第58届Intel ISEF中国参赛项目:虎符算法及其在802.11无线网络安全中的应用研究
东北育才学校 王一洲 朱天禹 王高楠
学科:计算机科学
现有加密算法的不安全性和复杂加密运算不仅对网络设备运算能力的要求高,而且对速度的影响也很大,阻碍了802.11无线网络技术发展。对此,我们从中国古代的军事典故中得到启示,设计出了一套全新的加密算法――虎符算法。虎符算法是一种利用虎符的特点,在无线网络中安全巧妙地传输数据的方法。在该算法中,我们没有像现有其他加密算法那样使用复杂的数学运算,而是另辟蹊径,将虎符的特点与简单的数学方法结合起来,利用“动态数据拆分”方式,在客户端计算机进行运算,经过实际测试,达到了在保留现有网络设备前提下不影响网络速度即可安全传输数据的目的,为无线网络的数据加密问题提供了一套新颖的安全且快速的解决方案。该算法不但可以在客户端两端分别安装虎符加密软件进行应用,还可以通过在路由器的嵌入式系统中加入相关组件完成加密工作,实用性强。
Introducing Hufoo Algorithm and Implementing in 802.11 Wireless Network Security
Computer Sciences
Wang Yizhou,17 Zhu Tianyu 19 , Wang Gaonan 18, Northeast Yucai School
Wireless network security is a common concern for the IT professionals. We’ve designed a brand new encryption algorithm-the Hufoo Algorithm, based on the inspiration from ancient Chinese military documents. Hufoo, a tiger-shaped iron-made tally, is a simple and effective instrument used by ancient Chinese emperors to exercise remote control over troops stationed elsewhere. It was cut into two pieces with random blows, one of which was kept by the emperor and the other by the military officers. An officer dispatched by the emperor to any garrison headquarter was required to present the other half of the tally. The troops could not comply with his orders unless both the tally fitted together.
In a bid to transmit data on a safe and convenient basis on a wireless network, taking advantage of the features of Hufoo, the Hufoo Algorithm simulates the authorization process of Hufoo in data transmission sessions. Without complicated arithmetic computation, the Hufoo Algorithm is identified as a Dynamic Data Split, which has a low requirement for the computation capability of ARM-based embedded platform. This algorithm has been applied to the ad-hoc structure; furthermore, infrastructures WLANs with Hufoo-Firmware Access Points were also investigated. Based on the performance and stability test of extension data under WLAN on campus for several months, we’ve concluded that this algorithm is able to reach a speed of 93%-97% in non-encryption environments, which is higher than those of the mainstream WLAN encryption techniques. Additional methods for further improvement in algorithm’s robustness are also discussed.