簡易檢索 / 詳目顯示

研究生: 洪順成
Hong, Shun-Cheng
論文名稱: 混沌式準隨機位元產生器及其在影像/視訊加密應用之研究
A Study on Chaotic PRBG and Its Application to Image/Video Encryption
指導教授: 陳進興
Chen, Chin-Hsing
學位類別: 博士
Doctor
系所名稱: 電機資訊學院 - 電機工程學系
Department of Electrical Engineering
論文出版年: 2011
畢業學年度: 99
語文別: 英文
論文頁數: 97
中文關鍵詞: 加密金鑰流迴授混沌式串流碼
外文關鍵詞: encryption, cipher feedback, chaos-based stream cipher
相關次數: 點閱:60下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本論文提出兩種加密架構,分別應用於JPEG2000影像和MPEG視訊。針對JPEG2000,我們採用J. Fang加密模式並增加金鑰流迴授的功能,此一修改的理由是在同樣的明文和相同金鑰流時能產生不同的密文,除此之外,我們採用藕合混沌準隨機位元產生器(CCS-PRBG)取代在F&S系統的計數器模式AES。經由實驗結果顯示,我們提出的加密架構能提供高安全性,並可大幅提高運算速度。
    在MPEG視訊部份,本論文將D. Xie和C. C. J. Kuo提出的REC/RPB加密架構修改成混沌加密架構,其中使用Zhu的混沌式串流碼取代128位元MD5雜湊函數以產生金鑰流。使用Zhu混沌式串流碼的原因是可產生任意長度的金鑰流。我們擷取已壓縮的影像資料流,做不同的組合加密以符合使用者的需求,設計一多重安全性的混沌加密架構。經由安全性實驗分析顯示,我們的架構具有高安全性,可抵禦已知密文攻擊,已知明文攻擊和選擇性明文攻擊。我們並以實驗比較部份加密,全部加密和原始未加密三者的壓縮效能和計算時間。

    In this thesis, we proposed an encryption scheme for JPEG2000 and an encryption scheme for MPEG video. For JPEG2000, we adopt the encryption scheme proposed by J. Fang and modify its encryption operations by adding the action of cipher feedback. The reason why we do this modification is that it can make the same plaintext with the same key stream have different ciphertext. Beside that, we adopt a pseudo-random bit generator based on couple chaotic systems called CCS-PRBG to replace the counter mode AES employed in the F&S system. Experiments show that our proposed encryption scheme not only still can provide high security but also speed performance greatly improved.
    For MPEG video, this thesis presents a modified chaos-based encryption scheme on the basis of the REC/RPB encryption scheme proposed by D. Xie and C. C. J. Kuo, where the Zhu’s chaos-based stream cipher is used to replace the 128-bit MD5 hash function as the secret key. The reason is that the Zhu’s chaos-based stream cipher could output keystream of arbitrary length. We encrypted the extracted video compressed stream with various combination according to the demands. Therefore a multiple security encryption scheme could be obtained. Experimental security analysis showed that it is of high security and able to withstand the attacks of ciphertext only, known plaintext, and chosen plaintext. Besides, the compression performance and the compution time comparison among the selective encryption, all entropy encoder output encryption, and the original compressed bitstream without encryption were also examined.

    Contents 摘要 III Abstract IV Acknowledgements VI Contents VII Figure Captions IX Table Captions XII Chapter 1 Introduction 1 Chapter 2 Cryptography with Chaos Theory 11 2.1 The Basic Concept of Cryptography 11 2.2 The Basic Concept of Chaos Theory 15 2.3 Implementation of Chaos in Digitalized World 22 2.4 Image Encryption as an Example Application of Chaos 26 Chapter 3 Pseudo-Random Bit Generators Based on Chaotic Maps 31 3.1 Chaotic PRNG 31 3.2 Tests on PRNGs 32 3.3 CCS-PRBG with Perturbance 35 3.4 Nonlinear Transform Based PRBG 40 Chapter 4 A Chaos-Based Encryption Scheme for JPEG2000 Images 47 4.1 The Proposed Encryption System 47 4.2. Experimental Results 53 4.3. Security Analysis 60 Chapter 5 A Chaos-Based Encryption Scheme for MPEG Video 69 5.1 The Proposed Encryption Scheme 69 5.2 Experimental Results 78 5.3 Security Analysis 85 Chapter 6 Conclusion and Future Work 90 References 92 Figure Captions Fig. 1.1 Stream cipher scheme. 2 Fig. 1.2 An output sequence from a logistic map. 5 Fig. 2.1 The block diagram of a typical cryptosystem. 12 Fig. 2.2 The goal of cryptography. 13 Fig. 2.3 The block diagram of a symmetric-key cryptosystem. 13 Fig. 2.4 The block diagram of an asymmetric-key cryptosystem. 14 Fig. 2.5 The projection of Eq. (2.1) onto (a) X-Y plane (b) X-Z plane (c) Y-Z plane. 17 Fig. 2.6 Bifurcation of the control parameter of the logistic map. 18 Fig. 2.7 Output sequences from a tent map with initial value=0.345 and (a) , (b) , (c) , (d) . 20 Fig. 2.8 Two output sequences from a PWLCM and their correlation functions. 22 Fig. 2.9 The quantization errors with precision of (a) 16-bit, (b) 32-bit. 23 Fig. 2.10 A typical pseudo-orbit of a digital chaotic system. 24 Fig. 2.11 Configurations of a perturbation-based algorithm. 26 Fig. 2.12 The projection of Eq. (2.6) onto (a) X-Y plane, (b) X-Z plane, (c) Y-Z plane. 28 Fig. 2.13 (a) Image Lena, (b) Histogram of (a). 30 Fig. 2.14 (a) A shuffled image of Fig. 2.13 (a), (b) Histogram of (a). 30 Fig. 2.15 (a) An encrypted image of Fig. 2.13 (a), (b) Histogram of (a). 30 Fig. 3.1 The diagram of CCS-PRBG. 37 Fig. 3.2 Statistical properties of CCS-PRBG. 40 Fig. 3.4 Auto correlation function 45 Fig. 3.5 Cross correlation function 45 Fig. 4.1 The flowchart of our proposed compliant encryption scheme. 48 Fig. 4.2 The CCS-PRBG diagram. 51 Fig. 4.3 The correlation functions: (a) auto correlation function, (b) cross correlation function. 52 Fig. 4.4 (a) Original image. (b) Encrypted image. (c) Correctly decrypted image. (d) Incorrectly decrypted image. 55 Fig. 4.5 (a) Original image. (b) Encrypted image. (c) Correctly decrypted image. (d) Incorrectly decrypted image. 56 Fig. 4.6 (a) Original image. (b) Encrypted image.(c) Correctly decrypted image. (d) Incorrectly decrypted image. 57 Fig. 4.7 (a) Original image. (b) Encrypted image. (c) Decrypted image from . (d) Decrypted image from . (e) Decrypted image from . (f) Decrypted image from . (g) Decrypted image from . (h) Decrypted image from . 63 Fig. 4.8 The key difference of versus the corresponding PSNR 64 Fig. 4.9 The key difference of versus the corresponding PSNR 64 Fig. 4.10 The key difference of versus the corresponding PSNR 65 Fig. 4.11 The key difference of versus the corresponding PSNR 65 Fig. 5.1 Nonlinear transform based key stream generator 71 Fig. 5.2 The correlation functions: (a) auto correlation function, (b) cross correlation function. 72 Fig. 5.3 Scheme of the proposed security encryption 74 Fig. 5.4 Chaotic encryption module 1 76 Fig. 5.5 Chaotic encryption module 2 77 Fig. 5.6 Chaotic encryption module 3 77 Fig. 5.7 Chaotic encryption module 4 78 Fig. 5.8 Chaotic encryption module 5 78 Fig. 5.9 Results of high security encryption: (a) Foreman with high security encryption. (b) Tennis with high security encryption 79 Fig. 5.10 Results of medium security encryption: (a) Foreman with medium security encryption. (b) Tennis with medium security encryption 79 Fig. 5.11 Results of low security encryption: (a) Foreman with low security encryption. (b) Tennis with low security encryption 80 Fig. 5.12 Original frames: (a) the 19th frame of Foreman (b) the 33rd frame of Tennis 80 Fig. 5.13 Encryption of differential values of DCs of I frames. (a) Signal values. (b) Differential values. (c) Result of decoding without decryption. (d) Encrypted differential values. 86 Table Captions Table 1.1 Block cipher algorithms. 2 Table 2.1 Comparison between chaos and cryptography properties. 16 Table 3.1 The required interval for runs test. 34 Table 3.2 Results of FIPS PUB 140-2 test for CCS-PRBG. 39 Table 4.1 Parameters used for FIPS 140-1 test samples 52 Table 4.2 Testing for FIPS 140-1 53 Table 4.3 The PSNR of three encrypted images 57 Table 4.4 Encrypting time for Lena image 58 Table 4.5 Encrypting time for Baboon image 59 Table 4.6 Encrypting time for Peppers image 60 Table 4.7 Parameters used for key sensitivity test 62 Table 4.8 The value of and the corresponding PSNR 66 Table 4.9 The value of and the corresponding PSNR 67 Table 5.1 PSNR of low, medium and high security encryption scheme 81 Table 5.2 PSNR of the proposed high security encryption scheme tested at 4 various target bitrates. 82 Table 5.3 Overheads test results of encrypting with low security scheme, medium security scheme, a high security scheme, and with encrypting all entropy encoder output. 83 Table 5.4 Compression performance comparison between the standard Huffman coding and the proposed high security scheme. 85

    [1] T. Addabbo, M. Alioto, A. Fort, S. Rocchi and V. Vignoli, “A feedback strategy to improve the entropy of a chaos-based random bit generator,” IEEE Transactions on Circuits and Systems, Vol. 53, No. 2, pp. 326-337, Feb. 2006.
    [2] W. Alexi, B. Chor, O. Goldreich and C. P. Schnorr, “RSA and Rabin functions: certain parts are as hard as the whole,” SIAM Journal on Computing, Vol. 17, No.2, pp. 194-209, Apr. 1988.
    [3] G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, Vol.16, No.8, Pages: 2129-2151, 2006.
    [4] J. M. Amigo, L. Kocarve and J. Szczepanski, “Theory and practice of chaotic cryptography,” Physics Letters A, Vol. 366, No. 3, pp. 211-216, Jun. 2007.
    [5] S. Behnia, A. Akhshani, A. Akhavan and H. Mahmodi, “Applications of tripled chaotic maps in cryptography,” arXiv.org, The Cornell University, May 2007.
    [6] S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solutions and Fractals, Vol. 35, No. 2, pp. 408-419, Jan. 2008.
    [7] H. J. Beker and F. C. Piper, “Secure speech communications,” London, Academic Press, 1985.
    [8] F. Beldhouche and U. Qidwai, "Binary image encoding using 1D chaotic maps," in IEEE Annual Technical Conf., 11 April 2003, pp. 39-43.
    [9] B. Bhargava, C. Shi, and Y. Wang, “MPEG video encryption algorithms,” Multimedia Tools and Applications, 2003.
    [10] L. Blum, M. Blum and M. Shub, “A simple unpredictable pseudo-random number generator,” SIAM Journal on Computing, Vol. 15, No. 2, pp. 364-383, May 1986.
    [11] R. Bose and S. Pathak, “A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system,” IEEE Transaction on Circuits and Systems, Vol. 53, No. 4, pp. 848-857, Apr. 2006.
    [12] J. Cernak, “Digital generators of chaos,” Physics Letters A, Vol. 214, pp. 151-160, Feb. 1996.
    [13] G. Chen, Y. Mao and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solutions & Fractals, Vol. 21, No. 3, pp. 749-761, Jul. 2004.
    [14] P. L’Ecuyer, “Uniform random number generation,” Annals of Operations Research, Vol. 53, No. 1, pp. 77-120, Dec. 1994.
    [15] J. Fang and J. Sun, "Compliant encryption scheme for JPEG 2000 image code streams," Journal of Electronic Imaging, Vol. 15, No. 4, pp. 043013-1 - 043013-4, Oct. - Dec. 2006.
    [16] C. Fu and Z. Zhu, “An improved chaos-based stream cipher algorithm,” Third International Conference on Natural Computation, IEEE, Vol. 3, pp. 179-183, Aug. 2007.
    [17] H. Gao, Y. Zhang, S. Liang and D. Li, “A new chaotic algorithm for image encryption,” Chaos, Solutions and Fractals, Vol. 29, No. 2, pp. 393-399, Jul. 2006.
    [18] T. G.. Gao and Z. Q. Chen, "A new image encryption algorithm based on hyper-chaos," Phys. Lett. A, Vol. 372, No. 4, pp. 394-400, 2008.
    [19] J. A. Gonzalez and R. Pino, “Chaotic and stochastic functions,” Physics Letters A, Vol. 276, No. 3-4, pp. 425-440, Feb. 2000.
    [20] D. Gillman, M, Mohtashemi and R. Rivest, “On breaking a huffman code,” IEEE Trans. Inform. Theory, Vol. 42, No. 3, Pages: 972, May, 1996.
    [21] M. Grangetto, A. Grosso and E. Magli, "Selective encryption of JPEG 2000 images by means of randomized arithmetic coding," 2004 IEEE 6th Workshop on Multimedia Signal Processing, pp. 347 - 350, Oct. 2004.
    [22] Z. H. Guan, F. J. Huang and W. J. Guan, "Chaos-based image encryption algorithm" Phys. Lett. A 346, pp. 153-157, 2005.
    [23] Z. H. Guan, F. Huang and W. Guan, “A general chaos-based key stream generator,” Circuits, Systems, and Signal Processing, Vol. 24, No. 5, pp. 549-555, 2005.
    [24] G. Heidari-Bateni and C. D. McGillem, “A chaotic direct-sequence spread-spectrum communication system,” IEEE Transaction on Communications, Vol. 42, No. 4, Apr. 1994.
    [25] L. Kocarev, “Chaos-based cryptography: a brief overview,” IEEE Circuits and Systems Magazine, Vol. 1, No. 3, pp. 6-21, 2001.
    [26] L. Kocarev and G. Jakimoski, “Logistic map as a block encryption algorithm,”Physics Letters A, Vol. 289, No. 4-5, pp. 199-206, Oct. 2001.
    [27] L. Kocarev and G. Jakimoski, “Pseudorandom bits generated by chaotic maps,” IEEE Transaction on Circuits and Systems, Vol. 50, No. 1, pp. 123-126, Jan. 2003.
    [28] L. Kocarev, G. Jakimoski and Z. Tasev, “Chaos and pseudo-randomness,” Lecture Notes in Control and Information Sciences, Vol. 292, pp. 247-263, 2004.
    [29] P. H. Lee, S. C. Pei and Y. Y. Chen, “Generating chaotic stream ciphers using chaotic systems,” Chinese Journal of Physics, Vol. 41, No. 6, pp. 559-581, Dec. 2003.
    [30] C. T. Li, “Compliant encryption of JPEG2000 code streams based on chaotic systems,” Master Thesis, Department of Electrical Engineering, NCKU, June 2008.
    [31] K. Li, Y. C. Soh and Z. G. Li, “Chaotic cryptosystem with high sensitivity to parameter mismatch,” IEEE Transaction on Circuits and Systems, Vol. 50, No. 4, pp. 579-583, Apr. 2003.
    [32] S. Li, G. Chen and X. Mou, “On the dynamical degradation of digital piecewise linear chaotic maps,” International Journal of Bifurcation and Chaos, Vol. 15, No. 10, pp. 3119-3151, Oct. 2005.
    [33] S. Li, X. Mou and Y. Cai, “Improving security of a chaotic encryption approach,” Physics Letters A, Vol. 290, No. 3-4, pp. 127-133, Nov. 2001.
    [34] S. Li, X. Mou and Y. Cai, “Pseudo-random bit generator based on couple chaotic systems and its applications in stream cipher cryptography,” in Progress in Cryptology-INDOCRYPT 2001, Lecture Notes in Computer Science, Vol. 2247, pp. 316-329, 2001.
    [35] S. Li, X. Mou, B. L. Yang, Z. Ji and J. Zhang, “Problems with a probabilistic encryption scheme based on chaotic systems,” International Journal of Bifurcation and Chaos, Vol. 13, No. 10, pp. 3063-3077, 2003.
    [36] S. Li, X. Mou, Y. Cai, Z. Ji and J. Zhang, “On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision,” Computer Physics Communications, Vol. 153, No. 1, pp. 52-58, Jun. 2003.
    [37] S. J. Li, G. R. Chen and X. Q. Mou, "On the dynamical degradation of digital piecewise linear chaotic maps," Int. J. Bifurcation and Chaos, Vol. 15, No. 10, pp. 3119-3151, 2005.
    [38] S. Li, X. Zheng, X. Mou and Y. Cai, "Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography," In Progress in Cryptology - INDOCRYPT 2001, Lecture Notes in Computer Science, Vol. 2247, pp. 316 - 329, 2001.
    [39] S. G. Lian, J. S. Sun, J. W. Wang and Z. Q. Wang, “A chaotic stream cipher and the usage in video protection,” Chaos, Solutions & Fractals, Vol. 34, No. 3, pp. 851-859, Nov. 2007.
    [40] S. Lian, G. Chen, A. Cheung and Z. Wang, "A chaotic-neural-network-based encryption algorithm for JPEG2000 encoded images," IEEE Symposium on Neural Networks, pp. 627 - 632, 2004.
    [41] S. Lian, J. Sun and Z. Wang, "A selective image encryption scheme based on JPEG2000 codec," Springer LNCS 3332, 2004.
    [42] T. D. Lookabaugh, D. C. Sicker, D. M. Keaton, W. Y. Guo and I. Vedula, “Security analysis of selectively encrypted MPEG-2 streams,” Multimedia Systems and Applications VI, Vol. 5241, Pages: 10-21, September, 2003.
    [43] Y. Mao, G. Chen and S. Lian, “A novel fast image encryption scheme based on 3D chaotic baker maps,” International Journal of Bifurcation and Chaos, Vol. 14, No. 10, pp. 3613-3624, 2004.
    [44] R. Norcen and A. Uhl, "Selective encryption of the JPEG2000 bitstream," International Federation for Information Processing, pp. 194 - 204, 2003.
    [45] N. K. Pareek, V. Patidar and K. K. Sud, "Image encryption using chaotic logistic map," Image and Vision Computing, Vol. 24, No. 9, pp. 926-934, 2006.
    [46] S. K. Park and K. W. Miller, “Random number generators: good ones are hard to find,” Communications of the ACM, Vol. 31, No. 10, pp. 1192-1201, Oct. 1988.
    [47] Mehdi Rezaei, Imed Bouazizi and Moncef Gabbouj, “Fuzzy Joint Encoding and Statistical Multiplexing of Multiple Video Sources with Independent Quality of Services for Streaming over DVB-H,” International Journal of Innovative Computing, Information and Control, vol.5, no.7, pp.1837-1850, 2009.
    [48] J. Peng, S. Jin, Y. Liu, Z. Yang, M. You and Y. Pei, “A novel scheme for image encryption based on piecewise linear chaotic map,” 2008 IEEE Conference on Cybernetics and Intelligent Systems, pp. 1012-1016, Sep. 2008.
    [49] A. Rukhin, J. Soto, J. Nechvatal, J. Smid, M. Barker, E. Leigh, S. Levenson, M. Vangel, M. Banks, A. Heckert, J. Dray and S. Vo, “A statistical test suit for random and pseudorandom number generators for cryptographic applications,” NIST Special Publication 800-22, 2001.
    [50] T. Sang, R. Wang and Y. Yan, “Perturbance-based algorithm to expand cycle length of chaotic key stream,” Electronics Letters, Vol. 34, No. 9, pp. 873-874, Apr. 1998.
    [51] J. Soto, “Statistical testing of random number generators,” http://www.csrc.nist.gov/groups/ST/toolkit/rng/documents/nissc-paper.pdf, 1999.
    [52] D. R. Stinson, “Cryptography: theory and practice,” CRC Press, Boca Raton, Florida, 3rd edition, 2006.
    [53] T. Stojanovski and L. Kocarev, “Chaos-based random number generators-Part I: analysis,” IEEE Transaction on Circuits and Systems, Vol. 48, No. 3, pp. 281-288, Mar. 2001.
    [54] T. Stojanovski, J. Pihl and L. Kocarev, “Chaos-based random number generators-Part II: practical realization,” IEEE Transaction on Circuits and Systems, Vol. 48, No. 3, pp. 382-385, Mar. 2001.
    [55] K.W. Tang, W. K. S. Tang and K. F. Man, “A chaos-based pseudo-random number generator and its application in voice communications,” International Journal of Bifurcation and Chaos, Vol. 17, No. 3, pp. 923-933, Mar. 2007.
    [56] S. Tao, W. Ruili and Y. Yixun, "Clock-controlled chaotic keystream generators," Electronics Letters, Vol. 34, No. 20, pp. 1932 - 1934, 1998.
    [57] S. Tao, W. Ruili and Y. Yixun, "Perturbance-based algorithm to expand cycle length of Cchaotic key stream," Electronics Letters, Vol. 34, No. 9, pp. 873 - 874, 1998.
    [58] T. Uehara, "Contributions to image encryption and authentication," Ph.D. dissertation, Department of Computer Science, University of Wollongong, 2003.
    [59] A. Uhl and A. Pommer, "Image and video encryption: From digital rights management to secured personal communication," Springer-Verlag, New York Inc., 2005.
    [60] Qiang Wang, Debin Zhao and Wen Gao, “Context-Based Adaptive Variable Length Coding for Video DCT Blocks, Part I -- Theoretical Approach, ” ICIC Express Letters, vol.3, no.2, pp.141-146, 2009.
    [61] Qiang Wang, Debin Zhao and Wen Gao, “Context-Based Adaptive Variable Length Coding for Video DCT Blocks, Part II -- Practical Scheme, ” ICIC Express Letters, vol.3, no.2, pp.163-170, 2009
    [62] X. Y. Wang and X. J. Wang, “Design of chaotic pseudo-random bit generator and its applications in stream-cipher cryptography,” International Journal of Modern Physics C, Vol. 19, No. 5, pp. 813-820, 2008.
    [63] D. D. Wheeler, “Problems with chaotic cryptosystems,” Cryptologia, Vol. 13, No. 3, pp. 243-250, Jul. 1989.
    [64] D. D. Wheeler and R. Matthews, "Supercomputer investigations of a chaotic encryption algorithm," Cryptologia, Vol.15, No.2, pp. 140 - 152, Apr. 1991.
    [65] C. P. Wu and C. C. J. Kuo, “Efficient multimedia encryption via entropy codec design,” Security and Watermarking of Multimedia Contents, Vol. 4314, pp. 128-138, January, 2001.
    [66] H. Wu and D. Ma, "Efficient and secure encryption schemes for JPEG2000," International Conference Acoustics, Speech, and Signal Processing, Vol. 5, pp. V - 869 - 872, May 2004.
    [67] Y. Wu and R. H. Deng, "Compliant encryption of JPEG2000 codestreams," International Conference Image Processing, Vol. 5, pp. 3439 - 3442, Oct. 2004.
    [68] D. Xie and C. C. J. Kuo, “Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream,” European Journal of Information Systems, 2007.
    [69] M. E. Yalcin, J. A. K. Suykens and J. Vandewalle, “True random bit generation from a double-scroll attractor,” IEEE Transaction on Circuits and Systems, Vol. 51, No. 7, pp. 1395-1404, Jul. 2004.
    [70] W. Zeng and S. Lei, “Efficient frequency domain selective scrambling of digital video,” IEEE Trans. Multimedia, pp. 118-129, March, 2003.
    [71] W. Zeng and S. Lei, “Efficient frequency domain video scrambling for content access control,” Proceedings of the seventh ACM International Multimedia Conference, Pages: 285-293, November, 1999.
    [72] J. Zhou, Z. Liang, Y. Chen and O. C. Au, “Security analysis of multimedia encryption schemes based on multiple Huffman table,” IEEE Signal Processing Letters, Vol. 14, No. 3, pp. 201-204, 2007.
    [73] “Security requirement for cryptographic modules,” Federal Information Processing Standards Publication (FIPS PUB 140-1), 1994.
    [74] “Security requirements for cryptographic modules,”National Institute of Standards and Technology, FIPS PUB 140-2, May 2001.

    下載圖示 校內:2016-07-29公開
    校外:2017-01-01公開
    QR CODE