相关文章推荐
讲道义的硬盘  ·  Pandas之数据清洗 - ...·  1 年前    · 
个性的灯泡  ·  【译】20个 Laravel ...·  2 年前    · 
:
twitter line
研究生: 蔡定曄
研究生(外文): Dean-Ye Tsai
論文名稱: 基於SHA-3的高級加密標準(AES)輕量級加密架構應用於物聯網環境
論文名稱(外文): Lightweight Cryptographic Architecture Based on Advanced Encryption Standard (AES) with SHA-3 in Internet of Things Networks
指導教授: 曾學文 曾學文引用關係
指導教授(外文): Hsueh-Wen Tseng
口試委員: 楊婷婷 盧永豐 林詠章
口試日期: 2023-07-24
學位類別: 碩士
校院名稱: 國立中興大學
系所名稱: 資訊工程學系所
學門: 工程學門
學類: 電資工程學類
論文種類: 學術論文
論文出版年: 2023
畢業學年度: 111
語文別: 中文
論文頁數: 85
中文關鍵詞: 資訊安全 物聯網 輕量化加密演算法 AES SHA-3
外文關鍵詞: AES SHA-3 Internet of Things (IoT) Lightweight encryption algorithm Information security
相關次數:
  • 被引用 被引用:0
  • 點閱 點閱:398
  • 評分 評分:
  • 下載 下載:82
  • 收藏至我的研究室書目清單 書目收藏:0
為了電子醫療設備需要收集與人體相關的生理影像數據,並將這些關乎個人高度敏感的數據加密傳輸至遠端監控設備或醫療系統進行處理及分析,處理大量加密數據的情況,以不改變硬體架構的前提下,輕量化加密演算法是目前最適合的方法。
本論文改良現行的Advanced Encryption Standard (AES)架構,加入Secure Hash Algorithm 3 (SHA-3)雜湊函數改變原先回合金鑰的計算方式,用以提升每一輪回合金鑰的複雜度達到更高的安全性,並減少回合數目。除了避免重複計算回合金鑰的問題外,整體架構在增加安全性的同時降低了計算加密檔案所需要的時間,從而提高整體加密的吞吐量。
In order to meet the requirements of electronic medical devices, it is necessary to collect physiological image data related to the human body. This highly sensitive personal data is encrypted and transmitted to remote monitoring devices or medical systems for processing and analysis. In scenarios involving the processing of large amounts of encrypted data, lightweight encryption algorithms are currently the most suitable approach, while maintaining the hardware architecture unchanged.

This improves the existing Advanced Encryption Standard (AES) architecture by incorporating the Secure Hash Algorithm 3 (SHA-3) hash function to modify the computation of the round keys. This enhancement increases the complexity of each round key, leading to higher security while reducing the number of rounds. Apart from avoiding the issue of repeated computation of round keys, the overall architecture enhances security while decreasing the time required to encrypt files, thereby improving the overall encryption throughput.
摘要 i
Abstract ii
目次 iii
表目次 v
圖目次 vi
第一章 緒論 1
1.1 簡介 1
1.2 研究動機 5
1.3 設計理念及貢獻 7
1.4 論文架構 10
第二章 背景知識及相關文獻 11
2.1 前言 11
2.2 高級加密標準(Advanced Encryption Standard, AES) 12
2.2.1 AddRoundKey 13
2.2.2 SubBytes 13
2.2.3 ShiftRows 14
2.2.4 MixColumns 15
2.2.5 金鑰擴展(Key Expansion) 16
2.3 SHA-3 (Secure Hash Algorithm 3) [8] 18
2.4 相關文獻 21
第三章 研究方法 23
3.1 設計構想 23
3.2 輕量化AES架構模型 25
3.3 金鑰拓展(Key Expansion) 27
3.4 Modified SubBytes 31
3.5 Modified ShiftRows 34
第四章 安全性分析與效能比較 37
4.1 概述 37
4.2 時間安全分析 39
4.3 雪崩效應安全分析 41
4.4 記憶體使用分析 59
4.5 執行速度與吞吐量 61
第五章 結論 66
參考文獻 67
附錄 72
1. 雪崩效應增加不同Input Key的測試結果 72
2. LRK-AES降低回合數目測試結果 78
[1]Saloni Bansal, V.K Tomar, “Challenges & Security Threats in IoT with Solution Architectures,” in 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), 2022
[2]Bravo Imaging, “Medical Imaging Modality Options and Their Uses,” https://www.bravoimaging.com/medical-imaging-equipment-miami/medical-imaging-modality-options-and-their-uses/ , July 20 2018.
[3]Muhammad Ali Siddiqi, Georg Hahn, Said Hamdioui, “Improving the Security of the IEEE 802.15.6 Standard for Medical BANs,” in IEEE Access, vol. 10, pp. 62953-62975, 2022
[4]Liu, F.; Hernandez-Cabronero, M.; Sanchez, V.; Marcellin, M.W.; Bilgin, A, “The Current Role of Image Compression Standards in Medical Imaging. Information,” Information 8, no. 4: 131. https://doi.org/10.3390/info8040131, 2017.
[5]M. Bedoui, H. Mestiri, B. Bouallegue, B. Hamdi, and M. Machhout,“An improvement of both security and reliability for AES implementations”, J. King Saud Univ. - Comput. Inf. Sci., Jan. 2022
[6]B. Khalil, A. Ahmed, R. D. Mahdi, T. I. Mohamed, and R. A. Jaleel,“A novel secure artificial bee colony with advanced encryption standard technique for biomedical signal processing”, Period. Eng. Nat. Sci., vol. 10, no. 1, pp. 288–294, 2022
[7]C. Tezcan, “Optimization of Advanced Encryption Standard on Graphics Processing Units”, IEEE Access, vol. 9, pp. 67315–67326, 2021.
[8]Morris Dworkin, “SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions”, Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8900, http://dx.doi.org/10.6028/NIST.FIPS.202, 2015.
[9]J. Damen, V. Rijmen, “The Block Cipher Rijndael”, available from NIST’s AES homepage, URL: http//www.nist.gov/aes
[10]Vishal A. Thakor, Mohammad Abdur Razzaque, “Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities”, IEEE Access, vol. 9, pp. 28177 – 28193, 2021.
[11]S. Sallam, B. D. Beheshti, “A survey on lightweight cryptographic algorithms”, IEEE Region Conf., pp. 1784-1789, Oct. 2018
[12]W. Easttom, “Substitution-Permutation Networks”, Modern Cryptography, pp. 165-186, 2021.
[13]H. K. Hoomod and A. M. Radi, “New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm”, Journal of Physics: Conference Series, Volume 1003, Issue 1, article id. 012025, 2018.
[14]M. S. Fadhil, A. K. Farhan, M. N. Fadhil and N. M. G. Al-Saidi, “A New Lightweight AES Using a Combination of Chaotic Systems”, Proceedings of 2020 1st Information Technology to Enhance E-Learning and other Application Conference IT-ELA 2020, pp. 82-88, 2020.
[15]F. Hazzaa, A. M. Shabut, N. H. M. Ali and M. Cirstea, “Security Scheme Enhancement for Voice over Wireless Networks”, Journal of Information Security and Applications, vol. 58, pp. 102798 - 102804, 2021.
[16]Chittibabu, Priya, “A Comparative Analysis of DES, AES and RSA Crypt Algorithms For Network Security in Cloud Computing”, JETIR Research Journal 574-582, 2019.
[17]A. O. Mulani and P. B. Mane, “High-Speed Area-Efficient Implementation of AES Algorithm on Reconfigurable Platform”, Computer and Network Security. IntechOpen, Jun. 10, 2020.
[18]Hojin Chio, Seog Chung Seo, “Fast Implementation of SHA-3 in GPU Environment”, IEEE Access, pp. 144574 – 144586, Oct 2021.
[19]Batel Oved, Orian Leitersdorf, “HashPIM: High-Throughput SHA-3via Memristive Digital Processing-in-Memory”, 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2022.
[20]R. S. Salman, A. K. Farhan and A. Shakir, "Lightweight Modifications in the Advanced Encryption Standard (AES) for IoT Applications: A Comparative Survey," 2022 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, pp. 325-330, March 2022.
[21]H. B. Acla and B. D. Gerardo, "Security Analysis of Lightweight Encryption based on Advanced Encryption Standard for Wireless Sensor Networks," 2019 IEEE 6th International Conference on Engineering Technologies and Applied Sciences (ICETAS), Kuala Lumpur, Malaysia, pp. 1-6, 2019.
[22]Y. Sverdlik, "The world's 10 fastest supercomputer - in pictures", Data Center Knowledge, 2019.
[23]W. Stallings, Cryptography and Network Security - Principles and Practice, Upper Saddle River, New Jersey:Pearson Education Limited, pp. 130-155, 2014
[24]Abikoye, O.C., Haruna, A.D., Abubakar, A., Akande, N.O., Asani, E.O., “Modified Advanced Encryption Standard Algorithm for Information Security,” Symmetry 11, no. 12: 1484, https://doi.org/10.3390/sym11121484, 2019
[25]Soukaena Hassan and M. Abd Zaid, “Modification Advanced Encryption Standard for Design Lightweight Algorithms”, Jour. Kufa Math. Comp., vol. 6, pp. 21-27, May 2019.
[26]Y. Zhou, G. -M. Tang, J. -H. Yang, P. -S. Yu and C. Peng, "Logic Design and Simulation of a 128-b AES Encryption Accelerator Based on Rapid Single-Flux-Quantum Circuits," in IEEE Transactions on Applied Superconductivity, vol. 31, no. 6, pp. 1-11, Sept. 2021.
[27]I. F. Alshaikhli, M. A. Alahmad and K. Munthir, "Comparison and Analysis Study of SHA-3 Finalists," 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, pp. 366-371, doi: 10.1109/ACSAT.2012.64, 2012.
[28]DICOM Standards Committee. Digital Imaging and Communications in Medicine (DICOM) PS3.1 2023c - Introduction and Overview (NEMA Standards Publication No. PS3.8-2023), National Electrical Manufacturers Association, https://dicom.nema.org/medical/dicom/current/output/html/part01.html#figure_5-1, 2023.
[29]Kannammal, A., Subha Rani, S., “DICOM Image Authentication and Encryption Based on RSA and AES Algorithms,” In: Ponnambalam, S.G., Parkkinen, J., Ramanathan, K.C. (eds) Trends in Intelligent Robotics, Automation, and Manufacturing. IRAM Communications in Computer and Information Science, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35197-6_39, 2012.
[30]M. Dzwonkowski, M. Papaj and R. Rykaczewski, “A New Quaternion-Based Encryption Method for DICOM Images,” in IEEE Transactions on Image Processing, vol. 24, no. 11, pp. 4614-4622, doi: 10.1109/TIP.2015.2467317, Nov. 2015.
連結至畢業學校之論文網頁 點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!