期刊文献+

适合CBTC系统无线信道加密算法 被引量:3

Cryptography algorithm for wireless channel of CBTC system
下载PDF
导出
摘要 分析了现有地铁CBTC无线信道安全问题,针对其加密算法RC4的缺陷,提出了一种新的基于Montgomery型曲线ECC快速加密算法。与一般形式的传统的Montgomery型椭圆曲线密码相比,该算法可部分恢复y坐标的值数,具有更高的安全性。该算法与传统椭圆曲线密码相比,具有更快的计算速度并能有效地抵御时间攻击和能量攻击,从而证明了利用ECC密码体制来代替RC4密码体制的可行性。算法对提高椭圆曲线密码的在CBTC等无线通信系统的实现效率有一定意义。 As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y-coordinate with more security.In addition,compared with the traditional ECC,it has faster computing speed and can effectively resist the timing attack and energy attack.The new Montgomery-form ECC algorithm has accelerated current ECC encoding speed and would make great improvement to the implementation of ECC in CBTC and other wireless communication.
出处 《通信学报》 EI CSCD 北大核心 2011年第2期48-52,共5页 Journal on Communications
基金 国家自然科学基金资助项目(60970006 60903187 60970115 91018008) 空天信息安全与可信计算教育部重点实验室开放基金资助项目(AISTC2009_04) 上海市重点学科和科委重点实验室资助项目(S30108 08DZ2231100)~~
关键词 MONTGOMERY 椭圆曲线密码 RC4 时间攻击 能量攻击 Montgomery ECC RC4 timing attack energy attack
  • 相关文献

参考文献2

二级参考文献21

  • 1曾广平,黄美华,涂序彦.软件人(SoftMan)的接口构造研究[J].微计算机信息,2005,21(2):192-193. 被引量:8
  • 2KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Compution American Mathematical Society, 1987(48): 203-309.
  • 3MILLER V. Use of elliptic curves in cryptography[A]. Advance in Cryptology-Proceedings of CRYPTO 1985, Lecture Notes in Computer Science[C]. Springer, 1986. 417-426.
  • 4MONTGOMERY P L. Speeding the pollard and elliptic curve methods of factorizations[J]. Math. Comp, 1987, 48: 243-264.
  • 5MONTGOMERY P L. Modular multiplication without trial division[J]. Mathematics of Computation, 1985, 44(170): 519-521.
  • 6LOPEZ J, DAHAB R. Fast Multiplication on elliptic curves over GF(2^m) without precomputation[A]. Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems[C]. London, UK: Springer Verlag, 1999.316-327.
  • 7OKEYA K, SAKURAI K. Use of Montgomery trick in precomputation of multi-scalar multiplication in elliptic curve cryptosystems[J]. IFACE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2003,86(1): 98-112.
  • 8IZU T. Elliptic curve exponentiation for cryptosystem[A]. SCIS'99[C]. 1999.275-280.
  • 9OKEYA K, SAKURAI K. A scalar multiplication algorithm with recovery of y-coordinate on the Montgomery form and analysis of efficiency for elliptic curve cryptosystem[J]. IEICE Trans Fundamental, 2002, 85(1): 84-93.
  • 10OKEYA K, KURUMATANI H, SAKURA K. Elliptic curves with the montgomery-form and their cryptographic applications[A]. Public Key Cryptography (PKC2000), LNCS1715[C]. 2000. 238-257.

共引文献14

同被引文献28

  • 1鲍爱华,李开成.基于IEEE802.11的CBTC数据安全传输的研究[J].微计算机信息,2006,22(03X):37-39. 被引量:9
  • 2Lee J D,Jung J I,Lee J H,et al.Verification and con- formance test generation of communication protocol for railway signaling systems[J].Computer Standards Interface,2007(29):143-151.
  • 3Chen L J,Shan Z Y,Tang T.Performance analysis and verification of safety communication protocol in train control system[J].Computer Standards Interfaces,2011,33(5):505-518.
  • 4Lee J H,Wang J G,Shin D.Development of verification and conformance testing tools for a railway signaling communication protocol[J],Computer Standards In- terfaces in Elsevier,2009,31:362-371.
  • 5Chen L J,Tang T,Zhao X Q,et al.Verification of the safety communication protocol in train control system using colored Petri net[J].Reliability Engineering and System Safety,2012,100(2):8-18.
  • 6Maria F,Marek V.Safety evaluation of cryptography module within safety related control system for rail- way application[J].Advances in Electrical and Elec- tronic Engineering,2011,9(2):103-108.
  • 7He X,Yener A.Cooperation with an untrusted relay:asecrecy perspective[J].IEEE Transactions on InformationTheory,2010,56(8):3807-3827.
  • 8Chen C,Jensen M A.Secret key establishment using temporallyand spatially correlated wireless channel coefficients[J].IEEE Trans on Mobile Computing,2011,10(2):205-215.
  • 9国家密码管理局.国家密码管理局公告第23 号[EB/OL].(2012-03-21).http://www.oscca.gov.cn/News/201204/News.1227.htm.
  • 10Zhang Xingmiao,Parhi K.High speed VLSI architecturefor the AES algorithm[J].IEEE Trans on Very LargeScale Integration System,2004,12(9):957-967.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部