高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

Rao-Nam私钥密码体制的修正

刘金龙 许宗泽

刘金龙, 许宗泽. Rao-Nam私钥密码体制的修正[J]. 电子与信息学报, 2005, 27(8): 1287-1289.
引用本文: 刘金龙, 许宗泽. Rao-Nam私钥密码体制的修正[J]. 电子与信息学报, 2005, 27(8): 1287-1289.
Liu Jin-long, Xu Zong-ze. Modification of Rao-Nam's Private-Key Cryptosystem[J]. Journal of Electronics & Information Technology, 2005, 27(8): 1287-1289.
Citation: Liu Jin-long, Xu Zong-ze. Modification of Rao-Nam's Private-Key Cryptosystem[J]. Journal of Electronics & Information Technology, 2005, 27(8): 1287-1289.

Rao-Nam私钥密码体制的修正

Modification of Rao-Nam's Private-Key Cryptosystem

  • 摘要: 该文提出了一种非查表的错误图样生成算法.该算法通过将可纠正的错误矢量的部分信息嵌入到明文消息中,从而得到比原错误矢量具有更大汉明重量的错误图样.用该算法修正的Rao-Nam私钥密码体制高效实用,既无需存储错误图样,又增强了安全性.
  • Berlekamp E R, McEliece R J, van Tilborg H C A. On the inherent intractability of certain coding problems. IEEE Trans. on Information Theory, 1978, IT-24: 384- 386. [2]McEliece R J. A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 1978:42 - 44, 114 - 116. [3]Rao T R N. Joint encryption and error correction schemes. Confer ence Proceedings-11th Annual International Symposium on Com puter Architecture, Ann Arbor, Mich, USA., 1984:240 - 241. [4]王新梅,马文平,等.纠错密码理论.北京:人民邮电出版社,2001:137-139. [5]Rao T R N, Nam K H. Private-key algebraic-code encryptions.IEEE Trans. on Information Theory, 1989, 35(4): 829- 833. [6]Struik R, Tilburg J. The Rao-Nam scheme is insecure against a chosen-plaintext attack. Advances in Cryptology-CRYPTO ’87.New York: Springer-Verlag, 1988:458 - 461. [7]王新梅,肖国镇.纠错码-原理与方法.西安:西安电子科技大学出版社,2001:63-63. [8]Struik R. On the Rao-Nam scheme using nonlinear codes. Infor mation Theory Proceedings. 1991 IEEE International Symposium,Eindhoven University of Technology, 1991: 174 - 174. [9]Denny W F. Encryptions using linear and nonlinear codes:implementation and security considerations. [Ph.D. dissertation],The Center for Advanced Computer Studies, University of Southwestern Louisiana, Lafayette, 1988. [10]Sun H M, Hwang T. Key generation of algebraic-code crypto systems. Computer Math. Application, 1994, 27(2): 99- 106.
  • 加载中
计量
  • 文章访问数:  2600
  • HTML全文浏览量:  79
  • PDF下载量:  734
  • 被引次数: 0
出版历程
  • 收稿日期:  2004-03-23
  • 修回日期:  2004-07-14
  • 刊出日期:  2005-08-19

目录

    /

    返回文章
    返回