首页 | 本学科首页   官方微博 | 高级检索  
   检索      

几种典型加密体制分析
引用本文:彭超峰,李连生.几种典型加密体制分析[J].装甲兵工程学院学报,2003,17(3):70-74.
作者姓名:彭超峰  李连生
作者单位:装甲兵工程学院指挥管理系,北京,100072
摘    要:简要分析了几种典型加密体制的基本原理,通过比较得出各种加密技术的优、缺点,及其应用领域和前景展望。结合我军指挥自动化发展过程中对安全保密技术的实际要求,选择了一种或几种合适的加密体制,对我军将要建设的指挥自动化系统(C~3I)所应用的加密算法提出了建议。

关 键 词:加密体制  密钥  非线性变换  指挥自动化
修稿时间:2003年4月1日

The Analyses of Several Representative Cryptography
PENG Chao-feng LI Lian-sheng.The Analyses of Several Representative Cryptography[J].Journal of Armored Force Engineering Institute,2003,17(3):70-74.
Authors:PENG Chao-feng LI Lian-sheng
Institution:PENG Chao-feng LI Lian-sheng
Abstract:This paper analyses the basic theories of several representative cryptographies. By comparison we know their advantages as well as disadvantages, applied fields and future development. And direct the right safety of process inside of army 's C3I development to actual request of cryptography technique's according to our army, choose one or several cryptography of what apply to our army's C3I, to our army's C3I will developments to suggest.
Keywords:cryptography  key  nonlinear conversion  C3I (command  control  communication and intelligence)  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号