Journal of South China University of Technology(Natural Science) >
Fast Modulus Algorithm for Internet of Things Key Exchange Based on Mersenne-like Numbers
Received date: 2022-06-06
Online published: 2023-01-16
Supported by
the Key-Area R&D Program of Guangdong Province(2020B0101120002)
In order to adapt to the limited computing performance and energy of numerous lightweight sensor nodes in the encrypted transmission of IoT (Internet of Things), this paper proposed a fast modulus algorithm (CZ-Mod algorithm) based on Mersenne-like numbers to slove the bottleneck problems of computing speed, power consumption and so on during the sensors run PKI (Public Key Infrastructure) encryption algorithms such as RSA (Rivest-Shamir-Adleman), DHM (Diffie-Hellman-Merkle), Elgamal, etc., and to simplify the corresponding hardware encrypting circuit logic design. CZ-Mod algorithm uses the mathematic characteristics of Mersenne numbers, and lowers the time complexity of its essential operation mod (modulo) into O(n). Firstly, a fast modulus algorithm mod1 using Mersenne-like numbers as modulus was presented, changing complex mod operation into simple binary shift/add operation; secondly, a fast modulus algorithm mod2 using any positive integers near Mersenne-like numbers as modulus was presented, expanding the modulus value range while simplifying mod operation; and then logic circuits of mod1 and mod2 operations were designed, simplifying mod operation hardware circuit. Finally, the above work was applied to the key exchange of IoT nodes, so as to lower the computing complexity and improve the speed of PKI encryption algorithms. The experiment test results indicate that the speed of DHM key exchange with CZ-Mod algorithm can reach 2.5 to 4 times of that of the conventional algorithm; CZ-Mod algorithm is concise and fits the hardware circuit design for the IoT sensors.
QIN Jiancheng, ZHONG Yu, CHENG Zhe, et al . Fast Modulus Algorithm for Internet of Things Key Exchange Based on Mersenne-like Numbers[J]. Journal of South China University of Technology(Natural Science), 2023 , 51(5) : 24 -35 . DOI: 10.12141/j.issn.1000-565X.220355
| 1 | HADDADPAJOUH H, DEHGHANTANHA A, PARIZI R M,et al .A survey on internet of things security:requirements,challenges,and solutions [J].Internet of Things,2021,14:100129/1-19. |
| 2 | DIFFIE W, HELLMAN M .New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654. |
| 3 | GAMAL T E .A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transactions on Information Theory,1985,31:469-472. |
| 4 | RIVEST R L, SHAMIR A, ADLEMAN L .A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126. |
| 5 | HU Q L, DUAN M X, YANG Z B,et al .Efficient parallel secure outsourcing of modular exponentiation to cloud for IoT applications[J].IEEE Internet of Things Journal,2020,8(16):12782-12791. |
| 6 | AL-NAJI F H, ZAGROUBA R .A survey on continuous authentication methods in internet-of-things environment[J].Computer Communications,2020,163:109-133. |
| 7 | 张帆 .基于区块链与属性基加密的物联网访问控制研究[D].南京:南京邮电大学,2020. |
| 8 | WU Y, SONG L, LIU L .The new method of sensor data privacy protection for IoT[J].Shock and Vibration,2021:3920579/1-11.DOI:10.1155/2021/3920579 . |
| 9 | 杨宏志,袁凌云,王舒 .基于SM2国密算法优化的区块链设计[J].计算机工程与设计,2021,42(3):622-627. |
| YANG Hong-zhi, YUAN Ling-yun, WANG Shu .Optimized blockchain design based on SM2 algorithm [J].Computer Engineering and Design,2021,42(3):622-627. | |
| 10 | 吴皓威,黄风娇,闫莲,等 .面向可疑中继通信网络的合法窃听方案[J].华南理工大学学报(自然科学版),2022,50(10):70-79. |
| WU Haowei, HUANG Fengjiao, YAN Lian,et al .Legitimate eavesdropping scheme for suspicious relay communication networks[J].Journal of South China University of Technology(Natural Science Edition),2022,50(10):70-79. | |
| 11 | QIN J C, BAI Z Y .Design of new format for mass data compression[J].Journal of China Universes of Posts and Telecommunications,2011,18(1):121-128. |
| 12 | QIN J C, LU Y Q, ZHONG Y .Fast algorithm of truncated Burrows-Wheeler transform coding for data compression of sensors[J].Journal of Sensors,2018:6908760/1-17.DOI:10.1155/2018/6908760 . |
| 13 | QIN J C, LU Y Q, ZHONG Y .Block-split array coding algorithm for long-stream data compression[J].Journal of Sensors,2020:5726527/1-21.DOI:10.1155/2020/5726527 . |
| 14 | QIN J C, LU Y Q, ZHONG Y .Parallel algorithm for wireless data compression and encryption[J].Journal of Sensors,2017:4209397/1-11.DOI:10.1155/2017/4209397 . |
| 15 | 覃健诚,陆以勤 .利用数据压缩编码的混沌同步加密解密方法及其装置:201210386406.9[P].2012-10-13. |
| 16 | LU Y Q, SU W Y, QIN J C .LDPC decoding on GPU for mobile device[J].Mobile Information Systems,2016:7048482/1-6.DOI:10.1155/2016/7048482 . |
| 17 | LU Y Q, WU D W, QIN J C .Wireless authentication center based on embedded Wi-Fi technology[J].WIT Transaction on Information and Communication Technologies,2014,59:387-394. |
| 18 | LU Y Q, ZHAI J, ZHU R H,et al .Study of wireless authentication center with mixed encryption in WSN[J].Journal of Sensors,2016:9297562/1-7.DOI:10.1155/2016/9297562 . |
| 19 | GORDON D M .A survey of fast exponentiation mehods[J].Journal of Algorithms,1998,27(1):129-146. |
| 20 | KNUTH D E .计算机程序设计艺术(卷2)[M].北京:人民邮电出版社,2016. |
| 21 | MOSS A, PAGE D, SMART N .Toward acceleration of RSA using 3D graphics hardware[C]∥ Proceedings of the 11th IMA International Conference on Cryptography and Coding.Cirencester:Springer,2007:364-383. |
| 22 | 乔洋 .基于GPU的RSA算法并行研究与设计及OpenCL实现[D].广州:华南理工大学,2013. |
| 23 | 张盛仕 .基于国密算法加密技术的SoC设计与优化[D].广州:广东工业大学,2019. |
| 24 | 覃健诚,钟宇,陆以勤,等 .基于梅森数的密钥交换或公钥密码加密优化方法及系统:202111668723.5 [P].2022-04-29. |
/
| 〈 |
|
〉 |