期刊文献+

WSNs中基于FPGA的AES-ECC新型加密系统

The new version of AES-ECC encryption system based on FPGA in WSNs
下载PDF
导出
摘要 针对无线传感器网络的特点,提出一种适于FPGA实现的改进的AES-ECC混合加密系统。本方案采用AES模块对数据进行加密,用SHA-1加密算法处理数据得到数据摘要,用ECC加密算法实现对摘要的签名和对AES私钥的加密。各个算法模块采用并行执行的处理方式以提高运算效率。方案优化了AES加密模块的设计,在占用相对较少逻辑资源的同时提高了系统吞吐率,通过优化ECC乘法单元的设计,提高了数字签名生成和认证的速度,完全满足了无线传感器网络对于稳定性、功耗以及处理速度的要求,给数据传输的安全性提供了高强度的保障。 According to the characteristics of wireless sensor networks, we propose a suitable FPGA implementa-tion of improved AES-ECC hybrid encryption systems. The program uses AES to encrypt data module, SHA-1 use for processing data, obtained data summaries, ECC encryption algorithm used to sign the data summary, and the pri-vate key to encrypt,In order to improve the efficiency, Performing parallel processing is used. For each module. Opti-mizing the design of AES encryption module occupies can use. Relatively little in logic resources while improves system throughput; ECC multiplication unit by optimizing the design of improved digital signature generation and authentication speed, fully meet the stability of wireless sensor networks , power consumption and processing speed requirements, the security of data transmission to provide a guarantee of high intensity.
作者 吉兵 汪烈军
出处 《激光杂志》 CAS CSCD 北大核心 2014年第7期39-42,共4页 Laser Journal
基金 新疆维吾尔自治区自然科学基金(2014211B008)
关键词 FPGA AES ECC 并行 优化 数字签名 FPGA AES ECC Parallel Optimization Digital Signatures
  • 相关文献

参考文献16

  • 1Blilat A, Bouayad A, E1 Houda Chaoui N, et al. Wireless sensor network: Security challenges[C]//Network Security and Systems (JNS2)[J]. 2012 National Days of. IEEE, 2012, 68-72.
  • 2谢卫民,汪烈军,汪明伟.基于QR分解与多项式的无线传感器网络密钥算法[J].传感器与微系统,2013,32(12):127-130. 被引量:1
  • 3Pethe H B, Pande S R. A survey on different secret key cryp- tographic algorithms[J]. IBMRD Journal of Management & Research, 2014, 3(1).
  • 4Zhang H B, Ji X P, Wu B Y, et al. Fast Elliptic Curve Point Multiplication Algorithm Optimization[J]. Applied Mechan- ics and Materials, 2014, 441: 1044-1048.
  • 5Chettibi N, Mellit A. FPGA-based real time simulation and control of grid-connected photovoltaic systems[J]. Simula- tion Modelling Practice and Theory, 2014, 43: 34-53.
  • 6Xu L, Zheng L, Chen Y, et al. Design and Implementation of Universal Serial Bus Transceiver with Verilog[J]. TEL- KOMNIKA Indonesian Journal of Electrical Engineering, 2014, 12(6):31-32.
  • 7肖国镇,白恩健,刘晓娟.AES密码分析的若干新进展[J].电子学报,2003,31(10):1549-1554. 被引量:31
  • 8CRYPTOGRAPHY E C. The advantages of elliptic curve cryptography for wireless security[J]. IEEE Wireless Com- munications, 2004, 63:32-33.
  • 9Johnson D, Menezes A, Vanstone S. The elliptic curve digi- tal signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001, 1(1): 36-63.
  • 10刘宗斌,荆继武,夏鲁宁.BLAKE算法的硬件实现研究[J].计算机学报,2012,35(4):703-711. 被引量:3

二级参考文献55

  • 1M Matsui. Linear cryptanalysis method for DES cipher[ A]. Advances in Cryptology, Proceedings of Eurocrypt ' 93 [ C ].Lofthus, Norway:Spfinger-Verlag. 1994.386 - 397.
  • 2J Daemen,L Knudsen, V Rijnmen. The block cipher Square[ A]. Fast So-ftware Encryption, Fourth International Workshop[ C]. Haifa, Israel:Springer-Verlag. 1997.149 - 165.
  • 3L R Knudsen. Block ciphers: state of the art[ R]. Copies of transparencies for lecture at the International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography. Katholieke Unive-rsiteit Leuven, Belgium, 1997.
  • 4Y Hu, Y Zhang, G Xiao. Integral cryptanalysis of SAFER + [ J]. Electroni-es Letters, 1999,35(17) : 1458 - 1459.
  • 5L R Knudsen, D Wagner. Integral cryptanalysis [ EB ]. Available:https://www. cosic. esat. kuleuven, ac. be/nessie.
  • 6N Ferguson, J Kelsey, et al. Improv-ed cryptanalysis of Rijndael[ A].Fast Software Encryption, 7th lnternat-ional Workshop, FSE 2000[ C ].NewYork, USA: Springer-Verlag, 2001.213 - 230.
  • 7T Jakobsen, L Knudsen. The interpolation attack on block ciphers[ A].Fast software encryption, fouth international workshop[ C ]. Haifa, Israel: Springer-Verlag. 1997.28 - 40.
  • 8Paul Kocher, Joshua Jaffe, Benjamin Jun, Introduction to differential power analysis and related attacks[ EB]. Available: http://www. cryptography. com/dpa./technical.
  • 9P Kocher, J Jatte, B Jun. Differential power analysis[A]. Advanced in Cryptology-CRYPTO' 99 [ C ]. California, USA: Springer Verlag. 1999.388 - 397.
  • 10J Damen, V Rijmen. Resistance againstimplementation attacks, a comparative study of the AES proposals[A] .Second AES Conference[C].Rome, Itary, 1999. Available: http://csrc. nist. gov/CryptoTcolkit/aes/roundl/conf2/aes2conf, htm.

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部