第58屆Intel ISEF中國(guó)參賽項(xiàng)目:虎符算法及其在802.11無(wú)線(xiàn)網(wǎng)絡(luò)安全中的應(yīng)用研究
東北育才學(xué)校 王一洲 朱天禹 王高楠
學(xué)科:計(jì)算機(jī)科學(xué)
現(xiàn)有加密算法的不安全性和復(fù)雜加密運(yùn)算不僅對(duì)網(wǎng)絡(luò)設(shè)備運(yùn)算能力的要求高,而且對(duì)速度的影響也很大,阻礙了802.11無(wú)線(xiàn)網(wǎng)絡(luò)技術(shù)發(fā)展。對(duì)此,我們從中國(guó)古代的軍事典故中得到啟示,設(shè)計(jì)出了一套全新的加密算法――虎符算法。虎符算法是一種利用虎符的特點(diǎn),在無(wú)線(xiàn)網(wǎng)絡(luò)中安全巧妙地傳輸數(shù)據(jù)的方法。在該算法中,我們沒(méi)有像現(xiàn)有其他加密算法那樣使用復(fù)雜的數(shù)學(xué)運(yùn)算,而是另辟蹊徑,將虎符的特點(diǎn)與簡(jiǎn)單的數(shù)學(xué)方法結(jié)合起來(lái),利用“動(dòng)態(tài)數(shù)據(jù)拆分”方式,在客戶(hù)端計(jì)算機(jī)進(jìn)行運(yùn)算,經(jīng)過(guò)實(shí)際測(cè)試,達(dá)到了在保留現(xiàn)有網(wǎng)絡(luò)設(shè)備前提下不影響網(wǎng)絡(luò)速度即可安全傳輸數(shù)據(jù)的目的,為無(wú)線(xiàn)網(wǎng)絡(luò)的數(shù)據(jù)加密問(wèn)題提供了一套新穎的安全且快速的解決方案。該算法不但可以在客戶(hù)端兩端分別安裝虎符加密軟件進(jìn)行應(yīng)用,還可以通過(guò)在路由器的嵌入式系統(tǒng)中加入相關(guān)組件完成加密工作,實(shí)用性強(qiáng)。

Introducing Hufoo Algorithm and Implementing in 802.11 Wireless Network Security
Computer Sciences
Wang Yizhou,17 Zhu Tianyu 19 , Wang Gaonan 18, Northeast Yucai School
Wireless network security is a common concern for the IT professionals. We’ve designed a brand new encryption algorithm-the Hufoo Algorithm, based on the inspiration from ancient Chinese military documents. Hufoo, a tiger-shaped iron-made tally, is a simple and effective instrument used by ancient Chinese emperors to exercise remote control over troops stationed elsewhere. It was cut into two pieces with random blows, one of which was kept by the emperor and the other by the military officers. An officer dispatched by the emperor to any garrison headquarter was required to present the other half of the tally. The troops could not comply with his orders unless both the tally fitted together.
In a bid to transmit data on a safe and convenient basis on a wireless network, taking advantage of the features of Hufoo, the Hufoo Algorithm simulates the authorization process of Hufoo in data transmission sessions. Without complicated arithmetic computation, the Hufoo Algorithm is identified as a Dynamic Data Split, which has a low requirement for the computation capability of ARM-based embedded platform. This algorithm has been applied to the ad-hoc structure; furthermore, infrastructures WLANs with Hufoo-Firmware Access Points were also investigated. Based on the performance and stability test of extension data under WLAN on campus for several months, we’ve concluded that this algorithm is able to reach a speed of 93%-97% in non-encryption environments, which is higher than those of the mainstream WLAN encryption techniques. Additional methods for further improvement in algorithm’s robustness are also discussed.