期刊文献+

分组密码算法圈函数设计及可证安全性 被引量:1

Block Cipher’s Round Function Design and Its Provable Security
原文传递
导出
摘要 分组密码迭代圈数与算法的安全性及运算速度直接相关。传统的一些分组密码设计采用的是基于经验的提高圈函数迭代上界的方案,可证安全性是设计完成之后的一系列说明。文中从设计角度出发,提出最少迭代圈数需要结合算法与随机预言优势的偏差确定。笔者对分组密码算法圈数进行量化研究,说明理想随机预言机与圈函数、圈数之间的相互制约关系。 The round number is directly related to both the security and speed of block cipher algorithm. The traditional design methods of block cipher, based on the experience, adopt increasing the most economic round number. And the provable security of the algorithm was demonstrated afterwards. This paper advocates that the economic boundary should be operated before the algorithm design. The proposed approach is that both the round function and randomness oracle should be considered in the calculation of the round number.
出处 《通信技术》 2007年第6期44-45,51,共3页 Communications Technology
基金 国家自然科学基金资助项目(60673075) 863基金项目(2006AA01Z428)资助
关键词 分组密码算法圈函数 圈数 可证安全 block cipher’s round function round number provable secure
  • 相关文献

参考文献4

  • 1冯登国,刘振华.关于正形置换的构造[J].信息安全与通信保密,1996,18(2):61-64. 被引量:26
  • 2[2]Liu Zhenhua,Ye Dingfeng,Shu Chang.A Method For Constructing Crthomorphic Permutations of Degre 2[A].见:密码学进展--CHINACRYPT'96[C],北京:科学出版社,1996:56~59. 被引量:1
  • 3[3]Mittenthal L.Block Substitutions Using Orthomorphic Mappings[J].Advances in Applied Mathematics,1995:59~71. 被引量:1
  • 4[4]Matsui M.Linear cryptanalysis method for DES cipher[C].Advances in cryptology-Eurocrypt'93,LNCS 765,BerLin:Springer-Verlag,1994:17~26. 被引量:1

共引文献25

同被引文献9

  • 1Boneh D, DeMillo RA, Lipton RJ. On the Importance of Checking Cryptographic Protocols for Faults[C]//Walter Fumy. Lecture Notes in Computer Science. Berlin:Springer verlag, 1997:37-51. 被引量:1
  • 2BihamE, Shamir A. Differential Fault Analysis of Secret Key Cryptosystems[C]//Burton S, Kaliski Jr. Lecture Notes in Computer Science, Berlin: Springer Verlag, 1997: 513-525. 被引量:1
  • 3Blomer J, Seifert J. Fault Based Cryptanalysis of the Advanced Encryption Standard[C]//Rebecca N. Wright. Lecture Notes in Computer Science. Berlin: Springer-verlag, 2003:162-181. 被引量:1
  • 4Skorobogatov S, Anderson R. Optical Fault Induction Attack[C]// Burton S, Kaliski Jr. Lecture Notes in Computer Science. Berlin: Springer verlag, 2003:2-12. 被引量:1
  • 5Biham E, Dunkelman O, Keller N. New Cryptanalytic Results on IDEA [C]//Xuejia Lai, Kefei chen. Lecture Notes in Computer Science. Berlin: Springer-verlag, 2006:412-427. 被引量:1
  • 6Piret G, Ouisquater J. A Differential Fault Attack Technique against SPN Structures, with Applications to the AES and KHAZAD [C]//Colin D Waiter, Cetin K. Koc, Christof Paar(Eds.). Lecture Notes in Computer Science. Berlin:Springer-verlag, 2003:77-88. 被引量:1
  • 7Schneier B. Applied Cryptography Second Edition:protocols, algorithm, and source code in C [M]. New York: John Wiley & Sons Inc, 1996: 282-283. 被引量:1
  • 8Meier W. On the Security of the IDEA Block Cipher [C]//Tor Helleseth. Lecture Notes in Computer Science. Berlin: Springer-verlag, 1994: 371-385. 被引量:1
  • 9郝耀辉,李安娜,郭渊博,刘伟.容忍入侵的密码协议自适应调整策略研究[J].通信技术,2008,41(4):42-43. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部