期刊文献+

蓝牙安全中链接密钥改进的一种新机制 被引量:1

New Scheme of Improving Link Key for Bluetooth Security
下载PDF
导出
摘要 蓝牙作为一种新型的无线通信技术,在安全方面存在两个缺点:一是当双方设备在交换加密密钥过程中,第三方可能获取加密密钥,扮演其中一方参与通信;二是第三方通过获取公开的蓝牙地址,能够容易地追踪这个设备的所有操作,并且知道与该设备通信的对方·针对这个问题,提出了一个链接密钥的改进方案,利用DES算法构造一个哈希函数,生成链接密钥,保证通信双方的信息安全,改善了蓝牙安全性能,为蓝牙无线特殊网建立一个更加强壮的安全机制·该方案可作为蓝牙单元密钥改进的设计参考· ?Bluetooth has two defects in its security. When the encryption key is exchanged between two units, the third party can capture the encryption key as one of the two units to communicate with the other. The third party can obtain the public Bluetooth address, easily trace all operation of the unit and know the other. A new scheme was proposed to improve a link key. By making use of DES algorithm, a link key was created by constructing a Hash function to ensure both information security and establish a more robust security mechanism for the Bluetooth wireless adhoc network. The scheme can be regarded as a reference of revising the unit key.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2003年第5期424-428,共5页 Journal of Northeastern University(Natural Science)
基金 国家科技部科技型中小企业技术创新基金资助项目(01C26212110295)
关键词 蓝牙 加密密钥 DES算法 哈希函数 安全管理 Bluetooth encryption key DES algorithm Hash Function security management
  • 相关文献

参考文献8

  • 1卢开澄.计算机密码学[M].北京:清华大学出版社,2000..
  • 2Stallings w 杨明 胥光辉 齐望东 译.密码编码学与网络安全:原理与实践 2版[M].北京:电子工业出版社,2001.62—65.
  • 3Haartsen J. The Bluetooth radio system[J ]. IEEE Personal Communications, 2000,7 ( 1 ) : 28 - 36.
  • 4Haartsen J. Bluetooth - the universal radio interface for ad hoc, wireless connectivity [ J ]. Ericsson Review, 1998, 75(3):110-117.
  • 5Jakobsson M, Wetzel S. Security weaknesses in Bluetooth[ A]. Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA 2001)[C]. Berlin: Springer, 2001.176- 191.
  • 6Bellare M, Canetti R, Krawczyk H. Keying Hash functions for message authentication[ A ]. Advances in Cryptology-CRYPTO'96[C]. Berlin: Springer, 1996.156- 168.
  • 7Mihaljevic M J, Imai H. A family of fast dedicated one-way Hash functions based on linear cellular automata over GF(q)[J]. IEICE Tram Fundamentals, 1999,82-A(1 ) :40 - 47.
  • 8Shoup V. Using Hash functions as a hedge against chosen ciphertext attack [ A ]. Advances in Cryptology-EUROCRYPT 2000[C]. Berlin: Springer, 2000. 205 -212.

共引文献9

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部