期刊文献+

基于拟态防御的QR码信息加密架构 被引量:9

QR Code Information Encryption Architecture Based on Mimic Defense
在线阅读 下载PDF
导出
摘要 QR码(Quick Response Code)作为重要的信息载体,正面临着严重的信息泄露和信息篡改等安全威胁.本文提出一种基于拟态防御思想的QR码信息加密架构(Mimic QR Code,M-QR),以提升QR码的安全性.首先,基于拟态防御模型的防御原理和特点构建异构冗余的加解密执行体;然后,选调器动态选取若干冗余执行体;接着,表决器对各执行体的处理结果进行表决以获得最终加密信息;最后生成相应的QR码.实验仿真表明,新架构可大幅提高QR码的安全性,而且识别效率很高,具有一定的实际应用价值. As an important information carrier,QR code is facing serious security threats such as information leakage and information tampering.This paper proposes a QR code information encryption architecture based on mimic defense to improve the security of QR code.Firstly,based on the principle and characteristics of the mimic defense model,a heterogeneous redundancy entities of encryption and decryption is constructed;then,the selector dynamically selects a number of redundant execution entities.Secondly,the voter votes on the processing results of execution entities to obtain final encrypted information.Finally,the architecture generate the corresponding QR code.The experimental simulation shows that the newarchitecture can greatly improve the security of the QR code,and the identification efficiency is very high,which has application value in practice.
作者 班绍桓 韩英杰 樊永文 周清雷 BAN Shao-huan;HAN Ying-jie;FAN Yong-wen;ZHOU Qing-lei(School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China)
出处 《小型微型计算机系统》 CSCD 北大核心 2020年第4期673-678,共6页 Journal of Chinese Computer Systems
基金 国家重点研发计划项目(2016YFB0800100)资助 国家自然科学基金面上项目(61572444,U1204608)资助。
关键词 QR码 信息加密 拟态防御 异构冗余 QR code information encryption mimic defense heterogeneous redundancy
  • 相关文献

参考文献10

二级参考文献52

  • 1吉萌,余少华,詹翊春.双冗余结构路由器故障恢复模型与方案研究[J].通信学报,2006,27(6):21-28. 被引量:4
  • 2GB/T18284-2000.快速响应矩阵码[S].国家质量技术监督局,2000.
  • 3PAVLIDIS T,SWARTZ J ,WANG Y P. Information encoding with two- dimensional bar codes [ J ]. IEEE Computer, 1992,27 ( 6 ) : 18 - 27.
  • 4胡向东,魏琴芳.应用密码学[M].北京:电子工业出版社,2005:147-201.
  • 5Wang Xiaoyun, Yu Hongbo. Finding collisions in the Full SHA - 1 [M]. Crvpto 2005 .LNCS 3621.2005:17 -36.
  • 6DroidLa. Encrypted QR codes: Share secret messages[EB/OL]. http://qrdroid.com/encrypted-qr-codes-share-secret-messages. htrnl, 2011-7- 13.
  • 7D.C-Lagoa, E.C-Montenegro, F.J.G-Castao, F.G-Castieira. Secure eTickets Based on QR-Codes with User-Encrypted Content[C]. Consumer Electronics (ICCE), 2010 Digest of Technical Papers International Conference. 2010: 257-258.
  • 8M. Jian, Y.Yang. Application of Mobile 2D Barcode in China [C]. Wireless Communications, Networking and MobileCom- puting, 2008. WiCOM '08.4th International Conference.2008: 1-4.
  • 9RSA Laboratories. PKCS #5:Password-Based Cryptography Standard[S]. Version 2.1, October 5, 2006.
  • 10FLOTY L W. Bar codes[J]. Metal Finishing, 2002, 100(8) : 42 - 47.

共引文献198

同被引文献167

引证文献9

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部