Hou Luoming, Zhou Xiaolei, Chen Chunyan. DEADS——A Useful System for Data Encryption and Decryption[J]. INFORMATION AND CONTROL, 1986, 15(1): 29-32.
Citation: Hou Luoming, Zhou Xiaolei, Chen Chunyan. DEADS——A Useful System for Data Encryption and Decryption[J]. INFORMATION AND CONTROL, 1986, 15(1): 29-32.

DEADS——A Useful System for Data Encryption and Decryption

More Information
  • Received Date: October 09, 1985
  • Published Date: February 19, 1986
  • In this paper,a data encryption and decryption system-DEADS is presented.In DEADS,a new technique called "pseudo-equal-length random key" which has some obvious advantages over traditional encryption techniques is used.DEADS may operateon IBM-PC and all machines compatible with CPU 8086.There fore,it is a powerfultool for computer network,communication security and software protection.
  • [1]
    Davies,D.W.,Data Security in Data Communi cation and Computer Networks, North-Holland Publishing Company,lg81.
    [2]
    DES编译组,美国国家标准局《数据加密标准》译文集,四川省灌县101信箱.(内部资料)
    [3]
    H.卡茨安著,陈太一,屠世祯译,标准数据加密算法,人民邮电出版社.
  • Related Articles

    [1]HE Lile, JIANG Yichun, HE Ning, WU Wen, CAO Jin. Analytical Tuning of Predictive Control for a Multivariable Fractional Dead Time System[J]. INFORMATION AND CONTROL, 2019, 48(6): 687-693. DOI: 10.13976/j.cnki.xk.2019.9248
    [2]XIA Fan, YU Xiuwu, LIU Yong, ZHONG Wenhao, GUO Lin, DAI Li, JIANG Hui. An Elliptic-curve and Hilbert-curve Based Privacy-preserving Aggregation Algorithm for Cluster Heads[J]. INFORMATION AND CONTROL, 2019, 48(2): 239-244. DOI: 10.13976/j.cnki.xk.2019.8241
    [3]ZHANG Hui, WANG Qinruo, XIANG Guobo, LI Ming. Nonlinearized Design for Twice-optimal Control of a Second-order Dead-time System[J]. INFORMATION AND CONTROL, 2017, 46(6): 664-670. DOI: 10.13976/j.cnki.xk.2017.0664
    [4]MA Zenghui, LIU Changliang, KAI Ping'an. Control of Dead-time Systems Based on Disturbance Compensation[J]. INFORMATION AND CONTROL, 2013, 42(5): 570-576. DOI: 10.3724/SP.J.1219.2013.00570
    [5]ZHANG Meng, SHI Yimin, YANG Yang. Reliability Estimation for the Generalized Exponential Components in Parallel System Using Masked Data[J]. INFORMATION AND CONTROL, 2011, 40(4): 483-488,496.
    [6]ZHAO Xue-long, YOU Jing, LI Qian-mu, LIU Feng-yu. Application of Coupled Toggle Cellular Automata in Data Encryption[J]. INFORMATION AND CONTROL, 2005, 34(6): 746-752.
    [7]LIAN Shi-guo, SUN Jin-sheng, WANG Zhi-quan. Video Encryption and Its Development[J]. INFORMATION AND CONTROL, 2004, 33(5): 560-566.
    [8]LIAN Shi-guo, SUN Jin-sheng, WANG Zhi-quan. Video Encryption and Its Development[J]. INFORMATION AND CONTROL, 2004, 33(5): 560-566.
    [9]XIE Kun, LEI Min, FENG Zheng-jin. Test Study on Surrogate Data of Chaotic Encryption Communication System[J]. INFORMATION AND CONTROL, 2004, 33(4): 429-433.
    [10]LI Chang-gang, HAN Zheng-zhi. THE NEW EVOLUTION OF IMAGE ENCRYPTION TECHNIQUES[J]. INFORMATION AND CONTROL, 2003, 32(4): 339-343,351.

Catalog

    Article views (615) PDF downloads (159) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return