大工至善|大学至真分享 http://blog.sciencenet.cn/u/lcj2212916

博文

[转载]【信息技术】【2017.08】一种用于设备间认证和安全通信的自定义加密算法的设计与实现

已有 1518 次阅读 2020-1-31 17:31 |系统分类:科研笔记|文章来源:转载

本文为美国托莱多大学(作者:Bhavana Daddala)的硕士论文,共75页。

 

安全是发展中国家最关心的问题之一。重要的是要确保通信各方之间的信息安全传输,保护他们免受攻击。已经有许多标准和开发的加密协议作为资源提供,并根据需求使用。在本论文中,我们提出一个自定义的加密算法和一个安全传输资讯的认证方案。该算法是高级加密标准(AES)的一个变种,可以在多个设备之间执行。AES只使用一个私钥(对称密钥)来加密数据。实现工作在一个标准的8次不可约多项式上,该多项式进一步用于计算算法中每一层工作所需的乘逆表、S盒和逆S盒。与AES相比,我们在实现中使用了168次不可约多项式,而不是一个。AES的密钥大小通常为128192256位;我们使用128位密钥。与对称加密不同,非对称加密使用两个密钥:私钥和公钥。公钥在通信双方之间共享,私钥则保密。密钥应该具有足够的长度,以保持加密强度。因此,对于非对称加密,它们通常从512位到2048位或更多。通信双方可以从公共私钥开始,并商定一个公共密钥(会话密钥),该密钥可以用作AES的密钥。Diffie-Hellman密钥交换协议使用AESRSA算法的组合,从而产生可靠的密码系统。该算法利用组合框架设计了一种新的密钥建立和协商协议。介绍了两台设备之间通信协议的实现,并展望了使用集中式服务器处理多台设备的前景。本文最终建立了一种不同的加密方法,通过提供对中间人攻击的保护来增强安全性。自定义的算法是用Python实现的。

 

Security is one of the biggest concerns inthe developing world. It is important to ensure a safe transfer of informationbetween communicating parties, protecting them from attacks. Many standards anddeveloped encryption protocols are available as resources and are used based onthe requirements. In this thesis, we propose a customized encryption algorithmand an authentication scheme to safely transfer information. The algorithm is avariation of Advanced Encryption Standard (AES) and is carried out betweenmultiple devices. AES uses only one private key (symmetric key) to encrypt thedata. The implementation works on a single standard irreducible polynomial ofdegree ‘8’ which is further used to compute multiplicative inverse tables,S-boxes and inverse S-Boxes required for the working of every layer in thealgorithm. As compared to AES, we use sixteen irreducible polynomials of degree‘8’ instead of one in our implementation. Key sizes for AES are usually 128,192 and 256 bits in size; we use a 128-bit key. Unlike symmetric encryption,asymmetric encryption uses two keys, private and public keys. The public keysare shared among the communicating parties, while the private keys are keptsecret. The keys are supposed to be large in size to maintain strength. Thus,they usually range from 512 bits to 2048 bits or more for asymmetriccryptography. The communicating parties can start with public-private keys andagree upon a common key (session key) which can be used as a key to AES.Diffie-Hellman key exchange protocol uses a combination of AES and RSAalgorithms resulting in reliable cryptosystems. Our algorithm focuses ondevising a new protocol for key establishment and agreement, using thecombination framework. The implementation of the communication protocol betweentwo devices, with a prospect of working with multiple devices using a centralizedserver, is presented. The outcome is to establish a different approach towardsencryption and enhance security by providing protection againstMan-in-the-Middle attacks. The customized algorithms are implemented usingPython.

 

 

引言

文献回顾

标准加密方法

自定义加密方法

性能与实现

结论与未来工作展望


更多精彩文章请关注公众号:qrcode_for_gh_60b944f6c215_258.jpg



https://blog.sciencenet.cn/blog-69686-1216297.html

上一篇:[转载]【计算机科学】【2011.12】三维城市建模研究——从航空图像重建三维多面体建筑模型、从地面三维点云和图像进行三维立面建
下一篇:[转载]【计算机科学】【2018.06】深度学习在食品目标识别中的应用
收藏 IP: 183.160.73.*| 热度|

0

该博文允许注册用户评论 请点击登录 评论 (0 个评论)

数据加载中...
扫一扫,分享此博文

Archiver|手机版|科学网 ( 京ICP备07017567号-12 )

GMT+8, 2024-4-26 10:48

Powered by ScienceNet.cn

Copyright © 2007- 中国科学报社

返回顶部