Volume 37 Issue 7
Jul.  2011
Turn off MathJax
Article Contents
Wang Wenhua, Zheng Zhiming. Random encryption scheme based on variable S-boxes[J]. Journal of Beijing University of Aeronautics and Astronautics, 2011, 37(7): 811-816. (in Chinese)
Citation: Wang Wenhua, Zheng Zhiming. Random encryption scheme based on variable S-boxes[J]. Journal of Beijing University of Aeronautics and Astronautics, 2011, 37(7): 811-816. (in Chinese)

Random encryption scheme based on variable S-boxes

  • Received Date: 08 Jul 2010
  • Publish Date: 30 Jul 2011
  • How the variable S-boxes would affect the security of the block cipher was studied and a new block cipher using random variable S-boxes was presented. A new encryption scheme based on such block cipher was put forward: the structure of the original encryption algorithm was kept, the S-box was taken as a variable and variable S-box was used instead of the primary one, which could increase the resistance against those known attacks. The security evaluation proves the scheme secure. Furthermore, a discussion on the improvement about the generation of the S-boxes and structure of the algorithms was given.

     

  • loading
  • [1] Daemen J,Rijmen V.The design of Rijndael:AES-the advanced encryption standard[M].Berlin:Springer-Verlag,2002:34-37 [2] Aoki K,Ichikawa T,Kanda M,et al.Camellia:A 128-bit block cipher suitable for multiple platforms[J].Lecture Notes in Computer Science,2001,2012:39-56 [3] 国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法 ,2006 .http://www.oscca.gov.cn/UpFile/200621016423197990.pdf Beijing Data Security Company.The SMS4 block cipher ,2006 .http://www.oscca.gov.cn/UpFile/200621016423197990.pdf (in Chinese) [4] Alex Biryukov,Dmitry Khovratovich.Related-key cryptanalysis of the full AES-192 and AES-256[J].Lecture Notes in Computer Science,2009,5912:1-18 [5] Courtois N,Pieprzyk J.Cryptanalysis of block ciphers with overdefined systems of equations[J].Lecture Notes in Computer Science,2002,2501:267-287 [6] Murphy S,Robshaw M.Essential algebraic structure within the AES[J].Lecture Notes in Computer Science,2002,2442:1-16 [7] Schneier B,Kelsey J,Whiting D,et al.Twofish:a 128-bit block cipher ,1998 .http://www.counterpane.com/twofish.pdf [8] Burns F,Murphy J,Koelmans A,et al.Efficient advanced encryption standard implementation using lookup and normal basis[J].Computers & Digital Techniques,2009,3(3):270-280 [9] Svetla Nikova,Vincent Rijmen,Martin Schlffer.Using normal bases for compact hardware implementations of the AES S-box[J].Lecture Notes in Computer Science,2008,5229:236-245 [10] Sony Corporation.The 128-bit blockcipher CLEFIA:algorithm specification ,2007 .http://www.sony.net/Products/clefia/technical/data/clefia-spec-1.0.pdf [11] Murphy S,Robshaw M.Differential cryptanalysis,keydependent S-boxes,and twofish ,2000 .AES Round 2 public comment,http://www.nist.gov/ [12] Shirai T,Shibutani K.On feistel structures using a diffusion switching mechanism[J].Lecture Notes in Computer Science,2006,4047:41-56 [13] Sony Corporation.The 128-bit blockcipher CLEFIA:Security and performance evaluations ,2007 .http://www.sony.co.jp/Products/clefia/technical/data/clefia-eval-1.0.pdf [14] David Wagner.The boomerang attack[J].Lecture Notes in Computer Science,1999,1636:56-170 [15] 吴礼银,胡汉平.利用遗传算法构造S-盒[J].计算机与数字工程,2005,32(2):36-41 Wu Liyin,Hu Hanping.Construct S-box by genetic algorithm [J].Computer and Digital Engineering,2005:32(2):36-41(in Chinese) [16] 陈华,冯登国,吴文玲.一种改善双射S盒密码特性的有效算法[J].计算机研究与发展,2004,41(8):1410-1414 Chen Hua,Feng Dengguo,Wu Wenling.An effective evolutionary stategy for bijective S-boxes [J].Journal of Computer Research and Development,2004,41(8):1410-1414(in Chinese)
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2430) PDF downloads(991) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return