浏览全部资源
扫码关注微信
1. 四川大学 计算机学院四川,成都,610065
2. 重庆城市管理职业学院重庆,400055
3. 四川大学 计算机学院
纸质出版日期:2010,
网络出版日期:2009-9-18,
扫 描 看 全 文
乐明于,李涛.基于人工免疫理论的数据保密通信研究[J].工程科学与技术,2010,42(2):150-153.
Yue Mingyu, Li Tao. Data Security Communications Based on Artificial Immunity Theory[J]. Advanced Engineering Sciences, 2010,42(2):150-153.
中文摘要: 针对数据保密通信的现实需求,提出一种新的保密通信方法。该方法首先基于否定选择算法从明文信息本身提取加密因子,然后再以加密因子按m序列进行密钥扩展,生成伪随机密钥序列对明文进行加密。利用该方法生成的伪随机密钥序列的自相关特性较好,数据加密后具备了较好的抗攻击性能,同时接收端还可以用加密因子进行免疫鉴别,以检验数据的完整性。
Abstract:For the realistic demand of data security communications
a new security communication method was proposed. First of all,the encryption factor was extracted from the plaintext. Secondly
Encryption factor as a key group was expanded by the way of the m-sequence and generates pseudo-random key sequence that can be used to encrypt data. Pseudo-random key sequence generated in this way had good characteristics of self-correlation and the encrypted data had a better anti-attack performance. Meanwhile
the receiver can also use encryption factor to identify the integrity of the data.
否定选择算法加密因子伪随机序列加密解密
negative selection algorithmencryption factorpseudo-random sequenceencryptiondecryption
Mihir Bellare ;Chanathip Namprempre ;Gregory Neven,Security Proofs For Identity-based Identification And Signature Schemes,Journal of Cryptology ,2009, 22(1).
Pin-Chang Su ;Chien-Hua Tsai,New cryptosystems design based on hybrid-mode problems,Computers and Electrical Engineering ,2009, 35(3).
黄光球,李眩.基于免疫原理的网络入侵检测[J].微电子学与计算机,2008(8)
李涛,计算机免疫学,北京:电子工业出版社,2004.
Forrest S,Computer immunology,Communications of the ACM
Forrest S;Perelson A S
Jain A K;Ross A;Pankanti S,Biometrics:A tool for information security,IEEE Transactions on Information Forensics and Security,2006(2).
Sekhar A C;Sudha K R;Prasad Reddy P V G D
Kim J;Bentley P J,Negative selection:how to generate detectors,Canterbury UK,Kent:Canterbury Printing Unit,2002.
Zeng J Q;Liu X J;Li T.A self-adaptive negative selection algorithm used for anomaly detection[J].Progress in Natural Science,2009(2)doi:10.1016/j.pnsc.2008.06.008
Chen Y F;Wang R C,A classification algorithm based on artificial immune,Chinese Journal of Electronics,2008(3).
Sudha K R;Sekhar A C;Prasad Reddy P V G D,Cryptography protection of digita signals using some Recurrence relations,IJCSNS International Journal of Computer Science and Network Security,2007(5).
0
浏览量
4
下载量
1
CNKI被引量
关联资源
相关文章
相关作者
相关机构