期刊文献+

一种带有时序参数的分组密码(英文)

BLOCK CIPHERS WITH TC PARAMETERS
下载PDF
导出
摘要 通过将系统时间和数据组号混合到轮密钥之中,可以有效地防止一些对分组密码算法的攻击.文中探讨了这类实用的密码算法方案的一般模式.由于变更部分轮密钥通常比若干轮变换快很多,这类方案会有明显的效率优势.在安全方面,由于加密时所有明文组几乎都各自使用了不同的轮密钥,而绝大数攻击方法需要一定数量相同密钥加密的明密文对,从而使这些攻击方法不能奏效.这也许会导致这类带有时间组号参数的分组算法在减少迭代轮情况下仍然是安全的.做为例子,给出了一个在安全和效率方面均有良好性能的密码算法TCR6. Certain kind of attacks on some block ciphers may be efficiently resisted by mixing the round keys with a group of frequently changed numbers computed from system time and the counter of data blocks.The general form of such practical schemes has been discussed.Because the changing of certain part of round keys is often much faster than the operations of certain rounds of encryption (or decryption),the efficiencies of this kind of block cipher schemes are quite obvious.In security,as nearly every plaintext data block is encrypted with different keys,and as most attacking techniques have high demands of plaintext/ciphertext pairs,it is difficult for them to work in such a cipher scheme.This may result that a block cipher with time and counter parameters is secure even with cases that the number of round is largely reduced.As an important example of the entire solution,we introduce a cipher scheme TCR6 which has some satisfactory features in both security and efficiency.
出处 《广西师范大学学报(自然科学版)》 CAS 北大核心 2005年第2期21-26,共6页 Journal of Guangxi Normal University:Natural Science Edition
基金 TheNationalScienceFundforDistinguishedYoungScholars(60025205) OpenProjectsofStateKey LaboratoryofInformationSecurity
关键词 密码学 数据加密 分组密码 轮密钥更新 安全与效率 TCR6 cryptography data encryption block cipher scheme updating of the round keys security and efficiency TCR6
  • 相关文献

参考文献7

  • 1Preneel B,Biryukov A,Oswald E,et al.NESSIE security report[R].Belgium:Katholieke Universiteit Leuven,2003.9-10.
  • 2Shannon C E.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4):656-715.
  • 3Daemen Joan,Rijmen Vincent.The design of Rijndael:AES-The advanced encryption standard[M].Berlin:Springer-Verlag,2002.
  • 4Ferguson N,Kelsey J,Lucks S,et al.Improved cryptanalysis of Rijndael[A].Proceedings of fast software encryption-FSE 2000,7th international workshop[C].Schneier B.New York:Springer-Verlag,2001.213-230.
  • 5Courtois N T,Pieprzyk J.Cryptanalysis of block ciphers with overdefined systems of equations[A].Proceedings of Asiacrypt'02,8th international conference on the theory and application of cryptology and information security[C].Zheng Y.Queenstown:Springer-Verlag,2002.267-287.
  • 6Courtois N T.The security of Hidden Field Equations (HFE)[A].Proceedings of progress in cryptology-CT-RSA 2001,cryptographers' track at RSA conference 2001[C].Naccache D.San Francisco:Springer-Verlag,2001.266-281.
  • 7Jakobsen T,Knudsen L R.The interpolation attack on block ciphers[A].Proceedings of fast software encryption-FSE'97,4th international workshop[C].Biham E.Haifa:Springer-Verlag,1997.28-40.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部