留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于可变S盒的随机加密方案

王文华 郑志明

王文华, 郑志明. 基于可变S盒的随机加密方案[J]. 北京航空航天大学学报, 2011, 37(7): 811-816.
引用本文: 王文华, 郑志明. 基于可变S盒的随机加密方案[J]. 北京航空航天大学学报, 2011, 37(7): 811-816.
Wang Wenhua, Zheng Zhiming. Random encryption scheme based on variable S-boxes[J]. Journal of Beijing University of Aeronautics and Astronautics, 2011, 37(7): 811-816. (in Chinese)
Citation: Wang Wenhua, Zheng Zhiming. Random encryption scheme based on variable S-boxes[J]. Journal of Beijing University of Aeronautics and Astronautics, 2011, 37(7): 811-816. (in Chinese)

基于可变S盒的随机加密方案

基金项目: 973国家重点基础研究发展计划资助项目(2005CB321902)
详细信息
    作者简介:

    王文华(1986-),男,河南新乡人,硕士生,wenhuawang1986@gmail.com.

  • 中图分类号: TP 309.7

Random encryption scheme based on variable S-boxes

  • 摘要: 研究了可变随机S盒对分组密码安全性的意义,给出了一种新的使用可变随机S盒的随机化分组密码算法,并在此基础上提出了相应的加密方案:在分组密码算法中,保持算法结构不变,将S盒作为变量,利用可变的S盒来抵御密码分析.随后给出安全性评估,证明该方案提高了分组密码抵抗目前已知攻击的能力.最后从S盒的生成方式与算法结构两方面讨论了改进策略.

     

  • [1] Daemen J,Rijmen V.The design of Rijndael:AES-the advanced encryption standard[M].Berlin:Springer-Verlag,2002:34-37 [2] Aoki K,Ichikawa T,Kanda M,et al.Camellia:A 128-bit block cipher suitable for multiple platforms[J].Lecture Notes in Computer Science,2001,2012:39-56 [3] 国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法 ,2006 .http://www.oscca.gov.cn/UpFile/200621016423197990.pdf Beijing Data Security Company.The SMS4 block cipher ,2006 .http://www.oscca.gov.cn/UpFile/200621016423197990.pdf (in Chinese) [4] Alex Biryukov,Dmitry Khovratovich.Related-key cryptanalysis of the full AES-192 and AES-256[J].Lecture Notes in Computer Science,2009,5912:1-18 [5] Courtois N,Pieprzyk J.Cryptanalysis of block ciphers with overdefined systems of equations[J].Lecture Notes in Computer Science,2002,2501:267-287 [6] Murphy S,Robshaw M.Essential algebraic structure within the AES[J].Lecture Notes in Computer Science,2002,2442:1-16 [7] Schneier B,Kelsey J,Whiting D,et al.Twofish:a 128-bit block cipher ,1998 .http://www.counterpane.com/twofish.pdf [8] Burns F,Murphy J,Koelmans A,et al.Efficient advanced encryption standard implementation using lookup and normal basis[J].Computers & Digital Techniques,2009,3(3):270-280 [9] Svetla Nikova,Vincent Rijmen,Martin Schlffer.Using normal bases for compact hardware implementations of the AES S-box[J].Lecture Notes in Computer Science,2008,5229:236-245 [10] Sony Corporation.The 128-bit blockcipher CLEFIA:algorithm specification ,2007 .http://www.sony.net/Products/clefia/technical/data/clefia-spec-1.0.pdf [11] Murphy S,Robshaw M.Differential cryptanalysis,keydependent S-boxes,and twofish ,2000 .AES Round 2 public comment,http://www.nist.gov/ [12] Shirai T,Shibutani K.On feistel structures using a diffusion switching mechanism[J].Lecture Notes in Computer Science,2006,4047:41-56 [13] Sony Corporation.The 128-bit blockcipher CLEFIA:Security and performance evaluations ,2007 .http://www.sony.co.jp/Products/clefia/technical/data/clefia-eval-1.0.pdf [14] David Wagner.The boomerang attack[J].Lecture Notes in Computer Science,1999,1636:56-170 [15] 吴礼银,胡汉平.利用遗传算法构造S-盒[J].计算机与数字工程,2005,32(2):36-41 Wu Liyin,Hu Hanping.Construct S-box by genetic algorithm [J].Computer and Digital Engineering,2005:32(2):36-41(in Chinese) [16] 陈华,冯登国,吴文玲.一种改善双射S盒密码特性的有效算法[J].计算机研究与发展,2004,41(8):1410-1414 Chen Hua,Feng Dengguo,Wu Wenling.An effective evolutionary stategy for bijective S-boxes [J].Journal of Computer Research and Development,2004,41(8):1410-1414(in Chinese)
  • 加载中
计量
  • 文章访问数:  2399
  • HTML全文浏览量:  40
  • PDF下载量:  991
  • 被引次数: 0
出版历程
  • 收稿日期:  2010-07-08
  • 网络出版日期:  2011-07-30

目录

    /

    返回文章
    返回
    常见问答