期刊文献+

Rijndael加密算法的密钥扩展算法的研究 被引量:4

Research on the Key Expansion of the Encryption Algorithm Rijndael
下载PDF
导出
摘要 本文先对Rijndael加密算法的密钥扩展算法进行了简要阐述,之后给出了密钥扩展算法的递归模型并对其进行了分析,最后指出Rijndael加密算法与密钥扩展算法之间的同步特性,并进而阐述了实现加密算法时应用该特性可以节约消耗的时间和空间。 This paper introduces the key expansion of the encryption algorithm rijndael. Then it puts forward the mathematical model of the key expansion and analyzes the model. Finally, it points out a synchronization between the encryption algorithm rijndael and the key expansion, on the basis of which the paper proposes that it saves time and space to make use of the synchronization when we implement the encryption algorithm rijndael.
出处 《信息技术与信息化》 2005年第5期49-52,共4页 Information Technology and Informatization
关键词 高级数据加密标准 RIJNDAEL加密算法 密钥扩展算法 DSP RIJNDAEL加密算法 扩展算法 密钥 同步特性 递归模型 和空间 Advanced encryption standard(AES) The encryption algorithm rijndael The key expansion algorithm DSP
  • 相关文献

参考文献6

二级参考文献31

  • 1M Matsui. Linear cryptanalysis method for DES cipher[ A]. Advances in Cryptology, Proceedings of Eurocrypt ' 93 [ C ].Lofthus, Norway:Spfinger-Verlag. 1994.386 - 397.
  • 2J Daemen,L Knudsen, V Rijnmen. The block cipher Square[ A]. Fast So-ftware Encryption, Fourth International Workshop[ C]. Haifa, Israel:Springer-Verlag. 1997.149 - 165.
  • 3L R Knudsen. Block ciphers: state of the art[ R]. Copies of transparencies for lecture at the International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography. Katholieke Unive-rsiteit Leuven, Belgium, 1997.
  • 4Y Hu, Y Zhang, G Xiao. Integral cryptanalysis of SAFER + [ J]. Electroni-es Letters, 1999,35(17) : 1458 - 1459.
  • 5L R Knudsen, D Wagner. Integral cryptanalysis [ EB ]. Available:https://www. cosic. esat. kuleuven, ac. be/nessie.
  • 6N Ferguson, J Kelsey, et al. Improv-ed cryptanalysis of Rijndael[ A].Fast Software Encryption, 7th lnternat-ional Workshop, FSE 2000[ C ].NewYork, USA: Springer-Verlag, 2001.213 - 230.
  • 7T Jakobsen, L Knudsen. The interpolation attack on block ciphers[ A].Fast software encryption, fouth international workshop[ C ]. Haifa, Israel: Springer-Verlag. 1997.28 - 40.
  • 8Paul Kocher, Joshua Jaffe, Benjamin Jun, Introduction to differential power analysis and related attacks[ EB]. Available: http://www. cryptography. com/dpa./technical.
  • 9P Kocher, J Jatte, B Jun. Differential power analysis[A]. Advanced in Cryptology-CRYPTO' 99 [ C ]. California, USA: Springer Verlag. 1999.388 - 397.
  • 10J Damen, V Rijmen. Resistance againstimplementation attacks, a comparative study of the AES proposals[A] .Second AES Conference[C].Rome, Itary, 1999. Available: http://csrc. nist. gov/CryptoTcolkit/aes/roundl/conf2/aes2conf, htm.

共引文献55

同被引文献24

  • 1吴文玲,冯登国.分组密码工作模式的研究现状[J].计算机学报,2006,29(1):21-36. 被引量:40
  • 2傅亚民.信息安全综述[J].中国科技信息,2007(12):101-102. 被引量:2
  • 3Joan Daemen , Vincent Rijmen. AES Proposal : Rijndael.
  • 4Doug Whiting,Bruce Schneier , Steve Bellovin . AES Key Agility Issues in High-Speed IPsec Implementations.
  • 5Joon Hyoung Shim, Dae Won Kim, Young Kyu Kang, Taek Won Kwon, Jun Rim Choi. A Rijndael cryptoprocessor using shared on-the-fly key scheduler. ASIC, 2002. Proceedings. 2002 IEEE Asia-Pacific Conference. 2002(8) :89-92.
  • 6[美]斯皮尔曼.经典密码学与现代密码学[M].叶健,曹英,张长富译.北京:清华大学出版社.2005.7.
  • 7[美]西里提.Verilog HDL高级数字设计[M].张雅绮等译.北京:电子工业出版社.2005.1.
  • 8吴文玲;张文涛.AES后分组密码的研究现状及发展趋势,2007(09).
  • 9刘连浩,崔杰,刘上力,马虹博.一种AESS盒改进方案的设计[J].中南大学学报(自然科学版),2007,38(2):339-344. 被引量:12
  • 10丁汉吉,何蕾,阮树骅.AES算法研究及实现分析[J].网络安全技术与应用,2007(11):80-81. 被引量:15

引证文献4

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部