首页 | 官方网站   微博 | 高级检索  
     

现代密码算法研究
引用本文:郑世慧.现代密码算法研究[J].中兴通讯技术,2007,13(5):1-5.
作者姓名:郑世慧
作者单位:北京邮电大学网络与交换技术国家重点实验室信息安全中心 北京100876
基金项目:国家重点基础研究发展计划(973计划)
摘    要:密码技术是信息安全的核心技术。密码技术主要包括对称密码算法和非对称密码算法及协议。对称加密算法加密密钥和解密密钥相互推导容易,加/解密速度非常快,适用于大批量数据加密的场合。非对称密钥密码体制从私有密钥推导公开密钥是计算不可行的,虽然公钥加密算法在运行速度方面无法和对称加密算法媲美,但很好地解决了对称密码学面临的密钥的分发与管理问题,同时对于数字签名问题也给出了完美的解答。

关 键 词:分组密码  流密码  Hash函数  非对称密码  密码协议
文章编号:1009-6868(2007)05-0001-05
收稿时间:2007-07-17
修稿时间:2007年7月17日

The Research on Cryptographic Schemes
ZHENG Shi-hui.The Research on Cryptographic Schemes[J].ZTE Communications,2007,13(5):1-5.
Authors:ZHENG Shi-hui
Affiliation:Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
Abstract:Technologies of cryptography are the core of information security. It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols. For the symmetric encryption algorithm, it is easy to deduce decryption keys from the encryption keys and vice versa. Because this algorithm encrypts and decrypts data very quickly, it is applicable in situations where large numbers of data have to be protected. However, for the asymmetric algorithm, extracting the secret key from the public key is computationally infeasible. Although the performance speed of asymmetric encryption algorithm is much slower than that of the symmetric algorithm, the asymmetric algorithm has key management advantages over the symmetric one, and it generates signature of digital messages.
Keywords:block cipher  stream cipher  Hash function  asymmetric cryptography  cryptographic protocol
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号