本文主要研究内容
作者刘恒壮(2019)在《基于椭圆曲线密码体制和AES的混合加密技术研究》一文中研究指出:随着政府对于环境保护的力度逐渐增强,燃煤电厂作为主要的污染物排放源头使得其成为了重点监测对象。燃煤电厂污染物监测系统通过使用无线传输作为燃煤电厂污染物的数据传输方式,大大提高了上级监管部门对于污染物排放的监控效率。然而其也存在一定的安全威胁,如燃煤电厂更改(替换)污染监测数据等等不安全的行为。针对燃煤电厂污染物排放监测数据的传输安全问题,本文提出了基于椭圆曲线密码体制和AES的混合加密技术方案。椭圆曲线密码体制作为一种非对称密码体制其加解密速度较慢,因此本文通过使用椭圆曲线数字签名(Elliptic Curve Digital Signature Algorithm,ECDSA)来保证数据的完整性,不可替换性和不可否认性,而高级加密标准(Advanced Encryption Standard,AES)作为一种对称加密算法较非对称加密算法其加解密效率具有较大的优势,因此本文使用AES加密算法保证数据和签名的机密性。首先,论文对椭圆曲线标量乘算法进行了研究,针对椭圆曲线数字签名中标量乘计算开销较大,占用了较多资源的情况,本文对椭圆曲线标量乘算法进行了优化,在对称三进制标量乘的基础上提出了降低非零值权重的对称三进制标量乘算法,通过对比分析,提出的算法不仅可以得到正确的运算结果,同时计算复杂度也较低。在此基础上,本文对椭圆曲线数字签名方案进行研究,针对相关改进方案中存在的安全缺陷,提出了基于密钥隐藏数据摘要的数字签名,在不增加计算量的同时,提升了算法的安全性。其次,论文对AES中的S盒设计算法进行了研究,由于传统的AES算法在加密和密钥扩展方案中使用同一个S盒,并且其S盒为大众所知,随着学者对S盒研究的深入,算法安全强度越来越依赖于密钥,而如果算法使用的S盒不公开,则能够减少攻击者对于算法的先验信息,增强算法的安全性。本文通过使用仿生优化算法来生成S盒,通过使用基于交叉变异的粒子群S盒设计算法生成的S盒来替换原有的基于代数运算生成的S盒,从而使得算法的S盒不为大众所知。通过在粒子群算法中加入交叉变异的思想,使得算法生成的S盒的非线性度和差分均匀度与当前的最优S盒极为接近,也可以克服代数方案一次只能生成一个S盒的缺点。最后,本文对AES加密算法进行了研究,针对AES加密算法中密钥扩展存在轮密钥相关性较强的安全性缺陷,本文提出了使用单向散列函数SHA256的密钥扩展方案代替原有的AES扩展方式,增强AES密钥扩展的不可逆性,并采取Logistic混沌映射生成的混沌序列控制基于交叉变异的粒子群算法生成的多S盒的排布,从而使得S盒的排布随Logistic系统初始参数的更改动态变化,提升了算法的安全性。并通过C++对混合加密方案进行了软件实现。
Abstract
sui zhao zheng fu dui yu huan jing bao hu de li du zhu jian zeng jiang ,ran mei dian an zuo wei zhu yao de wu ran wu pai fang yuan tou shi de ji cheng wei le chong dian jian ce dui xiang 。ran mei dian an wu ran wu jian ce ji tong tong guo shi yong mo xian chuan shu zuo wei ran mei dian an wu ran wu de shu ju chuan shu fang shi ,da da di gao le shang ji jian guan bu men dui yu wu ran wu pai fang de jian kong xiao lv 。ran er ji ye cun zai yi ding de an quan wei xie ,ru ran mei dian an geng gai (ti huan )wu ran jian ce shu ju deng deng bu an quan de hang wei 。zhen dui ran mei dian an wu ran wu pai fang jian ce shu ju de chuan shu an quan wen ti ,ben wen di chu le ji yu tuo yuan qu xian mi ma ti zhi he AESde hun ge jia mi ji shu fang an 。tuo yuan qu xian mi ma ti zhi zuo wei yi chong fei dui chen mi ma ti zhi ji jia jie mi su du jiao man ,yin ci ben wen tong guo shi yong tuo yuan qu xian shu zi qian ming (Elliptic Curve Digital Signature Algorithm,ECDSA)lai bao zheng shu ju de wan zheng xing ,bu ke ti huan xing he bu ke fou ren xing ,er gao ji jia mi biao zhun (Advanced Encryption Standard,AES)zuo wei yi chong dui chen jia mi suan fa jiao fei dui chen jia mi suan fa ji jia jie mi xiao lv ju you jiao da de you shi ,yin ci ben wen shi yong AESjia mi suan fa bao zheng shu ju he qian ming de ji mi xing 。shou xian ,lun wen dui tuo yuan qu xian biao liang cheng suan fa jin hang le yan jiu ,zhen dui tuo yuan qu xian shu zi qian ming zhong biao liang cheng ji suan kai xiao jiao da ,zhan yong le jiao duo zi yuan de qing kuang ,ben wen dui tuo yuan qu xian biao liang cheng suan fa jin hang le you hua ,zai dui chen san jin zhi biao liang cheng de ji chu shang di chu le jiang di fei ling zhi quan chong de dui chen san jin zhi biao liang cheng suan fa ,tong guo dui bi fen xi ,di chu de suan fa bu jin ke yi de dao zheng que de yun suan jie guo ,tong shi ji suan fu za du ye jiao di 。zai ci ji chu shang ,ben wen dui tuo yuan qu xian shu zi qian ming fang an jin hang yan jiu ,zhen dui xiang guan gai jin fang an zhong cun zai de an quan que xian ,di chu le ji yu mi yao yin cang shu ju zhai yao de shu zi qian ming ,zai bu zeng jia ji suan liang de tong shi ,di sheng le suan fa de an quan xing 。ji ci ,lun wen dui AESzhong de She she ji suan fa jin hang le yan jiu ,you yu chuan tong de AESsuan fa zai jia mi he mi yao kuo zhan fang an zhong shi yong tong yi ge She ,bing ju ji She wei da zhong suo zhi ,sui zhao xue zhe dui She yan jiu de shen ru ,suan fa an quan jiang du yue lai yue yi lai yu mi yao ,er ru guo suan fa shi yong de She bu gong kai ,ze neng gou jian shao gong ji zhe dui yu suan fa de xian yan xin xi ,zeng jiang suan fa de an quan xing 。ben wen tong guo shi yong fang sheng you hua suan fa lai sheng cheng She ,tong guo shi yong ji yu jiao cha bian yi de li zi qun She she ji suan fa sheng cheng de She lai ti huan yuan you de ji yu dai shu yun suan sheng cheng de She ,cong er shi de suan fa de She bu wei da zhong suo zhi 。tong guo zai li zi qun suan fa zhong jia ru jiao cha bian yi de sai xiang ,shi de suan fa sheng cheng de She de fei xian xing du he cha fen jun yun du yu dang qian de zui you She ji wei jie jin ,ye ke yi ke fu dai shu fang an yi ci zhi neng sheng cheng yi ge She de que dian 。zui hou ,ben wen dui AESjia mi suan fa jin hang le yan jiu ,zhen dui AESjia mi suan fa zhong mi yao kuo zhan cun zai lun mi yao xiang guan xing jiao jiang de an quan xing que xian ,ben wen di chu le shi yong chan xiang san lie han shu SHA256de mi yao kuo zhan fang an dai ti yuan you de AESkuo zhan fang shi ,zeng jiang AESmi yao kuo zhan de bu ke ni xing ,bing cai qu Logistichun dun ying she sheng cheng de hun dun xu lie kong zhi ji yu jiao cha bian yi de li zi qun suan fa sheng cheng de duo She de pai bu ,cong er shi de She de pai bu sui Logisticji tong chu shi can shu de geng gai dong tai bian hua ,di sheng le suan fa de an quan xing 。bing tong guo C++dui hun ge jia mi fang an jin hang le ruan jian shi xian 。
论文参考文献
论文详细介绍
论文作者分别是来自哈尔滨工程大学的刘恒壮,发表于刊物哈尔滨工程大学2019-07-01论文,是一篇关于椭圆曲线密码体制论文,标量乘论文,混合加密论文,哈尔滨工程大学2019-07-01论文的文章。本文可供学术参考使用,各位学者可以免费参考阅读下载,文章观点不代表本站观点,资料来自哈尔滨工程大学2019-07-01论文网站,若本站收录的文献无意侵犯了您的著作版权,请联系我们删除。
标签:椭圆曲线密码体制论文; 标量乘论文; 混合加密论文; 哈尔滨工程大学2019-07-01论文;