Font Size: a A A

Research And Application Of Threshold-based Mobile Security Key Distribution Mechanism

Posted on:2020-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y TangFull Text:PDF
GTID:2370330572480158Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the continuous development of mobile chip technology and intelligent operating systems,mobile internet terminals are widely used in communication,office,payment and other fields,and the scope of information exchange and resource sharing has also expanded.In order to ensure the security and privacy of mobile internet data,application developers usually use various data encryption schemes to protect secrets effectively.However,no matter which data encryption scheme is adopted,the security protection of its secret keys is a great challenge.The key protection scheme is mainly based on the encryption schemes or the hardware device.The scheme for protecting the key based on the hardware device has the characteristics of high confidentiality,but has the disadvantages of language barrier,complicated use and low development efficiency.The general key management scheme has many security risks by encrypting the complete key in a cryptographic scheme and then storing it in an insecure mobile terminal device.Based on threshold cryptography scheme and the national secret algorithm issued by the National Cryptographic Authority,this paper proposes a verifiable threshold cipher scheme based on SM2.This scheme puts distributing the key to multiple members,the mobile terminal only holds one share of the key.In case the key share of the mobile terminal is leaked,the security of the entire system can be guaranteed.The theoretical analysis proves that this scheme has anti-fragmentation attack and anti-collusion attack ability,and can protect against attacks under the mobile terminal open network.At the same time,according to the structure of the threshold cipher scheme and the security features of mobile terminals,a mobile key Distribution system based on verifiable SM2 threshold scheme is designed and implemented.The system includes communication services,cryptographic service participants,and mobile terminal applications.The three complete the cryptographic tasks that can verify the various stages of the SM2 threshold scheme through collaboration.Finally,test and analyze the functions,basic security,and performance of the key Distribution system.The results show that the system can prevent the security problem caused by the loss of the key information of the mobile terminal,and the execution time of the additional verification step is within the acceptable range,which can satisfy the performance requirements.
Keywords/Search Tags:Mobile terminal, Key protection, NDK, SM2/3/4 algorithm, VSS
PDF Full Text Request
Related items