期刊文献+

基于参数优化批处理的TLS协议(英文) 被引量:2

Parameter Optimization-Based Batching TLS Protocol
下载PDF
导出
摘要 TLS(transport layer security)协议的基本设计目标是为两个通信实体之间提供数据的保密性和完整性.由于在传输层安全握手协议中最耗费计算资源的步骤是服务器RSA解密运算,优化的批处理的RSA方法提出可以用于加速 TLS 会话的初始化.首先指出了以前的批处理方法由于要求多证书实现而实用性不强.然后提出了单一证书策略的方法,从而克服了这一问题.还提出结合用户对于因特网服务质量的要求优化了批处理参数.为了选择优化的批处理的参数,不仅考虑了服务器的性能,而且还考虑了客户可容忍的等待时间.通过分析并在阐述平均排队时间、批处理服务时间和系统稳定性的基础上提出了一种新颖的优化批处理调度算法,已部署在服务器上.最后通过分析和模拟两种方法验证了所提出方案的实用性和有效性. The primary goal of the Transport Layer Security (TLS) protocol is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the TLS handshake protocol is the server's RSA decryption, it is introduced that optimal batch RSA can be used to speedup TLS session initialization. This paper first indicates that the previous batch method is impractical since it requires a multiple of certificates, then it proposes the unique certificate scheme to overcome the problem. It is also introduced that the batching parameter is optimized when integrating users' requirements for Interact Quality of Service (QoS). To select the optimal batching parameters, not only the server's performance but also the client's tolerable waiting time is considered. Based on the analysis of the mean queue time, batching service time and the stability of the system, a novel batch optimal scheduling algorithm which is deployed in a batching Web server is proposed. Finally, the proposed algorithm is evaluated to be practical and efficient through both analysis and simulation studies.
出处 《软件学报》 EI CSCD 北大核心 2007年第6期1522-1530,共9页 Journal of Software
基金 国家自然科学基金No.60503007 the CityU Research Project(APR)9610027 国家重点基础研究发展计划(973)No.2003CB317003 2006年度教育部"新世纪优秀人才支持计划"No.NCET-06-0686~~
关键词 传输层安全协议 批处理RSA TLS握手协议 平均响应时间 可容忍的等待时间 transport layer security batch RSA TLS handshake mean response time tolerable waiting time
  • 相关文献

参考文献2

二级参考文献8

  • 1Zhiguang Shan, Chuang Lin, Yang Yang, Yan Wang (Information Engineering School, University of Science and Technology Beijing, Beijing 100083, China) (Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China).Performance Modeling and Approximate Analysis of Multiserver Multiqueue Systems with Poisson and Self-similar Arrivals[J].Journal of University of Science and Technology Beijing,2001,8(2):145-151. 被引量:2
  • 2[1]Freier AO, Karlton P, Kocher PC. The SSL protocol version 3.0. 1996. http://home.netscape.com/eng/ssls/ssl-toc.html.
  • 3[2]Wagner D, Schneier B. Analysis of the SSL protocol. In: Countpane Labs., ed. Proceedings of the 2nd USENIX Workshop on Electronic Commerce. USENIX Press, 1996. 29~40.
  • 4[3]Biham E, Shamir A. Differential Cryptanalysis of the DES. New York: Springer-Verlag, 1993. 211~219.
  • 5[4]Matsui M. Linear cryptanalysis of DES cipher. In: Proceedings of the Eurocrypt'94. Berlin: Springer-Verlag, 1994. 109~117.
  • 6[5]Meier W, Staffelbach O. Fast correlation attacks on stream ciphers. In: Advances in Cryptology-EUROCRYPT'88. LNCS 330, Brelin: Springer-Verlag, 1989. 301~314.
  • 7林闯.多媒体信息网络QoS的控制[J].软件学报,1999,10(10):1016-1024. 被引量:44
  • 8林闯,单志广,盛立杰,吴建平.Internet区分服务及其几个热点问题的研究[J].计算机学报,2000,23(4):419-433. 被引量:109

共引文献65

同被引文献25

  • 1周辉,程东年,权乐.面向应用的IPSec系统策略管理机制[J].计算机工程与科学,2007,29(5):15-18. 被引量:1
  • 2Schulzrinne H,Lanphier R,Rao A,et al.Real Time Streaming Protocol (RTSP)[S].RFC 2326,1998.
  • 3Salsano S,Veltri L,Papalilo D.SIP security issues:the SIP authentication procedure and its processing load.Network,IEEE,2002,16(6):38-44.
  • 4陈昌鹏,晋磊,陈凯,白英彩.SIP协议的安全分析[J].计算机应用与软件,2007,24(8):172-174. 被引量:3
  • 5SUN H M, WU M E, TING W C, et al.Dual RSA and its security analysis[J].IEEE Trans on Information Theory,2007,53(8):2922-2933.
  • 6MAMUN M A, MOTAHSRUL M I, MASHIHURE R S M, et al.Performance evaluation of several efficient RSA variants[J].International Journal of Computer Science and Network Security,2008,8(7):7-11.
  • 7COLLINS T, HOPKINS D, LANGFORD S, et al.Public key cryptographic apparatus and method:US Patent 5,848[P].1997.
  • 8BONEH D, SHACHAM H.Fast variants of RSA[J].Crypto-Bytes ,2002,5(1):1-9.
  • 9WIENER M.Cryptanalysis of short RSA secret exponents[J].IEEE Trans on Information Theory,1990,36(3):553-558.
  • 10FIAT A.Batch RSA[J].Journal of Cryptology,1997,10(2):75-88.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部