用户名: 密码: 验证码:
冗余加密及应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
目前,在电子商务中,利用 TCP/IP 公众网络和技术进行的在线交易和商务作
    业活动越来越多;同时,对于情报传递的快捷性和准确性也提出了更高的要求。
    电子商务其内容包含两个方面,一是电子方式,二是商贸活动; 涉及对象包括:
    金融机构、商家、生产企业、网络服务提供商、个人用户、政府部门和事业单位
    等。随着互联网技术的广泛应用,人们在从事上商业活动时更多的依靠于互联
    网,对机密文件传输的安全性的要求越来越高,因此信息的安全问题也显得尤为
    重要。对于网络传输中,经常会遇到一些进行恶意攻击,他们经常希望得到一些
    重要的甚至是机密的的东西。为了提高安全性,研究人员利用加密技术对解决这
    类问题提出了各种各样的办法。但是,各种加密方法各有各的特点,使得人们在
    实际使用中面临着选择。
    本论文首先,分析了目前加密算法存在的问题,同时对报价系统这种明文的
    加密,通过对报价单的分析,提出了设计加密的必要性,并设计了一种新型的加
    密算法,即利用纠错编码技术的加密技术 ------ 冗余加密。该加密算法是应哈莫尔
    曼泵系统(天津)有限公司的要求,针对报价系统的特点而制作的。利用该算
    法,对报价单系统我们根据不同的情况分为了对密钥加密和对明文加密两种情
    况。使原来只可以纠正一位错的矩阵变为可纠多位错;并产生一列明文加密的信
    息列,通过纠错码的原理使其产生一个冗余校验矩阵;加入到明文的矩阵中。使
    破译者的破译次数成倍增长,从而大大增加了破译难度。并且对采用不同的加密
    算法的破解次数进行了讨论分析。
    该算法目前不仅仅可以应用在报价系统中,对于其他的电子商务文件的加密
    也同样适用。
Recently, more and more people do transaction online using the TCP/IP network
    and technology. As a result, it requires quicker and more accuracy transmission of
    messages. ELECTRONIC COMMERCE has two aspects: one is electronic aspect and
    the other is transaction activity, which can serve a lot of people in all fields. With the
    wide use of internet technology, people more depend on the internet for their transaction
    activity, and so need higer and higer transaction security. Thus the imformation security
    is very important. However, we often meet some animus attacks and the attackers want
    to get some important files. To improve security, scientist provide many kinds of the
    ways of the encryption technology to resolve these problems. Because different
    technology has different properties, and so the people must analyze them and choose
    one of them.
     In this thesis, we analyze the current encryption methods' problems, and explain
    the necessary of the designing the encryption according to the peculiarity of the
    quotation system. Futhermore, we have designed a new encryption method using the
    correction wrong code in order to meet the requirements of the Hamaeman System
    Company for its quotation system. In our method design, we use the several correcting
    wrong codes to replace one correcting wrong code, and so many redundancy
    information are filled in the file so that it can strengthen the security. This method
    makes the attacker work more and more time.
     Now this method is used in not only the quotation system, but also in the other EC
    files.
引文
[1] S.Lin,T.Kasam,"Encoding and decoding of reed-solomon codes in dual basis",《电
    子学报》,No.4
    [2] W.W.Peterson and E.J.Weldon,Jr.,Error Correcting Codes,Cambridge,MA,1972
    [3] R. W. Hamming. Error detecting and error correcting codes. B. S. T. J., April 1950,
    29:147~160
    [4] 张江陵,冯丹 “海量信息存储”2003 科学出版社
    [5] 沈世镒,陈鲁生 “信息论与比编码理论”2002 科学出版社
    [6] W.D.Wallis"One-Factorizations" Kluwer Academic Publishers
    [7] McEliece R J.Fiite Fields for Computer Scientists and Engineers.Kluwer Academic,
    1987
    [8] MacWilliams F J,Sloane N J A.The theoy of error-correcting codes.North-Holland
    Publishing Company,1977
    [9] 卢开澄“组合数学(第 2 版)”,1991,清华大学出版社
    [10] 张效祥等“计算机科学技术百科全书”清华大学出版社
    [11]Van Lint J H.Introfuction to coding theory,raduate texts in mathematics, Vol86,
    Springer-Verlag,1982.
    [12]Van Tilburg J.Security-analysis of a class of cryptosystems based on linear error-
    correcting codes[dissertation of ph D],1994.
    [13] P.Elias.Error-free Coding.IRE Trans.on Information Theory,1954.
    [14] 万哲先,“代数与编码”,北京:科学出版社,1980
    [15] D.C.Gorentein,W.W.Peterson and W.Znerler,"Two-error correcting BCH codes are
    quasiperfect",Inform.Control,Vol.3.
    [16] P. Elias. Error- free Coding. IRE Trans. on Information Theory, 1954,4: 29~37
    [17] W.W.Peterson and E.J.Weldon, Jr.,Error-Correcting Codes,MIT Press,Cambridge,
    1972.
    [18] V.Pless,Introduction to the Theory of Error-Correcting Codes,John Wiley and Sons,
    1982.
     58
    
    
    天津大学工程硕士论文
    [19] T. Schauh, A Linear Complexity Approach to Cyclic Codes,Dissertation for Ph.
    D,ADAG,1988.
    [20] 冯贵良,吴新文,代数几何码,北京:科学出版社,1998
    [21] 王新梅,肖国镇“纠错码 - 原理与方法”1991,西安电子科技大学出版
    [22] W. J. V. Gils,“Two topics on linear unequal error protection codes bound on their
    length and cyclic code classes”, IEEE Trans. On IT, No.6,pp.866-876,1983.
    [23] G.C,Clark, Jr., J.B. Cain, Error – Correcting Coding for Digital Communications,
    Plenum Press, New York,1981.
    [24] A. J. Viterbi, J. K. Omura, Principles of Digital Communication and Coding,
    McGraw – Hill, New York,1979.
    [25] W.Stieritz, J. K. Wolf, “Improvement in two soft decision of linear coder using a
    trellies”, IEEE Trans. On IT, pp. 76-80, Jan. 1978.
    [26] L. D. Rudolph, C. R. P. Hartman, “Algebraic analog decoding of linear binary
    codes”
    [27] S. Lin and D. J. Costello, Jr., Error Control Coding --- Fundamentals and
    Applications, 1984.
    [28] J. L. Massey, Threshold Decoding, MIT Press, Cambridge, MA, 1963.
    [29] 于康友:求取一类循环码的覆盖多项式集合的一种方法,《通信学报》。
    [30] 靳蕃:《组合设计与编码》,西南交通大学出版社,1990。
    [31] 王新梅:《纠错码与差错控制》,人民邮电出版社,1989。
    [32] T. Schaub,“A linear complexity approach to cyclic codes”, A Dissertation for
    the Degree of Ph. Doctor, 1988.
    [33] J. H. VanLint, R. M. Wilson, “On the minimum distance of cyclic codes”, IEEE
    Trans, on IT, No. 1, pp.23-40, 1986.
    [34] W. W. Peeterson. Error correcting codes. Cambridge, MA: MIT Press, 1961
    [35] J. L. Massey. Threshold decoding. Cambridge, MA: MIT Press,1963
    [36] R. G. Gallager. Information theory and reliable communication. New York: John
    Wiley and Sons,1968
    [37] A. J. Viterbi, J. K. Omura. Principles of digital communication and coding. New
     59
    
    
    天津大学工程硕士论文
    York: McGraw- Hill,1979
    [38] W.W.Peterson& E. J. Weldon. Error- correcting codes. Cambridge Mass.:MIT
    Press,1972.
    [39] A. Hocquenghem. Codes correcteurs d'erreurs. Chiffres, 1959,2:147~156
    [40] R. C. Bose and D. K. Chaudhuri. On a class of error correcting binary group codes.
    inf. Control, 1960,3: 68~79
    [41] I.S. Reed and G.Solomon. Polynomial codes over certain finite fields. SIAM J.,
    1960, 8:300~304
    [42] J. L. Massey. Shift register synthesis and BCH decoding. IEEE T-IT, 1969, 15: 122
    ~127
    [43] William Stallings: 密码编码学与网络安全:原理与实践 电子工业出版社,
    2001
    [44] L. A. Dunning, “ Optimal encodings of linear block codes for unequal error
    protection”, Information and Control, Vol. 37, pp.150-177,1978.
    [45] V. Pless, Introduction to the Theory of Error - Correcting Codes, John Wiley and
    Sons,1982.
    [46] 林胜 “存储系统中的容错编码研究” 南开大学硕士学位论文,2002
    [47] 王育民, 粱传甲:《信息论与编码理论》, 西北电讯工程学院出版社, 1986.
    [48] T. R. N. Rao and E.Fujiwara: Error - Control Coding for Computer Systems,
    Prentice Hall,1989.
    [49] J.M. Berger, “A note on error detecting codes for asymmetric channels”, Inform.
    Contr., Vol.4,pp.68-73, 1961.
    [50] N. N. Tendolkar, Asymptotically Optimum Soft Decision Decoding, Dissertation,
    August 1983.
    [51] 殷剑宏 吴开亚 “图论及其算法” 中国科学技术大学出版社
    [52] 沈永欢 等 “实用数学手册” 科学出版社

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700