北京天津河北山西内蒙古辽宁吉林黑龙江上海江苏浙江安徽福建江西山东河南湖北湖南广东广西海南重庆四川贵州云南西藏陕西甘肃青海宁夏新疆香港澳门
站内搜索

关键词:

搜索范围:

工作管理 设为主页 加入收藏 英文网站
首页 > 工作动态 > 工作动态 > 全国公众信息服务门户网站

第58届Intel ISEF中国参赛项目:虎符算法及其在802.11无线网络安全中的应用研究

2007-05-28中国科协青少年科技中心本文被阅读过8018次[推荐][打印][保存][大字体][中字体][小字体]

东北育才学校  王一洲 朱天禹 王高楠

学科:计算机科学

    现有加密算法的不安全性和复杂加密运算不仅对网络设备运算能力的要求高,而且对速度的影响也很大,阻碍了802.11无线网络技术发展。对此,我们从中国古代的军事典故中得到启示,设计出了一套全新的加密算法――虎符算法。虎符算法是一种利用虎符的特点,在无线网络中安全巧妙地传输数据的方法。在该算法中,我们没有像现有其他加密算法那样使用复杂的数学运算,而是另辟蹊径,将虎符的特点与简单的数学方法结合起来,利用“动态数据拆分”方式,在客户端计算机进行运算,经过实际测试,达到了在保留现有网络设备前提下不影响网络速度即可安全传输数据的目的,为无线网络的数据加密问题提供了一套新颖的安全且快速的解决方案。该算法不但可以在客户端两端分别安装虎符加密软件进行应用,还可以通过在路由器的嵌入式系统中加入相关组件完成加密工作,实用性强。

 

Introducing Hufoo Algorithm and Implementing in 802.11 Wireless Network Security

Computer Sciences

Wang Yizhou,17  Zhu Tianyu 19 , Wang Gaonan 18, Northeast Yucai School 

Wireless network security is a common concern for the IT professionals. We’ve designed a brand new encryption algorithm-the Hufoo Algorithm, based on the inspiration from ancient Chinese military documents. Hufoo, a tiger-shaped iron-made tally, is a simple and effective  instrument used by ancient Chinese emperors to exercise remote control over troops stationed elsewhere. It was cut into two pieces with random blows, one of which was kept by the emperor and the other by the military officers. An officer dispatched by the emperor to any garrison headquarter was required to present the other half of the tally. The troops could not comply with his orders unless both the tally fitted together.


In a bid to transmit data on a safe and convenient basis on a wireless network, taking advantage of the features of Hufoo, the Hufoo Algorithm simulates the authorization process of Hufoo in data transmission sessions. Without complicated arithmetic computation, the Hufoo Algorithm is identified as a Dynamic Data Split, which has a low requirement for the computation capability of ARM-based embedded platform. This algorithm has been applied to the ad-hoc structure; furthermore, infrastructures WLANs with Hufoo-Firmware Access Points were also investigated. Based on the performance and stability test of extension data under WLAN on campus for several months, we’ve concluded that this algorithm is able to reach a speed of 93%-97% in non-encryption environments, which is higher than those of the mainstream WLAN encryption techniques. Additional methods for further improvement in algorithm’s robustness are also discussed.

(作者:王一洲 朱天禹 王高楠)
文章主题词:
    评论
    称 呼:
    评论须知
    • ★ 在本网发表言论,请自觉遵守爱国、守法、自律、真实、文明的原则,尊重网上道德,遵守各有关法律法规;
    • ★ 请勿发表可能危害国家安全,破坏民族团结、国家宗教政策和社会稳定,含侮辱、诽谤、教唆、淫秽等内容的言论;
    • ★ 承担一切因您的行为而直接或间接导致的民事或刑事法律责任;
    • ★ 在本网发表的言论,本网有权在网站内保留、转载、引用或者删除;
    • ★ 参与评论,即表明您已经阅读并接受上述条款。
    评 论:
    验证码: