首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 390 毫秒
1.
基于超混沌AES图像加密算法   总被引:2,自引:0,他引:2  
为提高图像加密算法的安全性能, 提出了一种改进的AES(Advanced Encryption Standard)超混沌加密算法。该算法根据超混沌系统产生的混沌序列进行排列组成S盒, 对明文图像做像素值替换;利用加入外部密钥的混沌序列分别对图像像素点进行行、 列位置置乱, 并对加密算法的安全性能进行了深入分析。仿真实验结果表明, 该算法具有更高的系统安全性, 不仅具有较大的密钥空间和较高的密钥敏感性, 而且能有效抵抗统计攻击和差分攻击等。  相似文献   

2.
为了解决混沌加密系统密钥空间设计上的不足以及数据加密标准(DES)加密算法易被攻击的问题,将细胞神经网络与DES加密算法相结合,提出一种混合加密通信方案.该方案利用细胞神经网络产生混沌信号,将其经过取整、取模、平方、开方、增益、偏移等运算处理后,用得到的新的混沌伪随机序列将图像加密,然后利用DES算法进行再加密.文中还讨论了系统的实现方法.仿真结果表明,采用此混合加密方案进行加解密均可取得较好的效果,解密结果对细胞神经网络初值和DES密钥高度敏感,安全性能有所提高.  相似文献   

3.
改进的差分功耗分析及其在DES中的应用   总被引:1,自引:1,他引:0  
智能卡中加密硬件设计存在很高的操作并发性,单个时钟周期内就会完成多个加密的关键操作(S box查表),造成了差分功耗分析(DPA:Differential Power Analysis)很难有明显的差分效果。为了在差分功耗分析时滤除不相关的S box查表所造成的噪声,结合选择明文的攻击方法对差分功耗攻击进行改进,使攻击过程中多个S box中仅有1个S box输入变化,并对硬件实现的DES(Data Encryption Standard)加密卡进行了攻击。试验结果表明,改进的差分功耗分析方法对硬件DES加密攻击的相关度比普通差分功耗攻击提高150%以上。  相似文献   

4.
刘浩  李强 《甘肃科技》2004,20(11):60-61
加密是为防止数据被查看或修改,并在原本不安全的信道上提供安全的通信信道。本文提出一种简明DES加密算法,并结合VisualBasic,很好地解决DES加密算法密钥的问题,实现了一种DES密码算法。  相似文献   

5.
针对AES(Advanced Encryption Standard)算法3轮加密后的密文代数表达式具有的次数较低(低于255)的特点,提出了低轮AES密码的插值攻击方法.该方法利用255个函数值可惟一求出254次多项式的拉格朗日插值公式.文中分析了AES加密算法中的密文代数表达式,并给出了相应的结论及证明.利用此攻击方法,通过选取28对明密文,即可还原4轮AES的密钥,利用211对明密文,可成功破译5轮AES密码,并可把此攻击扩展到6轮AES密码.  相似文献   

6.
首先介绍数据加密标准(Data Encryption Standard,DES)和高级加密标准(Advanced Encryption Standard,AES),并对其安全性进行分析,然后提出基于无理数的DES加密方案.该方案利用无理数的伪混沌特性对密钥空间进行扩展,增加子密钥产生的随机性,使得每一组16次迭代所使用的子密钥各不相同,能够以和DES相同的时间开销,获得和AES相同的密钥空间.  相似文献   

7.
一种将AES和SSL结合的数据加密算法   总被引:1,自引:0,他引:1  
分别介绍了高级数据加密标准AES与网络通信加密协议SSL的原理,基于AES算法的性能分析,结合SSL协议身份鉴别、授权认证的优势,将AES与SSL相结合,提出了一种适合于网络实时数据传输安全的新的数据加密算法.最后,重点阐述了该算法的原理及实现过程,并通过测量数据加密传输的网络延时证实:AES与 SSL相结合的混合加密算法在实现授权认证功能、安全密钥传输的基础上,仍继承了 AES算法的实时性,是远程实时数据安全传送的理想算法.  相似文献   

8.
在讨论AES功耗模型的基础上,提出了一种新的最大差分功耗攻击(MDPA)的方法.算法对被攻击的部分明文用猜测的密钥进行变换,采用差分的方法去除噪声,比较由变换后的明文和正确密钥产生的一组功耗值,通过寻找最大功耗值得到正确的密钥.采用MDPA方法和相关功耗分析的方法对AES进行了仿真攻击实验,结果证明了本文所提方法的有效性,同时也显示MDPA方法能够以合理的攻击代价显著增强相关功耗分析攻击的效果.  相似文献   

9.
本文提出了一种基于混沌和置换-替代机制的图像加密方法.该加密算法只对图像作一轮置换和一轮替代就达到非常好的加密效果.加密算法采用广义Arnold映射生成置换和替代时需要的一系列向量,并且采用整行和整列加密取代传统加密算法中的逐个像素加密,从而提高了加密的效率.本文还分析了加密算法的安全性,包括直方图分析,密钥敏感性分析,相邻像素相关性分析,信息熵分析,差分攻击分析等.所有的实验数据都表明本文所提的加密算法能有效的抵抗各种攻击,是一种简单有效的加密算法,在图像安全方面有一定的应用价值.  相似文献   

10.
本文通过对Eslamin和Bakhshandeh所提出的一种改进的基于全局置乱的图像加密算法进行密码分析,发现了该算法不能抵御选择明文攻击.通过选择明文攻击,动态加密选择明文图像,可以将明文图像的像素灰度值逐一恢复,最终得到完整的明文图像信息,成功破译了该算法.针对原加密算法的安全缺陷,笔者对该算法进行了改进.一个改进是设计置换过程的密钥流与明文图像内容相关,克服了原加密算法置换过程与明文图像无关的缺陷,从而可以抵御选择明文攻击、已知明文攻击.另一个改进是在扩散过程采用另一个斜帐篷映射生成密钥流,扩大了加密算法的密钥空间,使得加密算法更加安全.本文还对改进的加密算法的安全性进行了详细的实验分析,包括密钥空间分析、密钥敏感性分析、统计分析、信息熵分析、差分攻击分析等.数值实验结果表明,本文提出的改进的图像加密算法比原加密算法更加安全有效.  相似文献   

11.
Language markedness is a common phenomenon in languages, and is reflected from hearing, vision and sense, i.e. the variation in the three aspects such as phonology, morphology and semantics. This paper focuses on the interpretation of markedness in language use following the three perspectives, i.e. pragmatic interpretation, psychological interpretation and cognitive interpretation, with an aim to define the function of markedness.  相似文献   

12.
The discovery of the prolific Ordovician Red River reservoirs in 1995 in southeastern Saskatchewan was the catalyst for extensive exploration activity which resulted in the discovery of more than 15 new Red River pools. The best yields of Red River production to date have been from dolomite reservoirs. Understanding the processes of dolomitization is, therefore, crucial for the prediction of the connectivity, spatial distribution and heterogeneity of dolomite reservoirs.The Red River reservoirs in the Midale area consist of 3~4 thin dolomitized zones, with a total thickness of about 20 m, which occur at the top of the Yeoman Formation. Two types of replacement dolomite were recognized in the Red River reservoir: dolomitized burrow infills and dolomitized host matrix. The spatial distribution of dolomite suggests that burrowing organisms played an important role in facilitating the fluid flow in the backfilled sediments. This resulted in penecontemporaneous dolomitization of burrow infills by normal seawater. The dolomite in the host matrix is interpreted as having occurred at shallow burial by evaporitic seawater during precipitation of Lake Almar anhydrite that immediately overlies the Yeoman Formation. However, the low δ18O values of dolomited burrow infills (-5.9‰~ -7.8‰, PDB) and matrix dolomites (-6.6‰~ -8.1‰, avg. -7.4‰ PDB) compared to the estimated values for the late Ordovician marine dolomite could be attributed to modification and alteration of dolomite at higher temperatures during deeper burial, which could also be responsible for its 87Sr/86Sr ratios (0.7084~0.7088) that are higher than suggested for the late Ordovician seawaters (0.7078~0.7080). The trace amounts of saddle dolomite cement in the Red River carbonates are probably related to "cannibalization" of earlier replacement dolomite during the chemical compaction.  相似文献   

13.
何延凌 《科技信息》2008,(4):258-258
Language is a means of verbal communication. People use language to communicate with each other. In the society, no two speakers are exactly alike in the way of speaking. Some differences are due to age, gender, statue and personality. Above all, gender is one of the obvious reasons. The writer of this paper tries to describe the features of women's language from these perspectives: pronunciation, intonation, diction, subjects, grammar and discourse. From the discussion of the features of women's language, more attention should be paid to language use in social context. What's more, the linguistic phenomena in a speaking community can be understood more thoroughly.  相似文献   

14.
AcomputergeneratorforrandomlylayeredstructuresYUJia shun1,2,HEZhen hua2(1.TheInstituteofGeologicalandNuclearSciences,NewZealand;2.StateKeyLaboratoryofOilandGasReservoirGeologyandExploitation,ChengduUniversityofTechnology,China)Abstract:Analgorithmisintrod…  相似文献   

15.
理论推导与室内实验相结合,建立了低渗透非均质砂岩油藏启动压力梯度确定方法。首先借助油藏流场与电场相似的原理,推导了非均质砂岩油藏启动压力梯度计算公式。其次基于稳定流实验方法,建立了非均质砂岩油藏启动压力梯度测试方法。结果表明:低渗透非均质砂岩油藏的启动压力梯度确定遵循两个等效原则。平面非均质油藏的启动压力梯度等于各级渗透率段的启动压力梯度关于长度的加权平均;纵向非均质油藏的启动压力梯度等于各渗透率层的启动压力梯度关于渗透率与渗流面积乘积的加权平均。研究成果可用于有效指导低渗透非均质砂岩油藏的合理井距确定,促进该类油藏的高效开发。  相似文献   

16.
As an American modern novelist who were famous in the literary world, Hemingway was not a person who always followed the trend but a sharp observer. At the same time, he was a tragedy maestro, he paid great attention on existence, fate and end-result. The dramatis personae's tragedy of his works was an extreme limit by all means tragedy on the meaning of fearless challenge that failed. The beauty of tragedy was not produced on the destruction of life, but now this kind of value was in the impact activity. They performed for the reader about the tragedy on challenging for the limit and the death.  相似文献   

17.
本文叙述了对海南岛及其毗邻大陆边缘白垩纪到第四纪地层岩石进行古地磁研究的全部工作过程。通过分析岩石中剩余磁矢量的磁偏角及磁倾角的变化,提出海南岛白垩纪以来经历的构造演化模式如下:早期伴随顺时针旋转而向南迁移,后期伴随逆时针转动并向北运移。联系该地区及邻区的地质、地球物理资料,对海南岛上述的构造地体运动提出以下认识:北部湾内早期有一拉张作用,主要是该作用使湾内地壳显著伸长减薄,形成北部湾盆地。从而导致了海南岛的早期构造运动,而海南岛后期的构造运动则主要是受南海海底扩张的影响。海南地体运动规律的阐明对于了解北部湾油气盆地的形成演化有重要的理论和实际意义。  相似文献   

18.
There are numerous geometric objects stored in the spatial databases. An importance function in a spatial database is that users can browse the geometric objects as a map efficiently. Thus the spatial database should display the geometric objects users concern about swiftly onto the display window. This process includes two operations:retrieve data from database and then draw them onto screen. Accordingly, to improve the efficiency, we should try to reduce time of both retrieving object and displaying them. The former can be achieved with the aid of spatial index such as R-tree, the latter require to simplify the objects. Simplification means that objects are shown with sufficient but not with unnecessary detail which depend on the scale of browse. So the major problem is how to retrieve data at different detail level efficiently. This paper introduces the implementation of a multi-scale index in the spatial database SISP (Spatial Information Shared Platform) which is generalized from R-tree. The difference between the generalization and the R-tree lies on two facets: One is that every node and geometric object in the generalization is assigned with a importance value which denote the importance of them, and every vertex in the objects are assigned with a importance value,too. The importance value can be use to decide which data should be retrieve from disk in a query. The other difference is that geometric objects in the generalization are divided into one or more sub-blocks, and vertexes are total ordered by their importance value. With the help of the generalized R-tree, one can easily retrieve data at different detail levels.Some experiments are performed on real-life data to evaluate the performance of solutions that separately use normal spatial index and multi-scale spatial index. The results show that the solution using multi-scale index in SISP is satisfying.  相似文献   

19.
20.
The elongation method,originally proposed by Imamura was further developed for many years in our group.As a method towards O(N)with high efficiency and high accuracy for any dimensional systems.This treatment designed for one-dimensional(ID)polymers is now available for three-dimensional(3D)systems,but geometry optimization is now possible only for 1D-systems.As an approach toward post-Hartree-Fock,it was also extended to  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号