scheme for secure communication via information hiding based on key exchange and decomposition protocols通过信息隐藏方案安全通信基于密钥交换和分解协议.pdf
- 1、本文档共5页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
scheme for secure communication via information hiding based on key exchange and decomposition protocols通过信息隐藏方案安全通信基于密钥交换和分解协议
Int. J. Communications, Network and System Sciences, 2011, 4, 77-81
doi:10.4236/ijcns.2011.42009 Published Online February 2011 (http://www.SciRP.org/journal/ijcns)
Scheme for Secure Communication via Information Hiding
Based on Key Exchange and Decomposition Protocols
Boris S. Verkhovsky
Computer Science Department, New Jersey Institute of Technology, University Heights, Newark, USA
E-mail : verb@
Received January 26, 2011; revised February 8, 2011; accepted February 9, 2011
Abstract
This paper considers a decomposition framework as a mechanism for information hiding for secure commu-
nication via open network channels. Two varieties of this framework are provided: one is based on Gaussian
arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm
is illustrated in a numerical example.
Keywords: Complex Modulus, Cryptanalytic Protection, Decomposition, Gaussian Modular Arithmetic,
Information Hiding, Key Exchange, Modular Elliptic Curve, Secure Communication
1. Introduction and Problem Definition Therefore a pair of real integers x and y can be
0 0
used by Alice and Bob to design a cryptographic proto-
In this paper it is demonstrated how to use various Dif- col.
fie-Hellman key establishment (DHKE) protocols in or- DHKE based on elliptic curves : Consider a modular
der to design a computationally efficient cryptographic elliptic curve (EC)
schemes for secure communication between two parties
您可能关注的文档
- risk of overweight and obesity among migrants in switzerland在瑞士移民之间的超重和肥胖的风险.pdf
- risk of pacemaker patients by taser x26 contact mode application泰瑟枪的起搏器患者风险x26接触模式应用程序.pdf
- risk-adaptive volumetric modulated arc therapy using biological objective functions for subvolume boosting in radiotherapyrisk-adaptive体积调制电弧疗法在放射治疗中使用生物目标函数子卷增加.pdf
- risk-adjusted mortality problems and possibilities风险调整死亡率问题和可能性.pdf
- risk-adjusted control charts for health care monitoring医疗风险控制图监控.pdf
- risperidone versus yokukansan in the treatment of severe alzheimer’s disease利培酮与yokukansan治疗严重阿尔茨海默氏症.pdf
- risks of iron deficiency among vegetarian college women缺铁在素食女大学生的风险.pdf
- rit with -ibritumomab tiuxetan in follicular non-hodgkin lymphoma evaluation of recent outcomes in a single institution罗切斯特理工学院的航拍与-ibritumomab tiuxetan在最近的滤泡性非霍奇金淋巴瘤评估结果在一个单一的机构.pdf
- rituximab administration in third trimester of pregnancy suppresses neonatal b-cell development美罗华政府在晚期妊娠的抑制新生儿b细胞的发展.pdf
- risn an efficient sensor network overlay with support for autonomous and distributed applicationsrisn高效的传感器网络覆盖支持自治和分布式应用程序.pdf
最近下载
- 教师专业标准试题(5篇) .pdf VIP
- 2024发展新质生产力阶段下新能源行业人才解构报告.pptx
- 《工程制图》期末考试试卷附答案.pdf VIP
- 干阑建筑.ppt
- 云南农业大学2022-2023学年第2学期《生物化学》期末考试试卷(A卷)附参考答案.docx
- 《追风筝的人》书籍分享【优质公开课】精品PPT课件模板.pptx
- 23CJ87-1 采光、通风、消防排烟天窗(一)(1).pdf
- 干阑式建筑课件.ppt
- 河北开放大学《财会法规与职业道德》形成性考核一(1-3单元)-100分.doc VIP
- 2023年东华理工大学计算机科学与技术专业《数据结构与算法》科目期末试卷A(有答案).docx VIP
文档评论(0)