期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于PQC+SM2融合算法下的部署包下发安全机制研究
1
作者 唐银春 《信息化研究》 2025年第6期30-34,共5页
本文针对传统公钥密码(如RSA、SM2)面临量子计算威胁的问题,提出一种PQC与SM2融合的安全方案。该方案通过SM2实现身份认证与数据完整性保护,并采用PQC+SM2混合密钥交换机制保障传输机密性。分析表明,该设计可同时抵御传统网络攻击与量... 本文针对传统公钥密码(如RSA、SM2)面临量子计算威胁的问题,提出一种PQC与SM2融合的安全方案。该方案通过SM2实现身份认证与数据完整性保护,并采用PQC+SM2混合密钥交换机制保障传输机密性。分析表明,该设计可同时抵御传统网络攻击与量子计算攻击,且兼容现有国密标准与基础设施,为部署包下发提供了兼顾合规性与后量子安全性的解决方案,对关键信息系统平滑过渡具有实用价值。 展开更多
关键词 PQC算法 SM2算法 量子安全 融合加密
在线阅读 下载PDF
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things 被引量:1
2
作者 Senshan Ouyang Xiang Liu +3 位作者 Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期903-915,共13页
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle. 展开更多
关键词 KEY-INSULATED SM2 algorithm digital signature Industrial Internet of Things(IIoT) provable security
在线阅读 下载PDF
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1
3
作者 Youhai Shao Yong Wang +1 位作者 Yun Yang Xiang Wang 《Journal of Computer and Communications》 2022年第1期42-56,共15页
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s... Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. 展开更多
关键词 Secret Algorithm SM2 Communication Protocol Hybrid Encryption Security Protection
在线阅读 下载PDF
AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol
4
作者 Shan Shi Yong Wang +1 位作者 Cunming Zou Yingjie Tian 《Journal of Computer and Communications》 2022年第1期27-41,共15页
The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order ... The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol. 展开更多
关键词 104 Protocol Man in the Middle Attack AES and RSA Hybrid Encryption Signature National Secret SM2 Algorithm
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部