期刊文献+

基于嵌入式系统的身份认证和密钥协商算法 被引量:1

Design and Implementation of Embedded System-based Authentication and Key Agreement Algorithm
下载PDF
导出
摘要 随着接入到互联网中的嵌入式设备越来越普遍,嵌入式系统的网络安全问题也越来越引起人们的关注。文章针对嵌入式系统的网络安全需求和有限计算能力的特点,提出了一个基于有限域上离散对数的身份认证和密钥协商算法。分析表明该算法能有效抵御网络中的消息重放攻击和中间人攻击。该算法在基于ucLinux系统上的嵌入式IPSec框架中实现,具有较低的系统资源开销和较高的运行效率。 With more and more popularity of embedded device connecting the internet,the network security of the embedded system is more concerned by the people.According to the security requirement and limited compute ability,we propose a novel authentication and key agreement algorithm.The analysis demonstrates the cryptography can resist the message replay attacks and man-in-the-middle attack.The algorithm implemented in the embedded IPSec of ucLinux is of lower overhead and high efficiency.
出处 《贵州大学学报(自然科学版)》 2010年第2期74-77,95,共5页 Journal of Guizhou University:Natural Sciences
基金 国家自然科学基金项目(60473054)
关键词 嵌入式系统 IPSEC 身份认证 密钥协商 UCLINUX embedded system IPSec authentication Key agreement ucLinux
  • 相关文献

参考文献7

  • 1向文,陶良升,王同洋.一种高效的WTLS握手协议[J].计算机应用,2008,28(11):2798-2800. 被引量:5
  • 2Koopman,Philip.Embedded system security[J].Computer,2004(37)7:95-97. 被引量:1
  • 3崔国华,涂昭,梅林,张伟.一种基于身份的会议密钥协商方案[J].计算机工程与科学,2007,29(12):7-10. 被引量:1
  • 4Tzvetkov,Vesselin.Disaster coverable PKI model based on Majority Trust principle.International Conference on Information Technology:Coding Computing,ITCC,v2,International Conference on Information Technology:Coding Computing[J].ITCC,2004(2):118-119. 被引量:1
  • 5Kent S,Atkinson R.Security architecture for the internet protocol[M].RFC2401,1998. 被引量:1
  • 6戴宗坤,唐三平著..VPN 与网络安全[M].北京:金城出版社,2000:258.
  • 7Bruce Schneier.Applied Crytography Second Edition:protocol,algorithms,and source code in C[M].John Wiley & Sons,Inc,1996. 被引量:1

二级参考文献19

  • 1Kim Jeung-Seop, Kim Hyo-Chu, Ha Kyeoung-Ju, et al. One Round Identity-Based Authenticated Conference Key Agreement Protocol[A]. Proe of ECUMN'04[C]. 2004. 407-416. 被引量:1
  • 2Berkovits S. How to Broadcast a Secret[A]. Proc of Eurocrypt' 91[C]. 1991. 被引量:1
  • 3Mao J, Yang B. Anonymous and Dynamic Conference-Key Distribution System[A]. Proe of the 14th IEEE 2003 Int'1 Syrup on Personal, Indoor and Mobile Radio Communication [C]. 2003. 2784-2788. 被引量:1
  • 4Li Shiqun, Chen Kefei, Li Xiangxue, et al. Identity Based Conference Key Distribution Scheme from Parings[A]. Proc of ICCNMC'05[C]. 2005. 845-852. 被引量:1
  • 5Burmester M,Desmedt Y. A Secure and Efficient Conference Key Distribution System [A]. Proc of Eurocrypt' 94 [C]. 1995. 257-286. 被引量:1
  • 6Boyd C. Nieto J M O. Round-Optimal Contributory Conference Key Agreement[A]. Proc of PKC' 03[C]. 2003. 161- 174. 被引量:1
  • 7Tzeng W G. A Secure Fault-Tolerant Conference-Key Agreement Protocol[J]. IEEE Trans on Computers, 2002, 51 (4) : 373-379. 被引量:1
  • 8Shamir A. Identity-Based Cryptosystems and Signature Schemes [A]. Proc of Cryptology-Crypto'84[C]. 1985.47-53. 被引量:1
  • 9Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing[A]. Proc of Cryptology-Crypto ' 01 [C]. 2001. 213-219. 被引量:1
  • 10Paterson K G. ID-Based Signatures from Pairings on Elliptic Curves[EB/OL]. http://eprint. iaer. org,2005-12. 被引量:1

共引文献4

同被引文献15

  • 1叶生勤.公钥密码理论与技术的研究现状及发展趋势[J].计算机工程,2006,32(17):4-6. 被引量:15
  • 2Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone.应用密码学手册[M].北京:电子工业出版社,2005-6.12-14. 被引量:7
  • 3Kinder J,Katzenbeisser S,Schllhart C.Detecting malicious code by model checking[C].Vienna:Proceeding of the GISIG SIDAR Conference on Detection of Instrusions and Malware & Vulnera- bility Assessment.Springer,2005:174-187. 被引量:1
  • 4Christodorescu M,Jha S,Seshia S A.Semantics-aware Malware detection[C].IEEE Symposium on Security and Privacy,2005: 32-46. 被引量:1
  • 5段刚.加密与解密[M].3版.北京:电子工业出版社,2008:167-191. 被引量:1
  • 6Schwarz B,Chen H,Wagner D.Model checking an entire linux distribution for security violation[C].Los Alamitos,CA:Proc An- nual Computer Security Applications Conference. IEEE Com- puter Society,2005:13-22. 被引量:1
  • 7Chirs Eagle.The IDA pro book[M].石华耀,译.北京:人民邮电出版社,2010:162-172. 被引量:1
  • 8Hex-Rays SA.Hex-Rays decompiler[EB/OL], http://www.hex- rays.com/,2005. 被引量:1
  • 9Wei T, Mao J, Zou W. Structuring 2-way branches in binary executables [C]. Beijing: 31 st Annual IEEE International Com- puter Software and Applications Conference,2007:115 - 118. 被引量:1
  • 10Wei T, Mao J,Zou W.A new algorithm for identifying loops in de- compilation [C]. Kongens Lyngby, Denmark: The 14th Interna- tional Static Analysis Symposium,2007:170-183. 被引量:1

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部