期刊文献+

AES算法S盒中的等价线性变换 被引量:1

Equivalent Linear Transformation in the AES S Box
下载PDF
导出
摘要 该文给出了一种求AES算法S盒中各路布尔函数的等价线性变换矩阵的有效方法。该方法在求线性变换矩阵的各列的可能取值时仅需利用等价线性变换具有相同的差分和分布这一性质。随后,提出了利用各列的组合快速地从所有可能的矩阵中找出正确的矩阵的有效方法,该方法比FullerJ和MillanW所给出的求线性等价矩阵的方法更有效。 In this paper, an efficient method is proposed which searching the equivalent linear transformation matrix in the AES s box. And the only property that the equivalent linear transformation has the same difference sum distribution is needed. Then it presents an efficient method which determining the correct matrix with the possible value of the combination of the column, the way is more efficient than Fuller and Millan's.
作者 胡斌 金晨辉
出处 《计算机工程与应用》 CSCD 北大核心 2005年第22期70-72,共3页 Computer Engineering and Applications
关键词 差分 差分和分布 线性等价 线性变换 difference, difference sum distribution, linear equivalence, linear transformation
  • 相关文献

参考文献2

二级参考文献3

  • 1Deamen J,Rijmen V.AES proposal:Rijndeal[DB/OL].http://csrc.nist.gov/CryptoToolkit/aes/rijndael/ Rijndael-ammended.pdf,1999-09-03.
  • 2Fuller J,Millan W.On the linear redundancy of AES S-box[EB/OL].http://eprint.iacr.org,2002.
  • 3Lidl R,Niederreiter H.Finite Fields [M].Addison-Wesley Publishing Company,1983.1-82.

共引文献10

同被引文献12

  • 1Dawson M H, Tavares S E. An expanded set of design crite- ria for substitution box and their use in strengthening DES- like cryptosystems [C]//IEEE Pacific Rim Conference on Communications, Computer and Sigual Processing, 1991: 191-195.
  • 2Dawson M H,Tavares S E. An expanded set of design crite- ria based on information theory and its relation to differenti- al-like attacks [ M ]//Advances in Cryptology: EURO- CRYPT' 91. Berlin: Springer-Verlag, 1991 : 352- 367.
  • 3Gligoroski D,Moe M E G. On deviations of the AES S-box when represented as vector valued Boolean functionEJ3. In- ternational Journal of Computer Science and Network Secu- rity,2007, 7(4) : 156-161.
  • 4Nyberg K. Differentially uniform mappings for cryptogra- phy[C]//Helleseth T. Advances in Cryptology, Proc EU- ROCRYPT'93,LNCS 765. Berlin:Springer-Verlag, 1994: 55-64.
  • 5Ziedan I E, Fouad O, Salem D H. Application of data en- cryption standard to bitmap and JPEG images[C]//The 20th National Radio Science Conference, 2003..16-18.
  • 6肖华勇,李建辉,边笛.基于AES的S盒图像置乱算法研究[J].西北工业大学学报,2008,26(1):74-78. 被引量:3
  • 7冯登国,宁鹏.S-盒的非线性准则之间的关系[J].通信学报,1998,19(4):72-76. 被引量:6
  • 8杨钒,薛模根.复合混沌二级置乱图像加密算法研究[J].合肥工业大学学报(自然科学版),2009,32(8):1128-1131. 被引量:8
  • 9陈令羽,宋国民,徐齐,丁嘉鹏,徐少坤.DES在数字高程模型信息伪装中的应用研究[J].合肥工业大学学报(自然科学版),2012,35(2):189-192. 被引量:4
  • 10吴文玲,冯登国.线性结构与非线性度之间的关系[J].电子学报,2000,28(1):139-141. 被引量:5

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部