期刊文献+

一种FPGA上防重放攻击的远程比特流更新协议的分析改进 被引量:3

Analysis and Improvement of Remote Bitstream Update Protocol Preventing Replay Attacks on FPGA
下载PDF
导出
摘要 Devic等提出的防重放攻击的远程比特流更新协议在密钥分发、密钥更新和存储方面具有较低的效率。提出了一种改进协议,它利用密钥链取得请求密钥和确认密钥。改进协议可有效提高密钥管理的效率,降低协议参与方的存储负担。分析表明,改进协议满足机密性和完整性,且能够防止重放攻击。 The remote bitstream update protocol preventing replay attacks on FPGA proposed by Devic et al has a lower efficiency in the key distribution, updating and storage. We proposed an improved protocol which utilizes key chains to obtain keys for request and acknowledgement. The improved protocol can improve the efficiency of key management, and reduce the storage requirements of participants. Technical discussions show that the improved protocol ensures con- fidentiality, integrity, and prevents replay attacks.
出处 《计算机科学》 CSCD 北大核心 2013年第8期149-150,195,共3页 Computer Science
基金 国家863计划重点项目(2009AA012201)资助
关键词 安全协议 比特流更新 FPGA 重放攻击 密钥链 Security protocol Bitstream update FPGA Replay attacks Key chains
  • 相关文献

参考文献10

  • 1Lysaght P, Stockwood J. A simulation tool for dynamically reconfigurable field programmable gate arrays[J]. IEEE Tran- sactions on Very Large Scale Integration(VLSI)Systems, 1996, 4(3) 381-390.
  • 2Upegui A, Pefia-Reyes C A, Sanchez E. An FPGA platform for on-line topology exploration of spiking neural networks[J]. Mi- croprocessors and microsystems, 2005,29 (5) : 211-223.
  • 3Upegui A, Pefla-Reyes C A, Sanchez E. A methodology for evol- ving spiking neural-network topologies on line using partial dy- na_rrfic reeonfiguration[C]//Intemational Conference on Compu- tational Intelligenc. Medellin, Colombia, 2003.
  • 4Devic F, Torres L, Badrignans B. Secure protocol implementa- tion for remote bitstream update preventing replay attacks on FPGA[C] // 2010 International Conference on Field Program- mable Logic and Applications(FPL). IEEE, 2010 : 179-182.
  • 5Actel. ProASIC Handbook. 2008 [O]. www. actel, corn/ documents/PA3 HB. pdf.
  • 6Badrignans B, Elbaz R, Torres L. Secure FPGA configuration technique preventing system downgrade[C]//Proceedings of the 18th International Conference on Field Programmable Logic and Applications(FPL' 08). 2008.
  • 7Drimer S. Volatile FPGA design security-a survey [M]. IEEE Computer Society Annual Volume, 2008 : 292-297.
  • 8Lamport L. Password authentication with insecure communica- tion[J]. Communications of the ACM, 1981,24(11) : 770-772.
  • 9Cederquist J, Dashti M T, Mauw S. A certified email protocol u- sing key chains [C]// Advanced Information Networking and Applications Workshops, 2007, AINAW 07. 21st International Conference on. IEEE, 2007 525-530.
  • 10李磊,谭新莲,王育民.密钥链多方非否认协议[J].计算机科学,2009,36(10):89-90. 被引量:2

二级参考文献11

  • 1Zhou J, Gollmann D. A fair non-repudiation protocol[C]//Proceedings of the 1996 IEEE Symposium on Security and Privacy. Oakland, 1996 : 55-61.
  • 2Wang G. Generic non-repudiation protocols supporting transparent off-line TTP[J]. Journal of Computer Security, 2006, 14 (5) :441-467.
  • 3Cederquist J, Dashti M T, Mauw S. A Certified Email Protocol Using Key Chains[C]//Advanced Information Networking and Applications Workshops(AINAW '07). 21st International Conference. 2007 : 525-530.
  • 4Liang X, Cao Z, Lu R, et al. Efficient and secure protocol in fair document exchange [J]. Computer Standards & Interfaces, 2008,30(3) : 167-176.
  • 5Perrnpoontanalarp Y,Kanokkanjanapong J. Dynamic Undeniable Fair Certified Ernail with DDoS Protection[C] //Advanced Information Networking and Applications. Okinawa, 2008.
  • 6Kremer S, Markowitch O. A multi-party non-repudiation protoco[C]//15th International Conference on Information Security. IFIP World Computer Congress. Beijing, China, 2000 : 271-280.
  • 7Markowitch O, Kremer S. A Multi-party Optimistic Non-repudiation Protocol[C]//Information Security and Cryptology-ICISC 2000: Third International Conference Seoul, Korea: Spinger- Verlag, 2001 : 109-122.
  • 8Onieva J A, Zhou J, Lopez J. Non-repudiation protocols for multiple entities [J]. Computer Communications, 2004, 27 ( 16 ) : 1608-1616.
  • 9Zhou J, Onieva J, Lopez J. Optimized multi-party certified email protocols[J]. Information Management and Computer Security, 2005,13 (5) : 350-366.
  • 10Wang H,Wang R. Improvement of a multi-party certified email protocol[J]. Chinese Journal of Electronics, 2007, 16 (4) : 613- 616.

共引文献1

同被引文献25

引证文献3

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部