English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4217468      Online Users : 257
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/24933


    Title: A true random-number encryption method
    Authors: Huang, Y.-L.;Leu, F.-Y.;Chen, J.-H.;Chu, C.-C.;Yang, C.-T.
    Contributors: Department of Computer Science, TungHai University
    Keywords: AES;Block ciphers;decryption;DES;Random Numbers;Internet;Standards;Ubiquitous computing;Cryptography
    Date: 2013-07-03
    Issue Date: 2014-06-20T02:05:11Z (UTC)
    Publisher: Taichung
    Abstract: In January, 1999, distributed.net and the Electronic Frontier Foundation collaborated with each other to break a DES key in 22 hours and 15 minutes, implying that the DES is no longer a secure encryption method. In this paper, we propose a more secure one, called the True Random Number Encryption Method (TRNEM for short), which employs true random numbers, the time parameters, and coated cipher text as the parameters of the encryption process to increase the security level of a system. After encryption, the cipher text is difficult to be cracked. We also analyze the security of the DES, AES and TRNEM, and explain why the TRNEM can effectively defend some specific attacks, and why it is safer than the DES and AES. ? 2013 IEEE.
    Relation: 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013
    Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013,P.654-659
    Appears in Collections:[資訊工程學系所] 會議論文

    Files in This Item:

    There are no files associated with this item.



    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback