期刊文献+
共找到2,273篇文章
< 1 2 114 >
每页显示 20 50 100
高级加密标准AES及其实现技巧 被引量:20
1
作者 黄智颖 冯新喜 张焕国 《计算机工程与应用》 CSCD 北大核心 2002年第9期112-115,共4页
介绍美国联邦信息处理标准(FIPS)草案——高级加密标准AES,用ANSIC高效实现了此算法,并给出了其执行性能。
关键词 密码 密钥 高级加密标准 信息安全 AES
下载PDF
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms 被引量:27
2
作者 ZHANG WenTao BAO ZhenZhen +3 位作者 LIN DongDai Vincent RIJMEN YANG Bo Han Ingrid VERBAUWHEDE 《Science China Chemistry》 SCIE EI CAS CSCD 2015年第12期85-99,共15页
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-netw... In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-network. The substitution layer consists of 16 4 × 4 S-boxes in parallel. The permutation layer is composed of 3 rotations. As shown in this paper, RECTANGLE offers great performance in both hardware and software environment, which provides enough flexibility for different application scenario. The following are3 main advantages of RECTANGLE. First, RECTANGLE is extremely hardware-friendly. For the 80-bit key version, a one-cycle-per-round parallel implementation only needs 1600 gates for a throughput of 246 Kbits/s at100 k Hz clock and an energy efficiency of 3.0 p J/bit. Second, RECTANGLE achieves a very competitive software speed among the existing lightweight block ciphers due to its bit-slice style. Using 128-bit SSE instructions,a bit-slice implementation of RECTANGLE reaches an average encryption speed of about 3.9 cycles/byte for messages around 3000 bytes. Last but not least, we propose new design criteria for the RECTANGLE S-box.Due to our careful selection of the S-box and the asymmetric design of the permutation layer, RECTANGLE achieves a very good security-performance tradeoff. Our extensive and deep security analysis shows that the highest number of rounds that we can attack, is 18(out of 25). 展开更多
关键词 lightweight cryptography block cipher design bit-slice hardware efficiency software efficiency
原文传递
建立INTERNET上的安全环境 被引量:19
3
作者 唐晓东 齐治昌 《计算机科学》 CSCD 北大核心 1998年第1期26-30,共5页
最近几年 INTERNET飞速发展,为用户提供方便的远程计算、资源共享和电子数据传输等服务,促进了社会发展。然而,INTERNET尚存在着一个致命缺点:缺乏安全性。在激烈竟争的壮会中,用户面对着INTERNET拥有的巨大财富,既爱又怕,
关键词 INTERNET网 安全机制 计算机网络
下载PDF
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia 被引量:20
4
作者 吴文玲 张文涛 冯登国 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第3期449-456,共8页
This paper studies the security of the block ciphers ARIA and Camellia against impossible differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of ARIA and Camellia known so far.... This paper studies the security of the block ciphers ARIA and Camellia against impossible differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of ARIA and Camellia known so far. The designers of ARIA expected no impossible differentials exist for 4-round ARIA. However, we found some nontrivial 4-round impossible differentials, which may lead to a possible attack on 6-round ARIA. Moreover, we found some nontrivial 8-round impossible differentials for Camellia, whereas only 7-round impossible differentials were previously known. By using the 8-round impossible differentials, we presented an attack on 12-round Camellia without FL/FL^-1 layers. 展开更多
关键词 block cipher ARIA CAMELLIA data complexity time complexity impossible differential cryptanalysis
原文传递
一类广义Feistel密码的安全性评估 被引量:18
5
作者 吴文玲 贺也平 《电子与信息学报》 EI CSCD 北大核心 2002年第9期1177-1184,共8页
该文评估一类广义Feistel密码(GFC)抵抗差分和线性密码分析的能力:如果轮函数是双射且它的最大差分和线性特征的概率分别是p和q,则16轮GFC的差分和线性特征的概率的上界为p^7和q^7;如果轮函数采用SP结构且是双射,S盒的最大差分和线性特... 该文评估一类广义Feistel密码(GFC)抵抗差分和线性密码分析的能力:如果轮函数是双射且它的最大差分和线性特征的概率分别是p和q,则16轮GFC的差分和线性特征的概率的上界为p^7和q^7;如果轮函数采用SP结构且是双射,S盒的最大差分和线性特征的概率是ps和qs,P变换的分支数为Pd,则16轮GFC的差分和线性特征的概率的上界为(ps)^(3Pd+1)和(qs)^(3Pd+1)。 展开更多
关键词 差分密码分析 线性密码分析 分支数 Feistel密码 安全性
下载PDF
可重构密码协处理器的概念及其设计原理 被引量:11
6
作者 曲英杰 《计算机工程与应用》 CSCD 北大核心 2003年第12期7-9,19,共4页
提出了可重构密码协处理器的概念并论述了其设计原理。所谓可重构密码协处理器实际上是一个其内部逻辑电路结构和功能可被灵活改变的密码处理单元,它能够在主处理器的控制和驱动下灵活、快速地实现多种不同的密码操作,以便适应不同密码... 提出了可重构密码协处理器的概念并论述了其设计原理。所谓可重构密码协处理器实际上是一个其内部逻辑电路结构和功能可被灵活改变的密码处理单元,它能够在主处理器的控制和驱动下灵活、快速地实现多种不同的密码操作,以便适应不同密码算法的需求。基于可重构密码协处理器的可重构密码系统具有灵活、快速、安全的特点,在保密通讯和网络安全等领域中具有良好的应用前景。 展开更多
关键词 可重构 密码 体系结构 逻辑设计
下载PDF
Security of the SMS4 Block Cipher Against Differential Cryptanalysis 被引量:15
7
作者 苏波展 吴文玲 张文涛 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第1期130-138,共9页
SMS4 is a 128-bit block cipher used in the WAPI standard for wireless networks in China. In this paper, we analyze the security of the SMS4 block cipher against differential cryptanalysis. Firstly, we prove three theo... SMS4 is a 128-bit block cipher used in the WAPI standard for wireless networks in China. In this paper, we analyze the security of the SMS4 block cipher against differential cryptanalysis. Firstly, we prove three theorems and one corollary that reflect relationships of 5- and 6-round SMS4. Next, by these relationships, we clarify the minimum number of active S-boxes in 6-, 7- and 12-round SMS4 respectively. Finally, based on the above results, we present a family of about 2^14 differential characteristics for 19-round SMS4, which leads to an attack on 23-round SMS4 with 2^118 chosen plaintexts and 2^126.7 encryptions. 展开更多
关键词 block cipher SMS4 differential cryptanalysis
原文传递
数字视频加密技术发展现状及展望 被引量:9
8
作者 徐正全 杨志云 +1 位作者 李伟 陈琳 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2005年第7期570-574,共5页
对视频加密所涉及到的基本原理和技术、存在的问题和一些重要的方法、当前研究热点及发展趋势等进行了全面介绍和综述;通过分析视频加密方法的特点,指出针对压缩视频数据信源特征而采用的选择性加密技术是未来的主要研究方向。
关键词 密码 图像 视频 编码 加密
下载PDF
A trinomial type of σ-LFSR oriented toward software implementation 被引量:11
9
作者 ZENG Guang HE KaiCheng HAN WenBao 《Science in China(Series F)》 2007年第3期359-372,共14页
In this paper, we introduce a new type of feedback shift register based on words, called G-linear feedback shift register (σ-LFSR) which can make full use of the instructions of modern CPUs so that we can find good... In this paper, we introduce a new type of feedback shift register based on words, called G-linear feedback shift register (σ-LFSR) which can make full use of the instructions of modern CPUs so that we can find good σ-LFSR with simple structure and fast software implementation. After analysis, we find a class of simple σ-LFSR with maximal period and give an algorithm of searching for those σ-LFSRs. As a result, we provide a new optional fast component in the design of modern wordbased stream ciphers. 展开更多
关键词 finite field stream cipher σ-LFSR primitive polynomial fast software implementation
原文传递
可重构密码协处理器的组成与结构 被引量:12
10
作者 曲英杰 《计算机工程与应用》 CSCD 北大核心 2003年第23期32-34,共3页
文章提出了一些关于可重构密码协处理器的组成与结构的设计思想和方法。可重构密码协处理器组成与结构是指可重构密码协处理器的组成模块及其相互之间的连接网络。可重构密码协处理器组成与结构的设计直接影响到可重构密码协处理器的性... 文章提出了一些关于可重构密码协处理器的组成与结构的设计思想和方法。可重构密码协处理器组成与结构是指可重构密码协处理器的组成模块及其相互之间的连接网络。可重构密码协处理器组成与结构的设计直接影响到可重构密码协处理器的性能,因此是可重构密码协处理器设计中的一个关键问题。 展开更多
关键词 可重构密码协处理器 组成模块 结构 设计
下载PDF
网络加密安全系统的设计与实现 被引量:10
11
作者 李飞 《计算机工程与设计》 CSCD 2003年第12期86-88,共3页
随着Internet的快速普及,人们在享受Internet带来便利的同时,也在承受着网络病毒和黑客的侵扰,因此,网络信息的安全性成为人们日益关注的焦点,于是网络安全设备出现了,加密机就是其中之一。飞星安全系统就是依照网络加密机的原理设计的... 随着Internet的快速普及,人们在享受Internet带来便利的同时,也在承受着网络病毒和黑客的侵扰,因此,网络信息的安全性成为人们日益关注的焦点,于是网络安全设备出现了,加密机就是其中之一。飞星安全系统就是依照网络加密机的原理设计的,它包括了HTTP数据在公网上的安全传输和数据过滤等功能,实现了对指定Web服务器的安全访问。 展开更多
关键词 网络加密安全系统 设计 信息安全 数据保密 密码 计算机网络 网络安全 网络病毒
下载PDF
高级加密标准AES候选之一——Rijndael 被引量:6
12
作者 苏学东 崔竞松 张焕国 《通信保密》 2000年第1期62-67,,78,,共7页
介绍了理解Rijndael算法的数学基础和Rijndael算法本身,并介绍了此算法用不同语言编写时的执行性能和对目前几种流行的攻击算法的抵抗能力。
关键词 密钥 RIJNDAEL算法 密码算法 高级加密标准
下载PDF
A Reconfigurable Block Cryptographic Processor Based on VLIW Architecture 被引量:11
13
作者 LI Wei ZENG Xiaoyang +2 位作者 NAN Longmei CHEN Tao DAI Zibin 《China Communications》 SCIE CSCD 2016年第1期91-99,共9页
An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the... An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the broad range of support.However,these methods could not achieve a good tradeoff between high-speed processing and flexibility.In this paper,we present a reconfigurable VLIW processor architecture targeted at block cipher processing,analyze basic operations and storage characteristics,and propose the multi-cluster register-file structure for block ciphers.As for the same operation element of block ciphers,we adopt reconfigurable technology for multiple cryptographic processing units and interconnection scheme.The proposed processor not only flexibly accomplishes the combination of multiple basic cryptographic operations,but also realizes dynamic configuration for cryptographic processing units.It has been implemented with0.18μm CMOS technology,the test results show that the frequency can reach 350 MHz.and power consumption is 420 mw.Ten kinds of block and hash ciphers were realized in the processor.The encryption throughput of AES,DES,IDEA,and SHA-1 algorithm is1554 Mbps,448Mbps,785 Mbps,and 424 Mbps respectively,the test result shows that our processor's encryption performance is significantly higher than other designs. 展开更多
关键词 Block cipher VLIW processor reconfigurable application-specific instruction-set
下载PDF
Collision attack on reduced-round Camellia 被引量:7
14
作者 WUWenling FENGDengguo 《Science in China(Series F)》 2005年第1期78-90,共13页
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searc... Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack on 6, 7, 8 and 9 rounds of Camellia with 128-bit key and 8, 9 and 10 rounds of Camellia with 192/256-bit key. The 128-bit key of 6 rounds Camellia can be recovered with 210 chosen plaintexts and 215 encryptions. The 128-bit key of 7 rounds Camellia can be recovered with 212 chosen plaintexts and 254.5 encryptions. The 128-bit key of 8 rounds Camellia can be recovered with 213 chosen plaintexts and 2112.1 encryptions. The 128-bit key of 9 rounds Camellia can be recovered with 2113.6 chosen plaintexts and 2121 encryptions. The 192/256-bit key of 8 rounds Camellia can be recovered with 213 chosen plaintexts and 2111.1 encryptions. The 192/256-bit key of 9 rounds Camellia can be recovered with 213 chosen plaintexts and 2175.6 encryptions. The 256-bit key of 10 rounds Camellia can be recovered with 214 chosen plaintexts and 2239.9 encryptions. 展开更多
关键词 block cipher collision attack KEY data complexity time complexity.
原文传递
计算机实时通信中一种新的数据加密技术 被引量:6
15
作者 刘连浩 《中南工业大学学报》 CSCD 北大核心 2000年第1期84-86,共3页
数据加密是实现网络安全的关键技术之一 .常用数据加密算法有其难以克服的缺点———加密和还原运算复杂 ,时间开销大 ,不适应高速实时通信的需要 .为此 ,设计了一种新的数据加密方法———基于随机性原理变换包长、密钥和加密运算控制 ... 数据加密是实现网络安全的关键技术之一 .常用数据加密算法有其难以克服的缺点———加密和还原运算复杂 ,时间开销大 ,不适应高速实时通信的需要 .为此 ,设计了一种新的数据加密方法———基于随机性原理变换包长、密钥和加密运算控制 ,克服了常用数据加密算法的缺点 ,运算简单 ,加密效果好 ,它适合于多路复用器等高速通信仪器的数据加密 . 展开更多
关键词 计算机 实时通信 数据加密技术 密码 公开密钥
下载PDF
分布式入侵检测系统安全通信研究 被引量:6
16
作者 王坤 陈哲 郭建胜 《郑州大学学报(理学版)》 CAS 2004年第3期13-17,共5页
当前入侵检测系统的研究存在一些不足之处 ,如其层次化的入侵数据分析结构使检测效率低、缺少对 IDS自身的安全性考虑等 ,难以适应新的网络环境的需要 .针对这些问题 ,将密码学运用到入侵检测系统中 ,实现入侵检测系统的安全 ;将 agent... 当前入侵检测系统的研究存在一些不足之处 ,如其层次化的入侵数据分析结构使检测效率低、缺少对 IDS自身的安全性考虑等 ,难以适应新的网络环境的需要 .针对这些问题 ,将密码学运用到入侵检测系统中 ,实现入侵检测系统的安全 ;将 agent技术和 P2 P技术应用到研究中 ,实现高效的分布式入侵检测系统 .给出系统的设计与实现方法 ,并对系统的安全性和性能进行了分析 . 展开更多
关键词 分布式入侵检测系统 安全通信 密码 消息安全 P2P
下载PDF
Fast correlation attack on streamcipher ABC v3 被引量:7
17
作者 ZHANG HaiNa LI Lin WANG XiaoYun 《Science in China(Series F)》 2008年第7期936-947,共12页
ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is 128 bits. In this paper, we find large numbers of new weak keys of ABC family and introd... ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is 128 bits. In this paper, we find large numbers of new weak keys of ABC family and introduce a method to search for them, and then apply a fast correlation attack to break ABC v3 with weak keys. We show that there are at least 2^103.71 new weak keys in ABC v3. Recovering the internal state of a weak key requires 236.05 keystream words and 2^50.56 operations. The attack can be applied to ABC vl and v2 with the same complexity as that of ABC v3. However, the number of weak keys of ABC vl as well as ABC v2 decreases to 2^97 + 20^95.19,It reveals that ABC v3 incurs more weak keys than that of ABC vl and v2. 展开更多
关键词 CRYPTANALYSIS stream cipher fast correlation attack ABC v3
原文传递
Crypto-analysis of the Encryption Algorithm Rijndael 被引量:5
18
作者 WANG Lin (Xian University of Posts and Telecommunications, Xian 710061, P.R.China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2001年第2期32-34,共3页
A special property of the S box of the block cipher Rijndael is found, which states that for any x 1, x 2, and Δ∈ SBYTE,if S(x 1)S(x 1Δ)=S(x 2)S(x 2Δ),then either x 1=x 2,or x 1=x 2Δ, where SBYTE de... A special property of the S box of the block cipher Rijndael is found, which states that for any x 1, x 2, and Δ∈ SBYTE,if S(x 1)S(x 1Δ)=S(x 2)S(x 2Δ),then either x 1=x 2,or x 1=x 2Δ, where SBYTE denotes the set of all bytes. This property is helpful for mounting an efficient attack on Rijndael, that is illustrated by a simple example in this paper. 展开更多
关键词 Block cipher rijndael S box AES
原文传递
截断差分-线性密码分析 被引量:3
19
作者 贺也平 吴文玲 卿斯汉 《软件学报》 EI CSCD 北大核心 2000年第10期1294-1298,共5页
对差分 -线性密码分析方法进行推广 ,提出了截断差分 -线性密码分析方法 .对 9-轮和 11-轮 DES( dataencryption standard)密码算法的分析表明 ,该方法具有更加方便、灵活 ,适用范围更广的特点 .同时 ,利用截断差分 -线性密码分析方法得... 对差分 -线性密码分析方法进行推广 ,提出了截断差分 -线性密码分析方法 .对 9-轮和 11-轮 DES( dataencryption standard)密码算法的分析表明 ,该方法具有更加方便、灵活 ,适用范围更广的特点 .同时 ,利用截断差分 -线性密码分析方法得出 ,在类似 DES结构的算法中 ,S-盒的摆放顺序对密码的强度有较大的影响 .由此 ,截断差分 -线性分析方法给出了优化 展开更多
关键词 密码 差分分析 线性分析 截断差分 信息安全
下载PDF
DNACDS:Cloud IoE big data security and accessing scheme based on DNA cryptography 被引量:3
20
作者 Ashish SINGH Abhinav KUMAR Suyel NAMASUDRA 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第1期157-170,共14页
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data world.This approach allows efficient infrastructure to store and access big real-time data and smart IoE ... The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data world.This approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the cloud.The IoE-based cloud computing services are located at remote locations without the control of the data owner.The data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security capabilities.The lack of knowledge about security capabilities and control over data raises several security issues.Deoxyribonucleic Acid(DNA)computing is a biological concept that can improve the security of IoE big data.The IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher algorithms.This paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access issues.The experimental results illustrated that DNACDS performs better than other DNA-based security schemes.The theoretical security analysis of the DNACDS shows better resistance capabilities. 展开更多
关键词 IoE based cloud computing DNA cryptography IoE big data security StS KAP feistel cipher IoE big data access
原文传递
上一页 1 2 114 下一页 到第
使用帮助 返回顶部