期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于改进SHA-1物联网监测节点完整性验证与增强方法 被引量:5
1
作者 刘桂雄 张龙 徐钦桂 《中国测试》 CAS 北大核心 2013年第1期80-83,共4页
针对物联网监测节点完整性问题,提出一种适用于物联网监测节点的基于改进SHA-1物联网监测节点完整性验证与增强方法。引入基于SHA-1的不变属性融合增强算法技术,提出改进SHA-1散列算法思想、结构与流程。性能仿真分析表明:改进SHA-1散... 针对物联网监测节点完整性问题,提出一种适用于物联网监测节点的基于改进SHA-1物联网监测节点完整性验证与增强方法。引入基于SHA-1的不变属性融合增强算法技术,提出改进SHA-1散列算法思想、结构与流程。性能仿真分析表明:改进SHA-1散列算法的防碰撞性能及混乱与散布性能较SHA-1算法有明显改善,其改变明文消息1个比特带来的数字指纹平均距离与理论值仅偏差0.54%,置乱数均值从80.3583下降到80.0107。 展开更多
关键词 物联网监测节点 完整性 改进sha-1散列算法
在线阅读 下载PDF
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks 被引量:2
2
作者 Chi Zhang Jun-Rong Liu +4 位作者 Da-Wu Gu Wei-Jia Wang Xiang-Jun Lu Zheng Guo Hai-Ning Lu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第5期1079-1095,共17页
Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to ... Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), giving rise to a series of powerful SCA-based attacks against unprotected subscriber identity module (SIM) cards. CDMA networks have two authentication protocols, cellular authentication and voice encryption (CAVE) based authentication protocol and authentication and key agreement (AKA) based authentication protocol, which are used in different phases of the networks. However, there has been no SCA attack for these two protocols so far. In this paper, in order to figure out if the authentication protocols of CDMA networks are sufficiently secure against SCA, we investigate the two existing protocols and their cryptographic algorithms. We find the side-channel weaknesses of the two protocols when they are implemented on embedded systems. Based on these weaknesses, we propose specific attack strategies to recover their authentication keys for the two protocols, respectively. We verify our strategies on an 8-bit microcontroller and a real-world SIM card, showing that the authentication keys can be fully recovered within a few minutes with a limited number of power measurements. The successful experiments demonstrate the correctness and the effectiveness of our proposed strategies and prove that the unprotected implementations of the authentication protocols of CDMA networks cannot resist SCA. 展开更多
关键词 AUTHENTICATION protocol cellular AUTHENTICATION and voice encryption (CAVE) CODE-DIVISION multiple access (CDMA) secure hash algorithm 1 (sha-1) side-channel analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部