期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于类梅森数的物联网密钥交换快速取模算法
1
作者 覃健诚 钟宇 +3 位作者 程喆 黄成海 陆以勤 潘伟锵 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2023年第5期24-35,共12页
为适应物联网加密传输中大量轻型传感器节点运算性能和能源有限的特点,解决传感器运行RSA(Rivest-Shamir-Adleman)、DHM(Diffie-Hellman-Merkle)、Elgamal等公钥基础设施(PKI)加密算法所面临的运算速度、功耗等瓶颈问题,并简化相应的硬... 为适应物联网加密传输中大量轻型传感器节点运算性能和能源有限的特点,解决传感器运行RSA(Rivest-Shamir-Adleman)、DHM(Diffie-Hellman-Merkle)、Elgamal等公钥基础设施(PKI)加密算法所面临的运算速度、功耗等瓶颈问题,并简化相应的硬件加密电路逻辑设计,文中提出了一种基于类梅森数的密钥交换快速取模算法(CZ-Mod算法)。CZ-Mod算法利用梅森数的数学特性,使关键的mod(取模)运算的时间复杂度降至O(n)。首先,提出了一种以类梅森数为模数的快速取模运算mod1,使复杂的mod运算变成简单的二进制移位相加运算;其次,提出了一种以任意近似类梅森数的正整数为模数的快速取模运算mod2,在简化mod运算的同时扩大模数的取值范围;然后,对mod1、mod2运算作逻辑电路设计,以简化mod运算的硬件电路;最后,将以上工作应用到物联网节点的密钥交换中,以降低计算的复杂度,提高PKI加密算法的速度。实验测试结果表明:采用CZ-Mod算法的DHM密钥交换速度可达到常规算法的2.5~4倍;CZ-Mod算法精简,适合做物联网传感器的硬件电路设计。 展开更多
关键词 网络安全 传感器密码 梅森数 加密运算电路
下载PDF
DEFENSE AGAINST COLLUSION SCHEME BASED ON ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SENSOR NETWORKS
2
作者 Cheng Hongbing Huang Xiao Yang Geng 《Journal of Electronics(China)》 2009年第5期651-658,共8页
Wireless Sensor Networks (WSNs) are being deployed for a wide variety of applications and the security problems of them have received considerable attention. Considering the limitations of power, computation capabilit... Wireless Sensor Networks (WSNs) are being deployed for a wide variety of applications and the security problems of them have received considerable attention. Considering the limitations of power, computation capability and storage resources, this paper proposed an efficient defense against collusion scheme based on elliptic curve cryptography for wireless sensor networks in order to solve the problems that sensor node-key leaking and adversaries make compromised nodes as their collusions to launch new attack. In the proposed scheme, the group-key distribution strategy is employed to compute the private key of each sensor node, and the encryption and decryption algorithms are constructed based on Elliptic Curve Cryptography (ECC). The command center (node) only needs to broadcast a controlling header with three group elements, and the authorized sensor node can correctly recover the session key and use it to decrypt the broadcasting message. Analysis and proof of the proposed scheme's efficiency and security show that the proposed scheme can resist the k-collusion attack efficiently. 展开更多
关键词 Wireless Sensor Networks (WSNs) COLLUSION Elliptic Curve Cryptography (ECC) Security
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部