Computer Science ›› 2012, Vol. 39 ›› Issue (3): 51-53.
Previous Articles Next Articles
Online:
Published:
Abstract: DifficHcllman key exchange algorithm, which is used in regular scenes based on the discrete logarithm problem, demands that both of two communication parties struck up a lively conversation long-term dependable fellowship. A much more secure polymorphic key exchange algorithm was proposed based on the DifficHellman key exchange algorithm The identity information of two parties can be appended to the agreement. Both communication parties use their PRNGs to finish the polymorphic virtual S-box together. The polymorphic S-box can become a broad agreement in irregular scenes.
Key words: Polymorphic cipher, Polymorphic virtual S-box, Polymorphic key exchange algorithm, Bit independence criterion
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2012/V39/I3/51
Cited