期刊文献+
共找到32篇文章
< 1 2 >
每页显示 20 50 100
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms 被引量:28
1
作者 ZHANG WenTao BAO ZhenZhen +3 位作者 LIN DongDai Vincent RIJMEN YANG Bo Han Ingrid VERBAUWHEDE 《Science China Chemistry》 SCIE EI CAS CSCD 2015年第12期85-99,共15页
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-netw... In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-network. The substitution layer consists of 16 4 × 4 S-boxes in parallel. The permutation layer is composed of 3 rotations. As shown in this paper, RECTANGLE offers great performance in both hardware and software environment, which provides enough flexibility for different application scenario. The following are3 main advantages of RECTANGLE. First, RECTANGLE is extremely hardware-friendly. For the 80-bit key version, a one-cycle-per-round parallel implementation only needs 1600 gates for a throughput of 246 Kbits/s at100 k Hz clock and an energy efficiency of 3.0 p J/bit. Second, RECTANGLE achieves a very competitive software speed among the existing lightweight block ciphers due to its bit-slice style. Using 128-bit SSE instructions,a bit-slice implementation of RECTANGLE reaches an average encryption speed of about 3.9 cycles/byte for messages around 3000 bytes. Last but not least, we propose new design criteria for the RECTANGLE S-box.Due to our careful selection of the S-box and the asymmetric design of the permutation layer, RECTANGLE achieves a very good security-performance tradeoff. Our extensive and deep security analysis shows that the highest number of rounds that we can attack, is 18(out of 25). 展开更多
关键词 lightweight cryptography block cipher design bit-slice hardware efficiency software efficiency
原文传递
基于轻量级加密技术建立物联网感知层信息安全的解决方案 被引量:9
2
作者 胡祥义 徐冠宁 杜丽萍 《网络安全技术与应用》 2013年第3期9-12,共4页
本文提出了采用轻量级(密码编制简单、安全性高、运算速度快的单钥密码算法,如:RC4、RC5、SMS4算法等)加密技术,并采用一种安全单钥管理技术来解决轻量级密码的密钥更新管理的难题,在传感器或RFID读卡器设备端的智能芯片里和物联网认证... 本文提出了采用轻量级(密码编制简单、安全性高、运算速度快的单钥密码算法,如:RC4、RC5、SMS4算法等)加密技术,并采用一种安全单钥管理技术来解决轻量级密码的密钥更新管理的难题,在传感器或RFID读卡器设备端的智能芯片里和物联网认证中心端加密卡芯片里,建立传感设备认证、签名和加密协议、签名验证和解密协议,保证物联网感知层的设备可信,保证传感信息可信、完整和安全保密,从而,建立物联网感知层的信息安全系统。 展开更多
关键词 信息安全系统 加密技术 物联网 轻量级 感知 密码算法 SMS4算法 传感设备
原文传递
Eight-sided fortress: a lightweight block cipher 被引量:6
3
作者 LIU Xuan ZHANG Wen-ying +1 位作者 LIU Xiang-zhong LIU Feng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第1期104-108,128,共6页
In this paper, we present a new lightweight block cipher named eight-sided fortress(ESF), which is suitable for resource-constrained environments such as sensor networks and low-cost radio rrequency identification(... In this paper, we present a new lightweight block cipher named eight-sided fortress(ESF), which is suitable for resource-constrained environments such as sensor networks and low-cost radio rrequency identification(RFID) tags. Meanwhile, we present the specification, design rationale and evaluation results in terms of the hardware implementation. For realizing both efficiency and security in embedded systems, similar to the other lightweight block ciphers, ESF is 64 bits block length and key size is 80 bits. It is inspired from existing block cipher, PRESENT and LBlock. The encryption algorithm of ESF is based on variant Feistel structure with SPN round function, used Feistel network as an overall structure with the purpose of minimizing computational resources. 展开更多
关键词 block cipher lightweight RFID tags EFFICIENCY cryptography design
原文传递
面向嵌入式系统的加密算法性能检测方法 被引量:6
4
作者 柯亚文 蔡挺 +1 位作者 夏晓峰 向宏 《重庆大学学报》 EI CAS CSCD 北大核心 2020年第11期1-10,共10页
嵌入式系统信息安全是保障工业控制系统安全的必然要求,然而有限成本的硬件资源可能无法有效支撑加密算法应用所带来的额外计算开销。为研究面向嵌入式系统中加密算法移植的可行性和对系统性能的影响,提出了一个嵌入式系统加密算法性能... 嵌入式系统信息安全是保障工业控制系统安全的必然要求,然而有限成本的硬件资源可能无法有效支撑加密算法应用所带来的额外计算开销。为研究面向嵌入式系统中加密算法移植的可行性和对系统性能的影响,提出了一个嵌入式系统加密算法性能度量方法,通过构建等效度量实现系统侧和密码侧两部分抽象层次的联系。实验利用该方法,以运行时间延迟、吞吐量和系统资源使用率为度量指标,完成对包括国产加密算法与轻量级算法等在内的多种不同配置加密算法的性能测评。实验结果表明加密算法密钥长度的增长会增加算法执行的延时,算法分组大小的增大会提高算法的运行速度,使用不同加密模式造成的性能影响随加密算法不同而表现出差异性。直接部署加密算法检测任务执行时系统的指标值可以简化测量,相比其他抽象模型在工业场景中的应用更有实际意义。 展开更多
关键词 嵌入式系统 加密算法 性能检测 轻量级密码 Xilinx ZYNQ
下载PDF
Magpie:一种高安全的轻量级分组密码算法 被引量:6
5
作者 李浪 李肯立 +2 位作者 贺位位 邹祎 刘波涛 《电子学报》 EI CAS CSCD 北大核心 2017年第10期2521-2527,共7页
论文提出了一种新的高安全轻量级密码算法,命名为Magpie.Magpie是基于SPN结构,分组长度为64位,密钥长度为96位,包含32轮运算.Magpie密码算法包括两个部分:运算部分和控制部分.运算部分,每轮运算包括五个基本运算模块:常数加,S盒变换,行... 论文提出了一种新的高安全轻量级密码算法,命名为Magpie.Magpie是基于SPN结构,分组长度为64位,密钥长度为96位,包含32轮运算.Magpie密码算法包括两个部分:运算部分和控制部分.运算部分,每轮运算包括五个基本运算模块:常数加,S盒变换,行移位,列混合,轮密钥加.控制部分,将密钥的第65位到96位作为Magpie加密算法的控制信号,其中密钥第65位到第80位作为S盒变换控制信号,第81位到第96位值作为列混合,行移位变换和每轮运算的控制信号.在Xilinx Virtex-5 FPGA上实现面积仅为10679 Slices,加密速率为6.4869Gb/s. 展开更多
关键词 轻量级密码 分组密码 FPGA实现
下载PDF
TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection
6
作者 Isha Sood Varsha Sharm 《Computers, Materials & Continua》 SCIE EI 2024年第11期2791-2818,共28页
Ransomware has emerged as a critical cybersecurity threat,characterized by its ability to encrypt user data or lock devices,demanding ransom for their release.Traditional ransomware detection methods face limitations ... Ransomware has emerged as a critical cybersecurity threat,characterized by its ability to encrypt user data or lock devices,demanding ransom for their release.Traditional ransomware detection methods face limitations due to their assumption of similar data distributions between training and testing phases,rendering them less effective against evolving ransomware families.This paper introduces TLERAD(Transfer Learning for Enhanced Ransomware Attack Detection),a novel approach that leverages unsupervised transfer learning and co-clustering techniques to bridge the gap between source and target domains,enabling robust detection of both known and unknown ransomware variants.The proposed method achieves high detection accuracy,with an AUC of 0.98 for known ransomware and 0.93 for unknown ransomware,significantly outperforming baseline methods.Comprehensive experiments demonstrate TLERAD’s effectiveness in real-world scenarios,highlighting its adapt-ability to the rapidly evolving ransomware landscape.The paper also discusses future directions for enhancing TLERAD,including real-time adaptation,integration with lightweight and post-quantum cryptography,and the incorporation of explainable AI techniques. 展开更多
关键词 Ransomware detection transfer learning unsupervised learning CO-CLUSTERING CYBERSECURITY machine learning lightweight cryptography post-quantum cryptography explainable AI TLERAD
下载PDF
An efficient permutation approach for SbPN-based symmetric block ciphers
7
作者 Mir Nazish M.Tariq Banday +1 位作者 Insha Syed Sheena Banday 《Cybersecurity》 EI CSCD 2024年第2期113-130,共18页
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end cons... It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end constrained devices.Therefore,an effcient hardware design approach that requires some specific hardware resource may not be effcient if implemented in software.Substitution bit Permutation Network based ciphers such as PRESENT and GIFT are effcient,lightweight cryptographic hardware design approaches.These ciphers introduce confusion and diffu-sion by employing a 4×4 static substitution box and bit permutations.The bit-wise permutation is realised by sim-ple rerouting,which is most cost-effective to implement in hardware,resulting in negligible power consumption.However,this method is highly resource-consuming in software,particularly for large block-sized ciphers,with each single-bit permutation requiring multiple sub-operations.This paper proposes a novel software-based design approach for permutation operation in Substitution bit Permutation Network based ciphers using a bit-banding fea-ture.The conventional permutation using bit rotation and the proposed approach have been implemented,analysed and compared for GIFT and PRESENT ciphers on ARM Cortex-M3-based LPC1768 development platform with KEIL MDK used as an Integrated Development Environment.The real-time performance comparison between conven-tional and the proposed approaches in terms of memory(RAM/ROM)footprint,power,energy and execution time has been carried out using ULINKpro and ULINKplus debug adapters for various code and speed optimisation sce-narios.The proposed approach substantially reduces execution time,energy and power consumption for both PRE-SENT and GIFT ciphers,thus demonstrating the effciency of the proposed method for Substitution bit Permutation Network based symmetric block ciphers. 展开更多
关键词 lightweight cryptography PRESENT GIFT SbPN Cortex-M LPC1768 Bit-band memory
原文传递
Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography
8
作者 Zainatul Yushaniza Mohamed Yusoff Mohamad Khairi Ishak +1 位作者 Lukman A.B.Rahim Mohd Shahrimie Mohd Asaari 《Computer Systems Science & Engineering》 2024年第6期1669-1697,共29页
The rapid adoption of Internet of Things(IoT)technologies has introduced significant security challenges across the physical,network,and application layers,particularly with the widespread use of the Message Queue Tel... The rapid adoption of Internet of Things(IoT)technologies has introduced significant security challenges across the physical,network,and application layers,particularly with the widespread use of the Message Queue Telemetry Transport(MQTT)protocol,which,while efficient in bandwidth consumption,lacks inherent security features,making it vulnerable to various cyber threats.This research addresses these challenges by presenting a secure,lightweight communication proxy that enhances the scalability and security of MQTT-based Internet of Things(IoT)networks.The proposed solution builds upon the Dang-Scheme,a mutual authentication protocol designed explicitly for resource-constrained environments and enhances it using Elliptic Curve Cryptography(ECC).This integration significantly improves device authentication,data confidentiality,and energy efficiency,achieving an 87.68%increase in data confidentiality and up to 77.04%energy savings during publish/subscribe communications in smart homes.The Middleware Broker System dynamically manages transaction keys and session IDs,offering robust defences against common cyber threats like impersonation and brute-force attacks.Penetration testing with tools such as Hydra and Nmap further validated the system’s security,demonstrating its potential to significantly improve the security and efficiency of IoT networks while underscoring the need for ongoing research to combat emerging threats. 展开更多
关键词 Smart home CONFIDENTIALITY ECC SECURITY lightweight cryptography AUTHENTICATION integrity efficiency
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
9
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT lightweight computation complexity communication overhead cybersecurity threats threat prevention secure data transmission Wireless Sensor Networks(WSNs) elliptic curve cryptography
下载PDF
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
10
作者 Sunil Kumar Dilip Kumar +3 位作者 Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You 《Computers, Materials & Continua》 SCIE EI 2024年第1期31-63,共33页
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ... The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio. 展开更多
关键词 IOT a sensor device lightweight cryptography block cipher smart card security and privacy
下载PDF
Feistel和SPN混合轻量级密码算法 被引量:2
11
作者 陈立军 蒋慧勇 《大连工业大学学报》 CAS 北大核心 2023年第4期288-298,共11页
空间和功率受限的物联网设备,不适合应用传统的安全加密算法。为了在开放环境中实现可信的数据传输,提出了一种混合Feistel结构和SPN结构的轻量级密码算法,包括设计一种现代轻量级的对称分组密码算法,在不安全的通道上对敏感数据进行加... 空间和功率受限的物联网设备,不适合应用传统的安全加密算法。为了在开放环境中实现可信的数据传输,提出了一种混合Feistel结构和SPN结构的轻量级密码算法,包括设计一种现代轻量级的对称分组密码算法,在不安全的通道上对敏感数据进行加密。实验证明,在随机性测试、雪崩效应测试、执行时间测试、相关性、熵、修改像素率、S_box的差分分布和差分密码分析等方面,该算法都给出了合格的结果。与其他算法相比,轻量级密码算法的实施时间最快,并保证了数据安全。 展开更多
关键词 分组密码 轻量级密码学 数据安全 混合轻量级密码算法
下载PDF
I-PRESENT<sup>TM</sup>: An Involutive Lightweight Block Cipher 被引量:2
12
作者 Muhammad Reza Z’aba Norziana Jamil +2 位作者 Mohd Ezanee Rusli Md. Zaini Jamaludin Ahmad Azlan Mohd Yasir 《Journal of Information Security》 2014年第3期114-122,共9页
This paper proposes a new involutive light-weight block cipher for resource-constraint environments called I-PRESENTTM. The design is based on the Present block cipher which is included in the ISO/IEC 29192 standard o... This paper proposes a new involutive light-weight block cipher for resource-constraint environments called I-PRESENTTM. The design is based on the Present block cipher which is included in the ISO/IEC 29192 standard on lightweight cryptography. The advantage of I-PRESENTTM is that the cipher is involutive such that the encryption circuit is identical to decryption. This is an advantage for environments which require the implementation of both circuits. The area requirement of I-PRESENTTM compares reasonably well with other similar ciphers such as PRINCE. 展开更多
关键词 Block CIPHER lightweight cryptography PRESENT PRINCE CRYPTANALYSIS
下载PDF
Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA 被引量:3
13
作者 Vijay DAHIPHALE Gaurav BANSOD +1 位作者 Ankur ZAMBARE Narayan PISHAROTY 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2020年第4期615-628,共14页
Since the dawn of the Internet of Things(IoT),data and system security has been the major concern for developers.Because most IoT devices operate on 8-bit controllers with limited storage and computation power,encrypt... Since the dawn of the Internet of Things(IoT),data and system security has been the major concern for developers.Because most IoT devices operate on 8-bit controllers with limited storage and computation power,encryption and decryption need to be implemented at the transmitting and receiving ends,respectively,using lightweight ciphers.We present novel architectures for hardware implementation for the ANU cipher and present results associated with each architecture.The ANU cipher is implemented at 4-,8-,16-,and 32-bit datapath sizes on four different field-programmable gate array(FPGA)platforms under the same implementation condition,and the results are compared on every performance metric.Unlike previous ANU architectures,the new architectures have parallel substitution boxes(S-boxes)for high throughput and hardware optimization.With these different datapath designs,ANU cipher proves to be the obvious choice for implementing security in extremely resourceconstrained systems. 展开更多
关键词 lightweight cryptography Internet of Things(IoT) Embedded security ENCRYPTION FPGA Datapath design
原文传递
轻量级密码在资源受限设备安全中的应用简析 被引量:3
14
作者 向宏 夏晓峰 《自动化博览》 2018年第A02期72-75,共4页
资源受限设备的安全是工控安全面临的主要挑战之一,这使得对工控安全的关注亟需考虑安全技术在有限资源设备或系统上实现的有效性和适配性,以及目标设备或系统的可靠性、性能等重要指标受到安全技术实现的影响程度。本文将聚焦轻量级密... 资源受限设备的安全是工控安全面临的主要挑战之一,这使得对工控安全的关注亟需考虑安全技术在有限资源设备或系统上实现的有效性和适配性,以及目标设备或系统的可靠性、性能等重要指标受到安全技术实现的影响程度。本文将聚焦轻量级密码,主要从技术研究、标准化研究等方面探讨国内外轻量级密码在资源受限设备安全中的应用进展情况,以期为工控安全的研究者提供一些参考。 展开更多
关键词 工控安全 资源受限设备 轻量级密码
下载PDF
Feistel结构的8比特轻量化S盒 被引量:3
15
作者 董新锋 张文政 许春香 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2021年第1期69-75,共7页
轻量化S盒作为轻量级对称密码算法的混淆部件,是设计轻量级对称密码算法的关键。提出一种新的8比特轻量化S盒设计方法,其单轮逻辑运算仅涉及4个单比特逻辑与运算和4个单比特逻辑异或运算,迭代4轮后密码性质可达到差分均匀度为16、非线... 轻量化S盒作为轻量级对称密码算法的混淆部件,是设计轻量级对称密码算法的关键。提出一种新的8比特轻量化S盒设计方法,其单轮逻辑运算仅涉及4个单比特逻辑与运算和4个单比特逻辑异或运算,迭代4轮后密码性质可达到差分均匀度为16、非线性度为96。与目前已有轻量化S盒设计方法相比,新的8比特轻量化S盒设计方法在硬件实现资源小的同时达到了已知最优的差分均匀度和非线性度等密码学指标,解决了之前8比特轻量化S盒差分均匀度和非线性度等密码性质弱的问题。 展开更多
关键词 FEISTEL结构 S盒 轻量级 对称密码 差分均匀度 非线性度
下载PDF
适用于电力受限设备的轻量级分组密码算法 被引量:2
16
作者 张相依 刘硕 唐小宇 《电力信息与通信技术》 2017年第8期16-20,共5页
随着物联网技术的发展,智能电网中传感器、RFID等电力受限设备的信息安全性问题日益严峻,针对这些设备应用的轻量级加密算法成为近些年的研究热点。文章研究了目前能够应用于电力受限设备的几个典型轻量级算法,进行了软硬件实现性能以... 随着物联网技术的发展,智能电网中传感器、RFID等电力受限设备的信息安全性问题日益严峻,针对这些设备应用的轻量级加密算法成为近些年的研究热点。文章研究了目前能够应用于电力受限设备的几个典型轻量级算法,进行了软硬件实现性能以及安全性等方面的对比,总结出轻量级分组密码算法的设计需求与评价准则,最后进一步阐明了轻量级密码算法在今后研究中要解决的主要问题。 展开更多
关键词 受限设备 轻量级密码 安全分析
下载PDF
基于云计算的文件加密传输方法 被引量:2
17
作者 胡祥义 徐冠宁 杜丽萍 《网络安全技术与应用》 2013年第5期18-22,共5页
本文提出了在云计算环境下,采用一种安全单钥管理技术,来解决轻量级密码的对称密钥快速交换难题,在云用户的客户机端智能卡芯片和云计算平台的认证中心端加密卡芯片里,建立云用户之间的文件快速、安全和完整性验证传输协议,从而,建立基... 本文提出了在云计算环境下,采用一种安全单钥管理技术,来解决轻量级密码的对称密钥快速交换难题,在云用户的客户机端智能卡芯片和云计算平台的认证中心端加密卡芯片里,建立云用户之间的文件快速、安全和完整性验证传输协议,从而,建立基于云计算的信息安全系统。 展开更多
关键词 云计算 大数据 海量用户 轻量级密码 组合密钥
原文传递
轻量级密码算法对比分析及应用
18
作者 李祥宁 张舒黎 +1 位作者 胡蓬 邓春华 《通信技术》 2023年第12期1401-1410,共10页
传统密码算法难以适用于物联网等资源受限环境,为了满足此类场景的安全防护需求,轻量级密码算法应运而生且不断发展。近些年,世界各国学者、机构推出了大量的轻量级密码算法,本文对选取的6个典型轻量级密码算法进行对比分析,结合算法结... 传统密码算法难以适用于物联网等资源受限环境,为了满足此类场景的安全防护需求,轻量级密码算法应运而生且不断发展。近些年,世界各国学者、机构推出了大量的轻量级密码算法,本文对选取的6个典型轻量级密码算法进行对比分析,结合算法结构和软硬件上的性能表现,给予相应的评价以及应用场景推荐。最后从算法应用的角度对轻量级密码算法在物联网端边云协同、自动驾驶和卫星安全通信三个场景下的应用进行探讨。 展开更多
关键词 轻量级密码 物联网 卫星通信 自动驾驶
下载PDF
基于有限域逆映射的轻量级加密SOPT-S盒构造与研究 被引量:1
19
作者 樊兆龙 徐启建 +1 位作者 徐勇军 王飞 《电信科学》 北大核心 2014年第4期61-67,共7页
基于有限域上的逆映射构造出了一类新的、性能优良的轻量级加密次最优(suboptimal)SOPT-S盒,通过与PRESENT等算法中S盒密码学指标进行对比分析可知,SOPT-S盒密码学特性如差分均匀度、代数次数、雪崩效应优于PRESENT中S盒,其中代数次数达... 基于有限域上的逆映射构造出了一类新的、性能优良的轻量级加密次最优(suboptimal)SOPT-S盒,通过与PRESENT等算法中S盒密码学指标进行对比分析可知,SOPT-S盒密码学特性如差分均匀度、代数次数、雪崩效应优于PRESENT中S盒,其中代数次数达到n-1,雪崩概率为1/2,均达到最佳,同时非线性度与之相等;此外,硬件方面实现规模也与之相同(4×4),从而为轻量级加密算法中分组密码的非线性层设计提供了参考。 展开更多
关键词 轻量级加密 分组密码 有限域逆映射 SOPT-S盒
下载PDF
射频识别认证协议研究 被引量:1
20
作者 朱恺捷 张磊 《湘潭大学自然科学学报》 CAS CSCD 北大核心 2011年第3期123-126,共4页
通过分析Cichoń,Klonowski和Kutylowski提出的射频识别安全认证协议,发现该协议在安全性上存在一定的漏洞,进而提出了两个攻击算法,包括主动攻击和被动攻击.算法以协议中的置换为目标,试图从特殊的置换入手,逐步找出协议中所使用的特... 通过分析Cichoń,Klonowski和Kutylowski提出的射频识别安全认证协议,发现该协议在安全性上存在一定的漏洞,进而提出了两个攻击算法,包括主动攻击和被动攻击.算法以协议中的置换为目标,试图从特殊的置换入手,逐步找出协议中所使用的特定置换,进而成功的对协议进行攻击. 展开更多
关键词 轻量级加密 共享密钥 置换 RFID 认证
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部