Font Size: a A A

Gr(?)bner-based Information Security Technology

Posted on:2010-06-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhaoFull Text:PDF
GTID:2178360272991582Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Gr(o|¨)bner-based theory,experienced only a short period of decades.In the past few decades,Gr(o|¨)bner based on the research has a wide range of applications;it is close to the computer algorithm development and the improvement,for example: Gr(o|¨)bner-based group in the semi-algebra in structural characteristics and the methods in solving the shortest path algorithm Research.However,the uses of Gr(o|¨)bner-based information in security applications are relatively rare.In view of this,the paper is about Gr(o|¨)bner-based to do some of the aspects and research of information security.In the limited domain,with combination of the nature of some of the Gr(o|¨)bner base.This article first proposed the application of Gr(o|¨)bner-based the encryption and decryption algorithm;based on Gr(o|¨)bner bases to do data signature algorithm;Put forward their views and programs on the application of information security aspects of the application.First of all,introduced information security in today's information society of today's important role and applications,describes the background and significance of writing.Second,through the interpretation of the mathematical aspects of computer algebra concepts and terminology,explain the concept and nature of Gr(o|¨)bner bases.Gr(o|¨)bner-solving algorithm of thought,led to the application of Maple package to solve the Gr(o|¨)bner base.Next,after studying the Gr(o|¨)bner-based encryption and decryption mechanism on the basis of the theory,put forward Gr(o|¨)bner-symmetric encryption algorithm,and improve the existing non-Gr(o|¨)bner symmetric encryption algorithms and Gr(o|¨)bner-based digital signature algorithm,the final simulation experiment proved that the improved The feasibility algorithm.Finally,the author sums up the full text of the main elements of the future work of the management system of information security research predicted.
Keywords/Search Tags:Gr(o|¨)bner-based, RSA, DES, JAVA security package, Data Signature Algorithm
PDF Full Text Request
Related items