计算机应用 ›› 2017, Vol. 37 ›› Issue (12): 3406-3411.DOI: 10.11772/j.issn.1001-9081.2017.12.3406

• 网络空间安全 • 上一篇    下一篇

蜜罐加密技术在私密数据保护中的应用

银伟, 周红建, 邢国强   

  1. 95899部队, 北京 100085
  • 收稿日期:2017-05-16 修回日期:2017-07-31 出版日期:2017-12-10 发布日期:2017-12-18
  • 通讯作者: 银伟
  • 作者简介:银伟(1982-),男,湖南邵阳人,工程师,博士,主要研究方向:网络安全、无线网络;周红建(1972-),男,湖北鄂州人,高级工程师,博士,主要研究方向:网络安全、大数据;邢国强(1981-),男,山西太原人,工程师,硕士,主要研究方向:网络安全。
  • 基金资助:
    国家自然科学基金资助项目(61702542);中国博士后基金资助项目(2016M603017)。

Application of honey encryption mechanism in protection of private data

YIN Wei, ZHOU Hongjian, XING Guoqiang   

  1. 95899 Unit, Beijing 100085, China
  • Received:2017-05-16 Revised:2017-07-31 Online:2017-12-10 Published:2017-12-18
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (61702542), the China Postdoctoral Science Foundation (2016M603017).

摘要: 针对传统加密技术脆弱性问题,将蜜罐加密技术应用到身份证号码、手机号码和银行卡密码的保护中以保证数据存储安全。首先,分析阐述了蜜罐加密技术原理,并设计了对蜜罐加密系统分布式转换加密器;然后,抽象了消息空间,对系统进行实现和性能评估,发现性能开销问题并提出增强型机制。在蜜罐加密设计与实现中,考虑到均衡分布和随机分布的消息空间,并将其运用到对称加密算法和公钥加密机制。通过所提设计、系统实现和实验结果得出以下结论:1)由于性能问题,蜜罐加密技术更适合小的消息空间;2)设计消息空间时需要考虑周全,不能带来指纹特征,否则不能解决暴力破解脆弱性问题;3)蜜罐加密的保护能力随应用的不同而不同;4)对于不同的应用,蜜罐加密技术的实现需要定制。

关键词: 蜜罐加密, 私密数据, 暴力破解, 消息空间, 分布式转换加密器

Abstract: In order to solve the vulnerability problem of the traditional encryption mechanisms, the honey encryption mechanism was applied to three types of private data including identity card numbers, mobile phone numbers and bank card passwords to protect data storage security. Firstly, the principle of honey encryption was analyzed and discussed, and a distributed-transforming encryptor for honey encryption system was designed. Then, the message space was abstracted, and the system was implemented and its performance was evaluated. The performance overhead problem was found and an enhanced mechanism was proposed. The message spaces with uniformly/non-uniformly distribution were taken into account and also used for symmetric encryption algorithm and public key encryption mechanism in the design and implementation of honey encryption. Through the proposed design, system implementation and experimental results of honey encryption, the following conclusions are drawn:1)due to the performance issue, honey encryption is more suitable for a small message space instead of a large one; 2)the design of message space needs to be considered comprehensively, which can not bring fingerprint characteristics, otherwise it can not solve the vulnerability problem of brute-force attack; 3)the protection ability of honey encryption is different with the application; 4) the implementation of honey encryption has to be customized for different applications.

Key words: honey encryption, private data, brute-force attack, message space, distributed-transforming encryptor

中图分类号: