CN114465733A - Secure network coding method based on improved RSA - Google Patents
Secure network coding method based on improved RSA Download PDFInfo
- Publication number
- CN114465733A CN114465733A CN202210242049.2A CN202210242049A CN114465733A CN 114465733 A CN114465733 A CN 114465733A CN 202210242049 A CN202210242049 A CN 202210242049A CN 114465733 A CN114465733 A CN 114465733A
- Authority
- CN
- China
- Prior art keywords
- network
- eavesdropping
- kdc
- subspace
- improved
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0014—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the source coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Quality & Reliability (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本发明公开了一种基于改进RSA的安全网络编码方法,涉及网络安全技术领域;该方法基于Yeung和Cai提出的窃听网络模型,建立本发明使用的网络拓扑结构;并改进置换步骤,提高搜索复杂度,以保证数据的安全传输;针对KDC易受攻击的问题,建立基于改进RSA的安全网络编码方案,该方案应用于信源节点和KDC之间。与其他方案相比,本方法提高了数据安全性,具有较强的加密性能,能有效抵抗窃听攻击。
The invention discloses a security network coding method based on improved RSA, and relates to the technical field of network security; the method is based on the eavesdropping network model proposed by Yeung and Cai to establish the network topology structure used in the invention; and the replacement step is improved to improve the search complexity In order to ensure the safe transmission of data; for the KDC vulnerable problem, a secure network coding scheme based on improved RSA is established, which is applied between the source node and the KDC. Compared with other schemes, the method improves data security, has strong encryption performance, and can effectively resist eavesdropping attacks.
Description
技术领域technical field
本发明涉及网络安全技术领域,具体涉及一种基于改进RSA的安全网络编码方法。The invention relates to the technical field of network security, in particular to a security network coding method based on improved RSA.
背景技术Background technique
2000年,Cai等创新性的提出了网络编码(Network Coding)理论,该理论与传统的路由存储-转发方式不同,其允许中间节点先对接收到的消息进行编码和译码操作,再对处理后的数据进行转发。网络编码不仅可以提升网络吞吐量,还可以显著提高网络的可靠性,但是网络编码方式可能会受到网络窃听攻击,面临着安全问题。In 2000, Cai et al. innovatively proposed the network coding theory, which is different from the traditional routing store-and-forward method, which allows intermediate nodes to encode and decode the received messages first, and then process them. The subsequent data is forwarded. Network coding can not only improve network throughput, but also significantly improve network reliability, but network coding methods may be subject to network eavesdropping attacks and face security problems.
为了提高网络编码安全性,Yeung和Cai等提出抗窃听的安全网络通信模型,以抵抗窃听攻击。进一步,Cai等人给出了安全网络模型的具体构造方案。Vilela等提出基于密码学的SPOC(Secure Practical network Coding)方案,SPOC方案通过加密预编码矩阵隐藏信源消息,但在该方案中,需要将加密后的预编码矩阵和信源消息一同传输,由此造成了大量的网络开销。Zhang等提出了基于置换加密(P-coding)的编码方案,该方案使用置换操作对数据进行加密,可以提高编码速度,但是无法抵抗已知明文攻击。Guang等利用改进的RSA算法对DES密钥进行了加密,仿真结果表明该方案可有效抵御攻击,安全性更高。但是上述方案均没有一定的纠错能力,Brahimi等提出了一种使用子空间码的安全网络编码方案,其具有一定的纠错能力,但该方案的安全性不足。In order to improve the security of network coding, Yeung and Cai et al. proposed an anti-eavesdropping secure network communication model to resist eavesdropping attacks. Further, Cai et al. gave a specific construction scheme of the secure network model. Vilela et al. proposed the SPOC (Secure Practical network Coding) scheme based on cryptography. The SPOC scheme hides the source message by encrypting the precoding matrix. However, in this scheme, the encrypted precoding matrix and the source message need to be transmitted together. This creates a lot of network overhead. Zhang et al. proposed an encoding scheme based on permutation encryption (P-coding), which uses permutation operations to encrypt data, which can improve the encoding speed, but cannot resist known plaintext attacks. Guang et al. used the improved RSA algorithm to encrypt the DES key. The simulation results show that the scheme can effectively resist attacks and has higher security. However, none of the above schemes have a certain error correction ability. Brahimi et al. proposed a secure network coding scheme using subspace codes, which has a certain error correction ability, but the security of the scheme is insufficient.
发明内容SUMMARY OF THE INVENTION
针对在非相干网络中分发置换密钥时,密钥分发中心(Key DistributionCenter,KDC)会受到攻击的问题,本发明提出了一种安全网络编码方法,该方法利用改进RSA算法对置换密钥PK1和PK2进行加密,然后对置换步骤进行更新,以提高穷举搜索攻击的搜索复杂度,保证数据传输的安全性。Aiming at the problem that the key distribution center (Key Distribution Center, KDC) will be attacked when distributing replacement keys in a non-coherent network, the present invention proposes a secure network coding method, which utilizes an improved RSA algorithm for the replacement key P K1 and P K2 are encrypted, and then the replacement step is updated to improve the search complexity of the exhaustive search attack and ensure the security of data transmission.
为实现上述目的,本申请提出一种基于改进RSA的安全网络编码方法,包括:In order to achieve the above-mentioned purpose, the application proposes a security network coding method based on improved RSA, comprising:
基于窃听网络模型,构建网络拓扑结构;Based on the eavesdropping network model, construct the network topology;
改进置换步骤,提高搜索复杂度,以保证数据的安全传输;Improve the replacement step and increase the search complexity to ensure the safe transmission of data;
建立基于改进RSA的安全网络编码方案,该安全网络编码方案应用于信源节点和KDC之间。A secure network coding scheme based on improved RSA is established, which is applied between the source node and the KDC.
进一步的,基于窃听网络模型,构建网络拓扑结构,具体包括:Further, based on the eavesdropping network model, a network topology structure is constructed, including:
获取子空间码:令Fq表示一个有q个元素的有限域,是Fq上的一个n维向量空间;令P(n)表示的所有子空间集合,其构成Fq上的一个n阶射影空间;令G(k,n)表示n维向量空间的所有k维子空间集合,其中k≤n;并且P(n)=U0≤k≤nG(k,n);Obtain the subspace code: Let F q denote a finite field with q elements, is an n-dimensional vector space on F q ; let P(n) denote The set of all subspaces of , which constitute an n-order projective space on F q ; let G(k,n) denote an n-dimensional vector space The set of all k-dimensional subspaces of , where k≤n; and P(n)=U 0≤k≤n G(k,n);
子空间码C是P(n)的非空子集;对于0≤k≤n,如果则称C为恒维码(Constant Dimension Code CDC);否则,称C为混合维度码(Mixed Dimension Code MDC)。A subspace code C is a non-empty subset of P(n); for 0≤k≤n, if Then C is called constant dimension code (Constant Dimension Code CDC); otherwise, C is called mixed dimension code (Mixed Dimension Code MDC).
进一步的,设N是一个网络,它有S个信源节点,T个信宿节点和E个信道;设C是一个子空间码,cc∈C是信源s∈S发送到信宿的某个子集t∈T的传输码字;Further, let N be a network, which has S source nodes, T sink nodes and E channels; let C be a subspace code, c c ∈ C is a certain subspace sent by the source s ∈ S to the sink. set t∈T transmission codewords;
算子信道模型用于描述场景信道,该模型使用I和O定义信道的输入和输出;I和O是P(n)的子集,The operator channel model is used to describe the scene channel, which uses I and O to define the input and output of the channel; I and O are subsets of P(n),
Ηk是一个随机算子,它随机返回I的k维子空间Hk(I)和ε,其中ε是误差子空间,它导致了dim(ε)的插入,dim(ε)是向量空间ε的维数。Η k is a random operator that randomly returns the k-dimensional subspace H k (I) and ε of I, where ε is the error subspace, which leads to the insertion of dim(ε), and dim(ε) is the vector space ε dimension.
进一步的,基于窃听网络模型,构建网络拓扑结构,具体还包括:Further, based on the eavesdropping network model, a network topology structure is constructed, which specifically includes:
构建网络拓扑结构:窃听网络模型用四重(G,s,U,We)来表示,有以下定义:Build network topology: The eavesdropping network model is represented by quadruple (G, s, U, We ), with the following definitions:
(i)使用G=(VG,EG)表示一个无环有向的通信网络,其中VG是所有节点的集合,EG是所有边的集合;(i) Use G=(V G , E G ) to represent an acyclic directed communication network, where V G is the set of all nodes, and EG is the set of all edges;
(ii)一个信源节点sG∈VG;(ii) a source node s G ∈ V G ;
(iii)一组信宿节点 (iii) A set of sink nodes
(iv)一组窃听边 (iv) a set of eavesdropping edges
网络中每条边的容量均为单位容量;设V={s}∪IG∪UG,IG是中间节点的集合;假设有无数的窃听者,并且它们相互之间不合作;重点分析其中一个窃听者,并把这个窃听者将称为Eve;令W∈We表示Eve使用的一组窃听边;|W|表示Eve收集到的向量,|W|的数量表示Eve的窃听能力,用Ce表示;|W|<Cm,Cm表示G的组播容量;The capacity of each edge in the network is unit capacity; let V ={s} ∪IG ∪UG , IG is the set of intermediate nodes; it is assumed that there are countless eavesdroppers, and they do not cooperate with each other; key analysis One of the eavesdroppers, and this eavesdropper will be called Eve; let W∈W e denote a set of eavesdropping edges used by Eve; |W| denote the vector collected by Eve, and the number of |W| denote the eavesdropping ability of Eve, It is represented by C e ; |W|<C m , C m represents the multicast capacity of G;
添加一个额外的节点作为密钥分发中心KDC,该节点用于连接信源节点和信宿节点,并且其信道与窃听网络分离。An additional node is added as the key distribution center KDC, which is used to connect the source node and the sink node, and its channel is separated from the eavesdropping network.
进一步的,改进置换步骤,具体为:Further, improve the replacement step, specifically:
信源信息是一个包含有nD个比特的数据流,所述数据流被划分为多个位串,该位串的长度为m,l个位串为一组;如果位串的个数小于l,则进行填充;划分后的数据流具有如下的表示方式:The source information is a data stream containing n D bits, the data stream is divided into a plurality of bit strings, the length of the bit string is m, and l bit strings form a group; if the number of bit strings is less than l, then fill; the divided data stream has the following representation:
其中,dij∈Fq,i=1,2,...,l,j=1,2,...,m.Among them, d ij ∈ F q , i=1,2,...,l,j=1,2,...,m.
位串使用KDC分发的置换密钥Pk1和Pk2进行置换,其中Pk1为行置换密钥,Pk2表示列置换密钥,分别表示如下:The bit string is permuted using the permutation keys P k1 and P k2 distributed by the KDC, where P k1 is the row permutation key, and P k2 is the column permutation key, respectively expressed as follows:
将待加密的数据与行置换矩阵相结合,得到行加密后的数据;再与列置换矩阵相结合,得到经过行与列加密后的数据;然后使用子空间码的集合Sc进行编码,在编码过程中使用SCS(subspace coding strategy)策略。Combine the data to be encrypted with the row permutation matrix to obtain the row-encrypted data; then combine with the column permutation matrix to obtain the data after row and column encryption; then use the set S c of subspace codes to encode, in The SCS (subspace coding strategy) strategy is used in the coding process.
更进一步的,在一个具有组播容量为Cm的网络中,SCS策略是一个五元组,用表示,定义如下:Furthermore, in a network with multicast capacity C m , the SCS policy is a quintuple, using means, defined as follows:
(i)P(n)是Fq上的一个n阶射影空间,(i) P(n) is a projective space of order n on F q ,
(ii)是一个正整数,表示安全偏移率,(ii) is a positive integer representing the safe offset rate,
(iii)是P(n)中的一组格拉斯曼码,(iii) is a set of Grassmann codes in P(n),
(iv)设并随机创建一个满映射θ:Ssym→{0,1}m,(iv) set and randomly create a full map θ:S sym →{0,1} m ,
(v)是一个双映射,表示对Eve的窃听能力Ce的最大容量猜测;(v) is a double map, represents the maximum capacity guess for Eve's eavesdropping capability Ce ;
信源将使用SCS策略作为数据传输的手段,子空间集合Sc和映射θ、φ以及集合ET由KDC提供;The source will use the SCS strategy as a means of data transmission, and the subspace set S c and the mappings θ, φ and the set ET are provided by KDC;
令<V>∈c表示当前选择的码字,其中c∈Sc;在每一轮的传输过程中,信源会将含有错误的有效码字c注入到网络当中,这些错误在接收端可以被纠正;当这些码字向量穿过网络时,在支持RLNC编码的节点进行RLNC编码操作;Let <V>∈c denote the currently selected codeword, where c∈S c ; in each round of transmission, the source will inject valid codeword c with errors into the network, and these errors can be detected at the receiver. be corrected; when these codeword vectors pass through the network, perform RLNC encoding operations at nodes that support RLNC encoding;
信宿节点u∈UG接收到一个RLNC编码的错误版本后,通过解码得到正确的码字c,最后经过逆置换,得到信源数据。After the sink node u∈UG receives an erroneous version of the RLNC code, it obtains the correct codeword c through decoding, and finally obtains the source data through inverse permutation.
更进一步的,建立基于改进RSA的安全网络编码方案,具体为:使用改进的RSA算法对行置换密钥PK1和列置换密钥PK2进行加密,具体实施过程为:Further, a secure network coding scheme based on improved RSA is established, specifically: using the improved RSA algorithm to encrypt the row permutation key P K1 and the column permutation key P K2 , and the specific implementation process is:
随机选取三个的大素数p,q和r,f=pqr,φ(f)=(p-1)(q-1)(r-1);Randomly select three large prime numbers p, q and r, f=pqr, φ(f)=(p-1)(q-1)(r-1);
信源节点选取加密密钥g,并获取满足hg≡1mod(f)的私钥h;The source node selects the encryption key g, and obtains the private key h satisfying hg≡1mod(f);
将公钥(g,f)发送给KDC;Send the public key (g, f) to the KDC;
所述KDC产生E(g,f)(PK1||PK2),并发送到信源节点;The KDC generates E (g,f) (P K1 ||P K2 ), and sends it to the source node;
所述信源节点使用h解密E(g,f)(PK1||PK2),在解密过程中采用蒙哥马利模乘法和中国剩余定理来进行幂乘运算。The source node uses h to decrypt E (g,f) (P K1 ||P K2 ), and uses Montgomery's modular multiplication and the Chinese remainder theorem to perform exponentiation in the decryption process.
本发明采用的以上技术方案,与现有技术相比,具有的优点是:本发明基于Yeung和Cai提出的窃听网络模型,建立本发明使用的网络拓扑结构;并改进置换步骤,提高搜索复杂度,以保证数据的安全传输;针对KDC易受攻击的问题,建立基于改进RSA的安全网络编码方案,该方案应用于信源节点和KDC之间。与其他方案相比,本方法提高了数据安全性,具有较强的加密性能,能有效抵抗窃听攻击。Compared with the prior art, the above technical solutions adopted in the present invention have the following advantages: the present invention is based on the wiretapping network model proposed by Yeung and Cai to establish the network topology structure used in the present invention; and the replacement step is improved to increase the search complexity , in order to ensure the safe transmission of data; Aiming at the problem that KDC is vulnerable to attack, a secure network coding scheme based on improved RSA is established, which is applied between the source node and the KDC. Compared with other schemes, the method improves data security, has strong encryption performance, and can effectively resist eavesdropping attacks.
附图说明Description of drawings
图1为本发明的实施过程流程图;Fig. 1 is the implementation process flow chart of the present invention;
图2为基于改进RSA的安全网络编码方案图;Figure 2 is a diagram of a secure network coding scheme based on improved RSA;
图3为多播网络模型图;Fig. 3 is a multicast network model diagram;
图4为猜测概率和Eve窃听能力的关系图;Figure 4 is a graph showing the relationship between guessing probability and Eve's eavesdropping ability;
图5为本发明方案、SCS和SPOC的猜测概率图。FIG. 5 is a guessing probability diagram of the scheme of the present invention, SCS and SPOC.
具体实施方式Detailed ways
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请,即所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application, that is, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments.
实施例1Example 1
如图1所示,本发明提供一种基于改进RSA的安全网络编码方法,包括:As shown in Figure 1, the present invention provides a security network coding method based on improved RSA, comprising:
S1:基于Yeung和Cai提出的窃听网络模型,建立本发明使用的网络拓扑结构;S1: Based on the eavesdropping network model proposed by Yeung and Cai, establish the network topology structure used in the present invention;
S1.1获取子空间码:令Fq表示一个有q个元素的有限域,是Fq上的一个n维向量空间。令P(n)表示的所有子空间集合,其构成Fq上的一个n阶射影空间。令G(k,n)表示n维向量空间的所有k维子空间集合,其中k≤n;G(k,n)也被称为Grassmannian,并且P(n)=U0≤k≤nG(k,n);S1.1 Get the subspace code: Let F q denote a finite field with q elements, is an n-dimensional vector space on Fq . Let P(n) denote The set of all subspaces of , which constitutes a projective space of order n on F q . Let G(k,n) denote an n-dimensional vector space The set of all k-dimensional subspaces of , where k≤n; G(k,n) is also called Grassmannian, and P(n)=U 0≤k≤n G(k,n);
子空间码C是P(n)的非空子集。对于0≤k≤n,如果称C为恒维码(Constant Dimension Code CDC)。否则,称C是混合维度码(Mixed Dimension Code MDC)。The subspace code C is a non-empty subset of P(n). For 0≤k≤n, if Call C the constant dimension code (Constant Dimension Code CDC). Otherwise, C is said to be a mixed dimension code (Mixed Dimension Code MDC).
设V为矩阵,用<V>表示由V的行向量张成的子空间。类似地,本发明通过选择一个矩阵来表示一个子空间,这个矩阵是由行向量张成的。Let V be a matrix, and denote the subspace spanned by the row vectors of V by <V>. Similarly, the present invention represents a subspace by selecting a matrix that is stretched by row vectors.
设N是一个网络,它有S个信源节点,T个信宿节点和E个信道。设C是一个子空间码,cc∈C是信源s∈S发送到信宿的某个子集t∈T的传输码字。在传输过程中,码字cc的维数减小会给网络信道带来删除错误。当信宿收到一组向量的码字cc',而这些向量不在cc向量张成的子空间中时,会带来插入错误。Let N be a network with S source nodes, T sink nodes and E channels. Let C be a subspace code, and c c ∈ C be the transmission codeword sent by the source s ∈ S to some subset t ∈ T of the sink. During transmission, the reduction of the dimensionality of the codeword cc will bring deletion errors to the network channel. An insertion error occurs when a sink receives a codeword cc ' for a set of vectors that are not in the subspace spanned by the cc vectors.
算子信道模型用于描述场景信道,该模型使用I和O定义信道的输入和输出。The operator channel model is used to describe the scene channel, which uses I and O to define the input and output of the channel.
S1.2构建网络拓扑结构:本发明采用Yeung和Cai提出的窃听网络模型,该网络模型用四重(G,s,U,We)来表示,有以下定义:S1.2 constructs the network topology structure: The present invention adopts the wiretapping network model proposed by Yeung and Cai, and the network model is represented by quadruple (G, s, U, We), and has the following definitions:
(i)使用G=(VG,EG)表示一个无环有向的通信网络,其中VG是所有节点的集合,EG是所有边的集合;(i) Use G=(V G , E G ) to represent an acyclic directed communication network, where V G is the set of all nodes, and EG is the set of all edges;
(ii)一个信源节点sG∈VG;(ii) a source node s G ∈ V G ;
(iii)一组信宿节点 (iii) A set of sink nodes
(iv)一组窃听边 (iv) a set of eavesdropping edges
网络中每条边的容量均为单位容量。设V={s}∪IG∪UG,IG是中间节点的集合。假设有无数的窃听者,并且它们相互之间不合作。本发明重点分析其中一个窃听者,把这个窃听者将称为Eve。令W∈We表示Eve使用的一组窃听边。|W|表示Eve收集到的向量,|W|的数量表示Eve的窃听能力,用Ce表示。|W|<Cm,Cm表示G的组播容量。The capacity of each edge in the network is the unit capacity. Let V ={s} ∪IG ∪UG , and IG is the set of intermediate nodes. Suppose there are countless eavesdroppers, and they don't cooperate with each other. The present invention focuses on analyzing one of the eavesdroppers, and this eavesdropper will be called Eve. Let W ∈ We denote the set of eavesdropping edges used by Eve. |W| represents the vector collected by Eve, and the number of |W| represents Eve's eavesdropping ability, denoted by C e . |W|<C m , C m represents the multicast capacity of G.
在Yeung和Cai提出的网络模型基础上,添加了一个额外的节点作为密钥分发中心(KDC)。该节点用于连接信源节点和信宿节点,并且其信道与窃听网络分离。另外,本发明使用改进的RSA算法对KDC分发的置换密钥进行加密。Based on the network model proposed by Yeung and Cai, an additional node is added as a key distribution center (KDC). This node is used to connect the source node and the sink node, and its channel is separated from the eavesdropping network. In addition, the present invention uses the improved RSA algorithm to encrypt the replacement key distributed by the KDC.
S2:改进置换步骤,提高搜索复杂度,以保证数据的安全传输;S2: Improve the replacement step and increase the search complexity to ensure the safe transmission of data;
具体的,信源信息是一个包含有nD个比特的数据流,数据流被划分为多个位串。位串的长度为m,l个位串为一组。如果位串的个数小于l,则进行填充。Specifically, the source information is a data stream containing n D bits, and the data stream is divided into multiple bit strings. The length of the bit string is m, and l bit strings form a group. If the number of bit strings is less than 1, padding is performed.
位串将会使用KDC分发的置换密钥PK1和PK2进行置换,然后使用子空间码的集合Sc进行编码,本发明在编码过程中使用SCS(subspace coding strategy)策略。在每一轮的传输过程中,信源会将含有错误的码字c注入到网络当中,这些错误在接收端可以被纠正,其中c∈Sc。当这些码字向量穿过网络时,会在支持RLNC编码的节点进行RLNC编码操作。The bit string will be permuted using the permutation keys P K1 and P K2 distributed by the KDC, and then encoded using the set S c of subspace codes. The present invention uses the SCS (subspace coding strategy) strategy in the encoding process. In each round of transmission, the source will inject the codeword c with errors into the network, and these errors can be corrected at the receiver, where c∈S c . As these codeword vectors traverse the network, RLNC encoding operations are performed at nodes that support RLNC encoding.
当信宿节点u∈UG接收到一个RLNC编码的错误版本后,会通过解码得到正确的码字c,最后经过逆置换,得到信源数据。When the sink node u∈UG receives an erroneous version of RLNC encoding, it will obtain the correct codeword c through decoding, and finally obtain the source data through inverse permutation.
S3:针对KDC易受攻击的问题,建立基于改进RSA的安全网络编码方案,该方案应用于信源节点和KDC之间;S3: Aiming at the problem that KDC is vulnerable to attack, establish a secure network coding scheme based on improved RSA, which is applied between the source node and KDC;
具体的,为了保证KDC中PK1和PK2的安全性,使用改进的RSA对PK1和PK2进行加密。如图2所示,安全网络编码方案位于信源节点和KDC之间,具体实现步骤如下:Specifically, in order to ensure the security of P K1 and P K2 in the KDC, improved RSA is used to encrypt P K1 and P K2 . As shown in Figure 2, the secure network coding scheme is located between the source node and the KDC, and the specific implementation steps are as follows:
步骤1:随机选取三个的大素数p,q和r,f=pqr,φ(f)=(p-1)(q-1)(r-1)。Step 1: Randomly select three large prime numbers p, q and r, f=pqr, φ(f)=(p-1)(q-1)(r-1).
步骤2:信源节点选取加密密钥g,并获取满足hg≡1mod(f)的私钥h。Step 2: The source node selects the encryption key g, and obtains the private key h that satisfies hg≡1mod(f).
步骤3:将公钥(g,f)发送给KDC。Step 3: Send the public key (g, f) to the KDC.
步骤4:KDC产生E(g,f)(PK1||PK2)。Step 4: KDC produces E (g,f) (P K1 ||P K2 ).
步骤5:KDC发送E(g,f)(PK1||PK2)到信源节点。Step 5: The KDC sends E (g,f) (P K1 ||P K2 ) to the source node.
步骤6:信源节点使用h解密E(g,f)(PK1||PK2)。为了提高计算效率,在解密过程中采用蒙哥马利模乘法和中国剩余定理来进行幂乘运算。Step 6: The source node decrypts E (g,f) (P K1 ||P K2 ) using h. In order to improve the computational efficiency, Montgomery modular multiplication and Chinese remainder theorem are used for exponentiation in the decryption process.
网络模型如图3所示,信源节点的数据流D设置为121bits。设置Ce=3,子空间码间最小距离d≥9。假设m=11,l=11,集合Sc={C5,C6,C7,C8},Sc中码字的特点如表1所示。Sc中使用的元素是来自于F2上16维环境向量空间的子空间。在本发明实验中,部分边代表Eve可以窃听到的边,并且0≤Ce≤8。0表示Eve无法访问该网络。窃听的矢量都是线性无关的。The network model is shown in Figure 3, and the data flow D of the source node is set to 121 bits. Set C e =3, the minimum distance between subspace codes d≥9. Assuming that m=11, l=11, the set S c = {C 5 , C 6 , C 7 , C 8 }, the characteristics of the code words in S c are shown in Table 1. The elements used in Sc are subspaces from the 16 - dimensional environment vector space on F2. In the experiments of the present invention, some edges represent the edges that Eve can eavesdrop, and 0≤C e ≤8. 0 means that Eve cannot access the network. The tapped vectors are all linearly independent.
表1 Sc中码字的特点Table 1 Characteristics of codewords in S c
图4显示了本发明的方案、SCS、通用安全网络编码方案(本发明记作USUC方案)和SPOC的猜测概率。猜测概率表示Eve获得信源消息的能力。在本发明中,猜测概率不仅与码字可能的组合数目有关,还与RSA、m和l有关。SCS的猜测概率与码字的可能组合数和l有关。USUC的猜测概率与丢失数据包的数量有关。SPOC的猜测概率不仅和丢失数据包的数量有关,还和锁定的编码系数有关。由图4可知本发明的安全网络编码方案比SCS和SPOC有更好的猜测概率。然而,USNC的搜索复杂度仅取决于丢失数据包的可能性数量,使得该方案的安全性高度依赖于Ce。当Ce≥Cm时,USNC将不再被认为是安全的。FIG. 4 shows the guess probability of the scheme of the present invention, SCS, Universal Security Network Coding Scheme (denoted as USUC scheme in the present invention) and SPOC. The guessing probability represents Eve's ability to obtain information from the source. In the present invention, the guessing probability is not only related to the number of possible combinations of codewords, but also to RSA, m and l. The guess probability of SCS is related to the number of possible combinations of codewords and l. The guess probability of USUC is related to the number of lost packets. The guess probability of SPOC is not only related to the number of lost packets, but also to the locked coding coefficient. It can be seen from FIG. 4 that the secure network coding scheme of the present invention has better guessing probability than SCS and SPOC. However, the search complexity of USNC only depends on the number of possibilities of missing packets, making the security of this scheme highly dependent on Ce. When C e ≥ C m , USNC will no longer be considered safe.
图5显示了当Ce≥Cm时,本发明的方案、SCS和SPOC的猜测概率。RLNC编码时数据包的长度len设置为24。编码系数随数据包一起发送。如图5所示,本发明的猜测概率最小,因此本发明的安全性远高于SCS和SPOC。Figure 5 shows the guess probabilities for the scheme of the present invention, SCS and SPOC when C e ≥ C m . The length len of the data packet is set to 24 during RLNC encoding. The encoded coefficients are sent with the packet. As shown in FIG. 5 , the guessing probability of the present invention is the smallest, so the security of the present invention is much higher than that of SCS and SPOC.
表2显示了当Ce<Cm时,本发明的方案、SCS、USNC和SPOC的穷举搜索复杂度。本发明的复杂性取决于数据包的组合数和m、l的数目,SCS的复杂性取决于数据包的组合数和l的数目。USNC的复杂性取决于Eve错过的数据包数。对于SPOC,除了猜测丢失的数据包数,还必须猜测编码系数和置换键。由表2可知,在穷举搜索攻击时,本发明具有最高的搜索复杂度。这意味着本发明具有最大的搜索空间和更好的安全性。Table 2 shows the exhaustive search complexity of the scheme of the present invention, SCS, USNC and SPOC when C e < C m . The complexity of the present invention depends on the number of combinations of data packets and the number of m and l, and the complexity of the SCS depends on the number of combinations of data packets and the number of l. The complexity of USNC depends on the number of packets that Eve misses. For SPOC, in addition to guessing the number of lost packets, encoding coefficients and permutation keys must also be guessed. It can be seen from Table 2 that the present invention has the highest search complexity in an exhaustive search attack. This means that the present invention has the largest search space and better security.
表2本发明方案与SCS、USNC和SPOC的搜索复杂度Table 2 The search complexity of the scheme of the present invention and SCS, USNC and SPOC
前述对本发明的具体示例性实施方案的描述是为了说明和例证的目的。这些描述并非想将本发明限定为所公开的精确形式,并且很显然,根据上述教导,可以进行很多改变和变化。对示例性实施例进行选择和描述的目的在于解释本发明的特定原理及其实际应用,从而使得本领域的技术人员能够实现并利用本发明的各种不同的示例性实施方案以及各种不同的选择和改变。本发明的范围意在由权利要求书及其等同形式所限定。The foregoing descriptions of specific exemplary embodiments of the present invention have been presented for purposes of illustration and description. These descriptions are not intended to limit the invention to the precise form disclosed, and obviously many changes and modifications are possible in light of the above teachings. The exemplary embodiments were chosen and described for the purpose of explaining certain principles of the invention and their practical applications, to thereby enable others skilled in the art to make and utilize various exemplary embodiments and various different aspects of the invention. Choose and change. The scope of the invention is intended to be defined by the claims and their equivalents.
Claims (7)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210242049.2A CN114465733B (en) | 2022-03-11 | 2022-03-11 | A secure network coding method based on improved RSA |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210242049.2A CN114465733B (en) | 2022-03-11 | 2022-03-11 | A secure network coding method based on improved RSA |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN114465733A true CN114465733A (en) | 2022-05-10 |
| CN114465733B CN114465733B (en) | 2024-05-28 |
Family
ID=81417527
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210242049.2A Active CN114465733B (en) | 2022-03-11 | 2022-03-11 | A secure network coding method based on improved RSA |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN114465733B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102022133962A1 (en) * | 2022-12-19 | 2024-06-20 | Friedrich-Schiller-Universität Jena Körperschaft des öffentlichen Rechts | PROCESSING MEASURED RAMAN SPECTRA WITH NEURAL NETWORKS |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4351982A (en) * | 1980-12-15 | 1982-09-28 | Racal-Milgo, Inc. | RSA Public-key data encryption system having large random prime number generating microprocessor or the like |
| WO2004021694A1 (en) * | 2002-08-30 | 2004-03-11 | Rheinische Friedrich-Wilhelms-Uni Versität Bonn | Method and device for decryption-secure transfer of data |
| US20160373210A1 (en) * | 2013-07-04 | 2016-12-22 | Norwegian University Of Science And Technology | Network coding over gf(2) |
| CN107426248A (en) * | 2017-09-05 | 2017-12-01 | 东北大学 | A kind of WMN anonymous communication methods based on network code |
| CN110166247A (en) * | 2019-05-06 | 2019-08-23 | 湖北工业大学 | It can the anti-pollution network code endorsement method attacked and position intermediate node conspiracy attack |
| CN110851845A (en) * | 2019-10-18 | 2020-02-28 | 华东师范大学 | A Lightweight Single User Multiple Data Encapsulation Method for Fully Homomorphic Data |
| CN111262684A (en) * | 2020-01-13 | 2020-06-09 | 燕山大学 | A power battery traceability management coding encryption method based on improved AES algorithm |
| CN113067669A (en) * | 2021-03-03 | 2021-07-02 | 伍仁勇 | Network coding method and security network |
| US20220069987A1 (en) * | 2020-08-31 | 2022-03-03 | Massachusetts Institute Of Technology | Network Coding-Based Post-Quantum Cryptography |
-
2022
- 2022-03-11 CN CN202210242049.2A patent/CN114465733B/en active Active
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4351982A (en) * | 1980-12-15 | 1982-09-28 | Racal-Milgo, Inc. | RSA Public-key data encryption system having large random prime number generating microprocessor or the like |
| WO2004021694A1 (en) * | 2002-08-30 | 2004-03-11 | Rheinische Friedrich-Wilhelms-Uni Versität Bonn | Method and device for decryption-secure transfer of data |
| US20160373210A1 (en) * | 2013-07-04 | 2016-12-22 | Norwegian University Of Science And Technology | Network coding over gf(2) |
| CN107426248A (en) * | 2017-09-05 | 2017-12-01 | 东北大学 | A kind of WMN anonymous communication methods based on network code |
| CN110166247A (en) * | 2019-05-06 | 2019-08-23 | 湖北工业大学 | It can the anti-pollution network code endorsement method attacked and position intermediate node conspiracy attack |
| CN110851845A (en) * | 2019-10-18 | 2020-02-28 | 华东师范大学 | A Lightweight Single User Multiple Data Encapsulation Method for Fully Homomorphic Data |
| CN111262684A (en) * | 2020-01-13 | 2020-06-09 | 燕山大学 | A power battery traceability management coding encryption method based on improved AES algorithm |
| US20220069987A1 (en) * | 2020-08-31 | 2022-03-03 | Massachusetts Institute Of Technology | Network Coding-Based Post-Quantum Cryptography |
| CN113067669A (en) * | 2021-03-03 | 2021-07-02 | 伍仁勇 | Network coding method and security network |
Non-Patent Citations (5)
| Title |
|---|
| MOHAMED AMINE BRAHIMI, ET AL.: "Secure network coding for data encoded using subspace codes", PHYSICAL COMMUNICATION, pages 1 - 8 * |
| 刘宴涛;王雪冰;: "窃听攻击下子空间码的安全性", 计算机科学, no. 1 * |
| 刘宴涛;王雪冰;: "窃听攻击下子空间码的安全性", 计算机科学, no. 1, 15 June 2017 (2017-06-15) * |
| 邵志骅;: "基于DES和RSA加密算法的数据安全传输技术的研究", 科技信息, no. 36, 25 December 2009 (2009-12-25) * |
| 魏秀岭 等: "基于三素数改进RSA算法的智能小区数据信息保护研究", 实验探索, pages 22 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102022133962A1 (en) * | 2022-12-19 | 2024-06-20 | Friedrich-Schiller-Universität Jena Körperschaft des öffentlichen Rechts | PROCESSING MEASURED RAMAN SPECTRA WITH NEURAL NETWORKS |
| DE102022133962B4 (en) * | 2022-12-19 | 2024-07-25 | Friedrich-Schiller-Universität Jena Körperschaft des öffentlichen Rechts | PROCESSING MEASURED RAMAN SPECTRA WITH NEURAL NETWORKS |
Also Published As
| Publication number | Publication date |
|---|---|
| CN114465733B (en) | 2024-05-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110958112B (en) | Key generation method and system, encryption and decryption method, encrypted communication system | |
| Vilela et al. | Lightweight security for network coding | |
| Applebaum et al. | Semantic security under related-key attacks and applications | |
| US20030063751A1 (en) | Key agreement protocol based on network dynamics | |
| Fung et al. | Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol | |
| CN114710261A (en) | AES key arrangement method | |
| Hemenway et al. | Non-committing encryption from Φ-hiding | |
| Hooshmand et al. | Efficient polar code-based physical layer encryption scheme | |
| Borghoff et al. | Slender-set differential cryptanalysis | |
| Rawal et al. | Challenges and opportunities on the horizon of post-quantum cryptography | |
| Borghoff et al. | Cryptanalysis of PRESENT-like ciphers with secret S-boxes | |
| Mathur et al. | On the design of error-correcting ciphers | |
| Liu et al. | A privacy-preserving signature scheme for network coding | |
| du Pin Calmon et al. | Lists that are smaller than their parts: A coding approach to tunable secrecy | |
| CN114465733B (en) | A secure network coding method based on improved RSA | |
| Özdemir et al. | Development of cryptography since Shannon | |
| Ma et al. | A new mechanism for achieving secure and reliable data transmission in wireless sensor networks | |
| Ye et al. | Improving wireless security through network diversity | |
| Evgnosia-Alexandra | A note on post quantum onion routing | |
| CN117014134A (en) | Grid-based physical entropy source enhanced key negotiation method | |
| Kim et al. | An Efficient Hybrid Key Exchange Mechanism | |
| Narayanan et al. | TLS cipher suite: Secure communication of 6LoWPAN devices | |
| Lin¹ et al. | Encapsulation Mechanism with Non-permutation Equivalent Public | |
| Martínez | New cryptanalysis of LFSR-based stream ciphers and decoders for p-ary QC-MDPC codes | |
| Boudriga et al. | Physical layer cryptography in optical networks: A lattice-based approach |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| EE01 | Entry into force of recordation of patent licensing contract | ||
| EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20220510 Assignee: Beijing Chumoxuan Graphic Technology Co.,Ltd. Assignor: DALIAN University Contract record no.: X2024980020659 Denomination of invention: A secure network encoding method based on improved RSA Granted publication date: 20240528 License type: Common License Record date: 20241024 |








































