期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
SM algorithms-based encryption scheme for large genomic data files
1
作者 Yatong Jiang Tao Shang Jianwei Liu 《Digital Communications and Networks》 SCIE CSCD 2021年第4期543-550,共8页
With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually reduced.The analysis and utilization of genomic dam gradually... With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually reduced.The analysis and utilization of genomic dam gradually entered the public view,and the leakage of genomic dam privacy has attracted the attention of researchers.The security of genomic data is not only related to the protection of personal privacy,but also related to the biological information security of the country.However,there is still no.effective genomic dam privacy protection scheme using Shangyong Mima(SM)algorithms.In this paper,we analyze the widely used genomic dam file formats and design a large genomic dam files encryption scheme based on the SM algorithms.Firstly,we design a key agreement protocol based on the SM2 asymmetric cryptography and use the SM3 hash function to guarantee the correctness of the key.Secondly,we used the SM4 symmetric cryptography to encrypt the genomic data by optimizing the packet processing of files,and improve the usability by assisting the computing platform with key management.Software implementation demonstrates that the scheme can be applied to securely transmit the genomic data in the network environment and provide an encryption method based on SM algorithms for protecting the privacy of genomic data. 展开更多
关键词 Genomic data Privacy protection sm algorithm Key agreement protocol Hybrid encryption
下载PDF
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
2
作者 Senshan Ouyang Xiang Liu +3 位作者 Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期903-915,共13页
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle. 展开更多
关键词 KEY-INSULATED sm2 algorithm digital signature Industrial Internet of Things(IIoT) provable security
下载PDF
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1
3
作者 Youhai Shao Yong Wang +1 位作者 Yun Yang Xiang Wang 《Journal of Computer and Communications》 2022年第1期42-56,共15页
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s... Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. 展开更多
关键词 Secret Algorithm sm2 Communication Protocol Hybrid Encryption Security Protection
下载PDF
AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol
4
作者 Shan Shi Yong Wang +1 位作者 Cunming Zou Yingjie Tian 《Journal of Computer and Communications》 2022年第1期27-41,共15页
The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order ... The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol. 展开更多
关键词 104 Protocol Man in the Middle Attack AES and RSA Hybrid Encryption Signature National Secret sm2 Algorithm
下载PDF
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
5
作者 Dognery Sinaly Silue Wanggen Wan Muhammad Rizwan 《Open Journal of Applied Sciences》 2016年第13期893-902,共10页
With the rapid development of information technology, demand of network & information security has increased. People enjoy many benefits by virtue of information technology. At the same time network security has b... With the rapid development of information technology, demand of network & information security has increased. People enjoy many benefits by virtue of information technology. At the same time network security has become the important challenge, but network information security has become a top priority. In the field of authentication, dynamic password technology has gained users’ trust and favor because of its safety and ease of operation. Dynamic password, SHA (Secure Hash Algorithm) is widely used globally and acts as information security mechanism against potential threat. The cryptographic algorithm is an open research area, and development of these state-owned technology products helps secure encryption product and provides safeguard against threats. Dynamic password authentication technology is based on time synchronization, using the state-owned password algorithm. SM3 hash algorithm can meet the security needs of a variety of cryptographic applications for commercial cryptographic applications and verification of digital signatures, generation and verification of message authentication code. Dynamic password basically generates an unpredictable random numbers based on a combination of specialized algorithms. Each password can only be used once, and help provide high safety. Therefore, the dynamic password technology for network information security issues is of great significance. In our proposed algorithm, dynamic password is generated by SM3 Hash Algorithm using current time and the identity ID and it varies with time and changes randomly. Coupled with the SM3 hash algorithm security, dynamic password security properties can be further improved, thus it effectively improves network authentication security. 展开更多
关键词 Dynamic Password Authentication sm3 Hash Algorithm Network Authentication Security One Time Password
下载PDF
TESLA-Based Authentication for BeiDou Civil Navigation Message 被引量:1
6
作者 Zhijun Wu Yun Zhang +1 位作者 Liang Liu Meng Yue 《China Communications》 SCIE CSCD 2020年第11期194-218,共25页
Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here... Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here is spoofing attacks.Spoofing attacks make the positioning or timing results of BeiDou civilian receivers wrong.Such errors may cause a series of security problems,which lays a serious hidden danger for Bei-Dou satellite information security.This article proposes an anti-spoofing method for BeiDou navigation system based on the combination of SM commercial cryptographic algorithm and Timed Efficient Stream Loss-tolerant Authentication(TESLA)for spoofing attacks.In this solution,we use the SM3 algorithm to generate a TESLA key chain with time information,and then use the key in the key chain to generate the message authentication code for the BeiDou D2 navigation message.The message authentication code is inserted into a reserved bit of the D2 navigation message.In addition,this solution uses the SM2 algorithm to protect and encrypt time information in the TESLA key chain to prevent key replay attacks in TESLA.The experimental results tested on the experimental platform built in this paper show that this scheme reduces the possibility of the BeiDou navigation system being deceived and enhances the safety of the BeiDou navigation system. 展开更多
关键词 BeiDou navigation system sm commercial cryptographic algorithm TESLA message authentication code D2 navigation message
下载PDF
Distributed Implementation of SM4 Block Cipher Algorithm Based on SPDZ Secure Multi-party Computation Protocol
7
作者 Xiaowen Ma Maoning Wang Zhong Kang 《国际计算机前沿大会会议论文集》 EI 2023年第1期279-297,共19页
SM4 is a block cipher algorithm among Chinese commer-cial cryptographic algorithms,which is advanced in terms of efficiency and theoretical security and has become national and international stan-dards successively.Howe... SM4 is a block cipher algorithm among Chinese commer-cial cryptographic algorithms,which is advanced in terms of efficiency and theoretical security and has become national and international stan-dards successively.However,existing literature shows that SM4 was not designed with an emphasis on key storage,which means that in today’s world where a single trusted hardware device with the built-in key faces challenges such as vulnerability,high cost,and unreliability,the usabil-ity of SM4 may be limited.Therefore,this paper proposes an imple-mentation scheme for SM4 based on secure multi-party computation(MPC)technology.The scheme involves dispensing the key among mul-tiple users’devices in a distributed manner,and when using the SM4 algorithm for encryption,multiple users perform joint computation with-out opening the full key.Specifically,this paper employs the MP-SPDZ framework,which satisfies security requirements in the presence of a dishonest majority of active adversaries.In view of the fact that this framework can only perform basic linear operations such as addition and multiplication,this paper focuses on the algebraic analysis of Sbox,which is the only non-linear component in SM4,and reconstructs it using the bit decomposition method.Furthermore,this paper demonstrates the conversion between the SM4-Sboxfield GF(28)and the SPDZ parame-terfield GF(240)through the isomorphic mapping,making it possible to perform joint calculations throughout the entire SM4 algorithm.Com-plexity analysis shows that this scheme has advantages in terms of data storage and communication volume,reaching a level of usability. 展开更多
关键词 sm4 algorithm SPDZ protocol MPC
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部