Wang Xinlong, Ma Shan, Wang Haiyonget al. Fast and precise initial alignment of strapdown inertial navigation system on rolling base[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(1): 91-95. (in Chinese)
Citation: Wang Wenhua, Zheng Zhiming. Random encryption scheme based on variable S-boxes[J]. Journal of Beijing University of Aeronautics and Astronautics, 2011, 37(7): 811-816. (in Chinese)

Random encryption scheme based on variable S-boxes

  • Received Date: 08 Jul 2010
  • Publish Date: 30 Jul 2011
  • How the variable S-boxes would affect the security of the block cipher was studied and a new block cipher using random variable S-boxes was presented. A new encryption scheme based on such block cipher was put forward: the structure of the original encryption algorithm was kept, the S-box was taken as a variable and variable S-box was used instead of the primary one, which could increase the resistance against those known attacks. The security evaluation proves the scheme secure. Furthermore, a discussion on the improvement about the generation of the S-boxes and structure of the algorithms was given.

     

  • [1] Daemen J,Rijmen V.The design of Rijndael:AES-the advanced encryption standard[M].Berlin:Springer-Verlag,2002:34-37[2] Aoki K,Ichikawa T,Kanda M,et al.Camellia:A 128-bit block cipher suitable for multiple platforms[J].Lecture Notes in Computer Science,2001,2012:39-56[3] 国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法 ,2006 .[4] Alex Biryukov,Dmitry Khovratovich.Related-key cryptanalysis of the full AES-192 and AES-256[J].Lecture Notes in Computer Science,2009,5912:1-18[5] Courtois N,Pieprzyk J.Cryptanalysis of block ciphers with overdefined systems of equations[J].Lecture Notes in Computer Science,2002,2501:267-287[6] Murphy S,Robshaw M.Essential algebraic structure within the AES[J].Lecture Notes in Computer Science,2002,2442:1-16[7] Schneier B,Kelsey J,Whiting D,et al.Twofish:a 128-bit block cipher ,1998 .[8] Burns F,Murphy J,Koelmans A,et al.Efficient advanced encryption standard implementation using lookup and normal basis[J].Computers & Digital Techniques,2009,3(3):270-280[9] Svetla Nikova,Vincent Rijmen,Martin Schlffer.Using normal bases for compact hardware implementations of the AES S-box[J].Lecture Notes in Computer Science,2008,5229:236-245[10] Sony Corporation.The 128-bit blockcipher CLEFIA:algorithm specification ,2007 .[11] Murphy S,Robshaw M.Differential cryptanalysis,keydependent S-boxes,and twofish ,2000 .AES Round 2 public comment,[12] Shirai T,Shibutani K.On feistel structures using a diffusion switching mechanism[J].Lecture Notes in Computer Science,2006,4047:41-56[13] Sony Corporation.The 128-bit blockcipher CLEFIA:Security and performance evaluations ,2007 .[14] David Wagner.The boomerang attack[J].Lecture Notes in Computer Science,1999,1636:56-170[15] 吴礼银,胡汉平.利用遗传算法构造S-盒[J].计算机与数字工程,2005,32(2):36-41 Wu Liyin,Hu Hanping.Construct S-box by genetic algorithm [J].Computer and Digital Engineering,2005:32(2):36-41(in Chinese)[16] 陈华,冯登国,吴文玲.一种改善双射S盒密码特性的有效算法[J].计算机研究与发展,2004,41(8):1410-1414 Chen Hua,Feng Dengguo,Wu Wenling.An effective evolutionary stategy for bijective S-boxes [J].Journal of Computer Research and Development,2004,41(8):1410-1414(in Chinese)
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2605) PDF downloads(996) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return