天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

RFID中輕量級加密算法及實現(xiàn)技術(shù)的研究

發(fā)布時間:2018-01-15 01:35

  本文關(guān)鍵詞:RFID中輕量級加密算法及實現(xiàn)技術(shù)的研究 出處:《山東師范大學》2014年碩士論文 論文類型:學位論文


  更多相關(guān)文章: RFID 輕量級加密算法 橢圓曲線加密算法 PRESENT-80算法 RC4算法


【摘要】:無線射頻識別(RFID,Radio Frequency Identification)技術(shù)是一種利用特定的無線頻率來實現(xiàn)不接觸、遠距離信息傳送的技術(shù)。該技術(shù)具有成本低、功耗小、抗污染能力強等優(yōu)點,這使其在物流監(jiān)管,門禁系統(tǒng),電子自動收費等領(lǐng)域得到了迅猛發(fā)展。由于RFID技術(shù)中的信息傳送是在無線信道中進行的,因此如何保障RFID中傳送信息的安全性,,成了RFID系統(tǒng)中日益重要的問題。 加密算法是一種,對明文數(shù)據(jù)進行分散,打亂,重組,等運算處理的數(shù)學算法。使處理后的信息,顯得“雜亂無章”或者“支離破碎”讓未授權(quán)的截獲者,即使得到了加密后的信息,但因為不知道解密的方法,仍然無法知道信息的具體內(nèi)容,這就保障了信息在傳送過程中的安全。這里提到的數(shù)學算法就是加密算法,解密算法是加密算法的逆運算,在加密解密過程中的參數(shù)稱為該算法的密鑰。加密前的信息稱為明文,加密后的信息稱為密文。 利用RFID技術(shù)進行信息交流的雙方,都要分別對明文進行加密運算,形成密文,對方接收到密文后再利用解密算法解出原來的明文信息。加密算法從不同的角度可以分為多種,根據(jù)加解密過程中,密鑰是否一樣分為對稱加密算法和不對稱加密算法:根據(jù)明文是否要分組,分為分組加密算法和流密碼加密算法:根據(jù)算法實現(xiàn)的復(fù)雜難易程度分為重量級加密算法,中量級級加密算法和輕量級加密算法。 不同的應(yīng)用系統(tǒng)選擇最佳適應(yīng)自己的加密算法,RFID系統(tǒng)是硬件資源極端受限的系統(tǒng),需要的是輕量級加密算法。RFID系統(tǒng)里的電子標簽成本普遍較低,比如一張門票,一張商品標簽,所以RFID系統(tǒng)中加密算法注重的是更小的資源消耗而不是更大加密強度。 本文了選取對稱加密算法中PRESENT-80算法,RC4算法和不對稱加密算法中的橢圓曲線加密算法(Elliptic Curve Cryptography,ECC)進行了研究。 之所以選擇PRESENT-80算法和RC4算法是因為他們一個是分組加密算法一個是流密碼算法。橢圓曲線加密算法是不對稱加密算法,本身加密強度很高,如何實現(xiàn)其輕量化是時下很熱的一個課題。 本文給出了這三種算法的加密原理,算法實現(xiàn)。并在AVR Studio仿真平臺上以Atmega-32作為微處理器,取得了這三種算法在運行效率、密碼安全強度與硬件資源開銷間的比較結(jié)果,得出在硬件資源同樣極端受限的環(huán)境下,改進后的橢圓加密算法不但表現(xiàn)較強的的密碼安全度,而且還具有較高的算法運行效率,實現(xiàn)了算法的輕量化。
[Abstract]:Radio Frequency Identification (RFID) is a technology that utilizes specific wireless frequencies to achieve contactless. Long distance information transmission technology. This technology has the advantages of low cost, low power consumption, strong anti-pollution ability, which makes it in the logistics supervision, access control system. Since the information transmission in RFID technology is carried out in wireless channel, how to ensure the security of information transmission in RFID. It has become an increasingly important problem in RFID system. Encryption algorithm is a mathematical algorithm to disperse, disrupt, reorganize and process the plaintext data. The processed information appears to be "messy" or "fragmented" to allow unauthorized interceptors. Even if we get the encrypted information, we still can't know the specific content of the information because we don't know how to decrypt it. This ensures the security of the information in the transmission process. The mathematical algorithm mentioned here is the encryption algorithm, the decryption algorithm is the inverse operation of the encryption algorithm. The parameters in the process of encryption and decryption are called the key of the algorithm, the information before encryption is called plaintext, and the information after encryption is called ciphertext. Both sides who use RFID technology to exchange information must encrypt plaintext separately to form ciphertext. After receiving the ciphertext, the other side uses the decryption algorithm to solve the original plaintext information. The encryption algorithm can be divided into many kinds from different angles, according to the encryption and decryption process. Whether the key is equally divided into symmetric encryption algorithm and asymmetric encryption algorithm: according to whether or not to group plaintext. It is divided into block encryption algorithm and stream cipher encryption algorithm: according to the complexity of the algorithm is divided into heavyweight encryption algorithm, middle level encryption algorithm and lightweight encryption algorithm. Different application systems choose the best encryption algorithm for their own RFID system is extremely limited hardware resources of the system. What is needed is a lightweight encryption algorithm. RFID system in the electronic tag costs are generally low, such as a ticket, a commodity label. So encryption algorithms in RFID system focus on less resource consumption rather than greater encryption intensity. This paper selects the PRESENT-80 algorithm in the symmetric encryption algorithm. The elliptic curve encryption algorithm (Elliptic Curve Cryptograph) in RC4 algorithm and asymmetric encryption algorithm is studied. PRESENT-80 algorithm and RC4 algorithm are chosen because one of them is block encryption algorithm and the other is stream cipher algorithm. The elliptic curve encryption algorithm is asymmetric encryption algorithm. Encryption intensity is very high, how to achieve its lightweight is a hot topic. This paper gives the encryption principle and realization of the three algorithms, and takes Atmega-32 as the microprocessor on the AVR Studio simulation platform, and obtains the running efficiency of the three algorithms. The comparison between cryptographic security intensity and hardware resource overhead shows that the improved elliptical encryption algorithm not only shows strong cryptographic security in the environment where hardware resources are also extremely limited. Moreover, it has a high efficiency of operation, and realizes the lightening of the algorithm.
【學位授予單位】:山東師范大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TN918.4

【參考文獻】

相關(guān)期刊論文 前10條

1 楊超;高海燕;;橢圓曲線密碼體制理論與其安全性研究[J];電腦知識與技術(shù);2006年17期

2 姚旭;周煒;;一種基于橢圓曲線密碼的隱蔽通信[J];計算機安全;2010年02期

3 魏強;楊力生;;改進的橢圓曲線消息恢復(fù)簽密方案[J];計算機安全;2010年03期

4 李學俊,敬忠良,戴冠中,張駿;基于橢圓曲線離散對數(shù)問題的公鑰密碼[J];計算機工程與應(yīng)用;2002年06期

5 張雁,林英,郝林;橢圓曲線公鑰密碼體制的研究熱點綜述[J];計算機工程;2004年03期

6 張忠;徐秋亮;;物聯(lián)網(wǎng)環(huán)境下UC安全的組證明RFID協(xié)議[J];計算機學報;2011年07期

7 許鳴;黃健;;面向嵌入式應(yīng)用的加密算法開銷與性能分析[J];計算機工程與設(shè)計;2009年23期

8 楊君輝,戴宗鐸,楊棟毅劉宏偉;關(guān)于橢圓曲線密碼的實現(xiàn)[J];通信技術(shù);2001年06期

9 茅岑微;;適用于RFID的幾種小型加密算法比較[J];中國電子商情(RFID技術(shù)與應(yīng)用);2008年06期

10 李俊芳,崔建雙;橢圓曲線加密算法及實例分析[J];網(wǎng)絡(luò)安全技術(shù)與應(yīng)用;2004年11期

相關(guān)博士學位論文 前1條

1 孫躍剛;橢圓曲線密碼體制中若干問題的研究[D];吉林大學;2009年

相關(guān)碩士學位論文 前1條

1 惠越超;低成本RFID系統(tǒng)安全方案的研究[D];蘇州大學;2010年



本文編號:1426240

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/1426240.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶b2569***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com