期刊文献+

适合WSN的等价替换标量乘法ECC加密算法研究 被引量:1

Research on ECC of equivalent substitution scalar multiplication suitable for WSN
下载PDF
导出
摘要 针对传感器网络所处环境恶劣、携带能源较少的特点,论文提出了一种基于等价替换标量乘法的椭圆曲线加密算法。该算法是在素场上对标量乘法进行基于点的阶的等价替换,减少标量乘法运算量的新方法。通过分析,在给定区间内,新方法比传统标量乘法的计算量大大减少,计算速度大大增加,并给出了阶为奇数或偶数时,计算量减少的加速度。该方法由于加密运算数据量少、加密速度快、加密时消耗能量低,适合用于无线传感网络中。 In the view of the harsh environment and less energy carried by sensor networks,an elliptic curve encryption algorithm based on equivalent substitution scalar multiplication is proposed in this paper.This algorithm is a new method to reduce the computation amount of scalar multiplication by an equivalent representation of points based on point order on the prime field.Through the analysis,the new method greatly reduces the calculation amount and increases the calculation speed compared with the traditional scalar multiplication in the given interval.This method is suitable for wireless sensor networks due to the decrease of data volume and the increase of encryption speed.
作者 胡海峰 王瑞尧 Hu Haifeng;Wang Ruiyao(College of Information Engineering,Pingdingshan University,HenanPingdingshan 467000)
出处 《网络空间安全》 2019年第2期86-88,共3页 Cyberspace Security
基金 河南省高等学校重点科研项目计划(项目编号:16B520022) 河南省2017年科技发展计划项目(项目编号:172102210118) 平顶山市科技计划项目(项目编号:201700812)
关键词 无线传感网络(WSN) 椭圆曲线算法(ECC) 等价替换 标量乘法 wireless sensor network elliptic curve cryptography equivalent substitution scalar multiplication
  • 相关文献

参考文献3

二级参考文献27

  • 1Ne&l Koblitz, Alfred Menezes,Scott V&nstone,The St&te of Elliptic Curve Cryptogr&phy.
  • 2Poll&rd.J," Monte Carlo methods for index comput&tion (mod P)" , M&them&tics of Computation, Vol. 32,1978,pp. 918-924.
  • 3Bernstein D J, Lange T. Fast Addition and Doubling on Elliptic Curves[A]. Asiacrypt 2007[C]. Lncs 4833, 2007.29-50.
  • 4Chevallier-Mames B, Ciet M, Joye M. Low-Cost Solutions for Preventing Simple Side Channel Analysis: Side-Channel Atomicity[J]. Ieee Transactions On Computers, 2004, 53(6): 760-768.
  • 5Cryptanalysis of A Remote User Authentication Scheme for Mobile Client-Server Environment with Provable Security Based on ECC. Information Fusion, 2013, 41(4):498-503.
  • 6Mishra P K, Dimitrov V. Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Muhibase Number Representation[C]. Proc.Of The lOth International Conference on Information Security. [S. L.]: Springer-Verlag, 2007: 390-406.
  • 7On the Security of an Improved Password Authentication Scheme Based on Ecc. Proceedings of the Third International Conference In- formation Computing and Applications (Icica 2012), Chende, China, Lncs 7473:181-188.
  • 8Pang Shi-Chun, Tong Shou-Yu, Congfu-Zong,et al. An Efficient Elliptic Curve Scalar Multiplication Algorithm Against Side Channel Attacks[C]. Proceedings of the 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering (Cm- ce2010), Springer-Verlag, Berlin:2010:361-364.
  • 9Hedabou, M., Pinel, P., B'En'Eteau, L.: Countermeasures for Preventing Comb Method Against Sca Attacks. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (Eds.) Ispec 2005. Lncs, Springer, Heidelberg 2005, 3439: 85-96.
  • 10Lu C Y,Jen S M,Laih C S.A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication[J]. Ieee Transac- tions on Computers,2013,62(3): 428-438.

共引文献16

同被引文献8

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部