GIẢI PHÁP XÁC THỰC, BẢO MẬT VĂN BẢN LƯU TRỮ SỬ DỤNG CÂY BĂM MERKLE, LƯỢC ĐỒ KÝ SỐ ED25519 VÀ MÃ KHỐI AES
Thông tin bài báo
Ngày nhận bài: 10/08/22                Ngày hoàn thiện: 16/09/22                Ngày đăng: 16/09/22Tóm tắt
Từ khóa
Toàn văn:
PDFTài liệu tham khảo
[1] W. Stalling, Cryptography and Network Security: Principles and Practice, 6th edition, Pearson Publishing, 2014, pp. 08-24.
[2] S. Nakov, Practical cryptography for developers, SoftUni, 2018, pp. 144 – 172.
[3] O. Rodeh, J. Bacik, and C. Mason, "BTRFS: The Linux B-tree filesystem," ACM Transactions on Storage (TOS), vol. 9, no. 3, pp. 1-32, 2013.
[4] M. R. Secrecy, “Authentication, and public key systems. Electrical Engineering,” PhD. Thesis, Stanford University, 1979.
[5] B. Carminati, “Merkle Trees,” in Encyclopedia of Database Systems, Springer Reference, 2009, pp. 1714–1715.
[6] D. Koo, Y. Shin, J. Yun, and J. Hur, "Improving Security and Reliability in Merkle tree-based Online Data Authentication with Leakage Resilience," Applied Sciences, vol. 8, no. 12, 2018, Art. no. 2532.
[7] B. Sharma, C. N. Sekharan, and F. Zuo, "Merkle-tree based approach for ensuring integrity of electronic medical records," Proceedings of 2018 9th IEEE Annual Ubiquitous Computing Electronics & Mobile Communication Conference (UEMCON), 2018, pp. 983-987.
[8] Q. Li, "Research on E-Commerce User Information Encryption Technology Based on Merkle Hash Tree," Proceedings of 2019 International Conference on Robots & Intelligent System (ICRIS), 2019, pp. 365-369.
[9] S. Dhumwad, M. Sukhadeve, C. Naik, K. N. Manjunath, and S. Prabhu, "A peer to peer money transfer using SHA256 and Merkle tree," Proceedings of 2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM), 2017, pp. 40-43.
[10] J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B. Yang, “High-speed high- security signatures,” Journal of Cryptographic Engineering, vol. 2, pp. 77-89, 2012.
[11] S. Josefsson, “Edwards curve Digital Signature Algorithm (EdDSA),” IETF, 2017. [Online]. Available: https://tools.ietf.org/html/rfc-8032. [Accessed Jun. 19, 2022].
[12] United States National Institute of Standards and Technology, "Announcing the ADVANCED ENCRYPTION STANDARD (AES)," Federal Information Processing Standards Publication 197. November 26, 2001.
[13] M. Lamberge and F. Mendel, Higher-Order Differential Attack on Reduced SHA-256, IACR Cryptology ePrint Archive, 2011.
[14] D. Giry, “Recommendation for Key Management,” Special Publication 800-57 Part 1 Rev. 5, NIST, 05/2020. [Online]. Available: https://www.keylength.com/en/4/. [Accessed Jul. 04, 2022].
[15] F. Mendel, T. Nad, and M. Schlaffer, “Improving local collisions: New attacks on reduced SHA-256,” LNCS, Springer, vol. 7881, pp. 262–278, 2013.
[16] A. Hosoyamada and Y. Sasaki, Quantum Collision Attacks on Reduced SHA-256 and SHA-512, Cryptology ePrint Archive, 2021.
[17] M. R. Z’aba and M. A. Maarof, “A survey on the cryptanalysis of the advanced encryption standard,” in Proceedings of the Postgraduate Annual Research Seminar, 2006, pp. 97–102.
[18] K. Li, L. Qu, B. Sun, and C. Li, “New results about the boomerang uniformity of permutation polynomials,” IEEE Transactions on Information Theory, vol. 65, no. 11, pp. 7542–7553, 2019.
[19] P. Wang, C. Hua, and M. Zochowski, “Benchmarking Hash and Signature Algorithms, medium.com,” 2019. [Online]. Available: https://medium.com/logos-network/benchmarking-hash-and-signature-algorithms-6079735ce05. [Accessed Jul. 04, 2022].
DOI: https://doi.org/10.34238/tnu-jst.6352
Các bài báo tham chiếu
- Hiện tại không có bài báo tham chiếu