[1]冷飞,徐进华,栾仕喜.RSA融合AES算法的网络信息安全方法[J].华侨大学学报(自然科学版),2017,38(1):117-120.[doi:10.11830/ISSN.1000-5013.201701023]
 LENG Fei,XU Jinhua,LUAN Shixi.Research on Network Information Security Based on RSA Fusion AES Algorithm[J].Journal of Huaqiao University(Natural Science),2017,38(1):117-120.[doi:10.11830/ISSN.1000-5013.201701023]
点击复制

RSA融合AES算法的网络信息安全方法()
分享到:

《华侨大学学报(自然科学版)》[ISSN:1000-5013/CN:35-1079/N]

卷:
第38卷
期数:
2017年第1期
页码:
117-120
栏目:
出版日期:
2017-01-09

文章信息/Info

Title:
Research on Network Information Security Based on RSA Fusion AES Algorithm
文章编号:
1000-5013(2017)01-0117-04
作者:
冷飞 徐进华 栾仕喜
苏州大学文正学院 信息中心, 江苏 苏州 215104
Author(s):
LENG Fei XU Jinhua LUAN Shixi
Information Centre, Wenzheng College of Soochow University, Suzhou 215104, China
关键词:
网络信息 网络安全 加密速度 密钥配置
Keywords:
network information network security encryption speed key distribution
分类号:
TP309
DOI:
10.11830/ISSN.1000-5013.201701023
文献标志码:
A
摘要:
针对网络信息的安全处理,提出一种RSA融合高级数据加密算法(AES)的加密算法.通过RSA算法配置系统密钥,降低密钥管理的复杂度.通过AES算法配合RSA密钥,完成网络信息加密.实验结果表明:RSA融合AES的加密算法充分发挥AES算法执行速度快、RSA密钥配置性能高的特点.
Abstract:
According to the security of network information, a new encryption algorithm based on RSA fusion advanced encryption standard(AES)is proposed. Using the RSA algorithm to configure the system key, in order to reduce the complexity of key management. Using AES algorithm with the RSA key to complete the network information encryption. The experimental results show that the RSA fusion AES encryption algorithm, give full play to the AES algorithm to perform fast, RSA key configuration characteristics of high performance.

参考文献/References:

[1] 赵振国.基于攻防博弈模型的网络安全测评和最优主动防范[J].电子测试,2015(2):62-64.
[2] BANDYOPADHYAY T,JACOB V,RAGHUNATHAN S.Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest[J].Information Technology and Management,2010,11(1):7-23.
[3] 刘巧平,周斌,王文涛.基于椭圆曲线的信息加密及网络身份认真算法的研究[J].自动化与仪器仪表,2016(8):105-111.
[4] WU Yong,HU Defa.Encryption model of network information based on AES algorithm with dimension reduction chaos optization[J].Metallurgical and Mining Industry,2015,7(4):11-17.
[5] 刘冰,潘大兵.新三维混沌映射及其在数字图像信息加密中的应用[J].华侨大学学报(自然科学版),2015,36(6):655-658.
[6] JADHAV S,MOHITE V.A data hiding techniques based on length of English text using DES and attacks[J].International Journal of Research in Computer Science,2012,2(4):1121-1128.
[7] GANESH A R,MANIKANDAN P N,SETHU S P,et al.An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based wireless sensor networks[J].International Conference on Recent Trends in Information Technology,2011:1209-1214.
[8] 蔺小梅,李国刚,张泽普.采用OHNN和M-LFSR的字序列密码加密方案[J].华侨大学学报(自然科学版),2014,35(5):519-522.
[9] KANNAMMAL A,RANI S S.DICOM image authentication and encryption based on RSA and AES algorithms[J].Communications in Computer and Information Science,2012,330:349-360.
[10] 许柯,刘绪崇,符振艾,等.网络信息加密RSA算法的运算速度和保密性优化[J].科技通报,2015,31(7):144-147.

相似文献/References:

[1]吴金龙.利用VC++编程实现防火墙数据包过滤[J].华侨大学学报(自然科学版),2003,24(1):92.[doi:10.3969/j.issn.1000-5013.2003.01.017]
 Wu Jinlong.Implementation of Firewall Packet Filtration by Applying VC++ Programming[J].Journal of Huaqiao University(Natural Science),2003,24(1):92.[doi:10.3969/j.issn.1000-5013.2003.01.017]
[2]李远敏.层次化分类淘汰法的网络最优弥补模型[J].华侨大学学报(自然科学版),2016,37(4):515.[doi:10.11830/ISSN.1000-5013.201604025]
 LI Yuanmin.Optimal Network Hardening Model Based on Hierarchical Classification Elimination[J].Journal of Huaqiao University(Natural Science),2016,37(1):515.[doi:10.11830/ISSN.1000-5013.201604025]

备注/Memo

备注/Memo:
收稿日期: 2016-11-25
通信作者: 冷飞(1974-),男,副教授,主要从事计算机技术,网络工程的研究.E-mail:53292999@qq.com.
基金项目: 国家自然科学基金资助项目(12ZWK01); 苏州大学文正学院高等教育改革资助项目(2910312615)
更新日期/Last Update: 2017-01-20