Random encryption scheme based on variable S-boxes
-
摘要: 研究了可变随机S盒对分组密码安全性的意义,给出了一种新的使用可变随机S盒的随机化分组密码算法,并在此基础上提出了相应的加密方案:在分组密码算法中,保持算法结构不变,将S盒作为变量,利用可变的S盒来抵御密码分析.随后给出安全性评估,证明该方案提高了分组密码抵抗目前已知攻击的能力.最后从S盒的生成方式与算法结构两方面讨论了改进策略.Abstract: How the variable S-boxes would affect the security of the block cipher was studied and a new block cipher using random variable S-boxes was presented. A new encryption scheme based on such block cipher was put forward: the structure of the original encryption algorithm was kept, the S-box was taken as a variable and variable S-box was used instead of the primary one, which could increase the resistance against those known attacks. The security evaluation proves the scheme secure. Furthermore, a discussion on the improvement about the generation of the S-boxes and structure of the algorithms was given.
-
Key words:
- cryptography /
- security of data /
- random number generation /
- block cipher /
- cryptanalysis
-
[1] Daemen J,Rijmen V.The design of Rijndael:AES-the advanced encryption standard[M].Berlin:Springer-Verlag,2002:34-37 [2] Aoki K,Ichikawa T,Kanda M,et al.Camellia:A 128-bit block cipher suitable for multiple platforms[J].Lecture Notes in Computer Science,2001,2012:39-56 [3] 国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法 ,2006 .http://www.oscca.gov.cn/UpFile/200621016423197990.pdf Beijing Data Security Company.The SMS4 block cipher ,2006 .http://www.oscca.gov.cn/UpFile/200621016423197990.pdf (in Chinese) [4] Alex Biryukov,Dmitry Khovratovich.Related-key cryptanalysis of the full AES-192 and AES-256[J].Lecture Notes in Computer Science,2009,5912:1-18 [5] Courtois N,Pieprzyk J.Cryptanalysis of block ciphers with overdefined systems of equations[J].Lecture Notes in Computer Science,2002,2501:267-287 [6] Murphy S,Robshaw M.Essential algebraic structure within the AES[J].Lecture Notes in Computer Science,2002,2442:1-16 [7] Schneier B,Kelsey J,Whiting D,et al.Twofish:a 128-bit block cipher ,1998 .http://www.counterpane.com/twofish.pdf [8] Burns F,Murphy J,Koelmans A,et al.Efficient advanced encryption standard implementation using lookup and normal basis[J].Computers & Digital Techniques,2009,3(3):270-280 [9] Svetla Nikova,Vincent Rijmen,Martin Schlffer.Using normal bases for compact hardware implementations of the AES S-box[J].Lecture Notes in Computer Science,2008,5229:236-245 [10] Sony Corporation.The 128-bit blockcipher CLEFIA:algorithm specification ,2007 .http://www.sony.net/Products/clefia/technical/data/clefia-spec-1.0.pdf [11] Murphy S,Robshaw M.Differential cryptanalysis,keydependent S-boxes,and twofish ,2000 .AES Round 2 public comment,http://www.nist.gov/ [12] Shirai T,Shibutani K.On feistel structures using a diffusion switching mechanism[J].Lecture Notes in Computer Science,2006,4047:41-56 [13] Sony Corporation.The 128-bit blockcipher CLEFIA:Security and performance evaluations ,2007 .http://www.sony.co.jp/Products/clefia/technical/data/clefia-eval-1.0.pdf [14] David Wagner.The boomerang attack[J].Lecture Notes in Computer Science,1999,1636:56-170 [15] 吴礼银,胡汉平.利用遗传算法构造S-盒[J].计算机与数字工程,2005,32(2):36-41 Wu Liyin,Hu Hanping.Construct S-box by genetic algorithm [J].Computer and Digital Engineering,2005:32(2):36-41(in Chinese) [16] 陈华,冯登国,吴文玲.一种改善双射S盒密码特性的有效算法[J].计算机研究与发展,2004,41(8):1410-1414 Chen Hua,Feng Dengguo,Wu Wenling.An effective evolutionary stategy for bijective S-boxes [J].Journal of Computer Research and Development,2004,41(8):1410-1414(in Chinese)
点击查看大图
计量
- 文章访问数: 2543
- HTML全文浏览量: 53
- PDF下载量: 996
- 被引次数: 0