Yi Xiaolin, Chen Nanzhong, Jia Zhigang, Chen Xiaobo
{"title":"基于RSA认证的可信通信系统","authors":"Yi Xiaolin, Chen Nanzhong, Jia Zhigang, Chen Xiaobo","doi":"10.1109/ETCS.2010.460","DOIUrl":null,"url":null,"abstract":"This paper briefly introduces the history of RSA generation and characteristics, the mathematics theories and the basic principles of RSA algorithm. The design and implementation of the trusted communication system based on RSA authentication are described. Then the paper compares the Trusted Communication System with QQ and MSN in performance, safety and speed. Finally the strength of the system and its prospects of application are summarized.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Trusted Communication System Based on RSA Authentication\",\"authors\":\"Yi Xiaolin, Chen Nanzhong, Jia Zhigang, Chen Xiaobo\",\"doi\":\"10.1109/ETCS.2010.460\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper briefly introduces the history of RSA generation and characteristics, the mathematics theories and the basic principles of RSA algorithm. The design and implementation of the trusted communication system based on RSA authentication are described. Then the paper compares the Trusted Communication System with QQ and MSN in performance, safety and speed. Finally the strength of the system and its prospects of application are summarized.\",\"PeriodicalId\":193276,\"journal\":{\"name\":\"2010 Second International Workshop on Education Technology and Computer Science\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Workshop on Education Technology and Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETCS.2010.460\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Workshop on Education Technology and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCS.2010.460","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trusted Communication System Based on RSA Authentication
This paper briefly introduces the history of RSA generation and characteristics, the mathematics theories and the basic principles of RSA algorithm. The design and implementation of the trusted communication system based on RSA authentication are described. Then the paper compares the Trusted Communication System with QQ and MSN in performance, safety and speed. Finally the strength of the system and its prospects of application are summarized.