欢迎来到沃文网! | 帮助中心 分享知识,传播智慧!
沃文网
全部分类
  • 教学课件>
  • 医学资料>
  • 技术资料>
  • 学术论文>
  • 资格考试>
  • 建筑施工>
  • 实用文档>
  • 其他资料>
  • ImageVerifierCode 换一换
    首页 沃文网 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    毕业论文外文翻译--基于RSA的数字签名系统的设计与实现(适用于毕业论文外文翻译+中英文对照.doc

    • 资源ID:850530       资源大小:73KB        全文页数:15页
    • 资源格式: DOC        下载积分:10积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    三方登录下载: QQ登录 微博登录
    二维码
    微信扫一扫登录
    下载资源需要10积分
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP,下载更划算!
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    毕业论文外文翻译--基于RSA的数字签名系统的设计与实现(适用于毕业论文外文翻译+中英文对照.doc

    1、外文翻译系 别信息工程系专 业网络工程班 级学 号17姓 名指导教师负责教师沈阳航空航天大学北方科技学院2012年6月沈阳航空航天大学北方科技学院毕业设计(外文翻译)The Design and Realization of Digital Signature Based on RSARSA algorithms is introducedRSA public key cryptography. So-called public key cryptography system is to use different encryption and decryption key keys, is

    2、a known encryption key is deduced by declassified in calculations is key to be done password system.In a public-key cryptosystem, encryption key (i.e. public key) PK is the public information, and decryption key (namely, the private key) SK is needed to remain confidential. Encryption algorithm E an

    3、d decryption algorithm D also are in the open. Although the secret key SK is by public key PK decision, but cannot PK calculated according to SK. It is based on this theory, appeared in 1978 the famous RSA algorithms, it is usually into a pair of Mr RSA keys, one of which is kept secret key, save by

    4、 users; Another for public key, can be made public, and even can be registered in the network server. In order to improve the secrecy intensity, RSA keys at least 500 bits long, generally recommend using 1024 bits. This makes the calculation amount of encryption is very large. To reduce the computat

    5、ional complexity, sending the information, often USES traditional encryption methods and public key encryption method unifies means, that information with the improved DES or IDEA dialogue key encryption, and use the RSA encryption keys and information the dialogue. Each other after receiving inform

    6、ation, with different keys decryption and can check the information.RSA algorithms is the first not only can be used for encryption but also can be used for digital signature algorithm, and it is also easy to understand and operation. RSA is most widely studied public key algorithm, and put forward

    7、to the now from more than 30 years, experienced the test of all kinds of attacks, for the people to accept gradually, generally, is now one of the most outstanding public key solutions.The safety of the RSARSA security depends on the larger decomposition, but whether or not equal to tarsus decomposi

    8、tion theory has been failed to get the certificate, and for no proof that break RSA will need to be larger decomposition. Assuming there are a large without decomposition algorithm, it must be larger decomposition algorithm can be modified. At present, some variant of RSA algorithms have been proved

    9、 equivalent to tarsus decomposition. Anyway, the decomposition n is the most obviously method of assault. Now, people already can break down more than 140 decimal big primes. Therefore, must choose a big modulus n some, for application is up.RSA speedBecause of the large is calculated, make the fast

    10、est RSA than DES 100 times on slow, whether software or hardware implementation. Speed has been the defects of RSA. Generally speaking only for a few data encryption.RSAs chosen-ciphertext attackRSA in chosen-ciphertext before the attack is weak. Generally the attacker is will certain information is

    11、 the camouflage (Blind), let the private key with the entity to sign. Then, after calculation can get what it wanted information. In fact, attack the same weaknesses are using, that is such a fact that have been retained the multiplication of the input structure: (XM) d = X d * M d mod n front have

    12、already mentioned, the inherent problems from the public key cryptography is the most useful features-everyone can use public key. But from the algorithm cant solve the problem, the main measures are two: one is the good public key agreement, guarantee the process not produce any other entity entity

    13、 of the information the decryption, you know nothing wrong information signature; The other One is never sent to strangers random document signature, the first to use One sign of a document for-Way HashFunction HASH processing, or use at the same time different signature algorithm.RSA encryption alg

    14、orithm faults produce key is very troublesome, produced by a prime technical limitations, so hard to do it once a secret. security, the safety of RSA depends on the large factor decomposition, but did not prove theoretically decipher the difficulty of tarsus and RSA decomposition difficulty equivale

    15、nt, and most people tend to academic password factor decomposition is not NPC problem. At present, people already can break down more than 140 decimal big primes, it is required to use more long key, speed, more slowly; Moreover, the people are actively looking for attack RSA methods, such as chosen

    16、-ciphertext attack, general attackers will certain information is the camouflage (Blind), let the private key with the entity to sign. Then, after calculation can get what it wanted information. In fact, attack the same weaknesses are using, that is such a fact that have been retained the multiplica

    17、tion of the input structure: (XM) d = Xd * Md mod n front have already mentioned, the inherent problems from the public key cryptography is the most useful features-everyone can use public key. But from the algorithm cant solve the problem, the main measures are two: one is the good public key agree

    18、ment, guarantee the process not produce any other entity entity of the information the decryption, you know nothing wrong information signature; The other One is never sent to strangers random document signature, the first to use One sign-Way Hash Function of document for Hash processing, or use at

    19、the same time different signature algorithm. In addition to using public modulus, people also try some use decryption index or (n) and so on attack. speed too slow, because the grouping of RSA too large length, to ensure safety, n at least 600 bitx above, make the operation cost is high, especially

    20、at a slower speed, a symmetric cryptosystem several orders of magnitude slower; Along with the development of the larger decomposition technique, the length is increasing, go against the standardization of data format. At present, the SET (Secure Electronic Transaction) agreement with 2048 bits long

    21、 requirements CA keys, other entity USES 1024 bit key. In order to speed, at present the widely use of single, the method of using a combination of public key password, complementary advantages and disadvantages: ChanYao password encryption speed, people use it to encrypt a long documents, and then

    22、using the RSA encryption to give document, extremely good solve the problem of ChanYao password key distribution.Modern cryptography has become the core of information security technology, cryptography, is the communication security confidential subject research, that is, to study the type of secret

    23、 information transmission of transformation in order to prevent the third party to steal information. Cryptography include two branches: password code to learn and password analytics. Password code to learn the main information exchange, to protect information in the channels relay in to steal, decr

    24、yption and use method, and the password analysis learning is and password code learning instead, it mainly studies how to analyze and crack password. Both between both opposition to each other and promote each other. The classification of the password system has a lot of, one of them is based on enc

    25、ryption algorithm and decryption keys used algorithms are same, password system can be divided into symmetrical encryption system (ChanYao password system) and asymmetric encryption system (public key cryptosystems), the two password system each have their own advantages and disadvantages, so now US

    26、ES two hybrid. Public key cryptosystems features are: the receiving party B produces a pair of keys (PK and SK); PK public, SK confidential; PK from launch SK is very difficult; A and B both sides communication, A in any way obtained B public key, use the B public key encryption information, encrypt

    27、ed information can be obtained by any unsafe channel sent. B received ciphertext information, with their own private key recovering the decryption plaintext. Public key cryptography system to ensure the security of information have become the key technology. RSA public key cryptosystems so far or a

    28、recognised as safe system. RSA public key encryption algorithm is the first can used for data encryption can also be used as a digital signature algorithm. It is easy to understand and operation, is also very popular. As more commercial application and standardization work, RSA has become the most r

    29、epresentative of the public key encryption technology. VISA, MasterCard, IBM, Microsoft and other companies for the safety of Electronic trading work standard (Secure Electronic Transactions, SET) adopt the standard RSA algorithms, this makes the RSA in our life almost everywhere. Online transaction

    30、s encrypted connection, the bank on the net identity authentication, all kinds of credit card the use of digital certificate, intelligent mobile phone memory card and validation of chips and so on the function, most use RSA technology.In 1995, has been put forward a very unexpected attack way: if E

    31、younger sister to huang hardware are fully know, and know it to some specific message when the time needed to encrypt words, so she can be quickly is deduced from the d. This attack will be established the way, mainly because of the encryption on the mode of the index when computing is a bit a bit,

    32、and bits of 1 spent than a yuan for 0 computation of a operation, so if you can get more information and its encryption of time, will have a chance to launch the private key content. The most popular attack on RSA is generally larger factor decomposition based on. In 1999, the RSA-155 (512 bits) be

    33、successful decomposition, spent five months time (about 8000 MIPS years) and 224 CPU hours in a 3.2 G the central memory Cray C916 finished on the computer. In 2002, the RSA-158 was also success factor decomposition. On December 12, 2009, Numbers for RSA-768 (768 bits, 232 digits) number also be suc

    34、cessful decomposition. Beijing time February 15 morning news, according to the New York times reported Tuesday, European and American mathematicians and cryptographers accidental discovery, at present is widely spoken all over the worlds public key encryption algorithm RSA existence of loopholes. Th

    35、ey found that, in 7 million the experiment of 27000 sample public key and not according to the theory of randomly generated. That is, maybe someone can find out the secret of produce public key prime Numbers. This research project was made by the independent cryptographers James P.H ughes and Dutch

    36、mathematician Arjen k. Lenstra lead. Their report said: we found the vast majority of the public key all is according to the theory of generation, but every one thousand public key will have two unsafe. The report says, to prevent someone USES the vulnerability, a public key from the public access d

    37、atabase has been removed. To ensure the security of the system, the website needs to be in the terminal to change.Over the years, RSA mainly focuses on information security market in several fields, is also have distinguishing feature each field. In the identity authentication field, RSA attention t

    38、o many online trading enterprise including financial, search, and industry, the user to the extent of the identity authentication concern obviously different. Another fishing, Trojan than before more widespread. Online identity authentication, the growth is strong fraud. In addition, the enterprise

    39、internal control, at present, China is still in the process of maturity. In the data leak in some new Trojan RSA services to society and to the strong identity authentication, also have some new business breakthrough.The financial industry in anywhere in the world, there are the highest safety risk

    40、industry, whether the reality of crime or cyber crime, financial is a sweet BoBo. Along with the development of the network bank, financial industry to information security solutions needs always very strong, the financial industry is the largest RSA development space, and in the future for a period

    41、 of time will still is. How to keep the financial industry information security, prevent data leak, and deal with the financial services, and become the focus of future business development RSA.Digital signature is introducedDigital signature, is the only information to produce the sender of the oth

    42、ers cant fake a digital string, the string is also a number of information of the sender sends information a valid proof of authenticity.Digital signature is symmetrical encryption technology and the application of digital technology.Digital signature of the file is easy to verify the integrity of t

    43、he (dont need at the chapter, at the signature, also do not need the handwriting expert), and digital signature is not deny sex (dont need the handwriting expert to verify).Say simply, the so-called digital signature is additional data unit in on some of the data, or of data elements of the password

    44、 change. This kind of data or transform allow data unit receiver to confirm our units of data source and the units of data integrity and protect data, to prevent being (such as the receiver) forged. It is to the electronic form of news to sign one method, a signature news can be in a communication n

    45、etwork transmission. Based on the public key cryptography system and a private key password system can get digital signature, mainly is based on public key cryptosystems digital signature. Including ordinary digital signatures and special digital signature. Ordinary digital signature algorithm has R

    46、SA, ElGamal, Fiat-Shamir, Guillou-Quisquarter, Schnorr, Ong-Schnorr-Shamir digital signature algorithm, Des/DSA, elliptic curve digital signature algorithm and finite automata digital signature algorithm, etc. Special digital signatures have blind signature, proxy signature, group signature, undenia

    47、ble signature, fair blind signature, threshold signature, with news of the signature restore function, it is closely related with the specific application environment. Obviously, the application of digital signature involving legal problems, the federal government based on limited domain of discrete

    48、 logarithm problem develop their own digital signature standard (DSS).Digital Signature (Digital Signature) technology is asymmetric encryption algorithm of typical application. The process of application of digital signature, sending data sources to use his private key to data validation and or oth

    49、er relevant variables and data content to encrypt and the completion of legal signature data, data receiving party is use the other public key to interpret received digital signatures, and will interpret results are used to test the integrity of the data, to confirm the legitimacy of the signature. Digital signature technology in network system is virtual environment identified important technology, and can completely replace the real


    注意事项

    本文(毕业论文外文翻译--基于RSA的数字签名系统的设计与实现(适用于毕业论文外文翻译+中英文对照.doc)为本站会员(管**)主动上传,沃文网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知沃文网(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服点击这里,给沃文网发消息,QQ:2622162128 - 联系我们

    版权声明:以上文章中所选用的图片及文字来源于网络以及用户投稿,由于未联系到知识产权人或未发现有关知识产权的登记,如有知识产权人并不愿意我们使用,如有侵权请立即联系:2622162128@qq.com ,我们立即下架或删除。

    Copyright© 2022-2024 www.wodocx.com ,All Rights Reserved |陕ICP备19002583号-1

    陕公网安备 61072602000132号     违法和不良信息举报:0916-4228922