[1]王 煜,朱 明,夏 演.非对称加密算法在身份认证中的应用研究[J].计算机技术与发展,2020,30(01):94-98.[doi:10. 3969 / j. issn. 1673-629X. 2020. 01. 017]
 WANG Yu,ZHU Ming,XIA Yan.Application Research of Asymmetric Encryption Algorithm in Identity Authentication[J].Computer Technology and Development,2020,30(01):94-98.[doi:10. 3969 / j. issn. 1673-629X. 2020. 01. 017]
点击复制

非对称加密算法在身份认证中的应用研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
30
期数:
2020年01期
页码:
94-98
栏目:
安全与防范
出版日期:
2020-01-10

文章信息/Info

Title:
Application Research of Asymmetric Encryption Algorithm in Identity Authentication
文章编号:
1673-629X(2020)01-0094-05
作者:
王 煜1 朱 明1 夏 演2
1. 安徽大学 电子信息工程学院,安徽 合肥 230601; 2. 安徽理工大学 计算机科学与工程学院,安徽 淮南 232001
Author(s):
WANG Yu 1 ZHU Ming 1 XIA Yan 2
1. School of Electronics and Information Engineering,Anhui University,Hefei 230601,China; 2. School of Computer Science and Engineering,Anhui University of Science and Technology,Huainan 232001,China
关键词:
身份认证PKI 公钥体系非对称加密RSA 算法
Keywords:
identity authenticationPKI public key systemasymmetric encryptionRSA algorithm
分类号:
TP39
DOI:
10. 3969 / j. issn. 1673-629X. 2020. 01. 017
摘要:
随着计算机网络以及智能终端应用的不断普及,特别是网络金融以及二维码的快速普及,信息安全问题越来越突出。 文中研究了对称加密算法数据加密标准 DES,主要研究了公开密钥基础设施体系 PKI,这是确保信息在传输过程中安全性的第三方平台,它主要负责颁发带有 CA 中心数字签名的证书以及管理 RSA 算法中需要的公钥和私钥;研究了几种非对称加密算法并分析了它们的性能;重点研究了 CEE 中基于有限域上的椭圆曲线离散对数算法和 RSA 非对称加密算法,提出了用私钥加密公钥解密方案来解决信息真伪鉴别即身份认证问题,编程实现了 RSA 的公钥生成以及信息的加密和解密,主要实现了 RSA 密钥生成器模块、加密模块和解密模块,设计了加解密图形界面,完成了文件路径加密和整个文件的加密。 实验结果表明 RSA 算法的可行性和安全性是较高的。
Abstract:
With the popularization of computer network and intelligent terminal application,especially network finance and QR code,the problem of information security is becoming more and more prominent. DES,the data encryption standard of symmetric encryption algorithm,is studied,and PKI,the public key infrastructure system,is mainly studied, which is a third-party platform to ensure the security of information during transmission. It is mainly responsible for issuing certificates with CA central digital signatures and managing the public and private keys required in RSA algorithms. Several asymmetric encryption algorithms are studied and their performance is analyzed. We focus on the elliptic curve discrete logarithm algorithm and RSA asymmetric encryption algorithm based on the finite domain in CEE, and propose a private key encryption public key decryption scheme to solve the problem of authentication of authenticity of information,namely identity authentication. The programming implements RSA’s public key generation and encryption and decryption of information. It mainly implements three modules:RSA key generator module,encryption module,and decryption module. A encryption and decryption graphical interface is designed to complete file path encryption and the entire file encryption. Experiment shows that RSA algorithm is feasible and safe.

相似文献/References:

[1]田志英 廖晓群 赵安新.校园网认证计费系统的研究与实现[J].计算机技术与发展,2010,(05):202.
 TIAN Zhi-ying,LIAO Xiao-qun,ZHAO An-xin.Research and Implementation of Campus Network Authentication and Accounting System[J].Computer Technology and Development,2010,(01):202.
[2]万久士 李翔 林祥.基于JSSh实现身份认证网站信息采集[J].计算机技术与发展,2009,(10):156.
 WAN Jiu-shi,LI Xiang,LIN Xiang.Information Collection of Website which Achieve Identity Authentication Based on JSSh[J].Computer Technology and Development,2009,(01):156.
[3]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
 HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].Computer Technology and Development,2009,(01):181.
[4]吕武玲 黎忠文.SIP中基于身份认证的安全机制研究[J].计算机技术与发展,2009,(02):158.
 LU Wu-ling,LI Zhong-wen.Research on Identity- Based Authentication in SIP[J].Computer Technology and Development,2009,(01):158.
[5]孙印杰 陈智芳 王敏 洪力.基于指纹和数字水印的网络身份认证系统研究[J].计算机技术与发展,2008,(04):147.
 SUN Yin-jie,CHEN Zhi-fang,WANG Min,et al.Research of Authentication System Based on Fingerprint and Digital Watermarking[J].Computer Technology and Development,2008,(01):147.
[6]黄叶珏 陈勤.Web网站统一口令认证系统的设计与实现[J].计算机技术与发展,2007,(06):163.
 HUANG Ye-jue,CHEN Qin.Design and Implementation of Web Site Universal Password Authentication System[J].Computer Technology and Development,2007,(01):163.
[7]徐小平 尹颖禹.基于数字签名的身份认证模型的一种方案[J].计算机技术与发展,2006,(02):220.
 XU Xiao-ping,YIN Ying-yu.A Model Scheme for Identity Verification Based on Digital Signature[J].Computer Technology and Development,2006,(01):220.
[8]范宏生 叶震 侯保花.基于公钥密码体制的Kerberos协议的改进[J].计算机技术与发展,2006,(04):224.
 FAN Hong-sheng,YE Zhen,HOU Bao-hua.Improvement of Kerberos Protocol Based on Public Key Cryptosystem[J].Computer Technology and Development,2006,(01):224.
[9]刘建明 贺占庄.硬盘加密和身份认证的硬件实现[J].计算机技术与发展,2006,(06):139.
 LIU Jian-ming,HE Zhan-zhuang.A Hardware Design of Harddisk Encryption and Identification[J].Computer Technology and Development,2006,(01):139.
[10]张球河 李也白 王宇鸽 尹天明.电子政务资源安全管理的研究与应用[J].计算机技术与发展,2006,(09):222.
 ZHANG Qiu-he,LI Ye-bai,WANG Yu-ge,et al.Research and Application of E- Government Resource Security Management[J].Computer Technology and Development,2006,(01):222.

更新日期/Last Update: 2020-01-10