22120083Computer&DigitalEngineeringVol.36No.38431)1)2)(1)454000)(2)454000),,3DES,PKI,TP3091IC,IC,IC,,,,,22.1IC,ICIC,IC()IC,,,3DES(CPU)[1]2.1.1,SAM,CPU,SAM(SecurityAccessModule),,,()[2]2.1.2,,[3]:16(0,1,9,A,,F)AB,AB,,AB,,AB,,3:20071127,:200814:,,,,:,,,:,,,:,[4],AB:16(16),SeedASeedB;,C:SeedC=SeedAÝSeedB;,:KEYINIT=Seed=DES-1(DES(DES-1(KEYINIT,SeedC),SeedB),SeedA)K3=Seed,:K0=DES-1(DES(DES-1(K3,SeedC),SeedB),SeedA)ÝK3K1=DES-1(DES(DES-1(K0,SeedC),SeedB),SeedA)K2=DES-1(DES(DES-1(K1,SeedC),SeedB),SeedA)K3=DES-1(DES(DES-1(K2,SeedC),SeedB),SeedA),:K4=K0ÝK2DES;K5=K1ÝK3DES;K4K5;,:A=K0||K1B=K2||K3MK=A+B,MK,2.1.3:,:12,PSAM,PSAM,,,,:(1)PIN,;(2),8;(3),,,;(4),,,,,,,:;,,,:,PSAMPSAM1,PSAM;PSAM2.2,,,,,,PKI:(PKI),,2.2.1,1,2,PSAM,,,,:RSA,,,,2.2.2PKICA5836(2008)3Ep,Dp,KeA,DdAAEt,Dt(3DES),Ks,PKI,(A,CA),A,CA=Dp(A,KeA,T,KdPKI),CAA,T,KdPKICACADePKI[5](1)A,APKIRAAvPKI:Ep(A,KePKI)RA,PKIvA:Dp(A,KdPKI)A,,,AKeAKdA,KeARACAAvPKI:Ep(A,KeA,T0,KePKI)CACA,,AAKePKI,CA(2)A,PSAM(B),AvPKI:Ep(A,B,KePKI)CAA,BRN,RNCA,CBABPKIvA:Dp(Et(CA,CB,RN,T1,KeA),KdPKI)PKIvB:Dp(Et(CA,CB,RN,T1,KeB),KdPKI)ABCA,CB,RN,T1,ABRN,RN(3)ABRNKs=Dt(RN,KAB),ABKs,AvB:Et(MA,Ks)BvA:Et(MB,Ks)(4),,RNKs2.3,,,,,,,,,3,,,,,CAWeb,[1],,.(PKI)[M].:,2002:365368[2].RSA[D].,2000[3]Schneier.B,.:C[M].:,2000:147[4],.[J].,2002,(11):3435[5],.[M].:,2003:114121,21521968:221troducedtoconstructacompleteB2CcellularphoneE-commercewebsiteandtheframedesignandfunctionrealizationofwebsiteareelaborated.Thefactorydesignmodehasbeenusedforsimplifyingthesystemstructuremore,loweringthecostofsystemdevelopmentandmaintenance,withpropertiesofmoremultiplexingandpacking.Thismethodisadvantageoustothefastdevel2opmentofanASP.NETwebsite.KeywordsE-commerce,Asp.net,factorydesignmode(Page:77)AWebServiceApplicationIntegrationFrame2workSupportingPublish/SubscribebyYuanHongliangAbstractAnapplicationintegrationframeworktowardswebservicehasbeenproposed,whichprovideswebserviceintegrationbusthatsupportspublish/subscribescheme.Theservicebushasbeenproposed,andanapplicationcaseissuggested.Keywordswebservice,publish/subscribe,applicationintegration(Page:81)ResearchandDesignofCampusEcardSecuritySchemebyWangGuoweiAbstractBasedoncampusecardsystem,aprofoundanalysisinsecurityofcardanddatatransmissionhasbeenmade.Amethodwhichusestraditional3descryp2togrammicarithmetictogeneratekeyhasbeenpresen2ted.Andmoderncryptogrammicarithmetic(PKI)hasbeenusedtodistributesessionkey.Atlast,adetailedkeymanagementplanhasbeenproposed.Keywordscampusecard,security,keymanagement(Page:84)DesignandImplementationofImageEncryptionBasedonChaosMapsbyZhaoFangzhouAbstractThecolorimagechaoticencryptionalgorithmsareproposed.Frequencydomainalgorithmuseshashfunctionandlogisticchaoticmapsconfusingimagetoac2complishencryption.Experimentsprovethatthealgo2rithmsareeasytobeaccomplishedandhavestrongse2curity,decryptionimage’sdistortionislow.Thesealgo2rithmshavegoodencryptioneffecttocolorimage.Keywordschaos,frequencydomain,logisticmap(Page:87)AvoidingSafeError-BasedAttackonExponen2tiationbyShenJingAbstractInordertoavoidthesafeerror-basedat2tack,basedonhashfunctionandverifyingtheintermedi2atevariablesofexponentiation,animprovedexponentia2tionalgorithmwhichcanavoidsafeerror-basedattackisadvanced.Keywordsfault-basedcryptanalysis,exponentiation,modularmultiplication,smartcard(Page:90)StudyonNetworkPacketsCapturingandFilte2ringTechniquebyHuangWeiAbstractTheWindowsserver2003DDKpassthruIn2termediatelayerdriverwasstudiedandextendedtoreal2izethepacketscapturingandfilteringatthebottomofthenetwork.Keywordsintermediatedriver,passthru,networkpacketsfiltering(Page:92)StudyonRemoteThreadInjectingforHidingVirusbyHanFangAbstractThekeytechnologyofremotethreadinjectingforhidingvirushasbeenpresentedinthepaper,AmethodbasedonAPIhooktechnologytorealizeholdingupthenewstylevirushasbeenproposed.Theexperi2mentshowsbetterresultsforholdingupthevirusfromremotethreadinjection.Keywordsvirus,hiding,APIHook(Page:96)ResolutionofAnimationDesignwith-no-paperBasedon3DModelbyRenJingliAbstractComputercandrawtheskindeformationof2Danimationroleintheturn-overmovementautomati2callybydetectingthecontoursof3Dhumanmodel.Basedonanalyzingthehumanmodel,thecoordinatesof3Dmodel’svertexesarerecalculated,andthecontoursof3Dmodelaredetected.Atlast,contoursarepre2servedintheformofvectorasa2Dcartoonrole.Keywordsanimation,3Dhumanmodel,contoursde2tection(Page:98)WaveletImageEenoisingBasedonMulti-sampleEstimationUsingNeighboringCoefficientsbyYouLingruAbstractAccordingtosignal-estimationtheory,ascaleshrinkingformulawasdeducedinwhicheverywaveletcoefficientwasestimatedfromseveralneighbor2ingcoefficientsamplesbyusingmaximumaposterior(MAP)estimator,combinedwiththisformulaandsta2tionarywavelettransform(SWT),alow-complexityimagedenoisingmethodwasproposed.TheredundantwaveletcoefficientswereaccessedthroughSWTfirstly,secondlysomesimilarpointswhichreflectedtheobjects’contentoredgewerechosenineachpoint’sneighbor2hoodaccordingtotheimageedge,finallyeachwaveletdetailcoefficientwasestimatedfromthesesimilarpointsusingtheformulapresented.Experim