[go: up one dir, main page]

CN114465733A - Secure network coding method based on improved RSA - Google Patents

Secure network coding method based on improved RSA Download PDF

Info

Publication number
CN114465733A
CN114465733A CN202210242049.2A CN202210242049A CN114465733A CN 114465733 A CN114465733 A CN 114465733A CN 202210242049 A CN202210242049 A CN 202210242049A CN 114465733 A CN114465733 A CN 114465733A
Authority
CN
China
Prior art keywords
network
eavesdropping
kdc
subspace
improved
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210242049.2A
Other languages
Chinese (zh)
Other versions
CN114465733B (en
Inventor
冯建新
许晶晶
丁元明
潘成胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University
Original Assignee
Dalian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University filed Critical Dalian University
Priority to CN202210242049.2A priority Critical patent/CN114465733B/en
Publication of CN114465733A publication Critical patent/CN114465733A/en
Application granted granted Critical
Publication of CN114465733B publication Critical patent/CN114465733B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0014Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the source coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种基于改进RSA的安全网络编码方法,涉及网络安全技术领域;该方法基于Yeung和Cai提出的窃听网络模型,建立本发明使用的网络拓扑结构;并改进置换步骤,提高搜索复杂度,以保证数据的安全传输;针对KDC易受攻击的问题,建立基于改进RSA的安全网络编码方案,该方案应用于信源节点和KDC之间。与其他方案相比,本方法提高了数据安全性,具有较强的加密性能,能有效抵抗窃听攻击。

Figure 202210242049

The invention discloses a security network coding method based on improved RSA, and relates to the technical field of network security; the method is based on the eavesdropping network model proposed by Yeung and Cai to establish the network topology structure used in the invention; and the replacement step is improved to improve the search complexity In order to ensure the safe transmission of data; for the KDC vulnerable problem, a secure network coding scheme based on improved RSA is established, which is applied between the source node and the KDC. Compared with other schemes, the method improves data security, has strong encryption performance, and can effectively resist eavesdropping attacks.

Figure 202210242049

Description

一种基于改进RSA的安全网络编码方法A Secure Network Coding Method Based on Improved RSA

技术领域technical field

本发明涉及网络安全技术领域,具体涉及一种基于改进RSA的安全网络编码方法。The invention relates to the technical field of network security, in particular to a security network coding method based on improved RSA.

背景技术Background technique

2000年,Cai等创新性的提出了网络编码(Network Coding)理论,该理论与传统的路由存储-转发方式不同,其允许中间节点先对接收到的消息进行编码和译码操作,再对处理后的数据进行转发。网络编码不仅可以提升网络吞吐量,还可以显著提高网络的可靠性,但是网络编码方式可能会受到网络窃听攻击,面临着安全问题。In 2000, Cai et al. innovatively proposed the network coding theory, which is different from the traditional routing store-and-forward method, which allows intermediate nodes to encode and decode the received messages first, and then process them. The subsequent data is forwarded. Network coding can not only improve network throughput, but also significantly improve network reliability, but network coding methods may be subject to network eavesdropping attacks and face security problems.

为了提高网络编码安全性,Yeung和Cai等提出抗窃听的安全网络通信模型,以抵抗窃听攻击。进一步,Cai等人给出了安全网络模型的具体构造方案。Vilela等提出基于密码学的SPOC(Secure Practical network Coding)方案,SPOC方案通过加密预编码矩阵隐藏信源消息,但在该方案中,需要将加密后的预编码矩阵和信源消息一同传输,由此造成了大量的网络开销。Zhang等提出了基于置换加密(P-coding)的编码方案,该方案使用置换操作对数据进行加密,可以提高编码速度,但是无法抵抗已知明文攻击。Guang等利用改进的RSA算法对DES密钥进行了加密,仿真结果表明该方案可有效抵御攻击,安全性更高。但是上述方案均没有一定的纠错能力,Brahimi等提出了一种使用子空间码的安全网络编码方案,其具有一定的纠错能力,但该方案的安全性不足。In order to improve the security of network coding, Yeung and Cai et al. proposed an anti-eavesdropping secure network communication model to resist eavesdropping attacks. Further, Cai et al. gave a specific construction scheme of the secure network model. Vilela et al. proposed the SPOC (Secure Practical network Coding) scheme based on cryptography. The SPOC scheme hides the source message by encrypting the precoding matrix. However, in this scheme, the encrypted precoding matrix and the source message need to be transmitted together. This creates a lot of network overhead. Zhang et al. proposed an encoding scheme based on permutation encryption (P-coding), which uses permutation operations to encrypt data, which can improve the encoding speed, but cannot resist known plaintext attacks. Guang et al. used the improved RSA algorithm to encrypt the DES key. The simulation results show that the scheme can effectively resist attacks and has higher security. However, none of the above schemes have a certain error correction ability. Brahimi et al. proposed a secure network coding scheme using subspace codes, which has a certain error correction ability, but the security of the scheme is insufficient.

发明内容SUMMARY OF THE INVENTION

针对在非相干网络中分发置换密钥时,密钥分发中心(Key DistributionCenter,KDC)会受到攻击的问题,本发明提出了一种安全网络编码方法,该方法利用改进RSA算法对置换密钥PK1和PK2进行加密,然后对置换步骤进行更新,以提高穷举搜索攻击的搜索复杂度,保证数据传输的安全性。Aiming at the problem that the key distribution center (Key Distribution Center, KDC) will be attacked when distributing replacement keys in a non-coherent network, the present invention proposes a secure network coding method, which utilizes an improved RSA algorithm for the replacement key P K1 and P K2 are encrypted, and then the replacement step is updated to improve the search complexity of the exhaustive search attack and ensure the security of data transmission.

为实现上述目的,本申请提出一种基于改进RSA的安全网络编码方法,包括:In order to achieve the above-mentioned purpose, the application proposes a security network coding method based on improved RSA, comprising:

基于窃听网络模型,构建网络拓扑结构;Based on the eavesdropping network model, construct the network topology;

改进置换步骤,提高搜索复杂度,以保证数据的安全传输;Improve the replacement step and increase the search complexity to ensure the safe transmission of data;

建立基于改进RSA的安全网络编码方案,该安全网络编码方案应用于信源节点和KDC之间。A secure network coding scheme based on improved RSA is established, which is applied between the source node and the KDC.

进一步的,基于窃听网络模型,构建网络拓扑结构,具体包括:Further, based on the eavesdropping network model, a network topology structure is constructed, including:

获取子空间码:令Fq表示一个有q个元素的有限域,

Figure BDA0003542701580000021
是Fq上的一个n维向量空间;令P(n)表示
Figure BDA0003542701580000022
的所有子空间集合,其构成Fq上的一个n阶射影空间;令G(k,n)表示n维向量空间
Figure BDA0003542701580000023
的所有k维子空间集合,其中k≤n;并且P(n)=U0≤k≤nG(k,n);Obtain the subspace code: Let F q denote a finite field with q elements,
Figure BDA0003542701580000021
is an n-dimensional vector space on F q ; let P(n) denote
Figure BDA0003542701580000022
The set of all subspaces of , which constitute an n-order projective space on F q ; let G(k,n) denote an n-dimensional vector space
Figure BDA0003542701580000023
The set of all k-dimensional subspaces of , where k≤n; and P(n)=U 0≤k≤n G(k,n);

子空间码C是P(n)的非空子集;对于0≤k≤n,如果

Figure BDA0003542701580000024
则称C为恒维码(Constant Dimension Code CDC);否则,称C为混合维度码(Mixed Dimension Code MDC)。A subspace code C is a non-empty subset of P(n); for 0≤k≤n, if
Figure BDA0003542701580000024
Then C is called constant dimension code (Constant Dimension Code CDC); otherwise, C is called mixed dimension code (Mixed Dimension Code MDC).

进一步的,设N是一个网络,它有S个信源节点,T个信宿节点和E个信道;设C是一个子空间码,cc∈C是信源s∈S发送到信宿的某个子集t∈T的传输码字;Further, let N be a network, which has S source nodes, T sink nodes and E channels; let C be a subspace code, c c ∈ C is a certain subspace sent by the source s ∈ S to the sink. set t∈T transmission codewords;

算子信道模型用于描述场景信道,该模型使用I和O定义信道的输入和输出;I和O是P(n)的子集,The operator channel model is used to describe the scene channel, which uses I and O to define the input and output of the channel; I and O are subsets of P(n),

Figure BDA0003542701580000031
Figure BDA0003542701580000031

Ηk是一个随机算子,它随机返回I的k维子空间Hk(I)和ε,其中ε是误差子空间,它导致了dim(ε)的插入,dim(ε)是向量空间ε的维数。Η k is a random operator that randomly returns the k-dimensional subspace H k (I) and ε of I, where ε is the error subspace, which leads to the insertion of dim(ε), and dim(ε) is the vector space ε dimension.

进一步的,基于窃听网络模型,构建网络拓扑结构,具体还包括:Further, based on the eavesdropping network model, a network topology structure is constructed, which specifically includes:

构建网络拓扑结构:窃听网络模型用四重(G,s,U,We)来表示,有以下定义:Build network topology: The eavesdropping network model is represented by quadruple (G, s, U, We ), with the following definitions:

(i)使用G=(VG,EG)表示一个无环有向的通信网络,其中VG是所有节点的集合,EG是所有边的集合;(i) Use G=(V G , E G ) to represent an acyclic directed communication network, where V G is the set of all nodes, and EG is the set of all edges;

(ii)一个信源节点sG∈VG(ii) a source node s G ∈ V G ;

(iii)一组信宿节点

Figure BDA0003542701580000032
(iii) A set of sink nodes
Figure BDA0003542701580000032

(iv)一组窃听边

Figure BDA0003542701580000033
(iv) a set of eavesdropping edges
Figure BDA0003542701580000033

网络中每条边的容量均为单位容量;设V={s}∪IG∪UG,IG是中间节点的集合;假设有无数的窃听者,并且它们相互之间不合作;重点分析其中一个窃听者,并把这个窃听者将称为Eve;令W∈We表示Eve使用的一组窃听边;|W|表示Eve收集到的向量,|W|的数量表示Eve的窃听能力,用Ce表示;|W|<Cm,Cm表示G的组播容量;The capacity of each edge in the network is unit capacity; let V ={s} ∪IG ∪UG , IG is the set of intermediate nodes; it is assumed that there are countless eavesdroppers, and they do not cooperate with each other; key analysis One of the eavesdroppers, and this eavesdropper will be called Eve; let W∈W e denote a set of eavesdropping edges used by Eve; |W| denote the vector collected by Eve, and the number of |W| denote the eavesdropping ability of Eve, It is represented by C e ; |W|<C m , C m represents the multicast capacity of G;

添加一个额外的节点作为密钥分发中心KDC,该节点用于连接信源节点和信宿节点,并且其信道与窃听网络分离。An additional node is added as the key distribution center KDC, which is used to connect the source node and the sink node, and its channel is separated from the eavesdropping network.

进一步的,改进置换步骤,具体为:Further, improve the replacement step, specifically:

信源信息是一个包含有nD个比特的数据流,所述数据流被划分为多个位串,该位串的长度为m,l个位串为一组;如果位串的个数小于l,则进行填充;划分后的数据流具有如下的表示方式:The source information is a data stream containing n D bits, the data stream is divided into a plurality of bit strings, the length of the bit string is m, and l bit strings form a group; if the number of bit strings is less than l, then fill; the divided data stream has the following representation:

Figure BDA0003542701580000041
Figure BDA0003542701580000041

其中,dij∈Fq,i=1,2,...,l,j=1,2,...,m.Among them, d ij ∈ F q , i=1,2,...,l,j=1,2,...,m.

位串使用KDC分发的置换密钥Pk1和Pk2进行置换,其中Pk1为行置换密钥,Pk2表示列置换密钥,分别表示如下:The bit string is permuted using the permutation keys P k1 and P k2 distributed by the KDC, where P k1 is the row permutation key, and P k2 is the column permutation key, respectively expressed as follows:

Figure BDA0003542701580000042
Figure BDA0003542701580000042

Figure BDA0003542701580000043
Figure BDA0003542701580000043

将待加密的数据与行置换矩阵相结合,得到行加密后的数据;再与列置换矩阵相结合,得到经过行与列加密后的数据;然后使用子空间码的集合Sc进行编码,在编码过程中使用SCS(subspace coding strategy)策略。Combine the data to be encrypted with the row permutation matrix to obtain the row-encrypted data; then combine with the column permutation matrix to obtain the data after row and column encryption; then use the set S c of subspace codes to encode, in The SCS (subspace coding strategy) strategy is used in the coding process.

更进一步的,在一个具有组播容量为Cm的网络中,SCS策略是一个五元组,用

Figure BDA0003542701580000051
表示,定义如下:Furthermore, in a network with multicast capacity C m , the SCS policy is a quintuple, using
Figure BDA0003542701580000051
means, defined as follows:

(i)P(n)是Fq上的一个n阶射影空间,(i) P(n) is a projective space of order n on F q ,

(ii)

Figure BDA0003542701580000052
是一个正整数,表示安全偏移率,(ii)
Figure BDA0003542701580000052
is a positive integer representing the safe offset rate,

(iii)

Figure BDA0003542701580000053
是P(n)中的一组格拉斯曼码,(iii)
Figure BDA0003542701580000053
is a set of Grassmann codes in P(n),

(iv)设

Figure BDA0003542701580000054
并随机创建一个满映射θ:Ssym→{0,1}m,(iv) set
Figure BDA0003542701580000054
and randomly create a full map θ:S sym →{0,1} m ,

(v)

Figure BDA0003542701580000055
是一个双映射,
Figure BDA0003542701580000056
表示对Eve的窃听能力Ce的最大容量猜测;(v)
Figure BDA0003542701580000055
is a double map,
Figure BDA0003542701580000056
represents the maximum capacity guess for Eve's eavesdropping capability Ce ;

信源将使用SCS策略作为数据传输的手段,子空间集合Sc和映射θ、φ以及集合ET由KDC提供;The source will use the SCS strategy as a means of data transmission, and the subspace set S c and the mappings θ, φ and the set ET are provided by KDC;

令<V>∈c表示当前选择的码字,其中c∈Sc;在每一轮的传输过程中,信源会将含有错误的有效码字c注入到网络当中,这些错误在接收端可以被纠正;当这些码字向量穿过网络时,在支持RLNC编码的节点进行RLNC编码操作;Let <V>∈c denote the currently selected codeword, where c∈S c ; in each round of transmission, the source will inject valid codeword c with errors into the network, and these errors can be detected at the receiver. be corrected; when these codeword vectors pass through the network, perform RLNC encoding operations at nodes that support RLNC encoding;

信宿节点u∈UG接收到一个RLNC编码的错误版本后,通过解码得到正确的码字c,最后经过逆置换,得到信源数据。After the sink node u∈UG receives an erroneous version of the RLNC code, it obtains the correct codeword c through decoding, and finally obtains the source data through inverse permutation.

更进一步的,建立基于改进RSA的安全网络编码方案,具体为:使用改进的RSA算法对行置换密钥PK1和列置换密钥PK2进行加密,具体实施过程为:Further, a secure network coding scheme based on improved RSA is established, specifically: using the improved RSA algorithm to encrypt the row permutation key P K1 and the column permutation key P K2 , and the specific implementation process is:

随机选取三个的大素数p,q和r,f=pqr,φ(f)=(p-1)(q-1)(r-1);Randomly select three large prime numbers p, q and r, f=pqr, φ(f)=(p-1)(q-1)(r-1);

信源节点选取加密密钥g,并获取满足hg≡1mod(f)的私钥h;The source node selects the encryption key g, and obtains the private key h satisfying hg≡1mod(f);

将公钥(g,f)发送给KDC;Send the public key (g, f) to the KDC;

所述KDC产生E(g,f)(PK1||PK2),并发送到信源节点;The KDC generates E (g,f) (P K1 ||P K2 ), and sends it to the source node;

所述信源节点使用h解密E(g,f)(PK1||PK2),在解密过程中采用蒙哥马利模乘法和中国剩余定理来进行幂乘运算。The source node uses h to decrypt E (g,f) (P K1 ||P K2 ), and uses Montgomery's modular multiplication and the Chinese remainder theorem to perform exponentiation in the decryption process.

本发明采用的以上技术方案,与现有技术相比,具有的优点是:本发明基于Yeung和Cai提出的窃听网络模型,建立本发明使用的网络拓扑结构;并改进置换步骤,提高搜索复杂度,以保证数据的安全传输;针对KDC易受攻击的问题,建立基于改进RSA的安全网络编码方案,该方案应用于信源节点和KDC之间。与其他方案相比,本方法提高了数据安全性,具有较强的加密性能,能有效抵抗窃听攻击。Compared with the prior art, the above technical solutions adopted in the present invention have the following advantages: the present invention is based on the wiretapping network model proposed by Yeung and Cai to establish the network topology structure used in the present invention; and the replacement step is improved to increase the search complexity , in order to ensure the safe transmission of data; Aiming at the problem that KDC is vulnerable to attack, a secure network coding scheme based on improved RSA is established, which is applied between the source node and the KDC. Compared with other schemes, the method improves data security, has strong encryption performance, and can effectively resist eavesdropping attacks.

附图说明Description of drawings

图1为本发明的实施过程流程图;Fig. 1 is the implementation process flow chart of the present invention;

图2为基于改进RSA的安全网络编码方案图;Figure 2 is a diagram of a secure network coding scheme based on improved RSA;

图3为多播网络模型图;Fig. 3 is a multicast network model diagram;

图4为猜测概率和Eve窃听能力的关系图;Figure 4 is a graph showing the relationship between guessing probability and Eve's eavesdropping ability;

图5为本发明方案、SCS和SPOC的猜测概率图。FIG. 5 is a guessing probability diagram of the scheme of the present invention, SCS and SPOC.

具体实施方式Detailed ways

为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请,即所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application, that is, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments.

实施例1Example 1

如图1所示,本发明提供一种基于改进RSA的安全网络编码方法,包括:As shown in Figure 1, the present invention provides a security network coding method based on improved RSA, comprising:

S1:基于Yeung和Cai提出的窃听网络模型,建立本发明使用的网络拓扑结构;S1: Based on the eavesdropping network model proposed by Yeung and Cai, establish the network topology structure used in the present invention;

S1.1获取子空间码:令Fq表示一个有q个元素的有限域,

Figure BDA0003542701580000071
是Fq上的一个n维向量空间。令P(n)表示
Figure BDA0003542701580000072
的所有子空间集合,其构成Fq上的一个n阶射影空间。令G(k,n)表示n维向量空间
Figure BDA0003542701580000073
的所有k维子空间集合,其中k≤n;G(k,n)也被称为Grassmannian,并且P(n)=U0≤k≤nG(k,n);S1.1 Get the subspace code: Let F q denote a finite field with q elements,
Figure BDA0003542701580000071
is an n-dimensional vector space on Fq . Let P(n) denote
Figure BDA0003542701580000072
The set of all subspaces of , which constitutes a projective space of order n on F q . Let G(k,n) denote an n-dimensional vector space
Figure BDA0003542701580000073
The set of all k-dimensional subspaces of , where k≤n; G(k,n) is also called Grassmannian, and P(n)=U 0≤k≤n G(k,n);

子空间码C是P(n)的非空子集。对于0≤k≤n,如果

Figure BDA0003542701580000074
称C为恒维码(Constant Dimension Code CDC)。否则,称C是混合维度码(Mixed Dimension Code MDC)。The subspace code C is a non-empty subset of P(n). For 0≤k≤n, if
Figure BDA0003542701580000074
Call C the constant dimension code (Constant Dimension Code CDC). Otherwise, C is said to be a mixed dimension code (Mixed Dimension Code MDC).

设V为矩阵,用<V>表示由V的行向量张成的子空间。类似地,本发明通过选择一个矩阵来表示一个子空间,这个矩阵是由行向量张成的。Let V be a matrix, and denote the subspace spanned by the row vectors of V by <V>. Similarly, the present invention represents a subspace by selecting a matrix that is stretched by row vectors.

设N是一个网络,它有S个信源节点,T个信宿节点和E个信道。设C是一个子空间码,cc∈C是信源s∈S发送到信宿的某个子集t∈T的传输码字。在传输过程中,码字cc的维数减小会给网络信道带来删除错误。当信宿收到一组向量的码字cc',而这些向量不在cc向量张成的子空间中时,会带来插入错误。Let N be a network with S source nodes, T sink nodes and E channels. Let C be a subspace code, and c c ∈ C be the transmission codeword sent by the source s ∈ S to some subset t ∈ T of the sink. During transmission, the reduction of the dimensionality of the codeword cc will bring deletion errors to the network channel. An insertion error occurs when a sink receives a codeword cc ' for a set of vectors that are not in the subspace spanned by the cc vectors.

算子信道模型用于描述场景信道,该模型使用I和O定义信道的输入和输出。The operator channel model is used to describe the scene channel, which uses I and O to define the input and output of the channel.

S1.2构建网络拓扑结构:本发明采用Yeung和Cai提出的窃听网络模型,该网络模型用四重(G,s,U,We)来表示,有以下定义:S1.2 constructs the network topology structure: The present invention adopts the wiretapping network model proposed by Yeung and Cai, and the network model is represented by quadruple (G, s, U, We), and has the following definitions:

(i)使用G=(VG,EG)表示一个无环有向的通信网络,其中VG是所有节点的集合,EG是所有边的集合;(i) Use G=(V G , E G ) to represent an acyclic directed communication network, where V G is the set of all nodes, and EG is the set of all edges;

(ii)一个信源节点sG∈VG(ii) a source node s G ∈ V G ;

(iii)一组信宿节点

Figure BDA0003542701580000081
(iii) A set of sink nodes
Figure BDA0003542701580000081

(iv)一组窃听边

Figure BDA0003542701580000082
(iv) a set of eavesdropping edges
Figure BDA0003542701580000082

网络中每条边的容量均为单位容量。设V={s}∪IG∪UG,IG是中间节点的集合。假设有无数的窃听者,并且它们相互之间不合作。本发明重点分析其中一个窃听者,把这个窃听者将称为Eve。令W∈We表示Eve使用的一组窃听边。|W|表示Eve收集到的向量,|W|的数量表示Eve的窃听能力,用Ce表示。|W|<Cm,Cm表示G的组播容量。The capacity of each edge in the network is the unit capacity. Let V ={s} ∪IG ∪UG , and IG is the set of intermediate nodes. Suppose there are countless eavesdroppers, and they don't cooperate with each other. The present invention focuses on analyzing one of the eavesdroppers, and this eavesdropper will be called Eve. Let W We denote the set of eavesdropping edges used by Eve. |W| represents the vector collected by Eve, and the number of |W| represents Eve's eavesdropping ability, denoted by C e . |W|<C m , C m represents the multicast capacity of G.

在Yeung和Cai提出的网络模型基础上,添加了一个额外的节点作为密钥分发中心(KDC)。该节点用于连接信源节点和信宿节点,并且其信道与窃听网络分离。另外,本发明使用改进的RSA算法对KDC分发的置换密钥进行加密。Based on the network model proposed by Yeung and Cai, an additional node is added as a key distribution center (KDC). This node is used to connect the source node and the sink node, and its channel is separated from the eavesdropping network. In addition, the present invention uses the improved RSA algorithm to encrypt the replacement key distributed by the KDC.

S2:改进置换步骤,提高搜索复杂度,以保证数据的安全传输;S2: Improve the replacement step and increase the search complexity to ensure the safe transmission of data;

具体的,信源信息是一个包含有nD个比特的数据流,数据流被划分为多个位串。位串的长度为m,l个位串为一组。如果位串的个数小于l,则进行填充。Specifically, the source information is a data stream containing n D bits, and the data stream is divided into multiple bit strings. The length of the bit string is m, and l bit strings form a group. If the number of bit strings is less than 1, padding is performed.

位串将会使用KDC分发的置换密钥PK1和PK2进行置换,然后使用子空间码的集合Sc进行编码,本发明在编码过程中使用SCS(subspace coding strategy)策略。在每一轮的传输过程中,信源会将含有错误的码字c注入到网络当中,这些错误在接收端可以被纠正,其中c∈Sc。当这些码字向量穿过网络时,会在支持RLNC编码的节点进行RLNC编码操作。The bit string will be permuted using the permutation keys P K1 and P K2 distributed by the KDC, and then encoded using the set S c of subspace codes. The present invention uses the SCS (subspace coding strategy) strategy in the encoding process. In each round of transmission, the source will inject the codeword c with errors into the network, and these errors can be corrected at the receiver, where c∈S c . As these codeword vectors traverse the network, RLNC encoding operations are performed at nodes that support RLNC encoding.

当信宿节点u∈UG接收到一个RLNC编码的错误版本后,会通过解码得到正确的码字c,最后经过逆置换,得到信源数据。When the sink node u∈UG receives an erroneous version of RLNC encoding, it will obtain the correct codeword c through decoding, and finally obtain the source data through inverse permutation.

S3:针对KDC易受攻击的问题,建立基于改进RSA的安全网络编码方案,该方案应用于信源节点和KDC之间;S3: Aiming at the problem that KDC is vulnerable to attack, establish a secure network coding scheme based on improved RSA, which is applied between the source node and KDC;

具体的,为了保证KDC中PK1和PK2的安全性,使用改进的RSA对PK1和PK2进行加密。如图2所示,安全网络编码方案位于信源节点和KDC之间,具体实现步骤如下:Specifically, in order to ensure the security of P K1 and P K2 in the KDC, improved RSA is used to encrypt P K1 and P K2 . As shown in Figure 2, the secure network coding scheme is located between the source node and the KDC, and the specific implementation steps are as follows:

步骤1:随机选取三个的大素数p,q和r,f=pqr,φ(f)=(p-1)(q-1)(r-1)。Step 1: Randomly select three large prime numbers p, q and r, f=pqr, φ(f)=(p-1)(q-1)(r-1).

步骤2:信源节点选取加密密钥g,并获取满足hg≡1mod(f)的私钥h。Step 2: The source node selects the encryption key g, and obtains the private key h that satisfies hg≡1mod(f).

步骤3:将公钥(g,f)发送给KDC。Step 3: Send the public key (g, f) to the KDC.

步骤4:KDC产生E(g,f)(PK1||PK2)。Step 4: KDC produces E (g,f) (P K1 ||P K2 ).

步骤5:KDC发送E(g,f)(PK1||PK2)到信源节点。Step 5: The KDC sends E (g,f) (P K1 ||P K2 ) to the source node.

步骤6:信源节点使用h解密E(g,f)(PK1||PK2)。为了提高计算效率,在解密过程中采用蒙哥马利模乘法和中国剩余定理来进行幂乘运算。Step 6: The source node decrypts E (g,f) (P K1 ||P K2 ) using h. In order to improve the computational efficiency, Montgomery modular multiplication and Chinese remainder theorem are used for exponentiation in the decryption process.

网络模型如图3所示,信源节点的数据流D设置为121bits。设置Ce=3,子空间码间最小距离d≥9。假设m=11,l=11,集合Sc={C5,C6,C7,C8},Sc中码字的特点如表1所示。Sc中使用的元素是来自于F2上16维环境向量空间的子空间。在本发明实验中,部分边代表Eve可以窃听到的边,并且0≤Ce≤8。0表示Eve无法访问该网络。窃听的矢量都是线性无关的。The network model is shown in Figure 3, and the data flow D of the source node is set to 121 bits. Set C e =3, the minimum distance between subspace codes d≥9. Assuming that m=11, l=11, the set S c = {C 5 , C 6 , C 7 , C 8 }, the characteristics of the code words in S c are shown in Table 1. The elements used in Sc are subspaces from the 16 - dimensional environment vector space on F2. In the experiments of the present invention, some edges represent the edges that Eve can eavesdrop, and 0≤C e ≤8. 0 means that Eve cannot access the network. The tapped vectors are all linearly independent.

表1 Sc中码字的特点Table 1 Characteristics of codewords in S c

Figure BDA0003542701580000101
Figure BDA0003542701580000101

图4显示了本发明的方案、SCS、通用安全网络编码方案(本发明记作USUC方案)和SPOC的猜测概率。猜测概率表示Eve获得信源消息的能力。在本发明中,猜测概率不仅与码字可能的组合数目有关,还与RSA、m和l有关。SCS的猜测概率与码字的可能组合数和l有关。USUC的猜测概率与丢失数据包的数量有关。SPOC的猜测概率不仅和丢失数据包的数量有关,还和锁定的编码系数有关。由图4可知本发明的安全网络编码方案比SCS和SPOC有更好的猜测概率。然而,USNC的搜索复杂度仅取决于丢失数据包的可能性数量,使得该方案的安全性高度依赖于Ce。当Ce≥Cm时,USNC将不再被认为是安全的。FIG. 4 shows the guess probability of the scheme of the present invention, SCS, Universal Security Network Coding Scheme (denoted as USUC scheme in the present invention) and SPOC. The guessing probability represents Eve's ability to obtain information from the source. In the present invention, the guessing probability is not only related to the number of possible combinations of codewords, but also to RSA, m and l. The guess probability of SCS is related to the number of possible combinations of codewords and l. The guess probability of USUC is related to the number of lost packets. The guess probability of SPOC is not only related to the number of lost packets, but also to the locked coding coefficient. It can be seen from FIG. 4 that the secure network coding scheme of the present invention has better guessing probability than SCS and SPOC. However, the search complexity of USNC only depends on the number of possibilities of missing packets, making the security of this scheme highly dependent on Ce. When C e ≥ C m , USNC will no longer be considered safe.

图5显示了当Ce≥Cm时,本发明的方案、SCS和SPOC的猜测概率。RLNC编码时数据包的长度len设置为24。编码系数随数据包一起发送。如图5所示,本发明的猜测概率最小,因此本发明的安全性远高于SCS和SPOC。Figure 5 shows the guess probabilities for the scheme of the present invention, SCS and SPOC when C e ≥ C m . The length len of the data packet is set to 24 during RLNC encoding. The encoded coefficients are sent with the packet. As shown in FIG. 5 , the guessing probability of the present invention is the smallest, so the security of the present invention is much higher than that of SCS and SPOC.

表2显示了当Ce<Cm时,本发明的方案、SCS、USNC和SPOC的穷举搜索复杂度。本发明的复杂性取决于数据包的组合数和m、l的数目,SCS的复杂性取决于数据包的组合数和l的数目。USNC的复杂性取决于Eve错过的数据包数。对于SPOC,除了猜测丢失的数据包数,还必须猜测编码系数和置换键。由表2可知,在穷举搜索攻击时,本发明具有最高的搜索复杂度。这意味着本发明具有最大的搜索空间和更好的安全性。Table 2 shows the exhaustive search complexity of the scheme of the present invention, SCS, USNC and SPOC when C e < C m . The complexity of the present invention depends on the number of combinations of data packets and the number of m and l, and the complexity of the SCS depends on the number of combinations of data packets and the number of l. The complexity of USNC depends on the number of packets that Eve misses. For SPOC, in addition to guessing the number of lost packets, encoding coefficients and permutation keys must also be guessed. It can be seen from Table 2 that the present invention has the highest search complexity in an exhaustive search attack. This means that the present invention has the largest search space and better security.

表2本发明方案与SCS、USNC和SPOC的搜索复杂度Table 2 The search complexity of the scheme of the present invention and SCS, USNC and SPOC

Figure BDA0003542701580000111
Figure BDA0003542701580000111

前述对本发明的具体示例性实施方案的描述是为了说明和例证的目的。这些描述并非想将本发明限定为所公开的精确形式,并且很显然,根据上述教导,可以进行很多改变和变化。对示例性实施例进行选择和描述的目的在于解释本发明的特定原理及其实际应用,从而使得本领域的技术人员能够实现并利用本发明的各种不同的示例性实施方案以及各种不同的选择和改变。本发明的范围意在由权利要求书及其等同形式所限定。The foregoing descriptions of specific exemplary embodiments of the present invention have been presented for purposes of illustration and description. These descriptions are not intended to limit the invention to the precise form disclosed, and obviously many changes and modifications are possible in light of the above teachings. The exemplary embodiments were chosen and described for the purpose of explaining certain principles of the invention and their practical applications, to thereby enable others skilled in the art to make and utilize various exemplary embodiments and various different aspects of the invention. Choose and change. The scope of the invention is intended to be defined by the claims and their equivalents.

Claims (7)

1. A method for secure network encoding based on improved RSA, comprising:
constructing a network topology structure based on the eavesdropping network model;
the replacement step is improved, and the search complexity is improved to ensure the safe transmission of data;
establishing a secure network encoding scheme based on modified RSA, the secure network encoding scheme being applied between the source node and the KDC.
2. The method as claimed in claim 1, wherein the step of constructing the network topology based on the eavesdropping network model specifically comprises:
obtaining a subspaceCode: let FqRepresenting a finite field of q elements,
Figure FDA0003542701570000011
is FqAn n-dimensional vector space; let P (n) denote
Figure FDA0003542701570000012
All subspace sets of (1), which constitute FqAn n-order projection space; let G (k, n) denote an n-dimensional vector space
Figure FDA0003542701570000013
All k-dimensional subspace sets of (1), wherein k is less than or equal to n; and p (n) ═ U0≤k≤nG(k,n);
Subspace code C is a non-empty subset of P (n); for 0 ≦ k ≦ n, if
Figure FDA0003542701570000015
Then, the code is called C as constant dimension code; otherwise, the code is called C as the mixed dimension code.
3. A method according to claim 2, wherein N is a network having S source nodes, T sink nodes and E channels; let C be a subspace code, CcC is a transmission codeword sent by the source S e S to some subset T e T of the sink;
the operator channel model is used for describing a scene channel, and the model defines the input and the output of the channel by using I and O; i and O are subsets of P (n),
Figure FDA0003542701570000014
Ηkis a random operator that randomly returns the k-dimensional subspace H of Ik(I) And ε, where ε is the error subspace, which results in the insertion of dim (ε), which is the dimension of the vector space ε.
4. The method according to claim 2, wherein the network topology is constructed based on the eavesdropping network model, and further comprising:
constructing a network topological structure: quadruple (G, s, U, W) for eavesdropping network modele) By the following definitions:
(i) using G ═ VG,EG) Representing a loop-free directed communication network, in which VGIs a collection of all nodes, EGIs a collection of all edges;
(ii) an information source node sG∈VG
(iii) A set of sink nodes
Figure FDA0003542701570000022
(iv) A group of eavesdropping edges
Figure FDA0003542701570000021
The capacity of each edge in the network is unit capacity; let V ═ s }. U IG∪UG,IGIs a collection of intermediate nodes; it is assumed that there are countless eavesdroppers, and they do not cooperate with each other; analyzing one of the eavesdroppers with emphasis, and calling the eavesdropper as Eve; let W be equal to WeA set of eavesdropping edges representing Eve usage; the vector collected by Eve is represented by W, the number of W represents the eavesdropping ability of Eve, and C is usedeRepresents; w < Cm,CmIndicating the multicast capacity of G;
an additional node is added as a key distribution center KDC, which is used to connect the source node and the sink node and whose channel is separated from the eavesdropping network.
5. The improved RSA-based secure network coding method of claim 1, wherein the improved permutation step is specifically:
the source information is a packet containing nDOf one bitA data stream, said data stream being divided into a plurality of bit strings, the bit strings having a length of m, a group of l bit strings; if the number of bit strings is less than l, padding; the divided data stream has the following representation mode:
Figure FDA0003542701570000031
wherein d isij∈Fq,i=1,2,...,l,j=1,2,...,m.
Permutation key P for distribution of bit strings using KDCk1And Pk2Is subjected to a substitution wherein Pk1For the line replacement of the key, Pk2Representing the column replacement keys, respectively as follows:
Figure FDA0003542701570000032
Figure FDA0003542701570000033
combining the data to be encrypted with the row permutation matrix to obtain row-encrypted data; combining with the column permutation matrix to obtain data after row and column encryption; then using a set S of subspace codescCoding is carried out, and SCS strategy is used in the coding process.
6. A method for secure network coding based on improved RSA according to claim 5, wherein a multicast capacity C is usedmIn the network, the SCS strategy is a quintuple with
Figure FDA0003542701570000034
Expressed, defined as follows:
(i) p (n) is FqIn the above-mentioned projection space of n order,
(ii)
Figure FDA0003542701570000035
is a positive integer, representing a safe offset rate,
(iii)
Figure FDA0003542701570000036
is a set of Grassmann codes in P (n),
(iv) is provided with
Figure FDA0003542701570000037
And randomly creating a full mapping θ Ssym→{0,1}m
(v)φ:
Figure FDA0003542701570000038
Is a double mapping of the number of the images,
Figure FDA0003542701570000039
representing eavesdropping capability C on EveeGuessing the maximum capacity of;
the source will use the SCS strategy as a means of data transmission, subspace aggregation ScAnd mapping θ, φ and set ETProvided by the KDC;
order to<V>E c represents the currently selected codeword, where c e Sc(ii) a In each round of transmission, the source injects effective code words c containing errors into the network, and when the code word vectors pass through the network, RLNC coding operation is carried out on the nodes supporting the RLNC coding;
sink node U e UGAnd after an error version of RLNC coding is received, obtaining a correct code word c through decoding, and finally obtaining information source data through inverse permutation.
7. The method according to claim 1, wherein the secure network coding scheme based on the improved RSA is established by: replacing a Key P against a line Using an improved RSA AlgorithmK1And column replacement key PK2Carry out encryption, concreteThe application process comprises the following steps:
randomly selecting three large prime numbers p, q and r, f is pqr, phi (f) is (p-1) (q-1) (r-1);
the information source node selects an encryption key g and acquires a private key h meeting hg ≡ 1mod (f);
sending the public key (g, f) to the KDC;
said KDC produces E(g,f)(PK1||PK2) And sending the data to the information source node;
the source node decrypts E using h(g,f)(PK1||PK2) In the decryption process, Montgomery modular multiplication and Chinese remainder theorem are adopted to carry out power multiplication operation.
CN202210242049.2A 2022-03-11 2022-03-11 A secure network coding method based on improved RSA Active CN114465733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210242049.2A CN114465733B (en) 2022-03-11 2022-03-11 A secure network coding method based on improved RSA

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210242049.2A CN114465733B (en) 2022-03-11 2022-03-11 A secure network coding method based on improved RSA

Publications (2)

Publication Number Publication Date
CN114465733A true CN114465733A (en) 2022-05-10
CN114465733B CN114465733B (en) 2024-05-28

Family

ID=81417527

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210242049.2A Active CN114465733B (en) 2022-03-11 2022-03-11 A secure network coding method based on improved RSA

Country Status (1)

Country Link
CN (1) CN114465733B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102022133962A1 (en) * 2022-12-19 2024-06-20 Friedrich-Schiller-Universität Jena Körperschaft des öffentlichen Rechts PROCESSING MEASURED RAMAN SPECTRA WITH NEURAL NETWORKS

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4351982A (en) * 1980-12-15 1982-09-28 Racal-Milgo, Inc. RSA Public-key data encryption system having large random prime number generating microprocessor or the like
WO2004021694A1 (en) * 2002-08-30 2004-03-11 Rheinische Friedrich-Wilhelms-Uni Versität Bonn Method and device for decryption-secure transfer of data
US20160373210A1 (en) * 2013-07-04 2016-12-22 Norwegian University Of Science And Technology Network coding over gf(2)
CN107426248A (en) * 2017-09-05 2017-12-01 东北大学 A kind of WMN anonymous communication methods based on network code
CN110166247A (en) * 2019-05-06 2019-08-23 湖北工业大学 It can the anti-pollution network code endorsement method attacked and position intermediate node conspiracy attack
CN110851845A (en) * 2019-10-18 2020-02-28 华东师范大学 A Lightweight Single User Multiple Data Encapsulation Method for Fully Homomorphic Data
CN111262684A (en) * 2020-01-13 2020-06-09 燕山大学 A power battery traceability management coding encryption method based on improved AES algorithm
CN113067669A (en) * 2021-03-03 2021-07-02 伍仁勇 Network coding method and security network
US20220069987A1 (en) * 2020-08-31 2022-03-03 Massachusetts Institute Of Technology Network Coding-Based Post-Quantum Cryptography

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4351982A (en) * 1980-12-15 1982-09-28 Racal-Milgo, Inc. RSA Public-key data encryption system having large random prime number generating microprocessor or the like
WO2004021694A1 (en) * 2002-08-30 2004-03-11 Rheinische Friedrich-Wilhelms-Uni Versität Bonn Method and device for decryption-secure transfer of data
US20160373210A1 (en) * 2013-07-04 2016-12-22 Norwegian University Of Science And Technology Network coding over gf(2)
CN107426248A (en) * 2017-09-05 2017-12-01 东北大学 A kind of WMN anonymous communication methods based on network code
CN110166247A (en) * 2019-05-06 2019-08-23 湖北工业大学 It can the anti-pollution network code endorsement method attacked and position intermediate node conspiracy attack
CN110851845A (en) * 2019-10-18 2020-02-28 华东师范大学 A Lightweight Single User Multiple Data Encapsulation Method for Fully Homomorphic Data
CN111262684A (en) * 2020-01-13 2020-06-09 燕山大学 A power battery traceability management coding encryption method based on improved AES algorithm
US20220069987A1 (en) * 2020-08-31 2022-03-03 Massachusetts Institute Of Technology Network Coding-Based Post-Quantum Cryptography
CN113067669A (en) * 2021-03-03 2021-07-02 伍仁勇 Network coding method and security network

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
MOHAMED AMINE BRAHIMI, ET AL.: "Secure network coding for data encoded using subspace codes", PHYSICAL COMMUNICATION, pages 1 - 8 *
刘宴涛;王雪冰;: "窃听攻击下子空间码的安全性", 计算机科学, no. 1 *
刘宴涛;王雪冰;: "窃听攻击下子空间码的安全性", 计算机科学, no. 1, 15 June 2017 (2017-06-15) *
邵志骅;: "基于DES和RSA加密算法的数据安全传输技术的研究", 科技信息, no. 36, 25 December 2009 (2009-12-25) *
魏秀岭 等: "基于三素数改进RSA算法的智能小区数据信息保护研究", 实验探索, pages 22 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102022133962A1 (en) * 2022-12-19 2024-06-20 Friedrich-Schiller-Universität Jena Körperschaft des öffentlichen Rechts PROCESSING MEASURED RAMAN SPECTRA WITH NEURAL NETWORKS
DE102022133962B4 (en) * 2022-12-19 2024-07-25 Friedrich-Schiller-Universität Jena Körperschaft des öffentlichen Rechts PROCESSING MEASURED RAMAN SPECTRA WITH NEURAL NETWORKS

Also Published As

Publication number Publication date
CN114465733B (en) 2024-05-28

Similar Documents

Publication Publication Date Title
CN110958112B (en) Key generation method and system, encryption and decryption method, encrypted communication system
Vilela et al. Lightweight security for network coding
Applebaum et al. Semantic security under related-key attacks and applications
US20030063751A1 (en) Key agreement protocol based on network dynamics
Fung et al. Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol
CN114710261A (en) AES key arrangement method
Hemenway et al. Non-committing encryption from Φ-hiding
Hooshmand et al. Efficient polar code-based physical layer encryption scheme
Borghoff et al. Slender-set differential cryptanalysis
Rawal et al. Challenges and opportunities on the horizon of post-quantum cryptography
Borghoff et al. Cryptanalysis of PRESENT-like ciphers with secret S-boxes
Mathur et al. On the design of error-correcting ciphers
Liu et al. A privacy-preserving signature scheme for network coding
du Pin Calmon et al. Lists that are smaller than their parts: A coding approach to tunable secrecy
CN114465733B (en) A secure network coding method based on improved RSA
Özdemir et al. Development of cryptography since Shannon
Ma et al. A new mechanism for achieving secure and reliable data transmission in wireless sensor networks
Ye et al. Improving wireless security through network diversity
Evgnosia-Alexandra A note on post quantum onion routing
CN117014134A (en) Grid-based physical entropy source enhanced key negotiation method
Kim et al. An Efficient Hybrid Key Exchange Mechanism
Narayanan et al. TLS cipher suite: Secure communication of 6LoWPAN devices
Lin¹ et al. Encapsulation Mechanism with Non-permutation Equivalent Public
Martínez New cryptanalysis of LFSR-based stream ciphers and decoders for p-ary QC-MDPC codes
Boudriga et al. Physical layer cryptography in optical networks: A lattice-based approach

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20220510

Assignee: Beijing Chumoxuan Graphic Technology Co.,Ltd.

Assignor: DALIAN University

Contract record no.: X2024980020659

Denomination of invention: A secure network encoding method based on improved RSA

Granted publication date: 20240528

License type: Common License

Record date: 20241024