期刊文献+

基于国密算法的Android智能终端SSL协议设计与实现 被引量:3

Design and Implementation of an Android SSL Protocol Based on National Cipher Algorithms
下载PDF
导出
摘要 针对移动互联网时代个人用户敏感信息传输的安全需求,开发实现了一种Android系统上的安全套接字协议.相比于传统的SSL/TLS协议,该协议采用安全性强于通用密码算法的国家商用密码算法即国密算法实现.在握手阶段改用SM2算法进行身份认证和密钥协商,使用SM4算法对数据报文进行加密传输,使用SM3算法进行摘要计算.该协议在开源的PoralSSL框架的数据结构和函数接口基础上进行扩展,经过测试验证实现了ECC-SM4-SM3与ECDHE-SM4-SM3两组加密套件,在满足功能需求的前提下有效提高了系统的安全性. This paper describes the specific design and implementation of an Android SSL Protocol based on the national commercial cipher algorithms,which are designed to meet the security needs of personal sensitive information in the era of mobile internet.It is obvious that the security of national commercial cipher algorithms are stronger than that of general cipher algorithms.Compared with the traditional SSL/TLS protocol,the protocol is implemented by the national commercial cipher algorithm,which enjoys better security than the general cryptographic algorithm,that is,the national security algorithm.The SM4 algorithm is employed to encrypt data packets,and the SM3 algorithm is applied for abstract calculation.The protocol is extended on the data structure and function of PoralSSL framework.The ECC-SM4-SM3 and ECDHE-SM4-SM3 cipher suites implemented are verified by testing,which can effectively improve the security of system under the premise of meeting the functional requirements.
作者 施晓芳 赵少卡 王震懿 SHI Xiaofang;ZHAO Shaoka;WANG Zhenyi(Fuqing Branch of Fujian Normal University,Fuqing,Fujian 350300,China;Newland Payment Technology Company,Fuzhou,Fujian 350015,China)
出处 《福建师大福清分校学报》 2019年第2期45-55,64,共12页 Journal of Fuqing Branch of Fujian Normal University
基金 福建师范大学福清分校科研创新培育项目(KY201702) 福建省中青年教师教育科研项目(JAT160577)
关键词 国密算法 SSL协议 PoralSSL ANDROID national cipher algorithms SSL protocol PoralSSL Android
  • 相关文献

参考文献3

二级参考文献20

  • 1Fahl S,Harbach M,Muders T,et al.Why Eve and Mallory love Android:an analysis of android SSL(in)security[C]//Proceedings of the 2012 ACM conference on Computer and communications security.ACM,2012:50-61.
  • 2Fahl S,Harbach M,Perl H,et al.Rethinking SSL development in an appified world[C]//Proceedings of the 2013 ACM SIGSAC conference on Computer&communications security.ACM,2013:49-60.
  • 3Georgiev M,Iyengar S,Jana S,et al.The most dangerous code in the world:validating SSL certificates in non-browser software[C]//Proceedings of the 2012 ACM conference on Computer and communications security.ACM,2012:38-49.
  • 4http://developer.android.com/training/articles/security-ssl.html.
  • 5Song Y,Yang C,Gu G.Who is Peeping at Your Passwords at Starbucks?–To Catch An Evil Twin Access Point[C]//IEEE/IFIP International Conferenceon Dependable Systems and Networks,2010:323-332.
  • 6Sotirakopoulos,Hawkey K.“I Did it Because ITrusted You”:Challenges With The Study Environment Biasing Participant Behaviours[C]//Proceedings of the 6th Symposium on Usable Privacyand Security,2010.
  • 7Akhawe D,Amann B,Vallentin M,et al.Here’s My Cert,So Trust Me,Maybe?Understanding TLS Errors on the Web[C]//Proceedings of the IW3C2 WWW 2013 Conference,May 13-17,2013.
  • 8Scanning P, de Assun~ao Sampaio R. Intemet Census 2012 [ OL ]. Carna Botnet ,2012.
  • 9X. 509 Intemet Public Key Infrastructure, Online Certificate Status Pro- tocol-OCSP [ OL]. http ://tools. left. org/html/rfc2560.
  • 10钟名富,胡予濮,陈杰.分组加密算法SMS4的14轮Square攻击[J].西安电子科技大学学报,2008,35(1):105-109. 被引量:11

共引文献150

同被引文献20

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部