首页 | 本学科首页   官方微博 | 高级检索  
     

新的对抗全局窃听的安全网络编码方案
引用本文:何克岩,赵宏宇.新的对抗全局窃听的安全网络编码方案[J].计算机应用,2016,36(12):3317-3321.
作者姓名:何克岩  赵宏宇
作者单位:西南交通大学 信息科学与技术学院, 成都 611756
摘    要:现有的对抗全局窃听攻击的安全网络编码方案存在引入了带宽开销、导致了很高的计算复杂度的问题,为了降低带宽开销并且提升实际编码效率,提出了一种新的对抗全局窃听的安全网络编码方案。对于编码域大小为q的网络编码,该方案利用密钥生成两个长度为q的置换序列,并利用置换序列对信源消息进行混合和替换,从而实现对抗全局窃听攻击。该方案只需在信源节点对信源消息进行加密,在中间节点不需作任何改变。由于该方案加密算法简单、编码复杂度低并且不需要预编码操作,因此该方案没有引入带宽开销且具有较高的实际编码效率。分析结果表明该方案不但可以抵抗唯密文攻击,对于已知明文攻击也有很好的抵抗效果。

关 键 词:网络编码  全局窃听  置换序列  唯密文攻击  已知明文攻击  
收稿时间:2016-06-06
修稿时间:2016-08-01

Novel secure network coding scheme against global wiretapping
HE Keyan,ZHAO Hongyu.Novel secure network coding scheme against global wiretapping[J].journal of Computer Applications,2016,36(12):3317-3321.
Authors:HE Keyan  ZHAO Hongyu
Affiliation:School of Information Science and Technology, SouthWest Jiaotong University, Chengdu Sichuan 611756, China
Abstract:The existing schemes against global wiretapping attacks for network coding have the problems of bringing bandwidth overhead and incuring high computational complexity. In order to reduce the bandwidth overhead and enhance the actual coding efficiency, a novel secure network coding scheme against global wiretapping was proposed. For the network coding with the size of field is q, two permutation sequences of length q were generated by using the key, and the source message was mixed and replaced by using the permutation sequences so as to resist global wiretapping attacks. The source message was only encrypted at the source node and had no change at the intermediate nodes. The proposed scheme has a simple encryption algorithm, low coding complexity and doesn't need pre-coding, so it doesn't bring bandwidth overhead and has high actual coding efficiency. The analysis results show that the proposed scheme can resist not only the ciphertext-only attacks but also the known-plaintext attacks efficiently.
Keywords:network coding                                                                                                                        global wiretapping                                                                                                                        permutation sequence                                                                                                                        ciphertext-only attack                                                                                                                        known-plaintext attack
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号