- 1、本文档共8页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
mimaxue(mimaxue)
mimaxue(mimaxue)
The development and recent progress of cryptography
Cryptography is the core technology of information security. Nowadays, the secrecy, integrity, availability and non repudiation of information in computer networks need to be solved by cryptography. Cryptography is generally divided into two categories: symmetric cryptography (also known as private key cryptography and asymmetric cryptography (also known as public key cryptography). Public key cryptography takes the important role of key agreement, digital signature and message authentication in information security, and has become the core cipher.
At present, the concept of security for public key cryptography has been greatly expanded. Like the famous RSA public key cryptography algorithm, Rabin public key cryptography algorithm and ElGamal public key cryptography algorithm have been widely used. However, some public key cryptography algorithms are theoretically secure, but they are not secure in specific practical applications. Because in practical applications, not only the algorithm itself is safe in mathematical proof, but also the algorithm is safe in practical applications. For example, public key encryption algorithm according to different applications, the need to consider the chosen plaintext security, non adaptive chosen ciphertext security and password security class adaptation. Digital signatures, as required, also consider resistance to non - messaging attacks and selected message attacks. Therefore, in recent years, provable security cryptography is an important part of public key cryptography, which is devoted to this aspect.
Public key cryptography takes the important role of key agreement, digital signature and message authentication in information security, and has become the core cipher. At present, the key subject of cryptography is to study all kinds of provable security system according to the specific network environment and the improvement of computing efficiency. What is
您可能关注的文档
- java招聘(java招聘).doc
- java常用英语(Java common English).doc
- java经典例题2(Java classic example 2).doc
- java绘图功能函数详细学习(Java drawing function, detailed learning).doc
- java技术ejb概述(上)(Overview of Java technology EJB (top)).doc
- java绘网络拓朴图(Java draw network topology).doc
- java自定义标签(Java custom tag).doc
- java核心技术的目录(Java core technology directory).doc
- java读写配置文件(Java read and write configuration file).doc
- java软件开发中可能出现几个错误观点(Several misconceptions may arise in Java Software Development).doc
- 基于VR与AI的小学语文阅读理解沉浸式教学方案设计教学研究课题报告.docx
- 高中英语阅读教学中的数据驱动策略与教学效果评估教学研究课题报告.docx
- 历史教学中的历史情境创设:对学生历史分析能力培养的影响教学研究课题报告.docx
- 2025至2030中国沙滩毛巾行业市场占有率及投资前景评估规划报告.docx
- 基于人工智能的初中生数字素养评价与干预策略研究教学研究课题报告.docx
- 小学数学教学:拓展练习册在提升学生逻辑思维能力中的应用研究教学研究课题报告.docx
- 《中医食疗与西医营养支持结合对慢阻肺患者营养状况及生活质量的协同作用研究》教学研究课题报告.docx
- 社区老年助餐跨境健康食谱开发与地方特色食疗研究.docx
- 高端显示材料生产线项目规划设计方案.docx
- 公司简介湖南省高职院校招聘方案.pptx
文档评论(0)