EPG系統(tǒng)數(shù)據(jù)傳輸安全性的研究
本文選題:電子節(jié)目導(dǎo)航系統(tǒng) + 文件監(jiān)聽 ; 參考:《北京郵電大學(xué)》2016年碩士論文
【摘要】:伴隨著我國數(shù)字電視技術(shù)的快速發(fā)展,EPG(ElectronicProgram Guide),即電子節(jié)目導(dǎo)航系統(tǒng)孕育而生,它已經(jīng)衍變成數(shù)字電視一項(xiàng)不可或缺的基礎(chǔ)性業(yè)務(wù)。從功能來講,它是電視和用戶之間傳遞消息的一個(gè)平臺(tái),提供了人機(jī)交互的一個(gè)窗口,供用戶快捷有效的操作,但相關(guān)安全性問題日益凸顯。目前EPG系統(tǒng)還沒有一套完整的安全保護(hù)機(jī)制,它自身存在諸多的安全問題,其中最大的安全隱患是數(shù)據(jù)的非法篡改,一旦攻擊者將帶有目的性、破壞性的被篡改過的內(nèi)容在電視端順利播放,將造成極其惡劣的影響。課題主要解決EPG系統(tǒng)數(shù)據(jù)的非法篡改這個(gè)安全性問題,結(jié)合觸發(fā)式文件監(jiān)聽技術(shù)與消息完整性驗(yàn)證技術(shù)進(jìn)行EPG系統(tǒng)數(shù)據(jù)傳輸安全性方案的設(shè)計(jì)。其中數(shù)據(jù)完整性檢測利用論文中改進(jìn)過的SHA-1算法,實(shí)現(xiàn)對(duì)EPG信息完整性的驗(yàn)證。方案最終目的是防止被篡改過的EPG數(shù)據(jù)推向機(jī)頂盒。本文主要內(nèi)容如下:首先,本文闡述了 EPG系統(tǒng)的結(jié)構(gòu),分析了 EPG系統(tǒng)存在的安全隱患,對(duì)EPG系統(tǒng)安全性需求進(jìn)行了分析,并對(duì)課題相關(guān)技術(shù)做了研究。其次,對(duì)課題方案中重點(diǎn)采用的核心算法SHA-1進(jìn)行了深入的研究及有效的改進(jìn)。根據(jù)目前SHA-1算法在碰撞性方面的缺陷,本文從壓縮函數(shù)和消息擴(kuò)展方式兩方面對(duì)SHA-1算法進(jìn)行了改進(jìn),改進(jìn)后的SHA-1算法命名為E-SHA-1。E-SHA-1算法對(duì)本課題方案的設(shè)計(jì)起到了關(guān)鍵性的作用。接著,對(duì)提出的三個(gè)初步方案進(jìn)行了簡單介紹,分析了各自的優(yōu)勢與不足。最終,基于E-SHA-1算法,本文詳細(xì)設(shè)計(jì)并實(shí)現(xiàn)了 EPG系統(tǒng)數(shù)據(jù)傳輸安全性方案。方案分解成EPG文件預(yù)處理系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn);EPG文件監(jiān)聽系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn);EPG文件完整性檢測系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn)。對(duì)其中各功能模塊的劃分及實(shí)現(xiàn)過程中關(guān)鍵接口的設(shè)計(jì)進(jìn)行了具體描述。最后,對(duì)課題方案及E-SHA-1算法進(jìn)行了測試。首先從完備度、雪崩效應(yīng)度、嚴(yán)格雪崩效應(yīng)度、抗碰撞性、消息的擴(kuò)散性及算法效率這六個(gè)方面對(duì)E-SHA-1算法進(jìn)行了全面的測試,測試結(jié)果證明該算法安全性得到了明顯提高;其次是對(duì)方案各功能模塊及系統(tǒng)整體性的測試,測試結(jié)果證明方案達(dá)到了預(yù)期效果,嚴(yán)格阻止被篡改過的EPG文件順利推向機(jī)頂盒,方案設(shè)計(jì)完整,適用于實(shí)際的EPG系統(tǒng)環(huán)境。
[Abstract]:With the rapid development of digital television technology in China, EPG Electronic Program Guide, or electronic program navigation system, has evolved into an indispensable basic business of digital television.In terms of function, it is a platform for transmitting messages between TV and users. It provides a window of human-computer interaction for users to operate quickly and effectively, but the related security problems become increasingly prominent.At present, EPG system does not have a complete security protection mechanism, it has many security problems, among which the biggest security hidden danger is illegal tampering of data, once the attacker will have a purpose,Destructive tampered content will play smoothly on the TV, which will have an extremely bad effect.This paper mainly solves the security problem of illegal tampering of EPG system data, and designs the security scheme of data transmission in EPG system by combining trigger file monitoring technology and message integrity verification technology.Data integrity detection uses the improved SHA-1 algorithm in this paper to verify the integrity of EPG information.The ultimate goal of the scheme is to prevent tampered EPG data from pushing to the set-top box.The main contents of this paper are as follows: firstly, this paper describes the structure of EPG system, analyzes the hidden dangers of EPG system, analyzes the security requirements of EPG system, and studies the related technologies.Secondly, the core algorithm SHA-1, which is used in the project, is studied deeply and improved effectively.According to the defects of SHA-1 algorithm in collision, this paper improves the SHA-1 algorithm from compression function and message expansion mode. The improved SHA-1 algorithm named E-SHA-1.E-SHA-1 algorithm plays a key role in the design of the project.Then, three preliminary schemes are introduced, and their advantages and disadvantages are analyzed.Finally, based on the E-SHA-1 algorithm, this paper designs and implements the data transmission security scheme of EPG system in detail.The scheme is decomposed into the design and implementation of the EPG file preprocessing system; the design and implementation of the EPG file monitoring system.The partition of each functional module and the design of key interfaces in the process of implementation are described in detail.Finally, the project and E-SHA-1 algorithm are tested.Firstly, the E-SHA-1 algorithm is tested from six aspects: completeness, avalanche effect, strict avalanche effect, anti-collision, message diffusion and algorithm efficiency. The test results show that the security of the algorithm is improved obviously.The test results show that the scheme achieves the desired results and strictly prevents the tampered EPG files from being pushed to the set-top box. The scheme design is complete and suitable for the actual EPG system environment.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2016
【分類號(hào)】:TP309
【參考文獻(xiàn)】
相關(guān)期刊論文 前3條
1 薛宇;吳文玲;王張宜;;SHA-3雜湊密碼候選算法簡評(píng)[J];中國科學(xué)院研究生院學(xué)報(bào);2009年05期
2 施雙雙;孫軍;;EPG在數(shù)字電視以及網(wǎng)絡(luò)電視中的實(shí)現(xiàn)與比較[J];信息技術(shù);2007年10期
3 盛利元;李更強(qiáng);李志煒;;基于切延遲橢圓反射腔映射系統(tǒng)的單向Hash函數(shù)構(gòu)造[J];物理學(xué)報(bào);2006年11期
相關(guān)博士學(xué)位論文 前1條
1 朱曉冬;數(shù)字水印技術(shù)的研究[D];吉林大學(xué);2004年
相關(guān)碩士學(xué)位論文 前4條
1 李世明;關(guān)于Hash算法SHA-1的研究與分析[D];西南大學(xué);2013年
2 宋永豪;數(shù)字電視的內(nèi)容保護(hù)技術(shù)研究[D];上海交通大學(xué);2008年
3 樂園園;基于數(shù)字電視機(jī)頂盒的Java平臺(tái)研究與實(shí)現(xiàn)[D];南京理工大學(xué);2007年
4 劉巖;數(shù)字電視EPG系統(tǒng)的研究與實(shí)現(xiàn)[D];天津大學(xué);2005年
,本文編號(hào):1769696
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/1769696.html