期刊文献+

基于AES算法改进的蓝牙安全机制研究 被引量:3

Bluetooth Security Mechanisms Research Based on AES Algorithm Modification
下载PDF
导出
摘要 对蓝牙安全机制鉴权过程中的加密算法进行了研究。分析了目前采用的基于序列密码的加密算法存在的安全隐患,提出利用分组密码实现加密的思路。详细讨论了蓝牙鉴权过程中的各类攻击方式,从硬件和软件两个方面阐述了防范的措施。对128位AES加密算法进行了研究和改进,使之能够适用于运算速度相对较低、存储资源相对较少的蓝牙移动系统环境。测试表明,改进后的AES算法可以为蓝牙的鉴权过程提供更为可靠的安全保证。 The encryption algorithm in the Bluetooth security mechanism authentication process is researched. Analysis of current security risks based on the sequence of password encryption algorithm is given,the idea of block cipher encryption is proposed. The various types of attacks in the Bluetooth authenti- cation process are discussed and two kinds of preventive measures are put forward by the hardware and software. 128-bit AES encryption algorithm is re- searched and improved so that it can be applied to relatively low computing speed and storage resources in a relatively small number of Bluetooth mobile systems. The test result shows that the AES algorithm can improve Bluetooth authentication process to provide a more reliable security guarantees.
作者 杨晓非 赵婷
出处 《电视技术》 北大核心 2013年第5期106-109,113,共5页 Video Engineering
关键词 蓝牙 鉴权过程 分组密码 AES Bluetooth authentication process block ciphers AES
  • 相关文献

参考文献8

  • 1NAFIE S M,DABAK A G,SCHMIDL T M,et 'al. Enhancements to the Blue-tooth specification[J]. Systems and Computers,2010,35(2):1591-1595.
  • 2LANSFORD J,STEPI{ENS A, NEVO R. WiFi and Bluetooth: enabling coexistence [ J ]. [EEE Network,20 l I , 15 (5) :33-34.
  • 3李雪梅,欧海文,路而红,童新海.基于FPGA快速AES算法IP核的设计与实现[J].计算机工程与应用,2006,42(24):84-86. 被引量:6
  • 4ZHANG Qitao. On a hardware implementing method of the optimized AES encryption a/gorithm[ C]//Proc. 2010 Second International Conference on Multimedia and Information Technology (MMIT). [ S. 1. ] : IEEE Press,2010:82-84.
  • 5张毅,叶天翔,马子超.面向移动终端的蓝牙网关设计与实现[J].电视技术,2012,36(5):41-43. 被引量:3
  • 6SHEPHERD R. Bluetooth wireless technology ira the home[ J ]. Electron- ics Communication Engineering Journal ,2011,13 (5) : 195-198.
  • 7宣善立,吴永忠,韩江洪,谢华.蓝牙技术安全研究[J].计算机工程,2002,28(9):93-95. 被引量:4
  • 8王莹,何大军.AES加密算法的改进与实现[J].电脑编程技术与维护,2010(17):83-84.

二级参考文献14

  • 1王锐华,于全.浅析ZigBee技术[J].电视技术,2004,28(6):33-35. 被引量:31
  • 2[1]Muller T. Bluetooth Security Architecture. http://www.bluetooth.com/ developer/download/download.asp?doc= 174, 1999-07-15
  • 3[2]Vainio J.Bluetooth Security. http://www.niksula,cs,hut.fi/-jiitv/bluesec, html ,2000-05-25
  • 4[3]Traskback M.Security in Bluetooth:An Overview of Bluetooth Security http://www.cs.hut fi/Opinnot/Tik-86.174/Bluetooth_Security.pdf ,2000-11-2
  • 5[4]Jakobsson M, Wetzel S. Security Weakness in Bluetooth: RSA 2001, http://www.bell-labs.com/user/markusj/bt.html,2001
  • 6[5]Bluetooth Baseband. http://www.infotooth.com/tutorial/Baseband.htm
  • 7[6]Authentication in Bluetoth. http://www.infotooth.com/knowbase/security/80.htm
  • 8[7]Zhou L, Haas Z. Securing Ad Hoc Networks.http://www.ec.comell.edu /-haas/Publications/network99.ps,2000-03-10
  • 9BC417143B Data Sheet[EB/OL].[2011-02-22].http://www.datashe-etarchive.com/pdf.
  • 10CC2530 Data Sheet[EB/OL].[2011-02-22].http://www.ti.com/lit/ds/symlink/cc2530.pdf.

共引文献10

同被引文献32

  • 1唐明,张焕国,刘树波,赵波.AES的高性能硬件设计与研究[J].计算机工程,2006,32(8):257-259. 被引量:4
  • 2KAZOVSKY L G,WONG S W,GUDLA V. Challenges in next- genera- tion optical access networks: addressing reach extension and security weaknesses[J]. IET Optoelectronics, 2011,5(4) : 133-43.
  • 3TANAKA K. IEEE 802.3av 10G-EPON standardization and its research and development status [ J ]. Journal of Lightwave Technology, 2010, 28 (4) : 651-661.
  • 4EL-FISHAWY N, ABU ZAID 0 M. Quality of eneryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms [J]. International Journal of Network Security, 2007, 5(3) :241-251.
  • 5MCLOONE M,MCCANNY J V. High-performance FPGA implementation of DES using a novel method for implementing the key schedule[J].IEEE Proc Circuits Devices Syst,2003,(5):373-378.
  • 6YANG Xianwen,LI Zheng,WANG An. Design research of the DES against power analysis attacks based on FPGA[J].{H}MICROPROCESSORS AND MICROSYSTEMS,2011,(35):18-22.
  • 7JOS M,GRANADO C,MIGUEL A. A new methodology to implement the AES algorithm using partial and dynamic reconfiguration[J].the VLSI journal of Integration,2010,(43):72-80.
  • 8张峰,郑春来,耶晓东.DES加密算法的FPGA实现[J].现代电子技术,2008,31(7):80-82. 被引量:5
  • 9姚霁,刘建华,范九伦.一种密钥可配置的DES加密算法的FPGA实现[J].电子技术应用,2009,35(7):145-148. 被引量:5
  • 10周建钦,何凌云.DES加密算法的密钥扩展[J].科技通报,2011,27(2):263-267. 被引量:6

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部