期刊文献+

基于哈希函数的正弦投影身份认证方案 被引量:2

Sinusoidal Projection Identity Authentication Scheme Based on Hash Function
在线阅读 下载PDF
导出
摘要 正弦函数具有多个自变量对应于单个变量值的多映射特性,为此,在单向散列函数SHA-1的基础上,设计一种适用于无线传感器网络的轻量级身份认证方案。该方案将平台发送的随机数及自身密钥进行哈希变换,并组合成取值范围较广的正弦函数变量进行正弦投影,由此获得一组取值简单的映射值,完成身份认证要素的变换运算。在MICAz无线节点上进行实验,结果证明该方案在提高SHA-1安全性、抵抗传统攻击的基础上,具有存储小、能耗低的特点。 This paper designs an identity authentication scheme for Wireless Sensor Network(WSN) based on SHA-1 function. By using the feature of multi-mapping, it is widely used in terminal node of WSN which has limited resources. The hash operation is done on the random number sent by the platform and the terminal node's key respectively, the results are integrated to be sinusoidal function variable which has larger value range, the variable is operated by sinusoidal projection, and a set of simpler projection values are obtained. Experiments on MICAz demonstrate that the scheme not only can improve the security of SHA-1, avoid traditional attack, but also can achieve better performance such as less memory space and energy.
出处 《计算机工程》 CAS CSCD 2012年第9期125-126,130,共3页 Computer Engineering
基金 教育部新世纪人才计划基金资助项目(NCET-08-0359) 上海市青年科技启明星跟踪计划基金资助项目(11QH1401300) 中兴通讯基金资助项目
关键词 正弦投影 哈希函数 身份认证 无线传感器网络 SHA-1算法 sinusoidal projection hash function identity authentication Wireless Sensor Network(WSN) SHA-1 algorithm
  • 相关文献

参考文献5

  • 1Kim M.Integrating Network Coding into Heterogeneous WirelessNetworks[C]//Proc.of MILCOM’08.San Diego,USA:[s.n.],2008.
  • 2Darrel H,Alfred M,Scott V.Guide to Elliptic CurveCryptography[M].[S.l.]:Springer,2004.
  • 3Wang Xiaoyun,Lai Xuejia,Feng Dengguo,et al.Cryptanalysis ofthe Hash Functions MD4 and RIPEMD[C]//Proceedings ofEUROCRYPY’05.[S.l.]:Springer-Verlag,2005.
  • 4李淼,徐金甫,戴紫彬,杨晓辉.可重构散列函数密码芯片的设计与实现[J].计算机工程,2010,36(6):131-132. 被引量:6
  • 5Crossbow.Micaz:Wireless Measurement System[EB/OL].[2011-03-10].http://www.xbow.com.

二级参考文献6

  • 1曲英杰,刘卫东,战嘉瑾.可重构密码协处理器简介及其特性[J].计算机工程,2004,30(13):166-168. 被引量:7
  • 2Yang Xiaohui Dai Zibin Liu Yuanfeng Wang Ting.Researching and implementation of reconfigurable Hash chip based on FPGA[J].Journal of Systems Engineering and Electronics,2007,18(1):183-187. 被引量:3
  • 3Satoh A, lnoue T. ASIC-hardware-focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS[C]//Proc. of ITCC'05. Las Vegas, Nevada, USA: [s. n], 2005.
  • 4National Institute of Standards and Technology. FIPS 180-Secure Hash Standard[Z]. 1993.
  • 5Diez J M. Hash Algorithms for Cryptographic Protocols: FPGA Imptementations[C]//Proc, of TELFOR'02. Belgrade, Yugoslavia: [s. n.], 2002: 26-28.
  • 6Altera Corporation. Stratix Ⅱ Architecture[Z]. (2004-09-22). http:// www.Altera.com.

共引文献5

同被引文献10

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部