期刊文献+

基于混沌的双模块Feistel结构高安全性高速分组密码算法安全性分析 被引量:1

Security Analysis of Block Cipher CFE
下载PDF
导出
摘要 该文对基于混沌的双模块Feistel结构(CFE)高安全性高速分组算法的安全性进行了分析。分析结果表明,算法不适合用积分攻击、中间相遇攻击、不变量攻击、插值攻击和循环移位攻击分析其安全性;可以抵抗相关密钥攻击;更进一步地构造出了5轮不可能差分特征链,并利用其进行区分攻击;求得算法的活性S盒下界为6,概率约为2–21;算法存在5轮零相关线性特征。 The security of high security and high speed block cipher algorithm of two-module FEistel structure based on Chaos(CFE)is analyzed.The results show that the cipher is not suitable to use integral attack,meat-in-the-middle attack,invariant attack,interpolation attack and circle shift attack to analyze its security.And it can resist the related-key attack.Furthermore,5 rounds of impossible differential characteristic are constructed and used to distinguish attacks.The lower bound of the active S-box is 6,and the probability is about 2–21.There are 5 rounds of linear characteristic with zero-correlation.
作者 杜小妮 段娥娥 王天心 DU Xiaoni;DUAN Ee;WANG Tianxin(College of Mathematics and Statistics,Northwest Normal University,Lanzhou 730070,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2021年第5期1365-1371,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61772022)。
关键词 混沌密码 差分活性S盒 不可能差分攻击 区分攻击 零相关线性攻击 Chaos cipher Differential active S-box Impossible differential attack Distinguish attack Zerocorrelation linear attack
  • 相关文献

参考文献10

二级参考文献60

  • 1金晨辉,高海英.对两个基于混沌的序列密码算法的分析[J].电子学报,2004,32(7):1066-1070. 被引量:28
  • 2吴文玲,张文涛,冯登国.Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J].Journal of Computer Science & Technology,2007,22(3):449-456. 被引量:21
  • 3Matsui M. Linear cryptanalysis method for DES cipher[A]. In:Advance in Cryptology Euroerypt'93[C]. LNCS 765.Springer Verlag, 1994: 386-397.
  • 4张文涛,吴文玲,张蕾.对低轮AES-256的相关密钥-不可能差分密码分析(英文)[J].软件学报,2007,18(11):2893-2901. 被引量:5
  • 5MATTHEWS R. On the derivation of a "chaotic" encryption algorithm [J]. Cryptologia, 1989, 13(1): 29-42.
  • 6JAKIMOSKI G, KOCAREV L. Chaos and cryptography: block encryption ciphers based on chaotic maps [J]. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, 2001, 48(2): 163-169.
  • 7KOCAREV L, JAKIMOSKI C. Logistic map as a block encryption algorithm [J]. Physics Letters A, 2001, 289(4): 199-206.
  • 8TANG G, LIAO X, CHEN Y. A novel method for designing S-boxes based on chaotic maps [J]. Chaos, Solitons ~= Fractals, 2005, 23(2): 413-419.
  • 9CHEN G, CHEN Y, LIAO X. An extended method for obtaining S-boxes based on three- dimensional chaotic Baker maps [J]. Chaos, Solitons & Fractals, 2007, 31(3): 571-579.
  • 10CHEN G. A novel heuristic method for obtaining S-boxes [J]. Chaos, Solitons &= Fractals, 2008, 36(4): 1028-1036.

共引文献48

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部