Research on Various Algorithms in Asynchronous Network Communication System

Article Preview

Abstract:

This paper discusses an in-depth analysis of various encryption technologies, such as RSA, DES, SHA-1, improves DES algorithm and combines their advantages, then put forward a new communication security model based on various algorithms. Thus increasing the security of asynchronous network communication system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 734-737)

Pages:

3180-3185

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] QIU Wei-xing, XIAO Ke-zhi, NI Fang, HUANG Hua. DES Key Extension Method[J] 2011.

Google Scholar

[2] Li Qin-wei, Peng lei. Analysis of DES S-box. Gui zhou university. 2008.

Google Scholar

[3] Zhu Gui-liang Wang Chao-feng Zhang Xiaoq-iang. Design and implementation of smis data security based on the mixed encryption algorithm and fuk technology. North China University of Water Resources and Electric Power. (2012)

Google Scholar

[4] Ding Chen-li. Reseach an implementation of encryption and decryption system of file. Shanghai Jiaotong university. 2009.

Google Scholar

[5] Liu Yuan-sheng. Computer network security[M]. BeiJing: Tsinghua University press. 2006.

Google Scholar

[6] Duan gang . The encryption and decryption of [M]. Beijing: Publishing House of electronics industry, 2009.

Google Scholar

[7] Du qian, Zhang Wen-xia. Language can realize S H A -1 hash algorithm [J].Journal of Wuhan University of Technology, 2007,( 29 ): 43-44.

Google Scholar

[8] Markku-Juhani O. Saarinen. Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. Helsinki University of Technology, 3-8

Google Scholar

[9] Timebleby, H. W. and Gow J, "Computer algebra in interface design research",Proceedings of the 9th International Conference onIntelligent User Interface, Island of Madeira, 2004, pp.366-367.

Google Scholar

[10] Z. He, et al, "Optimum bit allocation and accurate rate control forvideo coding viaρ-domain source modeling," IEEE Trans. CircuitsSyst. Video Technol., vol. 12, no. 10, p.840–849, Oct. 2002.

DOI: 10.1109/tcsvt.2002.804883

Google Scholar

[11] D. Kwon et al. "Rate Control for H.264 Video with Enhanced Rateand DistortionModels," IEEE Trans Circuits and Syst. VideoTechnol., Vol. 17, pp.517-529, May 2007.

Google Scholar