物联网中基于混合加密的密码安全认证方法

杨国涛, 曹冲, 韩涛, 汪海军

集成电路与嵌入式系统 ›› 2024, Vol. 24 ›› Issue (4) : 23-29.

PDF(1247 KB)
PDF(1247 KB)
集成电路与嵌入式系统 ›› 2024, Vol. 24 ›› Issue (4) : 23-29. DOI: 10.20193/j.ices2097-4191.2024.04.004
研究论文

物联网中基于混合加密的密码安全认证方法

作者信息 +

Password security authentication method based on hybrid encryption in the Internet of Things

Author information +
文章历史 +

摘要

针对我国相关物联网平台加密要求高,但是加密技术发展较慢的问题,设计了一个基于物联网中基于混合加密的密码安全认证系统。为了保证用户入网的安全认证,首次采用椭圆加密算法和高级加密标准的混合加密技术实现密码安全认证系统的设计实施,利用ECC算法椭圆曲线的特点,达到使用比一般加密技术更简便的密钥并得到相同的安全性;进一步对AES算法的扩展过程进行改进,提高了算法的安全性,对列混淆运算进行优化从而提高算法的运行速度;最后结合两种算法的各自优势构建一个既方便密钥管理又能兼顾效率和安全性的混合加密体系。通过试验,该系统技术核算的数据误差率在可接受范围内,该研究为其他技术研究奠定了基础。

Abstract

In view of the high encryption requirements of relevant IoT platforms in China,but the development of encryption technology is slow,a password security authentication system based on hybrid encryption in IoT is designed in the paper.In order to ensure the security authentication of users entering the network,this study adopts the elliptic curve cryptography for the first time.The hybrid encryption technology of ECC and AES realizes the design and implementation of the password security authentication system.By using the characteristics of ECC algorithm elliptic curve,it can use the key more convenient than the general encryption technology and obtain the same security.Further,the extended process of AES algorithm is improved to improve the security of the algorithm,and the column obfuscation operation is optimized to improve the running speed of the algorithm.Finally,combining the advantages of the two algorithms,a hybrid encryption system is constructed which is convenient for key management and can take into account both efficiency and security.Finally,a hybrid encryption system that is convenient for key management and can take into account both efficiency and security is achieved.Through the experiment,the system technical accounting data,error rate in the acceptable range,the study lays a foundation for other technical research.

关键词

混合加密 / ECC算法 / AES算法 / 安全认证 / 物联网

Key words

mixed encryption / ECC algorithm / AES algorithm / safety certification / Internet of Things

引用本文

导出引用
杨国涛, 曹冲, 韩涛, . 物联网中基于混合加密的密码安全认证方法[J]. 集成电路与嵌入式系统. 2024, 24(4): 23-29 https://doi.org/10.20193/j.ices2097-4191.2024.04.004
YANG Guotao, CAO Chong, HAN Tao, et al. Password security authentication method based on hybrid encryption in the Internet of Things[J]. Integrated Circuits and Embedded Systems. 2024, 24(4): 23-29 https://doi.org/10.20193/j.ices2097-4191.2024.04.004
中图分类号: TP391   

参考文献

[1]
官宇哲, 姜亦学. 基于混合加密算法的通信网络密文防丢失传输系统设计[J]. 现代电子技术, 2020, 43(2):64-66.
GUAN Y ZH, JIANG Y X. Design of a communication network ciphertext loss prevention transmission system based on hybrid encryption algorithm[J]. Modern Electronic Technology, 2020, 43(2):64-66. (in Chinese)
[2]
董清卿, 孙冬梅. 基于混合加密算法的IPMC控制器设计[J]. 电子器件, 2019, 42(6):1532-1537.
DONG Q Q, SUN D M. Design of IPMC controller based on hybrid encryption algorithm[J]. Electronic Devices, 2019, 42(6):1532-1537. (in Chinese)
[3]
于慧, 彭国军, 蔡凯峰. 混合加密型勒索软件密文还原方法研究[J]. 计算机工程与应用, 2019, 55(10):96-102,178.
摘要
以混合加密型勒索软件为研究对象,将设置诱饵文件和文件操作监控方法相结合,获取勒索软件文件加密过程中采用的加密密钥、加密算法、密文起始字段和密文长度等相关信息,并提出了被加密文件的还原方法。针对8个流行的勒索软件家族进行密文还原测试,测试结果表明了提出的还原方法的有效性。该密文还原方法适用于混合加密勒索软件密文还原,是现行勒索软件防御策略的有效补充。
YU H, PENG G J, CAI K F. Research on ciphertext restoration method for mixed encryption ransomware[J]. Computer Engineering and Applications, 2019, 55(10):96-102,178. (in Chinese)
[4]
SWATI K, MANINDER S, RAMAN S, et al. A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices[J]. Computer Networks, 2022, 217:109327.DOI:10.1016/j.comnet.2022.109327.
[5]
刘艳, 郎显赫, 裴少婧. 基于ECC与同态加密的加密算法[J]. 计算机工程与设计, 2020, 41(5):1243-1247.
LIU Y, LANG X H, PEI SH J. Encryption Algorithm Based on ECC and Homomorphic Encryption[J]. Computer Engineering and Design, 2020, 41(5):1243-1247. (in Chinese)
[6]
贾春福, 哈冠雄, 武少强, 等. 加密去重场景下基于AONT和NTRU的密钥更新方案[J]. 通信学报, 2021, 42(10):67-80.
摘要
密钥更新是对抗密钥泄露的有效方法。现有加密去重系统大多基于消息锁加密实现,拥有相同数据的多个用户共享同一加密密钥,某一用户更新密钥时其他数据所有者需同步该更新,这将引起较大的计算和通信开销。针对这一问题,提出了一种基于AONT和NTRU的密钥更新方案,设计了一个AONT的变体以解决多用户密钥更新时的同步问题,引入了一种基于NTRU的代理重加密方案以降低密钥更新过程中的系统通信开销和客户端计算开销。效率分析与实验结果表明,所提方案与现有方案相比具有更高的加解密效率,显著降低了密钥更新过程中的时间开销。
JIA CH F, HA G X, WU SH Q, et al. Key update scheme based on AONT and NTRU in encrypted deduplication scenarios[J]. Journal of Communications, 2021, 42(10):67-80. (in Chinese)
[7]
温贺平, 陈俞强. 面向大数据的超混沌和AES混合加密方法研究[J]. 计算机应用与软件, 2018, 35(5):318-322.
WEN H P, CHEN Y Q. Research on Hybrid Encryption Methods of Hyperchaos and AES for Big Data[J]. Computer Applications and Software, 2018, 35(5):318-322. (in Chinese)
[8]
杨宏宇, 宁宇光, 王玥. 一种基于多密码体制的混合加密算法[J]. 大连理工大学学报, 2018, 58(1):99-104.
YANG H Y, NING Y G, WANG Y. A Hybrid Encryption Algorithm Based on Multi Cryptosystem[J]. Journal of Dalian University of Technology, 2018, 58(1):99-104. (in Chinese)
[9]
YANG H W. Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card[J]. Security and Communication Networks, 2022(1).
[10]
张樊. 物联网密文数据访问中可撤销的混合加密控制算法设计[J]. 科学技术与工程, 2018, 18(5):247-251.
ZHANG F. Design of Revocable Hybrid Encryption Control Algorithm for Cryptographic Data Access in the Internet of Things[J]. Science and Engineering, 2018, 18(5):247-251. (in Chinese)
[11]
杨业平, 林德威, 黄芳芳, 等. 基于区块链的物联网安全数据共享系统[J]. 福州大学学报(自然科学版), 2021, 49(6):739-746.
YANG Y P, LIN D W, HUANG F F, et al. A blockchain based secure data sharing system for the Internet of Things[J]. Journal of Fuzhou University (Natural Science Edition), 2021, 49(6):739-746. (in Chinese)
[12]
马英杰, 郑子怡, 赵耿, 等. 基于新型混沌细胞神经网络的图像加密算法[J]. 计算机仿真, 2022, 39(12):271-274.
MA Y J, ZHENG Z Y, ZHAO G, et al. Image encryption algorithm based on a novel chaotic cellular neural network[J]. Computer Simulation, 2022, 39(12):271-274. (in Chinese)

编辑: 薛士然
PDF(1247 KB)

Accesses

Citation

Detail

段落导航
相关文章

/