您好,欢迎访问三七文档
22220064JOURNALOFXINZHOUTEACHERSUNIVERSITYVol.22No.2Apr.2006RSA(,034000):RSA,RSA,RSA:;RSA;:TP393:A:1671-1491(2006)02-0047-040,,,,,RSA,,,,RSA1RSARSA,,RSA500,10241,N1N50751002003.9104743.8X1015:(1)pq,N(N=pq)(2)N(N)=(p-1)(q-1),(N)NN(3)[0,(N)-1]e,e(N)gcd(e,(N))=1()(4)ed=1mod(N)d,d(5)X,Y(X,YN),::Y=XemodN:X=YdmodNdNeN,dpq,2RSAn=pq,,n,pq2.1p-1n,pn,p-1,p(1)k,kB,k=B!,kB;(2)2n-2,2,3,;(3)kmodn;(4)Kmodngcd{K,n};(5)dn,k,(1)kB,pn,p-1B,kp-1,:2005-09-02:(1971-),,,,,FermatK1modp,p|gcd{K-1,n}K1modnRSAn=pq,pqp-1p+1,p512,p-1q,qp2.2pqpq,n=pqp2pnq(p+q2)2-(p-q2)2=pq=n(p+q2)2-n=(p-q2)2,p+q2pq,pq,p+q2n,, p, p-n=(p-q2)2,p+q2p-q2,n=94245,(p+q2)2-n=(p-q2)2p+q2307,(307)2=94249,94249-94245=22p+q2=307p-q2=2p=309q=305pq,,2.3ed(1)e(e,(N))=1,,e,,e=3Cm3modnm3n,,3,3,m3,n1,n2,n3(,n1,n2,n3,),m3Cmod(n1n2n3)n1,n2,n3,m3n1n2n3e,16(2)d4n,,,IC,ICe,d,,d,RSA,n512,dn1/4e,d3RSA3.1RSA,e,,RSA,()e3,17,65537e3,e,,(1)p=3q=11,N=pq=3311=33(2)(N)=(p-1)(q-1)=2310=20(3)[0,(N)-1],,[0,19]e=3,e(N)(4)ed=1mod(N)ded=1mod(N)ed=k3(N)+1,3d=k320+1,0,1,2,3k,dk=1,d=7pqN,e,d(5),N,N,0N,X=172035594(C0A41-0E0A,172035594),N(N=33),X1=17,X2=20,X3=3,X4=5,X5=5,X6=9,X7=4X1Y1=X1emodN=173mod33=29,,Y2=14,Y3=27,Y4=26,Y5=26,Y6=3,Y7=31Y=2914272626331,,,,,,,(6),NY=2914272626331:Y1=29,Y2=14,Y3=27,Y4=26,Y5=26,Y6=3,Y7=31,X=YdmodN,X=1202811913,,nn,unsignedlong,324294967295,,7,,33335937,,,,,n,,n(A3B)modN=((AmodN)3(BmodN))modN,X=Y7modN=(Y33Y4)modN=((Y3modN)3(Y4modN))modN,Y7Y1Y7X=172035594,8422,,,,3.2,WebJavaScript:p=5q=3N=15,(p-1)3(q-1)=8e=3(pq),d311=1mod8,d=3A,1,:C=m^emodN=13mod15=1P:m=CdmodN=13mod15=1:functionGCD(e,PHI){//greatif(ePHI){while(e%PHI!=0){}great=PHI}else{while(PHI%e!=0)a=PHI%e;PHI=e;e=a}great=e}returngreat}functiontofindE(PHI,P,Q){//egreat=0;e=2a=e%PHI;e=PHI;PHI=az=1}uu=u1vv=u2if(vv0){inverse=vv+PHI}eles{}inverse=vvreturninverse}:functionresult(form){varM=form.message.options[form.message.selectedIndex].value)varU=(for.message.options[form.message.selectedIndex].text)while(great!=1){//great=1ePHIe=e+1great=GCD(e,PHI)PHI=(P-1)3(Q-1)}returne}functionextend(E,PHI){//du1=1;u2=0;u3=PHIv1=0;v2=1;v3=EwhileMath.floor(u3/v3)t1=u1-q3v1;t2=u2-q3v2t3=u3-q3v3;u1=v1;u2=v2;u3=v3v1=t1;v2=t2;v3=t3;varE=form.exponent.valueVarN=form.Nvalue.valueC=Math.pow(M,E)%nif(newWindow==null){varnewWindow=window.open(,,height=2000,width=300)}bgcolor=FFFFFFnewWindow.document.write(+U++M)newWindow.document.write(br)newWindow.document.write(C=P^emodn)newWindow.document.write(br)newWindow.document.write(=+M+^+E+mod+N+=)newWindow.document.write(C)newWindow.document.write(br)newWindow.document.write(,=b+C)newWindow.document.write(/b)newWindow.document.write(/body/html)newWindow.document.close()},RSA4,,,,:,POHLIG942:RSA-Hellman,Rabin,ElGamal,SCHNORR,ESIGN,McEliece,OKAMOTO,RSA,ElGamalRSA,,,,,,,,,RSA,(:):[1].[M].:,2003.[2]Bruceschneier.[M].:,1998.167-173.[3],.RSA[J].,2002,25(6):412-414.[4].DESRSA[J].,2002,21(5):396-397.[5],.RSA[J].,2002,19(6):57-59.[6].RSA[J].,2003,(10):54.ImplementandResearchofTheRSAPublicCryptogramAlgorithmFENGSu-qin(XinzhouTeachersUniversity,Xinzhou034000,China)Abstract:RSAPublicCryptogramalgorithmisbasedonTheoremofEuler,whosesecuritydependsonthediffi2cultyaboutthefactordecomposedofgreatnumber.Thealgorithmusuallyfirstlygeneratesapairofrightkeys.Thepaperanalyzesanddiscussestheprocessaboutit,andcombinestheinstancetoimplementRSAalgorithm.Keywords:Commonkeycryptography;RSAalgorithm;TheoremofEuler(27):[1],,.[M].:,1984.21.[2].[M].:,1996.111.[3],.[J].,2002,(11):25-27.[4].[J].,2003,(1):44-45.Kecognition-knowledgeFunctionofMultiple-mediumNetTechnologyinPhysisTeachingYANGYuan(XinzhouTeachersUniversity,Xinzhou034000,China)Abstract:Accordingtotherecognition-knowledgetheoryofthephysicsstudying,therecognition-knowledgefunctionofmultiple-mediumnettechnologyinphysicsteachingwasdiscussed.Fouraspectsarebasicallygot2ten:interestarechangedintomotivation;externalarechangedintonature;knowledgearechangedintoability,effectofteachingisimproved.Keywords:physicsteaching;recognition-knowledge;multiple-mediumnettechnology0522
本文标题:网络安全论文
链接地址:https://www.777doc.com/doc-1268387 .html