计算机科学 ›› 2023, Vol. 50 ›› Issue (6A): 220300107-7.doi: 10.11896/jsjkx.220300107
王鑫淼, 孙婷婷, 马晶军
WANG Xinmiao, SUN Tingting, MA Jingjun
摘要: 人们在利用各种各样的电子设备进行“面对面”信息交流的过程中,双方都不希望自己的信息被第三方获取,由此衍生了通信安全问题。数据安全性不够,数据传输过程就容易受到外界干扰,造成信息重复、缺失、丢包或延迟等现象的产生。针对此问题,广大科研工作者积极应对,引入了密码系统,采用密码算法对数据进行加密,减少其在传输过程中受到的干扰,进而起到保护数据的效果。为了进一步了解密码算法在网络数据传输中的工作原理,文中选取了非对称密码系统中的RSA算法作为研究对象,详细介绍了该算法的加密解密过程,对比分析了RSA算法和ECC算法的优缺点,并针对RSA算法的缺陷,总结了相应的优化措施和优化效果。最后,总结了RSA算法在网络数据传输中的研究进展和实际运用,并对RSA算法的未来进行了展望,期望为数据保护工作提供一些参考依据。
中图分类号:
[1]GONG L,ZHANG L,ZHANG W,et al.The application of data encryption technology in computer network communication security[C]//AIP Conference Proceedings.New York:American Institute of Physics,2017. [2]XIE X M.Establishment and Technical Analysis of Computer Network Information Security Protection Mode[J].Science and Technology Innovation,2019(7):66-67. [3]《Law of the people’s Republic of China on Guarding State secrets》[Z].Beijing,2010.10. [4]LIU S S,WANG P,LUO L,et al.Security Module in Information Unilateral Transmission System among Networks[C]//AASRI Procedia,NETHERLANDS:ELSEVIER SCIENCE BV.2012:100-105. [5]ZHAO Y B,ZHANG X J,JIANG Y L.Application Research of High Strength File Encryption Based on Digital Envelope[J].Computer Engineering and Design,2007(18):4357-4359. [6]DIFFIE W,HELLMAN M.New directions in cryptography[J].IEEE transactions on Information Theory,1976,22(6):644-654. [7]LAMPORT L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772. [8]YEN S M,LIAO K H.Shared authentication token secureagainst replay and weak key attacks[J],Information Processing Letters,1997,62(2):77-80. [9]LEE S,PARK S.Mobile Password System for Enhancing Usab-ility-Guaranteed Security in Mobile Phone Banking[J].Web and Communication Technologies and Internet-Related Social Issues-HSI 2005,2005,3597:66-74. [10]YANG Y J,DENG R H,BAO F.A practical password-based two-server authentication and key exchange system[J].IEEE Transactions on Dependable and Secure Computing,2006,3(2):105-114. [11]LIU J Z.Internet/INTRANET Security Technology[J].Software and Integrated Circuit,1997(1):16-20. [12]LIN X F,FUN M F.Data Security in Network Transmission[J].Software Guide,2012,11(1):139-141. [13]ZHAO G P.Cryptography Technology in Network Data Transmission Security[J].Information and Computer(theoretical edition),2010(20):19. [14]HUANG Y,HU W D,CHEN K F.Classification of Network Attack and Security Protection[J].Computer Engineering,2001(5):131-133,140. [15]XU C.The Application of AES and RSA Hybrid EncryptionTechnology in Network Data Transmission[J].Wireless Interconnection Technology,2016(13):142-144. [16]XU S S,ZHU X M,BAI L F,et al.Application of Attribute-based Cryptosystem in Network Security Level Protection[C]//Papers of the Seventh National Security Level Protection Technology Congress 2018.2018:159-164. [17]HUANG H M.Data Encryption Technology and Its Application in Network Security Transmission[D].Xiamen:Xiamen University,2008. [18]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126. [19]HU J.Research and Implementation of RSA Encryption Algorithm[M].Maanshan:Anhui University of Technology,2011:1-48. [20]SONG Y.Research and Application of Encryption Communication Based on RSA Algorithm[J].Electronic Test,2021(16):33-36,138. [21]ARTO S.Public Key Cryptography[M].Beijing:National Defense Industry Press,1998. [22]LU J Y.Research on Data Transmission Security TechnologyBased on Web Network[D].Nanjing:Nanjing University of Technology,2009:1-67. [23]TIAN W Y,LI Z M.Research and Implementation of RSA Encryption Algorithm and Its Improved Algorithm[J].Shanxi Electronic Technology,2013(6):90-92. [24]LIU W,ZHU M R,LIU Y L.Data Encryption Transmission in Remote Fault Diagnosis System[J].Network Security Techno-logy & Application,2008(1):83-84,21. [25]HUANG Y L,LEU F Y,YOU I,et al.A secure wireless communication system integrating RSA,Diffie-Hellman PKDS,intelligent protection-key chains and a Data Connection Core in a 4G environment[J].Journal of Supercomputing,2014,67(3):635-652. [26]KUMAR B J S,RAJ V K R,NAIR A.Comparative study onAES and RSA algorithm for medical images[C]//2017 International Conference on Communication and Signal Processing(ICCSP).New York:IEEE Press,2017:501-504. [27]ABOUD S J.An efficient method for attack RSA scheme[C]//2009 Second International Conference on the Applications of Digital Information and Web Technologies.New York:IEEE Press,2009:587-591. [28]ZHANG C N.Integrated approach for fault tolerance and digital signature in RSA[J].IEE Proceedings-Computers and Digital Techniques,1999,146(3):151-159. [29]ZHANG Y F,QIN Z G,LIU J D.Performance Analysis of Elliptic Curve Encryption System[J].Journal of University of Electronic Science and Technology of China,2001(2):144-147. [30]VANSTONE S A,ZUCCHERATO R J.Short RSA keys and their generation[J].Journal of Cryptology,1995,8(2):101-114. [31]YU H,KIM Y.New RSA Encryption Mechanism Using One-Time Encryption Keys and Unpredictable Bio-Signal for Wireless Communication Devices[J].Electronics,2020,9(2):246. [32]BHASKAR R,HEGDE G,VAYA P R.An efficient hardware model for RSA Encryption system using Vedic mathematics[C]//International Conference on Communication Technology and System Design 2011.NETHERLANDS:ELSEVIER SCIENCE BV,2012:124-128. [33]QIU L,LIU Z,PEREIRA G C C F,et al.Implementing RSA for sensor nodes in smart cities[J].Personal and Ubiquitous Computing,2017,21(5):807-813. [34]KARATSUBA A,OFMAN Y U.Multiplication of multidigitnumbers on automata[J].Soviet physics doklady,1963,7:595-596. [35]PRANESH R,HARISH V,VIGNESHWARAN M,et al.Anew approach for secure data transmission[C]//Proceedings of IEEE International Conference on Circuit,Power and Computing Technologies(ICCPCT 2016).New York:IEEE Press,2016:1-4. [36]CHAUDHURY P,DHANG S,ROY M,et al.ACAFP:Asymmetric key based cryptographic algorithm using four prime numbers to secure message communication.A review on RSA algorithm[C]//2017 8th Annual Industrial Automation and Electromechanical Engineering Conference(IEMECON).New York:IEEE Press,2017:332-337. [37]THIZIERS A H,THÉODORE H C,ZOUEU J T,et al.Enhanced,Modified and Secured RSA Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone[J].International Journal of Advanced Computer Science and Applications(IJACSA),2019,10(10):353-360. [38]ZHU K,LIN Z,DING Y.A new RSA image encryption algorithm based on singular value decomposition[J].International Journal of Pattern Recognition and Artificial Intelligence,2019,33(1):1954002. [39]ZHANG Y Z.Multi-character Sorting Encryption Transmission Method for Wireless Local Area Network Data[J].Automation &Instrumentation,2021(6):35-38,42. [40]SUNDARI M,REVATHI P B,SUMESH S.Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image[C]//Security in Computing and Communications(SSCC 2015).Berlin:Springer,2015:247-255. [41]RAMAIYA M K,HEMRAJANI N.Improvisation of Security aspect of Steganographic System by applying RSA Algorithm[J].International Journal of Advanced Computer Science and Applications,2016,7(7):245-249. [42]BANGERA K N,REDDY N V S,PADDAMBAIL Y,et al.Multilayer security using RSA cryptography and dual audio ste-ganography[C]//2017 2nd IEEE International Conference on Recent Trends in Electronics,Information & Communication Technology(RTEICT).New York:IEEE Press,2017:492-495. [43]JIANG W B,XU H,DONG H,et al.An improved security framework for Web service-based resources[J].Turkish Journal of Electrical Engineering & Computer Sciences,2016,24(3):774-792. [44]TIMOTHY D P,SANTRA A K.A hybrid cryptography algorithm for cloud computing security[C]//2017 International conference on Microelectronic Devices,Circuits and Systems(ICMDCS).New York:IEEE Press,2017:1-5. [45]FOTOHI R,BARI S F,YUSEFI M.Securing Wireless SensorNetworks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol[J].International Journal of Communication Systems,2020,33(4):e4234. [46]PARMAR N J,VERMA P K,MARTIN V.A ComparativeEvaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System[J].Security and Communication Networks,2017,2017:1467614. [47]PANKAJ K,SAURABH K S.An Empirical Evaluation of Various Digital Signature Scheme in Wireless Sensor Network[J].IETE Technical Review,2022,39(4):974-984. [48]SURACI C,PIZZI S,MOLINARO A,et al.An RSA-based Algorithm for Secure D2D-aided Multicast Delivery of Multimedia Services[C]//2020 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting(BMSB).New York:IEEE Press,2020:1-6. [49]MILANOV E.The RSA algorithm[R].US:RSA laboratories,2009. [50]DORUS R,VINOTH P.Mitigation of jamming attacks in wireless networks[C]//2013 IEEE International Conference on Emerging Trends in Computing,Communication and Nanotech-nology.New York:IEEE Press,2013:168-171. [51]ZHU F,WONG D S,CHAN A H,et al.Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks[J].Information Security,Proceedings.2002,2433:150-161. [52]NAGAR S A,ALSHAMMA S.High speed implementation of RSA algorithm with modified keys exchange[C]//2012 6th International Conference on Sciences of Electronics,Technologies of Information and Telecommunications.New York:IEEE Press,2012:639-642. [53]AMBIKA S,RAJAKUMAR S,ANAKATH A S.A novel RSAalgorithm for secured key transmission in a centralized cloud environment[J].International Journal of Communication Systems,2020,33(5):e4280. [54]ZHU M L,LIU J W.An Intelligent Door Lock Device Based on RSA Algorithm:China,201810181838.3[P].2018-08-03. [55]LU J C,XIONG X M.A hardware system and method of encryption and decryption based on RSA algorithm:China,CN201810877374.X[P].2018-12-18. |
|