Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220300107-7.doi: 10.11896/jsjkx.220300107
• Information Security • Previous Articles Next Articles
WANG Xinmiao, SUN Tingting, MA Jingjun
CLC Number:
[1]GONG L,ZHANG L,ZHANG W,et al.The application of data encryption technology in computer network communication security[C]//AIP Conference Proceedings.New York:American Institute of Physics,2017. [2]XIE X M.Establishment and Technical Analysis of Computer Network Information Security Protection Mode[J].Science and Technology Innovation,2019(7):66-67. [3]《Law of the people’s Republic of China on Guarding State secrets》[Z].Beijing,2010.10. [4]LIU S S,WANG P,LUO L,et al.Security Module in Information Unilateral Transmission System among Networks[C]//AASRI Procedia,NETHERLANDS:ELSEVIER SCIENCE BV.2012:100-105. [5]ZHAO Y B,ZHANG X J,JIANG Y L.Application Research of High Strength File Encryption Based on Digital Envelope[J].Computer Engineering and Design,2007(18):4357-4359. [6]DIFFIE W,HELLMAN M.New directions in cryptography[J].IEEE transactions on Information Theory,1976,22(6):644-654. [7]LAMPORT L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772. [8]YEN S M,LIAO K H.Shared authentication token secureagainst replay and weak key attacks[J],Information Processing Letters,1997,62(2):77-80. [9]LEE S,PARK S.Mobile Password System for Enhancing Usab-ility-Guaranteed Security in Mobile Phone Banking[J].Web and Communication Technologies and Internet-Related Social Issues-HSI 2005,2005,3597:66-74. [10]YANG Y J,DENG R H,BAO F.A practical password-based two-server authentication and key exchange system[J].IEEE Transactions on Dependable and Secure Computing,2006,3(2):105-114. [11]LIU J Z.Internet/INTRANET Security Technology[J].Software and Integrated Circuit,1997(1):16-20. [12]LIN X F,FUN M F.Data Security in Network Transmission[J].Software Guide,2012,11(1):139-141. [13]ZHAO G P.Cryptography Technology in Network Data Transmission Security[J].Information and Computer(theoretical edition),2010(20):19. [14]HUANG Y,HU W D,CHEN K F.Classification of Network Attack and Security Protection[J].Computer Engineering,2001(5):131-133,140. [15]XU C.The Application of AES and RSA Hybrid EncryptionTechnology in Network Data Transmission[J].Wireless Interconnection Technology,2016(13):142-144. [16]XU S S,ZHU X M,BAI L F,et al.Application of Attribute-based Cryptosystem in Network Security Level Protection[C]//Papers of the Seventh National Security Level Protection Technology Congress 2018.2018:159-164. [17]HUANG H M.Data Encryption Technology and Its Application in Network Security Transmission[D].Xiamen:Xiamen University,2008. [18]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126. [19]HU J.Research and Implementation of RSA Encryption Algorithm[M].Maanshan:Anhui University of Technology,2011:1-48. [20]SONG Y.Research and Application of Encryption Communication Based on RSA Algorithm[J].Electronic Test,2021(16):33-36,138. [21]ARTO S.Public Key Cryptography[M].Beijing:National Defense Industry Press,1998. [22]LU J Y.Research on Data Transmission Security TechnologyBased on Web Network[D].Nanjing:Nanjing University of Technology,2009:1-67. [23]TIAN W Y,LI Z M.Research and Implementation of RSA Encryption Algorithm and Its Improved Algorithm[J].Shanxi Electronic Technology,2013(6):90-92. [24]LIU W,ZHU M R,LIU Y L.Data Encryption Transmission in Remote Fault Diagnosis System[J].Network Security Techno-logy & Application,2008(1):83-84,21. [25]HUANG Y L,LEU F Y,YOU I,et al.A secure wireless communication system integrating RSA,Diffie-Hellman PKDS,intelligent protection-key chains and a Data Connection Core in a 4G environment[J].Journal of Supercomputing,2014,67(3):635-652. [26]KUMAR B J S,RAJ V K R,NAIR A.Comparative study onAES and RSA algorithm for medical images[C]//2017 International Conference on Communication and Signal Processing(ICCSP).New York:IEEE Press,2017:501-504. [27]ABOUD S J.An efficient method for attack RSA scheme[C]//2009 Second International Conference on the Applications of Digital Information and Web Technologies.New York:IEEE Press,2009:587-591. [28]ZHANG C N.Integrated approach for fault tolerance and digital signature in RSA[J].IEE Proceedings-Computers and Digital Techniques,1999,146(3):151-159. [29]ZHANG Y F,QIN Z G,LIU J D.Performance Analysis of Elliptic Curve Encryption System[J].Journal of University of Electronic Science and Technology of China,2001(2):144-147. [30]VANSTONE S A,ZUCCHERATO R J.Short RSA keys and their generation[J].Journal of Cryptology,1995,8(2):101-114. [31]YU H,KIM Y.New RSA Encryption Mechanism Using One-Time Encryption Keys and Unpredictable Bio-Signal for Wireless Communication Devices[J].Electronics,2020,9(2):246. [32]BHASKAR R,HEGDE G,VAYA P R.An efficient hardware model for RSA Encryption system using Vedic mathematics[C]//International Conference on Communication Technology and System Design 2011.NETHERLANDS:ELSEVIER SCIENCE BV,2012:124-128. [33]QIU L,LIU Z,PEREIRA G C C F,et al.Implementing RSA for sensor nodes in smart cities[J].Personal and Ubiquitous Computing,2017,21(5):807-813. [34]KARATSUBA A,OFMAN Y U.Multiplication of multidigitnumbers on automata[J].Soviet physics doklady,1963,7:595-596. [35]PRANESH R,HARISH V,VIGNESHWARAN M,et al.Anew approach for secure data transmission[C]//Proceedings of IEEE International Conference on Circuit,Power and Computing Technologies(ICCPCT 2016).New York:IEEE Press,2016:1-4. [36]CHAUDHURY P,DHANG S,ROY M,et al.ACAFP:Asymmetric key based cryptographic algorithm using four prime numbers to secure message communication.A review on RSA algorithm[C]//2017 8th Annual Industrial Automation and Electromechanical Engineering Conference(IEMECON).New York:IEEE Press,2017:332-337. [37]THIZIERS A H,THÉODORE H C,ZOUEU J T,et al.Enhanced,Modified and Secured RSA Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone[J].International Journal of Advanced Computer Science and Applications(IJACSA),2019,10(10):353-360. [38]ZHU K,LIN Z,DING Y.A new RSA image encryption algorithm based on singular value decomposition[J].International Journal of Pattern Recognition and Artificial Intelligence,2019,33(1):1954002. [39]ZHANG Y Z.Multi-character Sorting Encryption Transmission Method for Wireless Local Area Network Data[J].Automation &Instrumentation,2021(6):35-38,42. [40]SUNDARI M,REVATHI P B,SUMESH S.Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image[C]//Security in Computing and Communications(SSCC 2015).Berlin:Springer,2015:247-255. [41]RAMAIYA M K,HEMRAJANI N.Improvisation of Security aspect of Steganographic System by applying RSA Algorithm[J].International Journal of Advanced Computer Science and Applications,2016,7(7):245-249. [42]BANGERA K N,REDDY N V S,PADDAMBAIL Y,et al.Multilayer security using RSA cryptography and dual audio ste-ganography[C]//2017 2nd IEEE International Conference on Recent Trends in Electronics,Information & Communication Technology(RTEICT).New York:IEEE Press,2017:492-495. [43]JIANG W B,XU H,DONG H,et al.An improved security framework for Web service-based resources[J].Turkish Journal of Electrical Engineering & Computer Sciences,2016,24(3):774-792. [44]TIMOTHY D P,SANTRA A K.A hybrid cryptography algorithm for cloud computing security[C]//2017 International conference on Microelectronic Devices,Circuits and Systems(ICMDCS).New York:IEEE Press,2017:1-5. [45]FOTOHI R,BARI S F,YUSEFI M.Securing Wireless SensorNetworks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol[J].International Journal of Communication Systems,2020,33(4):e4234. [46]PARMAR N J,VERMA P K,MARTIN V.A ComparativeEvaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System[J].Security and Communication Networks,2017,2017:1467614. [47]PANKAJ K,SAURABH K S.An Empirical Evaluation of Various Digital Signature Scheme in Wireless Sensor Network[J].IETE Technical Review,2022,39(4):974-984. [48]SURACI C,PIZZI S,MOLINARO A,et al.An RSA-based Algorithm for Secure D2D-aided Multicast Delivery of Multimedia Services[C]//2020 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting(BMSB).New York:IEEE Press,2020:1-6. [49]MILANOV E.The RSA algorithm[R].US:RSA laboratories,2009. [50]DORUS R,VINOTH P.Mitigation of jamming attacks in wireless networks[C]//2013 IEEE International Conference on Emerging Trends in Computing,Communication and Nanotech-nology.New York:IEEE Press,2013:168-171. [51]ZHU F,WONG D S,CHAN A H,et al.Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks[J].Information Security,Proceedings.2002,2433:150-161. [52]NAGAR S A,ALSHAMMA S.High speed implementation of RSA algorithm with modified keys exchange[C]//2012 6th International Conference on Sciences of Electronics,Technologies of Information and Telecommunications.New York:IEEE Press,2012:639-642. [53]AMBIKA S,RAJAKUMAR S,ANAKATH A S.A novel RSAalgorithm for secured key transmission in a centralized cloud environment[J].International Journal of Communication Systems,2020,33(5):e4280. [54]ZHU M L,LIU J W.An Intelligent Door Lock Device Based on RSA Algorithm:China,201810181838.3[P].2018-08-03. [55]LU J C,XIONG X M.A hardware system and method of encryption and decryption based on RSA algorithm:China,CN201810877374.X[P].2018-12-18. |
[1] | LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui. Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [J]. Computer Science, 2023, 50(8): 294-303. |
[2] | LIU Yingjun, LUO Yang, YANG Yujun, LIU Yuanni. Anonymous Authentication Protocol for Medical Internet of Things [J]. Computer Science, 2023, 50(8): 359-364. |
[3] | HONG Xuan, YUAN Mengling. Ring Confidential Transaction Protocol Based on Multivariate Public-key Cryptosystem [J]. Computer Science, 2023, 50(6A): 220100157-6. |
[4] | LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9. |
[5] | ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347. |
[6] | GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong. Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [J]. Computer Science, 2023, 50(4): 308-316. |
[7] | ZHAO Yang, YI Peng, ZHANG Zhen, HU Tao, LIU Shaoxun. Anomaly Detection Method of SDN Network Edge Switch [J]. Computer Science, 2023, 50(1): 362-372. |
[8] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[9] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[12] | CHEN Li-ping, XU Peng, WANG Dan-chen, XU Yang. Study on Formal Verification of EAP-TLS Protocol [J]. Computer Science, 2022, 49(11A): 211100111-5. |
[13] | CHEN Bin, XU Huan, XI Jian-fei, LEI Mei-lian, ZHANG Rui, QIN Shi-han. Power Internet of Things Device Access Management Based on Cryptographic Accumulator [J]. Computer Science, 2022, 49(11A): 210900218-6. |
[14] | WANG Xiang-yu, YANG Ting. Routing Directory Server Defined by Smart Contract [J]. Computer Science, 2021, 48(6A): 504-508. |
[15] | JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng. Improved Certificateless Proxy Blind Signature Scheme with Forward Security [J]. Computer Science, 2021, 48(6A): 529-532. |
|