无线信道中的密钥进化与加密
发布时间:2018-08-28 06:28
【摘要】:无线网络可以利用物理层的信道噪声来增强系统的安全性能。通常物理层安全协议针对特定无线信道的噪声特性进行设计,并假设窃听者的信道特性已知,但在实际中该假设是不可行的。本文主要研究窃听信道中安全通信的密钥协商机制,针对无线信道的安全通信问题,提出密钥进化协议,设计基于动态秘密的加密机制。密钥进化的基本思想是在包含噪声的无线信道中,利用无线通信过程中传输的信息,使合法用户的密钥随传输数据流不断进化,而不用假设敌手的信道特征已知。如果合法用户之间存在认证信道,即使敌手的信道相比合法用户的信道具有优势,合法用户之间也能建立安全的会话密钥。密钥进化在信息论上,是一个熵增过程。对比常见的用户名和密码认证技术,已有的安全体系,都是密钥用的时间越长,被泄露和攻击的可能性就越大,而密钥进化协议则是随着时间的推移,密钥的安全性不会下降的安全技术。本文首先讨论一个特殊的搭线窃听信道模型,主信道是无噪声的,窃听信道是二元对称信道,然后将其推广到一般的窃听信道,即主信道和窃听信道都是二元对称信道。在此基础上,构造基于动态秘密的密钥进化协议,并且研究和分析了协议的安全特性。最后,提出k容忍加密机制(k-Resistance Encryption Scheme,k-RES),能够容忍加密密钥和解密密钥之间最多有k比特不同。k-RES的目的是利用具有微小差异的密钥对长度相对较短的消息进行加密。如果一对密钥最多有k比特不同,则接收者可以解密消息,否则无法解密。k-RES可以等价于一个搭线窃听信道,即误差概率不大于k n的主信道和一个窃听信道。利用一些编码的阈值属性,可以设计k-RES获得安全可靠的通信。
[Abstract]:Wireless network can enhance the security performance of the system by using the channel noise of the physical layer. Generally, physical layer security protocols are designed for the noise characteristics of a particular wireless channel, and assume that the eavesdropper's channel characteristics are known, but this assumption is not feasible in practice. This paper mainly studies the key agreement mechanism of secure communication in eavesdropping channel. Aiming at the problem of secure communication in wireless channel, a key evolution protocol is proposed and an encryption mechanism based on dynamic secret is designed. The basic idea of key evolution is to make use of the information transmitted in the wireless communication process to make the key of the legitimate user evolve with the transmission data stream in the wireless channel containing noise, without assuming that the channel characteristics of the enemy are known. If there is an authentication channel between legitimate users, even if the channel of the adversary has advantages over the channel of the legitimate user, a secure session key can be established between the legitimate users. Key evolution in information theory is a entropy increasing process. Comparing with common username and password authentication techniques, the existing security systems are more likely to be compromised and attacked the longer the key is used, and the more time the key evolution protocol is over time, the more likely it is to be compromised and attacked. The security of the key does not decrease with the security technology. This paper first discusses a special wiretapping channel model. The primary channel is noiseless and the eavesdropping channel is a binary symmetric channel. Then it is extended to the general eavesdropping channel, that is, the primary channel and the eavesdropping channel are both binary symmetric channels. On this basis, the key evolution protocol based on dynamic secret is constructed, and the security characteristics of the protocol are studied and analyzed. Finally, a k-tolerant encryption mechanism (k-Resistance Encryption Scheme,k-RES) is proposed, which can tolerate the difference of k bits between the encryption key and the decryption key at most. The purpose of this mechanism is to encrypt a message with relatively short length by using a key with small difference. If a pair of keys is different at most k bits, the receiver can decrypt the message, otherwise, the undecrypted .k-res can be equivalent to a wiretapping channel, that is, the primary channel with an error probability not greater than k n and an eavesdropping channel. Using some encoding threshold attributes, k-RES can be designed to obtain secure and reliable communication.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.4
本文编号:2208552
[Abstract]:Wireless network can enhance the security performance of the system by using the channel noise of the physical layer. Generally, physical layer security protocols are designed for the noise characteristics of a particular wireless channel, and assume that the eavesdropper's channel characteristics are known, but this assumption is not feasible in practice. This paper mainly studies the key agreement mechanism of secure communication in eavesdropping channel. Aiming at the problem of secure communication in wireless channel, a key evolution protocol is proposed and an encryption mechanism based on dynamic secret is designed. The basic idea of key evolution is to make use of the information transmitted in the wireless communication process to make the key of the legitimate user evolve with the transmission data stream in the wireless channel containing noise, without assuming that the channel characteristics of the enemy are known. If there is an authentication channel between legitimate users, even if the channel of the adversary has advantages over the channel of the legitimate user, a secure session key can be established between the legitimate users. Key evolution in information theory is a entropy increasing process. Comparing with common username and password authentication techniques, the existing security systems are more likely to be compromised and attacked the longer the key is used, and the more time the key evolution protocol is over time, the more likely it is to be compromised and attacked. The security of the key does not decrease with the security technology. This paper first discusses a special wiretapping channel model. The primary channel is noiseless and the eavesdropping channel is a binary symmetric channel. Then it is extended to the general eavesdropping channel, that is, the primary channel and the eavesdropping channel are both binary symmetric channels. On this basis, the key evolution protocol based on dynamic secret is constructed, and the security characteristics of the protocol are studied and analyzed. Finally, a k-tolerant encryption mechanism (k-Resistance Encryption Scheme,k-RES) is proposed, which can tolerate the difference of k bits between the encryption key and the decryption key at most. The purpose of this mechanism is to encrypt a message with relatively short length by using a key with small difference. If a pair of keys is different at most k bits, the receiver can decrypt the message, otherwise, the undecrypted .k-res can be equivalent to a wiretapping channel, that is, the primary channel with an error probability not greater than k n and an eavesdropping channel. Using some encoding threshold attributes, k-RES can be designed to obtain secure and reliable communication.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.4
【共引文献】
相关硕士学位论文 前4条
1 王兵;数字签名技术在军事网络通信安全中的应用[D];兰州理工大学;2005年
2 张中;基于XML/SOAP协议的Web服务研究及其应用[D];哈尔滨工程大学;2006年
3 肖林;电子商务网上支付系统的研究[D];贵州大学;2006年
4 赵艳玲;协作通信物理层安全的研究[D];天津大学;2012年
,本文编号:2208552
本文链接:https://www.wllwen.com/kejilunwen/wltx/2208552.html