defgf67ay
Dołączył: 29 Paź 2010
Posty: 863
Przeczytał: 0 tematów
Ostrzeżeń: 0/5 Skąd: England
|
Wysłany: Czw 8:05, 06 Sty 2011 Temat postu: ugg boots sale Based on DES, the new method of dig |
|
|
Based on DES, the new method of digital image scrambling
): 440 ~ 447lO Lu K C.. Computer cryptography. Beijing: Tsinghua University Press, l998lI Qi Dong Xu, and computer-generated fractal Beijing: Science Press,[link widoczny dla zalogowanych],】 994 l-Qi Zou Jiancheng Qi Dong Xu Wei on the Run: A digital image-based DES Scrambling Method 7ANovelDigitalImageScramblingMethodYanWeiqi ', ZouJianchengQiDongxu (1) BeijingHanwangGroup,[link widoczny dla zalogowanych], 100080. Beijing, China2) Collegeo1'FundSci, NorthChinaUniv0fTech, 100041, Beiiing, China3) CADResearchCenter, NorthChinaUnivofTeeh. , 100041, Beijing, China) AbstractBasedonDESincryptography, imagescramblingisstudiedinthispaper. ThescramblingmethodisanimprovementandapplicationofDESindigitalimages. DigitalimagelosescorrelationintWOdirectionyimagescrambling. Undersomeattacks, theoriginalimagecanbere-constructedbyscrambledimage. ThefeasibilityofthismethodisprovedbyexperimentalresultsKeyWordsdigitalimagescrambling; DES; XORoperation; anti-attack (on the next 3 Volume 13 p. 5) international information and communication security research trends BruceSchneier to 3wAY, Biham-DES, DES-X, NewDES, RC2, and TEA in the relevant key Password proposed a new type of \The so-called related-key cryptanalysis method is to assume that the attacker not only lies in the original key k (unknown) lower, and export control in some key k a f (k) under the form of some plaintext encrypted. In the choice of related key attack scenario, an attacker can specify the key and how to change the situation in the known related-key attack, the attacker knows the key difference, but can not select the key change here emphasized that the attacker is known or select the key relationship between the key but not really know the actual value. This new approach is the password in the Americas 1996 meeting,[link widoczny dla zalogowanych], BruceSchneier continuation of such work. This new approach not only shows the general method of attack used in different instances of the password system, and pointed out the design to prevent such attacks in the form of block cipher guidelines. YasuyakiSakai et al weak RSA PGP keys generated by the system were analyzed. PGP is the most popular for the In-ternet cryptography, PGP's security depends on the RSA algorithm's security. YasuyakiSakai, who focused on the PGP system resistance \PGP source code through the analysis of systems that generate large prime numbers PGP algorithm principle is: generate large prime numbers P, so that P1 has a large prime factor. Above the RSA algorithm can resist the \However, the above method does not consider the prime factors of P +1 case, which led to weak PGP system-generated RSA keys, can not resist the \Although more than 10 years, have been proposed to generate a strong prime number of ways,[link widoczny dla zalogowanych], can also resist \YasuyakiSakai and others not only from the theoretical analysis of the PGP system vulnerabilities, discussed the distribution of weak key RSA,[link widoczny dla zalogowanych], and their impact on system security of PGP, and PGP is given the weak system-generated RSA key practical examples. (Continued)
More articles related to topics:
[link widoczny dla zalogowanych]
moncler veste Brief Introduction to prevent corros
[link widoczny dla zalogowanych]
Post został pochwalony 0 razy
|
|