首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
2.
The security of stream cipher, which is known as one of the main cipher techniques, dependents completely on the quality of generated pseudo-stochastic sequences. Chaotic systems can produce the pseudo-stochastic sequences with the properties of excessive dependence on initial conditions and the difficulty in forecasting, therefore, these systems are suitable to the stream cipher. A new encryption algorithm is proposed by analyzing the principle of the chaos encryption algorithm based on logistic formula. Moreover, the security and performance of the proposed algorithm is also estimated. Finally, an example is given to demonstrate our method via the Visual C++.  相似文献   

3.
4.
5.
Chaotic maps with its characteristic are very useful in cryptography, however, compared with wide application in symmetric system, the research about chaos in public-key encryption system is still few. Through analysing the period of toms automorphisms which is a prototype of chaotic map, and making use of the framework of the traditional public-key algorithm RSA, the authors propose a chaotic public-key encryption algorithm based on toms automorphisms. Its security is based on the intractability of the integer factorization problem as RSA, and it is able to resist the chosen-ciphertext attack against RSA and easy to be implemented.  相似文献   

6.
An algorithm was proposed in view of the combination of image compression and encryption. We got the approximate part and three detail parts after transforming the image with discrete wavelet transform (DWT), and compressed the image by modifying the detail parts by a given threshold value based on human visual systems. And then, we encrypted the image by scrambling the approximate part because this part held mostly of the energy. Last, a compressed and encrypted image can be achieved after DWT. Simulation result shows a good effect on the combination of compression and encryption.  相似文献   

7.
A great deal of electronic documents will be produced in enterprises, many of which in the form of disk files are stored in the computers of each department. Some are shared through the sharing mechanism, but they are difficult to manage and maintain. Security problems and information-isolated island may occur for some of these documents. A new technology of electronic document administration are introduced, in which authorized administration mechanism are taken and the documents are classified, encrypted, compressed and then transported via intranet and stored in database. Its application in enterprises has proved that documents can be shared and queried dynamically, conveniently and reliably by using the technology.  相似文献   

8.
A logistic map controlled secure arithmetic coding is proposed, the Logistic map is used to control the order of the symbols in the model and change the probabilities of the symbols, which is applied to the image encryption. The proposed scheme makes the image transmit more secure and comfortably on the Internet, and that is done at little expense in terms of coding efficiency. In the coding process, it ensures the uniformity of the model being changed by the chaotic sequence, thus to meet the security requirements of image compression. The algorithm can be applied to any arithmetic codec based on multimedia data including video, image and audio. Its most strength compared with other cipher mode is that, there is a significant reduction in the redundancy of information during the compression process, and it is robust when attempting to estimate the information of the image and discovering the key. The scheme can effectively resist differential analyses from both cryptography and coding.  相似文献   

9.
Privacy protection technologies of automated trust negotiation have witnessed great development, among which hidden credentials is an admittedly more satisfactory one. However, for hidden credentials, there exists fatal weakness of blindly decryption, which results decryption execution costly. To solve the problem, using bilinear pairings over elliptic curves, a policy-based encryption for privacy protection is proposed. Under the assumption of BDH problem, the scheme is proven to be IND-Pol-CCA safety in the random prediction model. Compared with hidden credentials and other encryption solutions based on policy, this scheme is more efficient, secure and of shorter length of cipher text.  相似文献   

10.
11.
基于压缩编码的加密方式能够同时完成加密和压缩的功能,通过压缩减少了信息的冗余,同时引入加密使对试图推测出明文信息和找到密钥的攻击具有非常好的鲁棒性。提出了一种基于随机区间置换的安全算术编码,在编码过程中通过随机密钥保证图像压缩编码的安全性,且不影响编码的效率,使其方便在网络中安全传输。实验结果和安全性分析表明该安全算术编码有较好的安全性和加密效率。  相似文献   

12.
13.
As the important method and instrument of agile manufacture,the technology of distributed collaborative design and manufacturing has become the hotspot of manufacturing. The basic concept and key technologies of IP_VPN are introduced in this paper,and a collaborative design network model based on IP_VPN is presented. Distributed collaborative design is a multi_user,multitask involved system, which is consisted of lots of collaborative processs,so the network security is the key of distributed collaborative design. We research on the security of collaborative design network based on IP_VPN, hence get a conclusion:we can construct an economical?practical and secure collaborative design network system by the application of data encryption,user authentication and access control based on the role,etc.  相似文献   

14.
Jens Jensen 《Euphytica》1979,28(1):47-56
Summary The high-lysine gene in Risø mutant 1508 conditions an increased lysine content in the endosperm via a changed protein composition, a decreased seed size, and several other characters of the seed. The designation lys3a, lys3b, and lys3c, is proposed for the allelic high-lysine genes in three Risø mutants, nos 1508, 18, and 19. Linkage studies with translocations locate the lys3 locus in the centromere region of chromosome 7. A linkage study involving the loci lys3 and ddt (resistance to DDT) together with the marker loci fs (fragile stem), s (short rachilla hairs), and r (smooth awn) show that the order of the five loci on chromosome 7 from the long to the short chromosome arm is r, s, fs, lys3, ddt. The distance from locus r to locus ddt is about 100 centimorgans.  相似文献   

15.
Autotoxicity restricts reseeding of alfalfa (Medicago sativa L.) after alfalfa until autotoxic chemical(s) breaks down or is dispersed into external environments. A series of aqueous extracts from leaves, stems, roots and seeds of alfalfa ‘Vernal’ were bioassayed against alfalfa seedlings of the same cultivar to determine their autotoxicity. The highest inhibition was found in the extracts from the leaves. Extracts at 40 g dry tissue l?1 from alfalfa leaves were 15.4, 17.5 and 28.7 times more toxic to alfalfa root growth than were those from roots, stems and seeds, respectively. A high‐performance liquid chromatography (HPLC) analysis with nine standard compounds showed that the concentrations and compositions of allelopathic compounds depended on the plant parts. In leaf extracts that showed the most inhibitory effect on root growth, the highest amounts of allelochemicals were detected. Among nine phenolic compounds assayed for their phytotoxicity on root growth of alfalfa, coumarin, trans‐cinnamic acid and o‐coumaric acid at 10?3 m were most inhibitory. The type and amount of causative allelochemicals found in alfalfa plant parts were highly correlated with the results of the bioassay, indicating that the autotoxic effects of alfalfa plant parts significantly differed.  相似文献   

16.
[Objectives]This study aimed to establish a QAMS(quantitative analysis of multi-components by single-marker)method for simultaneous determination of four phenol...  相似文献   

17.
Development of onion (Allium cepa L., cv. ‘Early Cream Gold’) seed under cool climate conditions in Tasmania, Australia occurred over a longer duration than previously reported, but similar patterns of change in yield components were recorded. In contrast to previous studies, umbel moisture content declined from 85 to 67 % over 57 days while seed moisture content decreased from 85 to 31 %. Seed yield continued to increase over the duration of crop development, with increasing seed weight compensating for seed loss resulting from capsule dehiscence in the later stages of maturation. Germination percentage was high and did not vary significantly from 53 to 77 days after full bloom (DAF), but mean germination time declined and uniformity of germination increased significantly over the same time period. The percentage abnormal seedlings declined with later harvest date, resulting in highest seed quality at 77 DAF. The results of this study suggest that the decision to harvest cool climate onion seed crops before capsule dehiscence will result in a loss of potential seed yield and quality.  相似文献   

18.
[Objectives]To optimize the water extraction process of Chinese Herbal Compound Man Gan Ning and establish a method for its extraction and content determination...  相似文献   

19.
Progress is being made, mainly by ICARDA but also elsewhere, in breeding for resistance to Botrytis, AScochyta, Uromyces, and Orobanche; and some lines have resistance to more than one pathogen. The strategy is to extend multiple resistance but also to seek new and durable forms of resistance. Internationally coordinated programs are needed to maintain the momentum of this work.Tolerance of abiotic stresses leads to types suited to dry or cold environments rather than broad adaptability, but in this cross-pollinated species, the more hybrid vigor expressed by a cultivar, the more it is likely to tolerate various stresses.  相似文献   

20.
T. Visser  E. H. Oost 《Euphytica》1981,30(1):65-70
Summary Apple and pear pollen was irradiated with doses of 0, 50, 100, 250 and 500 krad (gamma rays) and stored at 4°C and 0–10% r.h. From the in-vitro germination percentages an average LD 50 dose of about 220 krad was estimated. For both irradiated and untreated pollen a close and corresponding lineair relationship existed between germination percentage and pollen tube growth.Irradiated pollen was much more sensitive to dry storage conditions than untreated pollen, resulting in less germination and more bursting. Apparently, irradiation caused the pollen cell membrane to lose its flexibility faster than normal. Rehydration of dry-stored, irradiated pollen in water-saturated air restored germination percentages up to their initial levels. The importance of this procedure in germination trials is stressed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号