Font Size: a A A

Public Key Encryption Algorithm Based On Time-memory Trade-Off

Posted on:2020-07-15Degree:MasterType:Thesis
Country:ChinaCandidate:Q YinFull Text:PDF
GTID:2428330623451415Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the early stages,these encryption algorithms are not designed for wireless sensor networks with resource-constrained,so there exits some problems in the application of wireless sensor networks.In addition,the common asymmetric encryption algorithm has higher computation capacity than symmetric encryption algorithm,which also limits its application on WSN nodes with limited computing capacity.The security of these algorithms depends on the intractability of mathematical problems,once they are completely cracked,and then the correspondent asymmetric encryption algorithm will be decrypted.Considering these problems,this paper proposes the idea of using time-memory trade-off technology and one-way function to design public key encryption algorithm,and implements three public key encryption algorithms.The main work of this paper includes:(1)Using the characteristics of one-way function that it is very difficult to calculate from other directions,combined with time-memory trade-off technology in the field of cryptanalysis,and carry the trapdoor with the pre-calculation phase of the time-memory trade-off technology.A method of constructing one-way trapdoor function using space-time compromise technique and one-way function is proposed.(2)Using the one-way feature of the hash function,a hash-based public key encryption algorithm is proposed.It can guarantee the security strength equivalent to the same length symmetric encryption algorithm.Meanwhile,our algorithm has a fast encryption speed and reasonable decryption time,which can be applied to message encryption on the occasions of limited resources such as wireless sensor network.Experimental and theoretical analysis proves that under the same encryption strength,our algorithm's packet length can be much lower than traditional encryption schemes such as RSA,and has an excellent performance in encryption.(3)In view of the fact that a hash-based public key encryption algorithm has a certain probability conflict problem,in order to improve the correct rate of decryption,combined with the characteristics of symmetric encryption,a public key encryption algorithm based on symmetric encryption is proposed.Experimental and theoretical analysis proves that under the same encryption strength,our algorithm's packet length can be much lower than traditional encryption schemes such as RSA,and has an excellent performance in encryption.
Keywords/Search Tags:Time-memory trade-off, Security strength, Public-key cryptosystems
PDF Full Text Request
Related items