共查询到20条相似文献,搜索用时 15 毫秒
1.
Howard M. Heys 《Cryptologia》2013,37(3):189-221
In this paper, we present a detailed tutorial on linear cryptanalysis and differential cryptanalysis, the two most significant attacks applicable to symmetric-key block ciphers. The intent of the paper is to present a lucid explanation of the attacks, detailing the practical application of the attacks to a cipher in a simple, conceptually revealing manner for the novice cryptanalyst. The tutorial is based on the analysis of a simple, yet realistically structured, basic Substitution-Permutation Network cipher. Understanding the attacks as they apply to this structure is useful, as the Rijndael cipher, recently selected for the Advanced Encryption Standard (AES), has been derived from the basic SPN architecture. As well, experimental data from the attacks is presented as confirmation of the applicability of the concepts as outlined. 相似文献
2.
差分-代数攻击是一种新的攻击方法,此方法结合了差分分析和代数攻击的思想。差分分析和代数攻击都是对高级加密标准(AES)最有效的攻击算法之一。对差分-代数如何在AES中应用进行了分析,并成功地应用此方法对5轮AES-256进行了攻击,使之比穷尽攻击更有效。 相似文献
3.
Raphael Chung-Wei Phan 《Cryptologia》2013,37(4):361-374
Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES). In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently. 相似文献
4.
Raphael Chung-Wei Phan 《Cryptologia》2013,37(4):283-306
In this paper, we present a mini version of Rijndael, the symmetric-key block cipher selected as the Advanced Encryption Standard (AES) recently. Mini-AES has all the parameters significantly reduced while at the same time preserving its original structure. It is meant to be a purely educational cipher and is not considered secure for actual applications. The purpose is such that once undergraduate students and amateur cryptanalysts have grasped the basic principles behind how Mini-AES works, it will be easy for them to move on to the real AES. At the same time, an illustration of how the Square attack can be applied to Mini-AES is presented in the hope that Mini-AES would also serve as a testbed for students to begin their cryptanalysis efforts. 相似文献
5.
6.
7.
AES算法的列混合变换具有最优的扩散特性,但它与逆列混合变换的硬件电路实现效率相差较大。通过分析AES算法列混合变换,根据电路实现特点,给出了一批加解密可以共用电路的列混合变换,在保持最优扩散性质的同时,新的列混合变换电路资源开销与效率同AES算法相当。 相似文献
8.
9.
在随机掩码技术基础上,定义了若干细粒度的随机掩码操作,将AES(Advanced Encryption Standard)算法中各种变换分解为细粒度随机掩码操作的序列,并使得所有的中间结果均被不同的随机量所掩码。为高效实现基于细粒度随机掩码操作分解的AES算法,定义了三种扩展指令,结合指令随机调度方法,给出了AES算法的完整实现流程,并指出这种实现技术可以抗一阶和高阶功耗攻击。实验结果表明,与其他典型防护技术相比,这种实现技术具有安全性、运算性能以及硬件复杂度等方面的综合优势。 相似文献
10.
本文对线性选择算法在比较算法类中给出了基于中值序列而设计的任何改进算法的复杂度下界;从应用的角度对子序列进行有关技术处理,并对递归参量进行动态选择,给出了线性选择算法的实用性改进,并对这一改进算法在共享存储的SIMD机器上给出了并行化。 相似文献
11.
12.
A compact AES core with on-line error-detection for FPGA applications with modest hardware resources
Uroš LegatAuthor Vitae Anton Biasizzo Author VitaeFranc Novak Author Vitae 《Microprocessors and Microsystems》2011,35(4):405-416
This paper presents a compact, low-cost, on-line error-detection architecture for a 32-bit hardware implementation of the AES. The implemented AES is specially designed for FPGA-based embedded applications, since it is tuned to specific FPGA logic resources. The on-line error-detection is based on parity codes. The parity prediction is implemented in the AES encryption, decryption, and key expansion process. The developed solution has been upgraded to an efficient BIST with a high fault coverage and a low hardware overhead. 相似文献
13.
14.
针对传统AES(高级加密标准)加密算法存在密钥空间小、固定不变等缺点,提出了一个新的超混沌系统和AES结合的图像加密算法。该算法首先利用超混沌Qi系统产生超混沌序列,截取混沌序列作为AES加密算法的目标密钥,且截取过程中引入了明文图像像素的平均值作为参数,以适应明文图像的变化。然后,将目标密钥代入AES加密算法进行两轮循环加密,且每轮加密过程中的S盒和轮密钥由混沌序列产生,增强了密钥的随机性。仿真实验结果表明,该算法能够很好地结合两者的优点,达到很好的加密效果。 相似文献
15.
In this paper, we examine the security of block ciphers referred to as substitution-permutation networks (SPNs). When the SPN has 2-round, we obtain an upper bound on the maximum differential probability. We also obtain an upper bound on the maximum linear hull probability. Our results extend and sharpen the known results for the 2-round SPNs. 相似文献
16.
多比特DEMA攻击是一种有效的密码算法旁道攻击方法。在分析汉明重量模型和DEMA攻击原理的基础上,提出了一种多比特DEMA尖峰模拟分析方法,并以AES算法为例进行了模拟分析,最后针对AES算法进行了多比特DEMA攻击实现,攻击结果验证了DEMA尖峰模拟分析方法的有效性。 相似文献
17.
AES算法原理及其实现 总被引:18,自引:0,他引:18
在研究分析了AES加密原理的基础上着重说明了AES算法实现的具体步骤,并用C语言完整地实现了AES算法,并利用密文分组链接(CBC)方式将其用于对文件的加密/解密(密钥长度可选)。AES结合其它技术还可实现更为广泛的安全协议。 相似文献
18.
19.
基于内外混合流水线的高吞吐率AES结构 总被引:1,自引:0,他引:1
提出了一种基于加解密轮内外流水线的、高性能及高吞吐率的128 bit AES算法的硬件实现方法.在此之前人们多采用查找表来实现AES算法中的SubBytes和InvSubBytes转换过程,本设计则仅仅使用了进行复合域运算的组合逻辑单元,硬件面积得以缩小,同时还可以将组合逻辑单元划分为6级次级流水线,轮外和轮内流水线得到更深层次的利用.使用本设计方案,在Altera DE2-115设备上以570 MHz频率实现的加密器可以达到73.562 Gb/s的吞吐率. 相似文献