期刊文献+

基于差分分布表的密码分析方法研究

Research on Cryptanalysis Method Based on Differential Distribution Table
下载PDF
导出
摘要 随着5G、边缘计算、雾计算等前沿技术的快速发展,大量的敏感信息由物联网设备存储、处理和发送,数据传输安全性由此面临巨大的挑战。而实现安全可靠的传输必须有一套优良的分组密码算法作为基础,差分分布表(Differential Distribution Table, DDT)因其在设计、修改和攻击轻量级分组密码等方面的优势,逐渐成为研究的热点。本文首先介绍了差分分布表的理论构建基础。然后,根据应用场景不同分别从Feistel、SPN、ARX三种结构进行细致的划分,讨论了差分分布表在密码算法安全性分析中的重要性。最后,展望差分分布表DDT在未来的研究方向,为后续研究提供参考借鉴。 With the rapid development of cutting-edge technologies such as 5G, edge computing, and fog computing, a large amount of sensitive information is stored, processed, and sent by IoT devices, and data transmission security is therefore facing huge challenges. To achieve safe and reliable transmission, a set of excellent block cipher algorithms must be used as the basis. Differential Distribution Table (DDT) has gradually become a research hotspot due to its advantages in designing, modifying and attacking lightweight block ciphers. This paper analyzes the common attack methods of block ciphers based on differential distribution table DDT. First, the theoretical foundation of the differential distribution table is introduced. Secondly, according to different application scenarios, the three structures of Feistel, SPN, and ARX are carefully divided, and the importance of differential distribution tables in the security analysis of cryptographic algorithms is discussed. Finally, the future research direction of differential distribution table DDT is prospected, which provides reference for follow-up research.
出处 《软件工程与应用》 2023年第1期45-50,共6页 Software Engineering and Applications
  • 相关文献

参考文献1

二级参考文献8

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部