共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
混沌系统具有良好的伪随机性、混频特性、对初始状态的敏感性和复杂的映射参数等特性,这些特性与密码学要求的产生伪随机信号、混乱和扩散、加、解密密钥的难以预测等属性是十分吻合的。近些年来,不少学者提出了多种基于混沌理论的密码算法,但对其安全性并没有详尽的分析。针对一种较新的基于Feistel结构的混沌分组密码,应用不可能差分的分析方法,在固定S盒的情况下对其安全性进行了分析,并在动态S盒的情况下说明了其安全性所在。 相似文献
3.
4.
In this paper, we try to give a security evaluation of LIZARD stream cipher in regard to fault attacks, which, to the best of our knowledge, is the first fault analysis on LIZARD. We design a differential engine of LIZARD to track the differential trail of the keystreams. It is shown that the distributions of the keystream differences are heavily biased. Utilizing this characteristic, we propose an improved method to identify the fault location for LIZARD whose success probability approaches 1. Then we use the fault-free keystream and faulty keystreams to generate system of equations in internal state variables and solve it by SAT solver. The result shows that with 100 keystream bits, only 6 different faults are needed to recover the internal state. Finally, the comparison between LIZARD and Grain v1 shows that LIZARD is more resistable than Grain v1 in regard to fault attacks. 相似文献
5.
Decorrelation: A Theory for Block Cipher Security 总被引:2,自引:0,他引:2
Pseudorandomness is a classical model for the security of block ciphers.
In this paper we propose convenient tools in order to study it in connection
with the Shannon Theory, the Carter–Wegman universal hash functions paradigm,
and the Luby–Rackoff approach.
This enables the construction of new ciphers with security proofs under
specific models.
We show how to ensure security against basic differential and linear
cryptanalysis and even more general attacks.
We propose practical construction schemes. 相似文献
6.
Low powered devices, such as smart phones, tablets and sensors, present a particular challenge for advanced encryption systems. In this paper, we present a new quasigroup block encryption system that has low memory and computational requirements and hence suitable for low powered devices. We compare its performance against Advanced Encryption Standard-256 (AES-256) bit algorithm using the NIST statistical test suite (NIST-STS). Since it is well known that a good encryption algorithm must destroy any statistical properties of the input sequence and produce output close to a true random sequence, the NIST-STS suite results provide us a good test bench. In almost all tests from the suite, the proposed algorithm performs better than AES-256. 相似文献
7.
对正形置换进行了初步分类,给出了几个重要性质,简化了一些定理的证明,概况了美国TET公司对正形置换的研究与应用情况,最后提出了一些与分组密码有关的研究方向。 相似文献
8.
立方攻击是在2009年欧洲密码年会上由Dinur和Shamir提出的一种新型密码分析方法,该方法旨在寻找密钥比特之间的线性关系。CTC(Courtois Toy Cipher)是N.Courtois设计的一种用于密码分析研究的分组密码算法,该算法的密钥长度、明文长度和迭代轮数都是可变的。文中利用立方攻击方法针对密钥长度为60bit的4轮CTC进行了分析,在选择明文攻击条件下,结合二次测试可恢复全部密钥,密钥恢复阶段仅需要不到2~10次加密算法。 相似文献
9.
An introduction to Block Cipher Cryptanalysis 总被引:1,自引:0,他引:1
de Canniere C. Biryukov A. Preneel B. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2006,94(2):346-356
Since the introduction of the Data Encryption Standard (DES) in the mid-1970s, block ciphers have played an ever-increasing role in cryptology. Because of the growing number of practical applications relying on their security,block ciphers have received, and are still receiving, a substantial amount of attention from academic cryptanalysts. This has led, over the last decades,to the development of several general techniques to analyze the security of block ciphers. This paper reviews the fundamental principles behind today's state of the art in block cipher cryptanalysis. 相似文献
10.
11.
王育民 《信息安全与通信保密》1997,(2)
介绍了20余种分组密码算法,这些算法反应了近年来分组密码算法的发展,其中有些已经或将可能用于现代通信网,特别是用在Internet中。另外还介绍了分组密码的一种新的分类方法,它可能为分组密码的分析和设计提供一点新的思路。 相似文献
12.
混沌系统具有良好的伪随机性、混频特性、对初始状态的敏感性、复杂的映射参数等特性,这些特性与密码学要求的产生伪随机信号、混乱和扩散、加解密密钥的难以预测等属性十分吻合。文中针对一种较新的基于Feistel结构的混沌分组密码,应用线性密码分析方法,分别在固定S盒、动态S盒两种情况对该算法进行了分析,并进行了大量的仿真测试。分析测试结果表明,相比较于传统分组密码,该混沌分组密码能够更有效地抵抗线性密码攻击,性能良好。 相似文献
13.
论文讨论了滑动攻击的基本原理,提出了截断滑动攻击的概念,利用截断滑动攻击分析了改进的LEX流密码算法。针对截断滑动攻击对LEX算法安全性的影响,文章对改进的LEX的密钥扩展方案做了修改,使滑动攻击和截断滑动攻击对改进的LEX不再有效。 相似文献
14.
对于S盒的顺序,选择两轮最优迭代特征最小的排列;对于P置换应选择各轮最优迭代特征概率小于两轮最优迭代特征概率的置换,对DES中S盒和P置换进行重新筛选,得到了完全抗线性和差分密码分析的变种DES。与其它变种DES相比,它不但保留了原S盒的设计结构而且安全性更强。 相似文献
15.
The notion of pseudorandomness is the theoretical foundation on which to consider the soundness of a basic structure used in some block ciphers. We examine the pseudorandomness of the block cipher KASUMI, which will be used in the next‐generation cellular phones. First, we prove that the four‐round unbalanced MISTY‐type transformation is pseudorandom in order to illustrate the pseudorandomness of the inside round function FI of KASUMI under an adaptive distinguisher model. Second, we show that the three‐round KASUMI‐like structure is not pseudorandom but the four‐round KASUMI‐like structure is pseudorandom under a non‐adaptive distinguisher model. 相似文献
16.
17.
由于密码分析研究的进展及DES自身的弱点,原64比特的DES将不能作为数据加密的标准算法而长期存在。在原来工作的基础上,本文提出了256比特的分组密码方案。密码算法由基于混沌映射的数字滤波器构造。 相似文献
18.
分组密码安全性研究的新进展 总被引:2,自引:0,他引:2
本文介绍了近期在分组密码(DES一类)安全性研究的进展情况,重点对差分密码分析和线性密码分析的方法和结果进行论述,对分组密码的安全性提出了展望。 相似文献
19.
为了降低简单能量算法、差分能量分析对分组密码攻击的可能性,针对分组密码芯片能量消耗情况,实施了对密码芯片的模块保护设计。通过对密码芯片中算法的线性部分与非线性部分进行抗能量攻击的模块保护设计,提高了密码芯片抗能量攻击性能。 相似文献
20.
密码专用可编程逻辑阵列(CSPLA)是一种数据流驱动的密码处理结构,该文针对不同规模的阵列结构和密码算法映射实现能效关系的问题,首先以CSPLA的特定硬件结构为基础,以分组密码的高能效实现为切入点,建立基于该结构的分组密码算法映射能效模型并分析影响能效的相关因素,然后进一步根据阵列结构上算法映射的基本过程提出映射算法,最后选取几种典型的分组密码算法分别在不同规模的阵列进行映射实验.结果表明越大的规模并不一定能够带来越高的能效,为取得映射的最佳能效,阵列的规模参数应当与具体的硬件资源限制和密码算法运算需求相匹配,CSPLA规模为4×4~4×6时映射取得最优能效,AES算法最优能效为33.68 Mbps/mW,对比其它密码处理结构,CSPLA具有较优的能效特性. 相似文献