期刊文献+

一种基于分段线性映射的分组密码算法 被引量:2

Block Cryptosystem Based on Piecewise Linear Map
下载PDF
导出
摘要 提出了一种新的基于混沌理论的分组密码算法,把128比特的明文加密为128比特的密文。整个加密过程包含了8个轮变换,每一个轮变换由替换变换、移位变换和置换变换3部分组成。所有的轮密钥都由128位的比特流K和由分段线性映射产生的128比特随机二进制序列导出。理论与实验分析表明该算法克服了一些纯混沌密码系统的固有缺陷,具有较高的性能。 Based on the study of some existing chaotic encryption algorithms, a new block cipher was proposed. The proposed cipher encrypts 128-bit plaintext to 128-bit ciphertext blocks. It consists of eight computationally identical rounds transformation. All roundkeys are derived from K and a 128-bit pseudorandom binary sequence generated from a chaotic map. Analysis shows that the proposed block cipher does not suffer from the flaws of pure chaotic cryptosysterns and possesses high security.
作者 马洁 张元清
出处 《计算机科学》 CSCD 北大核心 2009年第9期103-105,172,共4页 Computer Science
关键词 分组密码 混沌映射 模乘运算 置换 Block cipher, Chaotic map, Modulo multiplication, Permutation
  • 相关文献

参考文献16

  • 1Yang H,et al.A new block cipher based on chaotic map and group theory[J].Chaos,Solitons & Fractals,2005(10):10-16. 被引量:1
  • 2Tang G,Liao X F.A method for designing dynamical S-boxes based on discretized chaotic map[J].Chaos,Solitons & Fratals,2005,23:1901-1909. 被引量:1
  • 3Xun Yi,Chik How Tan,Chee Kheong Siew.A New Block Cipher Based on Chaotic Tent Maps[J].IEEE Trans.Circuits and Systems,2002,49 (12):1826-1829. 被引量:1
  • 4Jakimoski G,Kocarev L.Chaos and cryptography:Block encryption ciphers based on chaotic maps[J].IEEE Trans.Circuits Syst,2001,48(2):163-169. 被引量:1
  • 5Stojanovski T,Kocarev L.Chaos-based random number generators-Part Ⅰ:Analysis[J].IEEE Trans.Circuits Syst,2001,48(3):281-288. 被引量:1
  • 6Stojanovski T,Kocarev L.Chaos-based random number generators-Part Ⅱ:Practical realization[J].IEEE Trans.Circuits Syst,2001,48(3):382-385. 被引量:1
  • 7Wong W K,Lee L P,Wong K W.A modified chaotic cryptographic method[J].Comput Phys Commun,2000,138:234-236. 被引量:1
  • 8Li Shujun,Mou Xuanqin,Cai Yuanlong.Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography[C]//Progress in Cryptology-IndoCrypt 2001.Lecture Notes in Computer Science.2247,Dec.2001:316-329. 被引量:1
  • 9Wheeler D D.Problems with chaotic cryptosystems[J].Cryptologia,1989,13(3):243-250. 被引量:1
  • 10Wheeler D D,Mathews R A J.Supercomputer investigations of a chaotic encryption algorithm[J].Cryptologia,1991,15(2):140-152. 被引量:1

二级参考文献6

  • 1[1]KATZENBEISSER S,PETITCOLAS F A P.Information Hiding Techniques for Steganography and Digital Watermarking[M].Boston:Artech House Inc.,2000. 被引量:1
  • 2[2]BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for Data Hiding[J].IBM System Journal,1995,35(3,4):313-336. 被引量:1
  • 3[3]PETITCOLAS F A P,ANDERSON R J,KUHN M G.Information Hiding-A Survey[J].Proceedings of the IEEE special issue on protection of multimedia content,1999,87(7):1062-1078. 被引量:1
  • 4[4]Steganographic software[EB/OL].[2008-04-11].http://www.jjtc.com/Steganography/toolmatrix.html. 被引量:1
  • 5[5]FRIDRICH J,DU R,GOLJAN M.Detecting LSB Steganography in Color and Grey-Scale Images[J].Magazine of IEEE Multimedia Special Issue on Security,2001,8(4):22-28. 被引量:1
  • 6[6]ANDREAS W,ANDREAS P.Attacks on Steganographic Systems[C]// Proceedings of the Third International Workshop on Information Hiding.London,UK:Springer-Verlag,1999,1768:61-76. 被引量:1

共引文献1

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部