信息网络安全 ›› 2015, Vol. 15 ›› Issue (2): 33-39.doi: 10.3969/j.issn.1671-1122.2015.02.006

• 技术研究 • 上一篇    下一篇

星际骨干网的轻量级密码体制研究

侯玉灵1, 卞阳东1, 胡广跃2, 王潮1()   

  1. 1.上海大学特种光纤与光接入网省部共建重点实验室 上海 200072
    2.上海市信息安全测评中心,上海 200011
  • 收稿日期:2015-01-15 出版日期:2015-02-10 发布日期:2015-07-05
  • 作者简介:

    作者简介: 侯玉灵(1989-),女,河南,硕士研究生,主要研究方向:量子人工智能算法与密码学;卞阳东(1993-),男,上海,本科,主要研究方向:跳频通信编码;胡广跃(1987-),男,江苏,硕士,主要研究方向:网络信息安全;王潮(1971-),男,山东,教授,博士,主要研究方向:无线传感器网络、网络信息安全与椭圆曲线密码学、量子计算密码。

  • 基金资助:
    国家自然科学基金[61272096,6097006,61332019];上海市教委创新基金重点项目[14ZZ089]

Research on Lightweight Cryptography of Interplanetary Backbone Networks

HOU Yu-ling1, BIAN Yang-dong1, HU Guang-yue2, WANG Chao1()   

  1. 1. Key Lab of Specialty Fiber Optics and Optical Access Network, Shanghai University, Shanghai 200072, China
    2. Information Security Assessment Center of Shanghai, Shanghai 200011, China
  • Received:2015-01-15 Online:2015-02-10 Published:2015-07-05

摘要:

现有的空间网络安全方案存在缺乏对星际骨干网组网安全的考虑、缺乏对星际骨干网的节点特别是中继站的双向认证以及密钥管理和认证效率不高、密码计算复杂度较高等问题而不适合星际骨干网。文章结合深空通信的特点,提出了星际骨干网的轻量级密码体制和安全算法。为了解决遭遇恶意节点的问题,文章提出了基于门限秘密共享机制的思想;为了保证普通航天器与卫星间的通信安全,采用了双向认证的方式,由于认证过程简单高效,加上使用轻量化ECC算法设计,从而加速了点乘运算,减少了认证过程中的计算开销和通信开销;采用基于ECC的CPK体制的思想,在无需第三方的参与下,即可实现高效的认证过程,安全性依赖于椭圆离散对数分解的指数级破译计算复杂度;利用少量的公/私钥矩阵,生成大规模的公/私钥对;采用双向认证的方式,保证普通航天器与卫星间的通信安全,抵御中间人攻击。

关键词: 深空通信, 认证, 密钥管理, 轻量级

Abstract:

The existing security schemes are not suitable for interplanetary Internet, because they have some problems: be lack of interplanetary network security, the certification about interplanetary Internet nodes, and low efficiency in key management and secure authentication and high complexity in cipher algorithm. We propose the lightweight cryptography and lightweight security algorithm for interplanetary backbone networks. It can solve the problem that encounters malicious nodes in the process of backbone networks networking by threshold secret sharing mechanism. By the concept of CPK based on ECC, authentication is efficient without the third-party CA, and the lightweight ECC we proposed can speed up point multiplication to reduce the computational complexity; the key management can meet the resource limit in deep communication, and the key security depends on the exponential computation complexity of the elliptic discrete logarithm decomposition; the scheme also uses the improved two-way authentication to ensure the communication security between common spacecraft and satellite, which can prevent man-in-the-middle attack.

Key words: deep space communication, authentication, key management, lightweight

中图分类号: