期刊文献+

基于随机性检测的链路层加密数据盲识别方案 被引量:2

Independent Identification of Encrypted Data in Data Link Layer Based on Randomness Test
下载PDF
导出
摘要 为识别链路层加密数据,构建了以块内频数检测为主的链路层加密数据盲识别方案。针对分块长度影响块内频数检测识别率的问题,提出了基于方差原理的比特序列分块长度值选择方案。针对块内频数检测对长度较短的比特序列的识别能力有限的问题,提出了基于随机抽样原理的比特序列信息提取方法,以提高对未加密比特序列的识别率。最后,以某无线网络链路层数据的识别为例,对提出的方案进行了验证。结果表明,提出的方案对链路层加密数据具有较高的识别率,相关成果可为进一步的协议识别技术研究打下基础。 To identify the encrypted data of data link layer,an independent identification scheme was proposed by main- ly using the technique of frequency test within a block. As the identification rate of frequency test within a block is im- pressionable to the size of the block, a block size chosen scheme was provided based on the principle of variance. Fur- thermore, as the identification ability of frequency test within a block is also limited to short bit sequence, random sam- piing was introduced into its information extraction process to heighten the identification rate. Eventually, by taking the link layer bit sequence of a wiriness network as the identification object,the identification rate of the proposed schemes was verified. Experimental results demonstrate that the proposed schemes have high rates to identify encrypted data of data link layer and the correlative research paves the way for the further protocol identification research.
出处 《计算机科学》 CSCD 北大核心 2014年第8期192-196,共5页 Computer Science
基金 军内科研项目(YJJXM12033)资助
关键词 链路层 加密数据 块内频数检测 方差原理 随机抽样 Data link layer, Encrypted data, Frequency test within a block, Variance principle, Random sampling
  • 相关文献

参考文献13

二级参考文献53

  • 1薄彦娜,陈豪.浅谈信息战中通信卫星系统安全性[J].空间电子技术,2006,3(B11):1-4. 被引量:2
  • 2石昌贤,徐大雄,杜军.VSAT网络协议AA/TDMA的时延特性[J].北京邮电大学学报,1997,20(2):61-67. 被引量:1
  • 3桑志勇.二元序列的随机性测试技术的研究与应用[D].郑州:解放军信息工程大学,2004.
  • 4FIPS PUB 140-2-2001 Security Requirements for Cryptographic Modules[S].Washington,USA:National Institure of Standards and Technology,2001.
  • 5NIST SP 800-22.2001 A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[S].Washington.USA:National Institute of Standards and Technology,2001.
  • 6王玉柱.随机性测试工具研究与实现[D].北京:中国科学院研究生院,2000.
  • 7KRASNER. Using elliptic curve cryptography (ECC) for enhanced embedded security: financial advantages of ECC over RSA or Diffie-Hellmann(DH)[A]. Embedded Market Forecasters, American Technology[C]. 2004.1-27.
  • 8MORRIS A J, KAY S. Telephony earth station[A]. Global Telecommunications Conference 1989 and Exhibition. Communications Technology for the 1990s and Beyond, GLOBECOM '89[C]. IEEE 1989.1719- 1722.
  • 9PARK J H, LIM S B. Key distribution for secure vsat satellite communications[J]. IEEE Transactions on Broadcasting, 1998,44(3).
  • 10YI X, SIEW C K. Security of Park-Lim key agreement schemes for VSAT satellite communications[J]. IEEE Transactions on Vehicular Technology, 2003, 52(2):465-468.

共引文献87

同被引文献11

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部