首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 108 毫秒
1.
高级加密标准AES候选算法的比较   总被引:1,自引:0,他引:1  
通过了AES第2轮选拔的MARS、RC6TM、Rijndael、Serpent、TwoFish5种加密算法,每种算法各有千秋.作者从多种角度对以上5种算法进行比较,分析了各自的优缺点.  相似文献   

2.
高级加密标准AES候选之一--Rijndael   总被引:3,自引:0,他引:3  
介绍了理解Rijndael算法的数学基础和Rijndael算法本身,并介绍了此算法用不同语言编写时的执行性能和对目前几种流行的攻击算法的抵抗能力.  相似文献   

3.
高级加密标准AES候选之一--MARS算法   总被引:3,自引:0,他引:3  
本文对MABS算法进行了详细介绍.描述了MABS算法的加解密过程及子密钥生成过程.  相似文献   

4.
介绍了AES的一个候选算法——Twofish,它是一个128位分组加密算法.该密码由一个16圈的Feistel网络构成.描述了Twofish的加解密过程及子密钥生成过程,同时对其性能和抗攻击能力作了分析.  相似文献   

5.
高级加密标准AES候选之一--Serpent   总被引:1,自引:0,他引:1  
介绍了一个新的分组加密算法——Serpent,它是AES的一个候选算法,该算法使用256位的密钥对128位的块数据进行加解密;描述了Serpent的加解密过程及子密钥生成过程,同时对其性能作了部分阐述.  相似文献   

6.
高级加密标准AES评判规则   总被引:1,自引:0,他引:1  
作为DES的替代标准,AES密码算法的选择已成为世人关注的热点问题.美国国家标准与技术协会(NIST)接受了15种候选密码算法的提案,并以统一的规则进行评判,选择优胜者作为AES的算法标准.AES的制定将会成为密码发展史上的又一里程碑.本文对其评判规则做出了简明的阐述.  相似文献   

7.
随着无线射频识别(RFID)技术在各个应用领域的迅猛发展,轻量级(lightweight)加密算法日益受到人们的关注。在RFID中硬件资源是极端受限制的,为了在算法加密性能与硬件资源开销间得到一个好的权衡,把椭圆曲线加密算法(ECC)与流密码加密算法中RC4算法,分组加密算法中的PRESENT算法,进行分析比较。并选取Atmega-32微处理器在AVR Studio仿真平台上进行分析比较。实验获得了这三种算法在算法运行效率、密码安全强度和硬件资源开销间的比较结果。得出,在硬件资源同样极端受限的环境下,ECC所表现出的运行效率和密码安全强度是其他两种算法所不能比拟的,证明了非对称加密算法也可以做到轻量化。  相似文献   

8.
实现高速加密的新方法   总被引:1,自引:0,他引:1  
过去的密码算法实际上都存在这样那样的不足。例如:流密码算法设计难度较大,本身不宜公开,分组密码算法实现成本较高,公钥算法加密速度不高等。鉴于这些情况,休斯飞机公司的研究人员开发了一种新型的流密码算法,它以众所周知的移位寄存器数学和德.布鲁因函数为基础,采用单个工作寄存器与多输出功能件相结合的结构,能够以较低的成本实现高强度信息保护,并且加密速度能被大大提高。  相似文献   

9.
RC5循环覆盖链算法是一种面向字结构,由三个可变参数的一组加密算法,含有五个基础运算部件,具有适应性强、运算速度快、安全、结构简单、容易实现、内存要求较低等优势,不易被线性分析、差分分析。RC5算法因为这些优势,基于该算法制作的加/解密芯片,可用于移动信息收发设备的通信保密,被集成在较小的设备上,可节省成本,降低能耗,从而延长设备的时间,适合不同的安全需求的设备。RC5还可直接用于通信软件的信息加密,保障通信的安全。对于通信软件、加/解密芯片使用RC5加密解密算法参数的选择,需要根据加密速度、安全性需求设定。  相似文献   

10.
当代社会,信息安全成为信息领域重要的研究课题.本文对现有的密码算法作了比较分析后,结合RC4和RSA算法的优点,提出了混合加密算法方案.针对算法的特点,给出了实现方法,并设计了基于该算法的DSP硬件加密卡.  相似文献   

11.
RC6加密算法在VPN中的应用   总被引:1,自引:0,他引:1  
数据的安全性和保密性是建立VPN(虚拟专用网)的关键所在,随着技术的发展和计算能力的提高,原有的加密算法的安全性不断下降,RC6是一个安全、简单、灵活的参数化分组加密算法。详细介绍了RC6-w/r/b的加解密算法及其在IPSEC中的应用,并分析了该算法的性能。  相似文献   

12.
RC5 is a block cipher that has several salient features such as adaptability to process different word lengths with a variable block size, a variable number of rounds and a variable‐length secret key. However, RC5 can be broken with various attacks such as correlation attack, timing attack, known plaintext correlation attack and differential attacks, revealing weak security. We aimed to enhance the RC5 block cipher to be more secure and efficient for real‐time applications while preserving its advantages. For this purpose, this article introduces a new approach based on strengthening both the confusion and diffusion operations by combining chaos and cryptographic primitive operations to produce round keys with better pseudo‐random sequences. Comparative security analysis and performance evaluation of the enhanced RC5 block cipher (ERC5) with RC5, RC6 and chaotic block cipher algorithm (CBCA) are addressed. Several test images are used for inspecting the validity of the encryption and decryption algorithms. The experimental results show the superiority of the suggested enhanced RC5 (ERC5) block cipher to image encryption algorithms such as RC5, RC6 and CBCA from the security analysis and performance evaluation points of view.  相似文献   

13.
Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate two systematic approaches to low-cost, low-latency CED for symmetric encryption algorithm RC6. The proposed techniques have been validated on FPGA implementations of RC6, one of the advanced encryption standard finalists.  相似文献   

14.
Heys  H.M. 《Electronics letters》1997,33(10):836-838
The author examines the application of linear cryptanalysis to the RC5 private-key cipher and shows that there are expected to be weak keys for which the attack is applicable to many rounds. It is demonstrated that, for the 12-round nominal RC5 version with a 64 bit block size and a 128 bit key, there are 228 weak keys for which only ~217 known plaintexts are required to break the cipher. There are 268 keys for which the cipher is theoretically breakable, requiring ~257 known plaintexts. The analysis highlights the sensitivity of RC5 security to its key scheduling algorithm  相似文献   

15.
对于目前局域网中短消息加密算法的安全性漏洞,采用一种经典的加密算法,即Playfair加密法与RC4相结合的算法,为无线局域网络中短消息的传递提供了一种可靠的加密方法。运用该复合的加密算法可以有效地避免RC4密钥的静态安全性问题,还能避免密钥被窃取而导致的加密算法被破解。  相似文献   

16.
Time-triggered (TT), Rate-constrained (RC) and Best-eff ort (BE) traffics are included in Time-triggered ethernet (TTEthernet). For RC messages trans-mission is aff ected by TT messages, traditional schedul-ing policy cannot be well applied in TTEthernet. Dynamic programming priority (DPP) algorithm combines priority policy and dynamic programming algorithm for scheduling RC flows. The time slice for RC flows transmission is got by SMT solver YICES; RC flows are classified to different groups according to the priorities; Higher priority pack-ets in one time slice are scheduled using First input first output (FIFO) policy and lower priority packets are sched-uled by Dynamic programming policy. DPP policy guaran-tees different real-time requirements of heterogeneous RC flows, and make the best of time slice resource in aviation industries. The upper bound End-End of three methods and algorithm feasibility is analyzed. Simulation in avia-tion shows that DPP policy can obtain better real-time performance than other scheduling algorithms.  相似文献   

17.
A thermal resistor-capacitor (RC) model is introduced for the power insulated gate bipolar transistor (IGBT) modules used in a three-phase inverter. The parameters of the model are extracted from the experimental data for the transient thermal impedance from-junction-to-case Z/sub jc/ and case-to-ambient Z/sub ca/. The accuracy of the RC model is verified by comparing its predictions with those resulting from the three-dimensional finite element method simulation. The parameter extraction algorithm is easy to adapt to other types of power modules in an industrial application environment.  相似文献   

18.
田璐  谢淑翠  张建中 《电视技术》2015,39(11):15-18
为保证视频传输过程中的安全性,提出了一种基于超混沌与RC4相结合的视频加密算法.利用四维超混沌映射产生4个伪随机序列,将其分别作为RC4算法的种子密钥,实现DC系数、非零AC系数符号和运动矢量MV符号的联合加密.仿真加密算法的同时对算法的加密效果和安全性进行了分析,实验结果表明,该算法具有较大的密钥空间、较高的密钥敏感性以及较高的安全性.  相似文献   

19.
从RC5到RC6     
论文详细描述并分析了从RC5到RC6的演化设计过程,在详细研究了RC6性能的同时,指出了应该如何从一个旧的密码设计出好的新密码。最后对RC6和Rijndael作了一些比较,指出各自在性能上的优缺点。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号