Forum Europejskie Centrum Integracji i Rozwoju Strona Główna Europejskie Centrum Integracji i Rozwoju
ECID WITA


ugg boots sale Based on DES, the new method of dig

 
Napisz nowy temat   Odpowiedz do tematu    Forum Europejskie Centrum Integracji i Rozwoju Strona Główna -> Ogólne
Zobacz poprzedni temat :: Zobacz następny temat  
defgf67ay




Dołączył: 29 Paź 2010
Posty: 863
Przeczytał: 0 tematów

Ostrzeżeń: 0/5
Skąd: England

 PostWysłany: Czw 8:05, 06 Sty 2011    Temat postu: ugg boots sale Based on DES, the new method of dig Back to top

Based on DES, the new method of digital image scrambling


): 440 ~ 447lO Lu K C.. Computer cryptography. Beijing: Tsinghua University Press, l998lI Qi Dong Xu, and computer-generated fractal Beijing: Science Press,[link widoczny dla zalogowanych],】 994 l-Qi Zou Jiancheng Qi Dong Xu Wei on the Run: A digital image-based DES Scrambling Method 7ANovelDigitalImageScramblingMethodYanWeiqi ', ZouJianchengQiDongxu (1) BeijingHanwangGroup,[link widoczny dla zalogowanych], 100080. Beijing, China2) Collegeo1'FundSci, NorthChinaUniv0fTech, 100041, Beiiing, China3) CADResearchCenter, NorthChinaUnivofTeeh. , 100041, Beijing, China) AbstractBasedonDESincryptography, imagescramblingisstudiedinthispaper. ThescramblingmethodisanimprovementandapplicationofDESindigitalimages. DigitalimagelosescorrelationintWOdirectionyimagescrambling. Undersomeattacks, theoriginalimagecanbere-constructedbyscrambledimage. ThefeasibilityofthismethodisprovedbyexperimentalresultsKeyWordsdigitalimagescrambling; DES; XORoperation; anti-attack (on the next 3 Volume 13 p. 5) international information and communication security research trends BruceSchneier to 3wAY, Biham-DES, DES-X, NewDES, RC2, and TEA in the relevant key Password proposed a new type of \The so-called related-key cryptanalysis method is to assume that the attacker not only lies in the original key k (unknown) lower, and export control in some key k a f (k) under the form of some plaintext encrypted. In the choice of related key attack scenario, an attacker can specify the key and how to change the situation in the known related-key attack, the attacker knows the key difference, but can not select the key change here emphasized that the attacker is known or select the key relationship between the key but not really know the actual value. This new approach is the password in the Americas 1996 meeting,[link widoczny dla zalogowanych], BruceSchneier continuation of such work. This new approach not only shows the general method of attack used in different instances of the password system, and pointed out the design to prevent such attacks in the form of block cipher guidelines. YasuyakiSakai et al weak RSA PGP keys generated by the system were analyzed. PGP is the most popular for the In-ternet cryptography, PGP's security depends on the RSA algorithm's security. YasuyakiSakai, who focused on the PGP system resistance \PGP source code through the analysis of systems that generate large prime numbers PGP algorithm principle is: generate large prime numbers P, so that P1 has a large prime factor. Above the RSA algorithm can resist the \However, the above method does not consider the prime factors of P +1 case, which led to weak PGP system-generated RSA keys, can not resist the \Although more than 10 years, have been proposed to generate a strong prime number of ways,[link widoczny dla zalogowanych], can also resist \YasuyakiSakai and others not only from the theoretical analysis of the PGP system vulnerabilities, discussed the distribution of weak key RSA,[link widoczny dla zalogowanych], and their impact on system security of PGP, and PGP is given the weak system-generated RSA key practical examples. (Continued)
More articles related to topics:


[link widoczny dla zalogowanych]

moncler veste Brief Introduction to prevent corros

[link widoczny dla zalogowanych]


Post został pochwalony 0 razy
 
Zobacz profil autora
Wyświetl posty z ostatnich:   
Napisz nowy temat   Odpowiedz do tematu    Forum Europejskie Centrum Integracji i Rozwoju Strona Główna -> Ogólne Wszystkie czasy w strefie EET (Europa)
Strona 1 z 1

 
Skocz do:  
Możesz pisać nowe tematy
Możesz odpowiadać w tematach
Nie możesz zmieniać swoich postów
Nie możesz usuwać swoich postów
Nie możesz głosować w ankietach

Cobalt 2.0 phpBB theme/template by Jakob Persson.
Copyright © 2002-2004 Jakob Persson


fora.pl - załóż własne forum dyskusyjne za darmo
Powered by phpBB © 2001, 2002 phpBB Group