共查询到20条相似文献,搜索用时 140 毫秒
1.
介绍的TETRA端-端加密系统,使用帧挪用实现语音信号的同步,使用帧插入技术实现视频信号的同步。系统使用分组密码的输出反馈模式实现端-端密钥序列发生器。在短信息端-端加密应用中,密码分组链接模式用来实现密码校验和的计算,该校验和用来确保数据的完整性。 相似文献
2.
3.
TAE模式的分析和改进 总被引:1,自引:0,他引:1
TAE(tweakable authenticated encryption)模式是一种基于可调分组密码的加密认证模式.研究结果表明,安全的可调分组密码不是安全的TAE模式的充分条件.只有当可调分组密码是强安全的时候,TAE模式才是安全的.同时,还给出了TAE模式的一些改进,得到模式MTAE(modifiedtweakable authenticated encryption),并且证明了其安全性. 相似文献
4.
作为基本工作模式OFB具有流密码的特点,它允许明文的分组单位长度小于分组密码的长度,从而可适应用户数据格式的需要。但当分组单位长度远远小于分组密码的长度时,此模式使用分组密码的效率不高。因为不管加密多短的明文块,每加密一块都要使用一次分组密码。为了提高其效率,引进了计数器和缓冲器,使分组密码的输出得到全部使用。同时为了增强安全性,改进了OFB模式的反馈输入方式,使得在P. Rogaway等人给出的强安全性定义(priv)下是可证明安全的,并用M.Bellare和V.Shoup的玩游戏的方法给出了一个自然、通俗易懂的证明。 相似文献
5.
针对信息互动系统的实际应用及面向移动环境的加密认证系统的特点,结合使用密码技术和硬件令牌的身份认证技术,设计了一个基于内置加密技术的USB Key便携加密认证系统模型.该系统使用了改进的RSA公钥密码技术和SHA-1单向散列函数,设计和实现了身份认证协议以及相关应用接口,可以安全和有效地解决应用中所面临的加密认证问题. 相似文献
6.
7.
现在使用的几乎所有对称加密算法都是基于Feistel分组密码的结构。绝大部分基于网络的常规加密应用都使用分组密码。分组密码是对一个n bits明文分组进行操作产生一个n bits密文分组.共有2n种不同的明文分组。为了使加密过程可逆向操作.每一种明文分组都必需一个惟一的密文分组.这样一种加密变换称为可逆的或非奇异的。 相似文献
8.
9.
10.
针对网络数据加密过程未对其进行分组,导致加密数据易出现泄密现象,提出了一种基于分组密码的网络数据保形加密数学模型,分析分组密码内的混乱规则与扩散规则,进而得到两种规则的优缺点,将两种规则作为密码系统,构建两层前馈网络的分组密码定位模型,通过上述模型对网络数据进行分组加密,分析该模型可以呈现的三种模式的特点,即简单单机模... 相似文献
11.
12.
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three aspects of WSNs security: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms. We have measured and compared their memory and energy consumption on both MicaZ and TelosB sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources. 相似文献
13.
Efficient implementation of block ciphers is critical toward achieving both high security and high-speed processing. Numerous block ciphers have been proposed and implemented, using a wide and varied range of functional operations. Existing architectures such as microcontrollers do not provide this broad range of support. Therefore, we will present a hardware architecture that achieves efficient block cipher implementation while maintaining flexibility through reconfiguration. In an effort to achieve such a hardware architecture, a study of a wide range of block ciphers was undertaken to develop an understanding of the functional requirements of each algorithm. This study led to the development of COBRA, a reconfigurable architecture for the efficient implementation of block ciphers. A detailed discussion of the top-level architecture, interconnection scheme, and underlying elements of the architecture will be provided. System configuration and on-the-fly reconfiguration will be analyzed, and from this analysis, it will be demonstrated that the COBRA architecture satisfies the requirements for achieving efficient implementation of a wide range of block ciphers that meet the 622 Mbps ATM network encryption throughput requirement. 相似文献
14.
A performance comparison for the 64-bit block cipher (Triple-DES, IDEA, CAST-128, MISTY1, and KHAZAD) FPGA hardware implementations is given in this paper. All these ciphers are under consideration from the ISO/IEC 18033-3 standard in order to provide an international encryption standard for the 64-bit block ciphers. Two basic architectures are implemented for each cipher. For the non-feedback cipher modes, the pipelined technique between the rounds is used, and the achieved throughput ranges from 3.0 Gbps for IDEA to 6.9 Gbps for Triple-DES. For feedback ciphers modes, the basic iterative architecture is considered and the achieved throughput ranges from 115 Mbps for Triple-DES to 462 Mbps for KHAZAD. The throughput, throughput per slice, latency, and area requirement results are provided for all the ciphers implementations. Our study is an effort to determine the most suitable algorithm for hardware implementation with FPGA devices. 相似文献
15.
分组密码工作模式的研究现状 总被引:16,自引:0,他引:16
分组密码工作模式是利用分组密码解决实际问题的密码方案.好的工作模式可以弥补分组密码的某些缺憾;相反,不好的工作模式可能带来安全隐患.工作模式的研究始终伴随着分组密码的研究历史,新的分组密码标准的推出,都会伴随着相应工作模式的研究.从针对DES的ECB、CBC、CFB和OFB,到针对AES的CTR、CCM、CMAC、GCM和AESKW,作者以各种模式标准为主线,介绍分组密码工作模式的设计理念、安全模型、二十多年的研究成果以及发展现状. 相似文献
16.
对加密算法的识别是进行密码分析的首要工作.目前的识别方案涵盖了分组密码的识别、流密码的识别以及对称密码和公钥密码混合算法的识别.随着国密算法的应用普及,其安全性也备受关注.针对国密算法提出了基于随机性特征的SM4分组密码体制识别,将国密SM4算法与国际主要标准分组密码算法进行识别.利用随机性测试方法对密文进行特征提取,从而得到特征向量,由这些特征向量构成特征空间,最后借助机器学习算法对特征空间进行训练和测试.实验结果表明,SM4与其他分组密码算法的识别率高达90%以上.后续工作可以对分类算法和特征选取两个方向进行突破,来验证密码识别方案的有效性和可行性. 相似文献
17.
Abstract All-Or-Nothing (AON) is an encryption mode for block ciphers with the property that an adversary must decrypt the entire ciphertext in order to determine any plaintext block. In this article, we present a new encryption scheme with the AON property, based on operations defined by quasigroups. The proposed procedure is a reliable and secure preprocessing step to any other common encryption mode, aiming to slow down the brute force searches against block ciphers. 相似文献
18.
Razaq Abdul Iqra Ahmad Musheer Yousaf Muhammad Awais Masood Sarfaraz 《Multimedia Tools and Applications》2021,80(13):20191-20215
Multimedia Tools and Applications - Substitution-boxes have significant role in block ciphers as they are the only component which offers nonlinearity in the anticipated symmetric encryption... 相似文献
19.
李凌昊 《计算机光盘软件与应用》2011,(21)
在现在这个信息发展迅速的社会,数据的信息安全显得越来越重要。加密学作为信息安全中很重要的分支,从无到有,从最开始的简单加密体制,到分组加密原理,序列密码,再到现在普遍的RSA公钥加密体制,其安全性也越来越强。本文作者通过课上所学介绍了传统密码学的优缺点及近些年来新发展的混沌原理在密码学中的发展。 相似文献
20.
超混沌语音加密的网络传输 总被引:1,自引:0,他引:1
介绍了基于超混沌的语音加密及其网络通信,文章提出了一种基于广义Henon映射的超混沌块加密算法,将广义Henon映射扩展并离散化、结合块加密达到很好加密效果,同时通过软件实现其加密算法和网络通信过程,最后对系统的保密性能做了详细分析。 相似文献