首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
    
In this paper, we describe the Advanced Encryption Standard (AES), which has been approved after an international competition by the National Institute of Standards and Technology.  相似文献   

2.
    
LOUIS KRUH 《Cryptologia》2013,37(2):163-172
Abstract

In this article, we describe the five block cipher modes of operation that have been approved by the National Institute of Standards and Technology (NIST) for confidentiality. Each mode specifies an algorithm for encrypting/decrypting data sequences that are longer than a single block.  相似文献   

3.
基于硬件的AES算法   总被引:2,自引:1,他引:1  
张九华  胡廉民 《计算机工程》2008,34(20):175-176
分析AES算法原理,构建基于FPGA的硬件实现框架,描述数据加解密单元和密钥扩展单元的工作机制和硬件结构,引入核心运算模块复用的设计思想,在不影响系统效率的前提下降低芯片资源的使用率,并对该系统结构进行了芯片级的验证。实验结果表明,在38 MHz工作频率下,该系统的处理速度为405 Mb/s。  相似文献   

4.
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seldom used in the analysis of a cipher, and thus one cannot often get the desired formal assurance that the cipher is free from unwanted properties that may weaken its strength.In this paper, we claim that one can feasibly encode the low-level properties of state-of-the-art cryptographic algorithms as SAT problems and then use efficient automated theorem-proving systems and SAT-solvers for reasoning about them. We call this approach logical cryptanalysis.In this framework, for instance, finding a model for a formula encoding an algorithm is equivalent to finding a key with a cryptanalytic attack. Other important properties, such as cipher integrity or algebraic closure, can also be captured as SAT problems or as quantified boolean formulae. SAT benchmarks based on the encoding of cryptographic algorithms can be used to effectively combine features of real-world problems and randomly generated problems.Here we present a case study on the U.S. Data Encryption Standard (DES) and show how to obtain a manageable encoding of its properties.We have also tested three SAT provers, TABLEAU by Crawford and Auton, SATO by Zhang, and rel-SAT by Bayardo and Schrag, on the encoding of DES, and we discuss the reasons behind their different performance.A discussion of open problems and future research concludes the paper.  相似文献   

5.
基于混沌系统的独立密钥DES数字图像加密算法*   总被引:1,自引:1,他引:1  
将图像数据矩阵视为普通数据流,利用混沌动力学的特性生成定长的混沌二值序列作为密钥对该数据流进行加密,提出了基于混沌系统的独立密钥DES数字图像加密算法。该算法安全性高,实验结果令人满意。  相似文献   

6.
    
In this paper, we examine the security of reduced AES-192 and AES-256 against related-key rectangle attacks by exploiting the weakness in the AES key schedule. We find the following two new attacks: 9-round reduced AES-192 with 4 related keys, and 10-round reduced AES-256 with 4 related keys. Our results show that related-key rectangle attack with 4 related keys on 9-round reduced AES-192 requires a data complexity of about 2101 chosen plaintexts and a time complexity of about 2174.8 encryptions, and moreover, related-key rectangle attack with 4 related keys on 10-round reduced AES-256 requires a data complexity of about 297.5 chosen plaintexts and a time complexity of about 2254 encryptions. These attacks are the first known attacks on 9-round reduced AES-192 and 10-round reduced AES-256 with only 4 related keys. Furthermore, we give an improvement of the 10-round reduced AES-192 attack presented at FSE2007, which reduces both the data complexity and the time complexity. Supported by the National Natural Science Foundation of China (Grant No. 60673072), and the National Basic Research Program of China (Grant No. 2007CB311201)  相似文献   

7.
    
Peter Wayner 《Cryptologia》2013,37(2):107-112
This paper describes modifications of Huffman coding permitting encryption to accompany compression. The resulting cipher can be used alone or as a first pass to protect systems like the Data Encryption Standard (DES) from an attack by a brute force machine.  相似文献   

8.
利用加解密算法DES和shamir门限秘密共享算法,提出一种门限加密方案的实现.完成对文本和图像的加解密。通过对算法接口的分析,在算法理论的基础上.巧妙地将两种不同的信息安全算法有机结合在一起,并采用将像素值转换为二进制串的方式对图像进行加密,利用Java高级语言实现完整的可视化加解密过程。  相似文献   

9.
    
In this paper, we present a mini version of Rijndael, the symmetric-key block cipher selected as the Advanced Encryption Standard (AES) recently. Mini-AES has all the parameters significantly reduced while at the same time preserving its original structure. It is meant to be a purely educational cipher and is not considered secure for actual applications. The purpose is such that once undergraduate students and amateur cryptanalysts have grasped the basic principles behind how Mini-AES works, it will be easy for them to move on to the real AES. At the same time, an illustration of how the Square attack can be applied to Mini-AES is presented in the hope that Mini-AES would also serve as a testbed for students to begin their cryptanalysis efforts.  相似文献   

10.
IDEA是一个著名的加密算法,被广泛应用于各种领域,最著名的有PGP。基于IDEA算法,提出了一种新颖的十进制短分组加密技术。针对十进制数运算的特点,在加密算法中定义了三种新的运算,并从理论上证明新的运算能保证十进制加密算法的可逆性。将该算法应用于短分组加密仿真系统中的结果表明,算法具有良好的密码学特性,加解密的各项扩散率指标均达到很好的效果,其中1轮加密过程过后明文对密文的扩散率就达到了完全扩散。该加密算法可广泛用于各种需要十进制数加密的领域。  相似文献   

11.
一种DES密钥延长方法   总被引:1,自引:0,他引:1  
邱伟星  肖克芝  倪昉  黄华 《计算机工程》2011,37(5):167-168,171
数据加密标准(DES)是Feistel网络型加密算法的实现,但DES的密钥长度较短,不能适应目前网络安全的需求。为此,提出一种DES密钥延长方法,将DES算法的密钥长度由56 bit扩展到112 bit。理论和实例测试结果表明,使用该方法改进后的DES算法加密有效。  相似文献   

12.
A data security communications interface unit has been developed to allow data transfer between Apple terminals in either plain or encrypted format under user control. The unit employs the Data Encryption Standard algorithm and has a degree of sophistication sufficient to meet most user needs. The unit uses the 6502 microprocessor to control encryption, decryption and communications. In addition to the transfer of encrypted data, the interface also provides a facility for storing encrypted program and data files locally in the Apple disc system. Further, the encryption system has been designed to allow storage and retrieval of completely encrypted or partly encrypted frames of information on the Prestel database. The interface has been tested extensively using several DES modes of operation.  相似文献   

13.
吴双燕 《福建电脑》2005,(12):130-130,76
本文在对HTTP协议的分析基础上,论述了如何在J2ME上实现手机和PC服务器通过特定的无线通讯方式利用HTTP协议来进行可靠的数据传输。另外在数据传输过程中采用DES(Data Encryption Standard)这种常见的对称加密算法对数据进行加密和解密,并且对DES算法的实现过程加以解释。  相似文献   

14.
针对标准相关性能量分析(CPA)在旁路攻击中存在的运算时间长、搜索空间大等问题,在分析了功耗泄漏信息与数据相关性的基础上,结合标准相关性分析方法,提出一种基于密钥差异位的改进相关性分析方法,该方法利用加密密钥同猜测密钥差异位与猜测密钥同实际能量消耗间的相关系数反比映射这一特征,在给定一个密钥假设的情况下,通过逐位改变0、1取值进行相关性计算获取正确密钥;在搭建实验平台上,针对AES首轮首字节加密实现对改进前后的相关性分析方法分别进行攻击实验,对比表明新方法在破解密钥的基础上成功将密钥搜索空间由原来28成功将至9。  相似文献   

15.
卢丹华  钟诚  杨锋 《计算机应用》2011,31(4):1003-1005
为适应高速网络对大容量文件加解密速度的要求,提出了一种适用于多核环境下的AES保密模式——MACBC。MACBC模式利用多核计算机的多级缓存和共享内存等方面的特点,在保证安全性和对内存空间需求基本不变的情况下,把容量较大的待加密文件拆分为若干数据块,然后由多核心分别对这些数据块进行多线程加解密。实验表明,该模式加速效果明显,并且文件容量越大,加速比越高。  相似文献   

16.
随着网络信息技术的发展,对网络上传输的数据的安全性要求越来越高,而计算机密码学中的加密技术是保证信息保密性的一种有效手段。文中概括介绍了密码学中的对称密码体制、非对称密码体制和量子密码等三类主要加密技术的相关发展情况,并指出一些值得关注的问题。  相似文献   

17.
    
This article presents an overview of the concepts of and motivation for the OCB block cipher mode of operation. OCB is well suited for IoT, wireless, and other constrained devices where processing time and energy consumption are design issues. The article describes two versions of the OCB algorithm (OCB1 and OCB3) that have been widely accepted.  相似文献   

18.
随着网络普及和带宽提升,网络语音传输已成为现实,但网络的开放性也给语音安全带来了巨大威胁。数据加密常被用来保证网络语音通信的安全,混沌序列的宽频谱、类随机、参数敏感等特点使其非常适合作为加解密密钥。为避免长时间使用固定混沌序列作为密钥带来的安全隐患,设计并实现了一种用于VoIP的动态混沌加解密方案,利用混沌密钥动态交换机制实现收发端混沌根密钥交换,由根密钥通过Henon映射、改进的Logistic映射及非线性置换随机生成混沌密钥,接收端根据接收到的根密钥先生成解密密钥,然后对语音密文进行解密。测试结果表明,该动态混沌加解密系统具有良好的保密效果,可用于网络语音保密通信中。  相似文献   

19.
通过对DES加密原理的分析,推导出了DES的算法公式,通过对算法中核心部分的数学分析和化简,借助Verilog语言与C语言编程以及EDA设计软件的帮助,实现了DES算法的FPGA条件下的重构设计,同时对密钥的动态管理提出了新的设计方案。最后,通过对设计结果的功能仿真和测试分析,论证了整个设计过程的正确性。  相似文献   

20.
基于Cache行为的旁路攻击   总被引:1,自引:0,他引:1  
分析新型高速缓冲存储器(Cache)旁路攻击技术,给出一种Cache旁路攻击方法。针对S盒操作使用查找表处理的数据加密标准(DES)算法实现,通过获取DES加密过程中前2轮加密运算对应的Cache命中信息,结合数学分析方法,可以有效地缩小DES密钥搜索空间。对Cache存储器行为和数学分析攻击进行仿真实现的结果显示,通过26个选择明文,大约耗费230次离线DES加密时间成功地恢复了DES密钥。给出了防御Cache攻击的基本对策。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号