期刊文献+

一种轻量级动态密钥建立算法研究

Research on kind of light-weight dynamic cryptographic key establishment algorithm
下载PDF
导出
摘要 解决射频识别(RFID)和低运算能力设备安全的理想方法就是实现一种动态密钥建立算法,但是经典的动态密钥建立算法都不适用于RFID。旨在研究一种为RFID标签和低运算能力设备提供动态密钥建立的算法。基于TPM的密钥建立算法为轻量级的动态密钥建立提供了方法,KKK算法就是其中一种算法。研究了KKK算法的原理以及KKK算法的发展现状,建立了KKK算法仿真环境,并且实现了已经提出的大部分KKK类算法;提出了一种具有更强攻击效果的攻击算法——改进的遗传攻击算法,实验结果表明该算法优于目前提出的其他攻击算法。 The ideal way to solve security in RFID and low-computing-capability devices is realizing a dynamic key establishment algorithm.But all the classical dynamic key establishment algorithms are unsuitable for RFID.Aceording to limited computational resources of RFID tags and low-computing-capability devices,this paper aimed to designs a kind of light-weight dynamic cryptographic key establishment algorithm.Recenfly,a dynamic key establishment algorithm based on mutual learning between TPM neural networks,KKK algorithm,has given a light to light-weight dynamic key establishment algorithm.This study has covered the theory and development of KKK algorithm,and established its simulation environment. And base on these,the most of KKK-like algorithms are realized,and the experiment shows that this attacking algorithm is more effective than others.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第15期139-143,共5页 Computer Engineering and Applications
基金 国家自然科学基金No.60674068 国家高技术研究发展计划(863)No.2006AA04Z304~~
关键词 射频识别 遗传攻击算法 TPM 动态密钥 轻量级 Radio Frequency Identification (RFID) genetic attacking algorithm Tree Parity Machine (TPM) dynamic cryptographic key lightweight
  • 相关文献

参考文献15

  • 1MENEZES AJ, VAN OORSCHOT PC, VANSTONE SA.应用密码学手册[M].胡磊,王鹏,译.北京:电子工业出版社,2005.
  • 2Castelluccia C,Avoine G.Noisy tags:A pretty good key exchange protocol for RFID tags[C]//Intemational Conference on Smart Card Research and Advanced Applications(CARDIS'06),2006:289-299.
  • 3Volkmer M,Wallner S.Lightweight key exchange and stream cipher based solely on Tree parity machines[CT/ECRYPT(European Network of Excellence for Cryptology) Workshop on RFID and Lightweight Crypto,Graz University of Technology,Graz,2005:102-113.
  • 4Kanter I,Kinzel W,Kanter E.Secure exchange of information by synchronization of neural networks[J].Eumphys Lett,2002,57 ( 1 ) : 141-147.
  • 5Ruttor A,Kinzel W,Naeh R,et al.Genetic attack on neural cryptography[J].Phys Rev E,2006,73.
  • 6Rosen-Zvi M,Klein E,Kanter I,et al.Mutual learning in a tree parity machine and its application to cryptography[J].Phys Rev E 66,2002,66.
  • 7Ruttor A,Kinzel W,Kanter I.Dynamics of neural cryptography[EB/ OL]. ( 2006 ) .http://arxiv.org/cond-mat/0612537.
  • 8Klimov A,Mityaguine A,Shamir A.Analysis of neural cryptography[C]// Advances in Cryptology-ASIACRYPT'02,2002.
  • 9Shacham L N,Klein E,Mislovaty R,et al.Cooperating attackers in neural cryptography[J].Phys Rev E,2004,69.
  • 10Ruttor A,Kinzel W,Kanter I,et al.Neural cryptography with queries[EB/OL].(2005 ).http://arxiv.org/cond-mat/0411374.

共引文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部