期刊文献+

几种轻量级加密算法的比较研究 被引量:4

A comparative study of several lightweight encryption algorithms
在线阅读 下载PDF
导出
摘要 随着无线射频识别(RFID)技术在各个应用领域的迅猛发展,轻量级(lightweight)加密算法日益受到人们的关注。在RFID中硬件资源是极端受限制的,为了在算法加密性能与硬件资源开销间得到一个好的权衡,把椭圆曲线加密算法(ECC)与流密码加密算法中RC4算法,分组加密算法中的PRESENT算法,进行分析比较。并选取Atmega-32微处理器在AVR Studio仿真平台上进行分析比较。实验获得了这三种算法在算法运行效率、密码安全强度和硬件资源开销间的比较结果。得出,在硬件资源同样极端受限的环境下,ECC所表现出的运行效率和密码安全强度是其他两种算法所不能比拟的,证明了非对称加密算法也可以做到轻量化。 With the rapid development of radio frequency identification(RFID)technology,the lightweight encryption algo-rithm attracts increasing attention. In RFID system,the hardware resources are extremely limited. In order to get a better trade-off between the algorithm's encryption performance and the hardware resource requirements,the elliptic curve cryptography (ECC)is compared with RC4 algorithm in the stream cipher algorithm and PRESENT algorithm in the grouping encryption algo-rithm. Through the Atmega-32 microprocessor in the AVR Studio simulation platform,the comparison results between the three algorithms′ efficiency and the hardware requirements are obtained. The ECC algorithm ,under the condition of the same restricted hardware resources,is better in the operation efficiency and the password security than the other two algorithms. It proves that the non-symmetric encryption algorithm can also be lightweight.
出处 《现代电子技术》 2014年第12期37-41,共5页 Modern Electronics Technique
基金 山东省科技发展项目(2011GGB01053) 山东大学高校自主创新项目(201202001)
关键词 轻量级加密 RFID 椭圆曲线加密 流密码 PRESENT加密算法 lightweight encryption RFID ECC stream cipher PRESENT encryption algorithm
  • 相关文献

参考文献15

  • 1XOLE P H, TURNER L H, HU Zhong-hao, et al. The next generation of RFID technology [C]// Proceedings of Unique Ra- dio Innovation for the 21st Century: Building Scalable and Global RFID Networks. Berlin: [s.n.], 2010, 3-24.
  • 2张忠,徐秋亮.物联网环境下UC安全的组证明RFID协议[J].计算机学报,2011,34(7):1188-1194. 被引量:23
  • 3MOJTABA Alizadeh, WAN Haslina Hassan, MAZDAK Za- mani, et al. Implementation and evaluation of lightweight en- cryption algorithms suitable for RFID [J]. Journal of Next Generation Information Technology, 2013, 01(4): 65-77.
  • 4FINKENZELLER K. Fundamentals and applications in iontact- less smart card, radio frequency identification and near-field communication [M]. 3rd ed. Chichester: Wiley, 2010.
  • 5KOBLIT Zneal. The stateof elliptic curve cryptography [J]. De- signs Codes and Cryptography, 2000, 19: 173-193.
  • 6COUTURE N, KENT K.B. The effectiveness of brute force at- tacks on RC4 [C]// Proceedings of Second Annual Conference on Communication Networks and Services Research. [S.1.]: [s. n.], 2004: 333-336.
  • 7BODGANOV A, KUNDSEN L R, LEANDER G, et al. PRES- ENT: an ultra-lightweight block cipher [C]// Workshop on Cryp- tographic Hardware and Embedded Systems. Berlin: [s.n.], 2007 : 450-466.
  • 8李俊芳,崔建双.椭圆曲线加密算法及实例分析[J].网络安全技术与应用,2004(11):56-57. 被引量:10
  • 9黄道林,杨军.RC4加密算法的FPGA设计与实现[J].云南大学学报(自然科学版),2009,31(S1):80-83. 被引量:5
  • 10GUANG Gong. Lightweight cryptography for RFID systems [D]. Canana: University of Waterloo, 2010.

二级参考文献46

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2张细政,唐志航,肖建华.WEP协议中RC4算法硬件设计[J].微计算机信息,2006,22(04X):60-62. 被引量:1
  • 3崔旭涛,杨日杰,何友.基于DSP+FPGA的信号处理实验系统研制[J].仪器仪表学报,2007,28(5):918-922. 被引量:36
  • 4Hong D,Sung J,Hong S,et al.HIGHT: A new block cipher suitable for low-resource device[C].Proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 4249, Springer-Verlag,2006:46-59.
  • 5Standaert F X,Piret G,Gershenfeld N,et al.SEA: A scalable encryption algorithm for small embedded applications [C]. Proceedings of the 7th Smart Card Research and Advanced Application Conference,LNCS 3928, Springer-Verlag,2006:222-236.
  • 6Bogdanov A,Knudsen L R,Leander G,et al.PRESENT: An ultralightweight block cipher[C].Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 4727,Springer-Verlag,2007:450-466.
  • 7National Institute of Standards and Technology (NIST). Advanced encryption standard (AES) [S].2001.
  • 8Perrig A,Szewczyk R,Wen V, et al.SPINS: Security protocols for sensor networks[C].Proceedings of the 7th Annual Internatinnal Conference on Mobile Computing and Networking.ACM Press, 2001:189-199.
  • 9Karlof C,Sastry N,Wagner D.Tinysec: a link layer security architecture for wireless sensor networks[C]. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems.ACM Press,2004:162-175.
  • 10Gura N,Patel A,Wander A,et al.Comparing elliptic curve cryptography and RSA on 8-bit CPUs[C].Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems,LNCS 3156,Springer-Verlag,2004:119-132.

共引文献37

同被引文献29

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部