期刊文献+

基于小波分解的链路层加密数据识别方法 被引量:1

Method to identify encrypted data of data link layer based on wavelet decomposition
原文传递
导出
摘要 从链路层未加密数据与已加密数据的随机统计特性角度出发,提出了一种基于随机性检测的链路层加密数据识别方法,解决了未知网络中的链路层加密数据及未加密数据样本获得问题.在基于随机性检测的链路层加密数据识别基础上,结合小波分解的多尺度特性,提出了基于小波分解的链路层加密数据识别方法,解决了方案实施过程中小波选择、特征参数提取、模板匹配及阈值选择等关键问题.研究结果表明:提出的方法具有更好的适用性及更高的识别率.对某无线网络链路层加密与未加密数据的识别率均达到95%以上. From the random statistical properties of the encrypted data and plaintext in data link layer , an encrypted data identification method was proposed based on randomness test to solve the problem of obtaining the samples of encrypted data and plaintext in unknown network .Based on the random test and combined with the multi‐scale characteristic of wavelet decomposition ,another identification method was provided based on wavelet decomposition .The key issues such as wavelet selection ,char‐acteristic parameter extraction ,template matching and threshold selection were all solved in the meth‐od .The research results demonstrate that the proposed method is more applicable and has higher iden‐tification rate .T he identification rates of the proposed method are above 95% both to the encrypted data and plaintext in a wireless network .
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2015年第8期52-57,共6页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(61173191) 军内科研基金资助项目(YJJXM12033)
关键词 链路层 加密数据 随机性检测 小波分解 识别方法 data link layer encrypted data randomness test wavelet decomposition identification mehtod
  • 相关文献

参考文献8

二级参考文献53

  • 1薄彦娜,陈豪.浅谈信息战中通信卫星系统安全性[J].空间电子技术,2006,3(B11):1-4. 被引量:2
  • 2石昌贤,徐大雄,杜军.VSAT网络协议AA/TDMA的时延特性[J].北京邮电大学学报,1997,20(2):61-67. 被引量:1
  • 3桑志勇.二元序列的随机性测试技术的研究与应用[D].郑州:解放军信息工程大学,2004.
  • 4FIPS PUB 140-2-2001 Security Requirements for Cryptographic Modules[S].Washington,USA:National Institure of Standards and Technology,2001.
  • 5NIST SP 800-22.2001 A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[S].Washington.USA:National Institute of Standards and Technology,2001.
  • 6王玉柱.随机性测试工具研究与实现[D].北京:中国科学院研究生院,2000.
  • 7KRASNER. Using elliptic curve cryptography (ECC) for enhanced embedded security: financial advantages of ECC over RSA or Diffie-Hellmann(DH)[A]. Embedded Market Forecasters, American Technology[C]. 2004.1-27.
  • 8MORRIS A J, KAY S. Telephony earth station[A]. Global Telecommunications Conference 1989 and Exhibition. Communications Technology for the 1990s and Beyond, GLOBECOM '89[C]. IEEE 1989.1719- 1722.
  • 9PARK J H, LIM S B. Key distribution for secure vsat satellite communications[J]. IEEE Transactions on Broadcasting, 1998,44(3).
  • 10YI X, SIEW C K. Security of Park-Lim key agreement schemes for VSAT satellite communications[J]. IEEE Transactions on Vehicular Technology, 2003, 52(2):465-468.

共引文献87

同被引文献17

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部