计算机科学 ›› 2023, Vol. 50 ›› Issue (6A): 220300107-7.doi: 10.11896/jsjkx.220300107

• 信息安全 • 上一篇    下一篇

RSA算法在网络数据传输中的研究进展

王鑫淼, 孙婷婷, 马晶军   

  1. 河北农业大学理工学院 河北 沧州 061000
  • 出版日期:2023-06-10 发布日期:2023-06-12
  • 通讯作者: 马晶军(mjjwjpmartin@163.com)
  • 作者简介:(2823429651@qq.com)
  • 基金资助:
    河北省重点研发计划(19220119D)

Research Progress of RSA Algorithm in Network Data Transmission

WANG Xinmiao, SUN Tingting, MA Jingjun   

  1. College of Science and Technology,Hebei Agricultural University,Cangzhou,Hebei 061000,China
  • Online:2023-06-10 Published:2023-06-12
  • About author:WANG Xinmiao,born in 2000,undergraduate.Her main research interest is computer software and theory. MA Jingjun,born in 1971,professor.His main research interests include data mining and algorithm optimization.
  • Supported by:
    Key R&D Program of Hebei Province(19220119D).

摘要: 人们在利用各种各样的电子设备进行“面对面”信息交流的过程中,双方都不希望自己的信息被第三方获取,由此衍生了通信安全问题。数据安全性不够,数据传输过程就容易受到外界干扰,造成信息重复、缺失、丢包或延迟等现象的产生。针对此问题,广大科研工作者积极应对,引入了密码系统,采用密码算法对数据进行加密,减少其在传输过程中受到的干扰,进而起到保护数据的效果。为了进一步了解密码算法在网络数据传输中的工作原理,文中选取了非对称密码系统中的RSA算法作为研究对象,详细介绍了该算法的加密解密过程,对比分析了RSA算法和ECC算法的优缺点,并针对RSA算法的缺陷,总结了相应的优化措施和优化效果。最后,总结了RSA算法在网络数据传输中的研究进展和实际运用,并对RSA算法的未来进行了展望,期望为数据保护工作提供一些参考依据。

关键词: RSA算法, 密码系统, 数据加密, 身份验证, 数字签名

Abstract: In the process of people’s “ face-to-face ” information exchange using various electronic devices,both sides do not want their information to be obtained by the third party,which leads to the problem of communication security.Data security is not enough,the data transmission process is vulnerable to external interference,resulting in information duplication,missing,packet loss or delay.These problems are still not completely avoided.One of the important reasons is that the security of data is not enough,and it is disturbed by the outside world in the transmission process.In response to this problem,the majority of scientific researchers have actively responded,invented data encryption technology and introduced cryptography,which uses cryptographic algorithms to encrypt the data to reduce the interference in the transmission process,thereby protecting the data.In essence,among many technologies that guarantee various functional characteristics of information security,data encryption technology is the core and key technology of information security.Data encryption technology encrypts data from plaintext to ciphertext and communicates through encryption algorithm,and then decrypts the plaintext through corresponding decryption algorithm,which can improve the security of data transmission and ensure the integrity of data transmission.In order to further understand the working principle of cryptographic algorithm in network data transmission,this paper selects the RSA algorithm in asymmetric cryptographic system as the research object,introduces the encryption and decryption process of this algorithm in detail,compares and analyzes the advantages and disadvantages of RSA algorithm and ECC algorithm,and summarizes the corresponding optimization measures and optimization results in view of the defects of RSA algorithm.Finally,the research progress and practical application of RSA algorithm in network data transmission are summarized,and the future of RSA algorithm is prospected,hoping to provide some reference for data protection.

Key words: RSA algorithm, Cryptosystem, Data encryption, Authentication, Digital signature

中图分类号: 

  • TP309
[1]GONG L,ZHANG L,ZHANG W,et al.The application of data encryption technology in computer network communication security[C]//AIP Conference Proceedings.New York:American Institute of Physics,2017.
[2]XIE X M.Establishment and Technical Analysis of Computer Network Information Security Protection Mode[J].Science and Technology Innovation,2019(7):66-67.
[3]《Law of the people’s Republic of China on Guarding State secrets》[Z].Beijing,2010.10.
[4]LIU S S,WANG P,LUO L,et al.Security Module in Information Unilateral Transmission System among Networks[C]//AASRI Procedia,NETHERLANDS:ELSEVIER SCIENCE BV.2012:100-105.
[5]ZHAO Y B,ZHANG X J,JIANG Y L.Application Research of High Strength File Encryption Based on Digital Envelope[J].Computer Engineering and Design,2007(18):4357-4359.
[6]DIFFIE W,HELLMAN M.New directions in cryptography[J].IEEE transactions on Information Theory,1976,22(6):644-654.
[7]LAMPORT L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772.
[8]YEN S M,LIAO K H.Shared authentication token secureagainst replay and weak key attacks[J],Information Processing Letters,1997,62(2):77-80.
[9]LEE S,PARK S.Mobile Password System for Enhancing Usab-ility-Guaranteed Security in Mobile Phone Banking[J].Web and Communication Technologies and Internet-Related Social Issues-HSI 2005,2005,3597:66-74.
[10]YANG Y J,DENG R H,BAO F.A practical password-based two-server authentication and key exchange system[J].IEEE Transactions on Dependable and Secure Computing,2006,3(2):105-114.
[11]LIU J Z.Internet/INTRANET Security Technology[J].Software and Integrated Circuit,1997(1):16-20.
[12]LIN X F,FUN M F.Data Security in Network Transmission[J].Software Guide,2012,11(1):139-141.
[13]ZHAO G P.Cryptography Technology in Network Data Transmission Security[J].Information and Computer(theoretical edition),2010(20):19.
[14]HUANG Y,HU W D,CHEN K F.Classification of Network Attack and Security Protection[J].Computer Engineering,2001(5):131-133,140.
[15]XU C.The Application of AES and RSA Hybrid EncryptionTechnology in Network Data Transmission[J].Wireless Interconnection Technology,2016(13):142-144.
[16]XU S S,ZHU X M,BAI L F,et al.Application of Attribute-based Cryptosystem in Network Security Level Protection[C]//Papers of the Seventh National Security Level Protection Technology Congress 2018.2018:159-164.
[17]HUANG H M.Data Encryption Technology and Its Application in Network Security Transmission[D].Xiamen:Xiamen University,2008.
[18]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
[19]HU J.Research and Implementation of RSA Encryption Algorithm[M].Maanshan:Anhui University of Technology,2011:1-48.
[20]SONG Y.Research and Application of Encryption Communication Based on RSA Algorithm[J].Electronic Test,2021(16):33-36,138.
[21]ARTO S.Public Key Cryptography[M].Beijing:National Defense Industry Press,1998.
[22]LU J Y.Research on Data Transmission Security TechnologyBased on Web Network[D].Nanjing:Nanjing University of Technology,2009:1-67.
[23]TIAN W Y,LI Z M.Research and Implementation of RSA Encryption Algorithm and Its Improved Algorithm[J].Shanxi Electronic Technology,2013(6):90-92.
[24]LIU W,ZHU M R,LIU Y L.Data Encryption Transmission in Remote Fault Diagnosis System[J].Network Security Techno-logy & Application,2008(1):83-84,21.
[25]HUANG Y L,LEU F Y,YOU I,et al.A secure wireless communication system integrating RSA,Diffie-Hellman PKDS,intelligent protection-key chains and a Data Connection Core in a 4G environment[J].Journal of Supercomputing,2014,67(3):635-652.
[26]KUMAR B J S,RAJ V K R,NAIR A.Comparative study onAES and RSA algorithm for medical images[C]//2017 International Conference on Communication and Signal Processing(ICCSP).New York:IEEE Press,2017:501-504.
[27]ABOUD S J.An efficient method for attack RSA scheme[C]//2009 Second International Conference on the Applications of Digital Information and Web Technologies.New York:IEEE Press,2009:587-591.
[28]ZHANG C N.Integrated approach for fault tolerance and digital signature in RSA[J].IEE Proceedings-Computers and Digital Techniques,1999,146(3):151-159.
[29]ZHANG Y F,QIN Z G,LIU J D.Performance Analysis of Elliptic Curve Encryption System[J].Journal of University of Electronic Science and Technology of China,2001(2):144-147.
[30]VANSTONE S A,ZUCCHERATO R J.Short RSA keys and their generation[J].Journal of Cryptology,1995,8(2):101-114.
[31]YU H,KIM Y.New RSA Encryption Mechanism Using One-Time Encryption Keys and Unpredictable Bio-Signal for Wireless Communication Devices[J].Electronics,2020,9(2):246.
[32]BHASKAR R,HEGDE G,VAYA P R.An efficient hardware model for RSA Encryption system using Vedic mathematics[C]//International Conference on Communication Technology and System Design 2011.NETHERLANDS:ELSEVIER SCIENCE BV,2012:124-128.
[33]QIU L,LIU Z,PEREIRA G C C F,et al.Implementing RSA for sensor nodes in smart cities[J].Personal and Ubiquitous Computing,2017,21(5):807-813.
[34]KARATSUBA A,OFMAN Y U.Multiplication of multidigitnumbers on automata[J].Soviet physics doklady,1963,7:595-596.
[35]PRANESH R,HARISH V,VIGNESHWARAN M,et al.Anew approach for secure data transmission[C]//Proceedings of IEEE International Conference on Circuit,Power and Computing Technologies(ICCPCT 2016).New York:IEEE Press,2016:1-4.
[36]CHAUDHURY P,DHANG S,ROY M,et al.ACAFP:Asymmetric key based cryptographic algorithm using four prime numbers to secure message communication.A review on RSA algorithm[C]//2017 8th Annual Industrial Automation and Electromechanical Engineering Conference(IEMECON).New York:IEEE Press,2017:332-337.
[37]THIZIERS A H,THÉODORE H C,ZOUEU J T,et al.Enhanced,Modified and Secured RSA Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone[J].International Journal of Advanced Computer Science and Applications(IJACSA),2019,10(10):353-360.
[38]ZHU K,LIN Z,DING Y.A new RSA image encryption algorithm based on singular value decomposition[J].International Journal of Pattern Recognition and Artificial Intelligence,2019,33(1):1954002.
[39]ZHANG Y Z.Multi-character Sorting Encryption Transmission Method for Wireless Local Area Network Data[J].Automation &Instrumentation,2021(6):35-38,42.
[40]SUNDARI M,REVATHI P B,SUMESH S.Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image[C]//Security in Computing and Communications(SSCC 2015).Berlin:Springer,2015:247-255.
[41]RAMAIYA M K,HEMRAJANI N.Improvisation of Security aspect of Steganographic System by applying RSA Algorithm[J].International Journal of Advanced Computer Science and Applications,2016,7(7):245-249.
[42]BANGERA K N,REDDY N V S,PADDAMBAIL Y,et al.Multilayer security using RSA cryptography and dual audio ste-ganography[C]//2017 2nd IEEE International Conference on Recent Trends in Electronics,Information & Communication Technology(RTEICT).New York:IEEE Press,2017:492-495.
[43]JIANG W B,XU H,DONG H,et al.An improved security framework for Web service-based resources[J].Turkish Journal of Electrical Engineering & Computer Sciences,2016,24(3):774-792.
[44]TIMOTHY D P,SANTRA A K.A hybrid cryptography algorithm for cloud computing security[C]//2017 International conference on Microelectronic Devices,Circuits and Systems(ICMDCS).New York:IEEE Press,2017:1-5.
[45]FOTOHI R,BARI S F,YUSEFI M.Securing Wireless SensorNetworks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol[J].International Journal of Communication Systems,2020,33(4):e4234.
[46]PARMAR N J,VERMA P K,MARTIN V.A ComparativeEvaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System[J].Security and Communication Networks,2017,2017:1467614.
[47]PANKAJ K,SAURABH K S.An Empirical Evaluation of Various Digital Signature Scheme in Wireless Sensor Network[J].IETE Technical Review,2022,39(4):974-984.
[48]SURACI C,PIZZI S,MOLINARO A,et al.An RSA-based Algorithm for Secure D2D-aided Multicast Delivery of Multimedia Services[C]//2020 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting(BMSB).New York:IEEE Press,2020:1-6.
[49]MILANOV E.The RSA algorithm[R].US:RSA laboratories,2009.
[50]DORUS R,VINOTH P.Mitigation of jamming attacks in wireless networks[C]//2013 IEEE International Conference on Emerging Trends in Computing,Communication and Nanotech-nology.New York:IEEE Press,2013:168-171.
[51]ZHU F,WONG D S,CHAN A H,et al.Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks[J].Information Security,Proceedings.2002,2433:150-161.
[52]NAGAR S A,ALSHAMMA S.High speed implementation of RSA algorithm with modified keys exchange[C]//2012 6th International Conference on Sciences of Electronics,Technologies of Information and Telecommunications.New York:IEEE Press,2012:639-642.
[53]AMBIKA S,RAJAKUMAR S,ANAKATH A S.A novel RSAalgorithm for secured key transmission in a centralized cloud environment[J].International Journal of Communication Systems,2020,33(5):e4280.
[54]ZHU M L,LIU J W.An Intelligent Door Lock Device Based on RSA Algorithm:China,201810181838.3[P].2018-08-03.
[55]LU J C,XIONG X M.A hardware system and method of encryption and decryption based on RSA algorithm:China,CN201810877374.X[P].2018-12-18.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!