移动通信网络中的RSA公钥加密算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机科学技术及网络通信技术的飞速发展和Internet的快速普及,计算机网络的应用已遍及人类社会的各个领域。大量的数据通过网络进行交换,数据安全问题已经成为当今首要待解决的问题之一。第三代移动通信(3G)是一种基于QoS(Quality of Service服务质量)的高速宽带无线通信系统,其网络链路已满足大流量数据业务的需求,为用户实现了在线影音、移动电视等流媒体功能。然而,由于移动通信的空中链路具有开放性多径传输的固有特点,数据在无线传输路径中容易被监听而引起信息安全危机。
     本文通过分析移动通信系统中的数据安全度、安全需求度、及安全稳定性等重要参数,提出当用户对所传送的信息安全要求不同即用户的安全需求度不同,而系统所提供的安全度不变,将会造成用户的安全满足度随着安全需求度的变化而变化,从而导致系统的安全性能也随之波动,呈现及其不稳定状态的问题。本文提出使用加密算法来解决此种安全性能不稳定的问题。通过分析对称公钥和椭圆曲线密钥对移动通信信息安全的影响,从而提出一种基于RSA公钥密码体系的自适应安全度算法,根据用户的安全需求度的不同选择相对应的系统安全度,满足用户不同等级的安全需求,将无线通信网络构建成安全可控系统,从而均衡安全复杂度和安全满足度的波动特性,以稳定系统安全性能。
     本文通过一系列计算机仿真模拟实验,验证了移动通信安全度的高坡度脉冲形态特性及单参数自适应调节算法的可行性。
With the rapid development of Computer Science and the popularization of Internet, the applications of computer network have come into lots of fields in human society. 3G is a high-speech broad-band Mobile Communication System based on QOS. Its network, which realized online-media, mobile TV, and other stream media, has satisfied the need of huge flux of data operation. However, Due to the characteristics of openness and mass transmissibility of the wireless communication's aerial network, data in the wireless transmission route is prone to be monitored.
     In this Thesis, by analyzing the degree of data security and security requirements, the stability of the security and other important parameters, the author advances: with the constant system security degree, the user's satisfaction shifts with the user's security requirements which leads the fluctuation of the system security degree. The author discusses the influence of the symmetrical public-key and elliptic curvilinear private-key on the security of the mobile communication, and further advanced a self-adapting algorithm for the degree of the security based on the RSA public-key Cryptography. This algorithm could choose corresponding system security degree according to different user's security requirement and could build up the mobile communication net into a safe controllable system in order to poise the fluctuation of the complexity and security needs.
     The Thesis validates the characteristics of high gradient pulse in mobile communication security and the feasibility of the algorithm which is controlled by one parameter by a series of computer emulation experiments.
引文
[1] 刘东华. 网络与通信安全技术. 北京: 人民邮电出版社,2002. 4-6
    [2] 汤惟. 密码学与网络安全技术基础. 北京:机械工业出版社,2004
    [3] C.E.Shannon. Communication theory of secrecy systems[J]. Bej]System Technical Journal, 1949, 28(4): 656-715
    [4] Diffie, M. Hellman. New direction in cryptography. IEEE Trans. Information Theory, 1976, 22: 644-645
    [5] R.L. Rivest, A. Shamir, L.Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 21(2): 120-126
    [6] 颜篙铭. 因子分解之现况与展望—密码长度之选取,信息安全通信. 台湾: 台湾信息学会,1995. 1, 3, 7-10
    [7] 赖溪松,韩亮,张真诚. 计算机密码学及其应用. 北京: 国防工业出版社,2001. 47-48, 86-89
    [8] 凌捷,刘少涛. 数据加密算法与大素数的生成及运算. 广东工业大学学报,2001, 18(4): 25-27
    [9] 翁贻方,鞠磊. 基于混沌的序列密码加密算法. 计算机工程,2002, 28
    [10] D.Coppersmith. Small solutions to polynomial equations. and low exponent RSA vulnerabilities, J.Crypt, 1997, 10: 233-360
    [11] EY.Brickell. A survey of hardware implementations of RSA. In G.Brassard, editor, Advances in Cryptology-CRYPTO 89, Proceedings, Lecture Notes in Computer Science, New York, NY: Springer-Verlag, 1989. 368-370
    [12] Siavash M. Alamouti. “A simple transmit diversity technique for wireless communications.” IEEE J. Select. Areas Commun., 1998, 16(8): 1451-1458
    [13] William Stallings. Cryptography and Network Security: Principles and Practice(Second Edition). Prentice-Hall, 1999
    [14] 王昭顺. 椭圆曲线密码芯片研究及实现: [博士学位论文]. 北京科技大学, 2004
    [15] 孙宝林,杨球. RSA公开密钥密码算法及其在信息交换中的应用. 武汉交通科技大学学报, 2002(2): 169-172
    [16] 王育民,刘建伟. 通信网的安全. 西安: 西安电子科技大学出版社,1999
    [17] 赵珑. 移动通信技术发展的回顾与展望. 山东通信技术, 2002(1)
    [18] 邬贺铨. 第三代网络. 现代通信, 2002(3)
    [19] 张玉清. 公钥基础设施(第三版). 北京: 清华大学出版社,2002. 12-14
    [20] 王辉. 大素数域上的曲线密码体制. 西安电子科技大学学报,2002(6): 29
    [21] Darrel Hankerson. Guide to Elliptic Curve Cryptography. Frist Edition. Publisher: Springer-Verlag, New York, 2004. 122-286
    [22] 扬君辉. 关于椭圆曲线密码的实现. 通讯技术,2001, 117(6)
    [23] S. C.Coutinho. The Mathematics of Ciphers Number Theory and RSA Cryptography, 1st Edition, Publisher: Springer-Verlag, New York, 1998. 102-132
    [24] Lawrence C. Washington. Elliptic Curves Number Theory and Cryptography. Frist Edition. Publisher: Chapman & Hall/CRC, 2003. 98-138
    [25] Wade Trappe. Introduction to Cryptography with Coding Theory. 1st Edition. Publisher: Prentice Hall,New York, 2002. 165-16
    [26] [芬兰]Arto Salomaa著,丁存生,单炜娟译. 公钥密码学. 国防工业出版社, 1998
    [27] 王宇洁, 许占文, 郑守春. RSA公钥密码体制素数生成的研究. 沈阳工业大学学报,2000, 22(6)
    [28] 冯登国著. 密码分析学. 清华大学出版社, 2000
    [29] 段云所. 信息安全概论(第一版). 北京: 高等教育出版社,2003. 100-112
    [30] E.Biham, A. Shamir. Differential Cryptoanalysis of DES-like Cryptosystems. Proceedings of Crypto'90, Santa Babara, 1990. 17-2
    [31] Willam Stallings. Data and Computer Communication. Prentice Hal1, 1996. 512-520
    [32] 常永宏. 第三代移动通信系统与技术. 北京: 人民邮电出版社,2002
    [33] 张传福,吴伟陵. 第三代移动通信系统的网络安全问题. 电讯科技, 2000. 88-93
    [34] ETSI.Mobile Application Part (MAP) specification. V4.9.1 France: European Telecommunications. Standards Institute,1995. 15-19
    [35] F. Adachi, M. Sawahashi, and H. Suda, Wideband DS-CDMA for next-generation mobile communication systems. IEEE Communications Magazine, 1998, 36(9):56-69
    [36] William C.YLee著. 宋维模,姜焕成,李明等译. 移动通信工程理论与应用(第二版). 北京: 人民邮电出版社,2002
    [37] 张志涌. 精通MATLAB. 北京: 北京航空航天大学出版社,2000
    [38] MATLAB Application Program Interface Guide. The Mathworks Inc.,1998
    [39] 韩斌杰. GSM原理及其网络化. 机械工业出版社, 2000
    [40] 翁贻方, 鞠磊. 基于混沌的序列密码加密算法. 计算机工程, 2002, 28
    [41] 吴永森,张芹. 公开密钥密码体制RSA算法的实现和应用. 计算机工程,1993, 19: 28-3

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700