大了分解的困难性,并且因为大素数适当减小了位数,降低了计算量。实验结果表明,该方法提高了RSA算法的安全性,时间复杂度与传统RSA算法相同。
Abstract:
 In order to improve the security of the RSA algorithm and avoid the mathematical factorization of the module n in RSA cryto-system which leads to private key d leaking,the method of eliminating the distribution of n and three-factor encryption algorithm are a-dopted. The results show that the former can successfully avoid the appearance of n in public key and private key,preventing the attacter from using the method of mathematical factorization to get the n factors and deducing the decryption key d . Adopting the latter,even if the attacker knows theφ( n) ,but it doesn’ t have a specific formula to break down the three prime number for decomposition of n . So the difficulty of factoring increases and the computation is reduced due to the reduction of large prime numbers’ s bits. The experimental re-sults indicate that the method increases the security of the RSA algorithm and its time complexity is same to the traditional algorithm.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(08):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(08):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(08):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(08):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(08):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(08):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(08):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(08):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(08):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(08):47.
[11]蒋华[] [],潘文吉[],胡荣磊[]. 基于环签名的SIP认证方案设计[J].计算机技术与发展,2016,26(03):140.
 JIANG Hua[][],PAN Wen-ji[],HU Rong-lei[]. Design of SIP Authentication Scheme Based on Ring Signature[J].,2016,26(08):140.
[12]宁卓,石伟,孙知信. 基于格的第三方移动支付加密模型ECC-NTRU[J].计算机技术与发展,2017,27(01):84.
 NING Zhuo,SHI We,SUN Zhi-xin. A Secure M-payment Model Combing NTRU with ECC[J].,2017,27(08):84.

更新日期/Last Update: 2016-09-29