Font Size: a A A

Research And Implementation On AES-128Encryption Scheme Based On Timestamp

Posted on:2015-01-31Degree:MasterType:Thesis
Country:ChinaCandidate:S K WangFull Text:PDF
GTID:2298330422984630Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The construction of Monet is the core of the smart city construction. With the graduallyadvance in the construction of Monet, EPON technology as a representative of PON networks,has laid low cost, flexible business functions, easy to upgrade, etc., and therefore isconsidered to be ideal fiber access networks in Monet construction. EPON is widely usedowing to its advantage, but at the same time, because of its own structural characteristics,leading to serious security problems. As people gradually increasing dependence on thenetwork, the security will become a bottleneck in future applications of EPON.In order to make EPON has broad application space in the future, many domestic andforeign researchers and scholarsgive a lot of solutions for EPON. However, these solutionsare vague on EPON network to encrypt all data, resulting in a high level of security ofconfidential information section is not well protected. Based on the principle of EPON systemarchitecture and detailed analysis of the transmission, which could be summed up securitythreats, and for the safety of other senior EPON network of confidentialinformation proposedsolutions.This article is based on the AES-128algorithm, the main idea is to introduce atimestamp ranging in EPON system and use itin the key expansion phase of AES-128algorithm, making the round key can change over time dynamically update, and then realizethe dynamic changes of the ciphertext. Key and ciphertext dynamic changes in large part toensure the safety of the high-level confidential information. Meanwhile, the security of thefirst round key is based on the initial key AES-128algorithm used by the key expansion stage,so in this scenario for the initial key safety also designed a free matching key agreement willnegotiate a session key as the initial key.At the end of this article, through the software simulation to this scheme and comparesthe traditional scheme, and making use of the Java language for programming, and the resultsproved that the encryption scheme based on the time of the label is feasible.
Keywords/Search Tags:Ethernet passive optical network, ranging, key agreement, encryption algorithmbased on timestamp, AES-128algorithm
PDF Full Text Request
Related items