[1]王印明 李阳.一种基于DES,RSA的随机加密算法[J].计算机技术与发展,2012,(04):235-237.
 WANG Yin-ming,LI Yang.A Random Encryption Algorithm Based on DES,RSA Algorithm[J].,2012,(04):235-237.
点击复制

一种基于DES,RSA的随机加密算法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年04期
页码:
235-237
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
A Random Encryption Algorithm Based on DES,RSA Algorithm
文章编号:
1673-629X(2012)04-0235-03
作者:
王印明 李阳
兰州交通大学电子与信息工程学院
Author(s):
WANG Yin-mingLI Yang
School of Electronics and Information Engineering,Lanzhou Jiaotong University
关键词:
数据加密加密算法DES算法RSA算法随机加密算法
Keywords:
data encryption encryption algorithm DES algorithm RSA algorithm random encryption algorithm
分类号:
TP311
文献标志码:
A
摘要:
随着Internet的快速发展,对网络中信息传输的安全性要求越来越高。加密技术是网络安全技术的基石。目前典型的加密算法各有优缺点,如DES算法速度快,但安全性较低且密钥长度固定;RSA算法安全性高,密钥长度不固定,但运算速度较慢。文中提出基于DES,RSA的随机加密算法,可根据选取规则来选择DES或RSA算法来加密信息,然后将算法标记、密钥长度、密钥及密文信息组织成新的信息进行传输。这样既能快速地对数据进行加解密,又能很好地解决密钥分配问题,在保证安全性的前提下,也提高了算法效率
Abstract:
With the rapid development of Internet,the security of information transformation in the network has become more and more important.Encryption technology is the cornerstone of network security technology.At present,the typical encryption algorithms have advantages and disadvantages,such as,DES algorithm is fast,but its security is low and the length of key is fixed.RSA algorithm is safer,and its length of key is not fixed,but it is slower.In this paper,the random encryption algorithm based on DES,RSA algorithm chooses DES or RSA algorithm to encrypt information according to the selection rules,and then organizes the flag of algorithm,the length of key,key and the ciphertext information into the new information to transmit.This can not only encrypt and decrypt the data rapidly,but also be a good solution to key distribution problem,and improve the efficiency of the algorithm under the promise of security

相似文献/References:

[1]刘涛 胡佳伟.校园网络环境下数据加密的研究与设计[J].计算机技术与发展,2008,(01):171.
 LIU Tao,HU Jia-wei.Research and Design of Data Encryption Based on Campus Network Environment[J].,2008,(04):171.
[2]安培 徐江峰.国税信息化中网络安全问题研究[J].计算机技术与发展,2007,(11):149.
 AN Pei,XU Jiang-feng.Research on Security of Internal Revenue Service Network System[J].,2007,(04):149.
[3]刘建明 贺占庄.硬盘加密和身份认证的硬件实现[J].计算机技术与发展,2006,(06):139.
 LIU Jian-ming,HE Zhan-zhuang.A Hardware Design of Harddisk Encryption and Identification[J].,2006,(04):139.
[4]陈良臣 芦东昕 李春葆[].Euclid算法及扩展在密码学中的研究和应用[J].计算机技术与发展,2006,(11):156.
 CHEN Liang-chen,LU Dong-xin,LI Chun-bao,et al.Research and Application of Euclid Algorithm and Extended Euclid Algorithm[J].,2006,(04):156.
[5]吴杨 矫文成 潘艳辉 李华.卫星网络加密算法安全性分析与攻击建模[J].计算机技术与发展,2011,(06):140.
 WU Yang,JIAO Wen-cheng,PAN Yan-hui,et al.Analysis of Cipher Security and Cipher Attack Modeling in Satellite Network[J].,2011,(04):140.
[6]陈鹏,廖一鹏.手机SIM卡售卡控件的设计与实现[J].计算机技术与发展,2013,(11):169.
 CHEN Peng,LIAO Yi-peng.Design and Realization of SIM Card Sale Control[J].,2013,(04):169.
[7]漆媛,武彤. 基于生产线质量控制系统的OLAP安全性研究[J].计算机技术与发展,2014,24(09):179.
 QI Yuan,WU Tong. Research on OLAP Security Based on Production Line Quality Control System[J].,2014,24(04):179.
[8]漆媛,武彤. 生产线质量控制系统OLAP安全性的实现[J].计算机技术与发展,2015,25(10):166.
 QI Yuan,WU Tong. Implementation of OLAP Security in Production Line Quality Control System[J].,2015,25(04):166.
[9]肖洁,袁嵩,谭天. 大数据时代数据隐私安全研究[J].计算机技术与发展,2016,26(05):91.
 XIAO Jie,YUAN Song,TAN Tian. Research on Data Privacy in Big Data Age[J].,2016,26(04):91.
[10]武彤,漆媛. 分区加密与结构化加密相结合实现OLAP的数据安全性[J].计算机技术与发展,2017,27(01):89.
 WU Tong,QI Yuan. Implementation of Data Security of OLAP System Combined Partition Encryption with Structured Encryption[J].,2017,27(04):89.

备注/Memo

备注/Memo:
兰州市科技计划项目(2010-1-6)王印明(1987-),男,山东滕州人,硕士研究生,研究方向为信息服务集成、软件工程
更新日期/Last Update: 1900-01-01