期刊文献+

分组密码工作模式的研究现状 被引量:40

The State()-of-The()-Art of Research on Block Cipher Mode of Operation
下载PDF
导出
摘要 分组密码工作模式是利用分组密码解决实际问题的密码方案.好的工作模式可以弥补分组密码的某些缺憾;相反,不好的工作模式可能带来安全隐患.工作模式的研究始终伴随着分组密码的研究历史,新的分组密码标准的推出,都会伴随着相应工作模式的研究.从针对DES的ECB、CBC、CFB和OFB,到针对AES的CTR、CCM、CMAC、GCM和AESKW,作者以各种模式标准为主线,介绍分组密码工作模式的设计理念、安全模型、二十多年的研究成果以及发展现状. A mode of operation, or mode, for short, is an algorithm that features the use of a symmetric key block cipher algorithm to provide an information service, such as confidentiality or authentication. A good mode can remedy some weaknesses of block cipher, on the other hand, a poorly designed mode may be insecure even though the underlying block cipher is good. The research of mode always goes with the development of block cipher. With the advent of new block ciphers, there is a need to update long-standing modes of operation and an opportunity to consider the development of new modes. From the ECB,CBC,CFB and OFB modes of DES to CTR,CCM, CMAC,GCM and AESKW modes of AES, the authors introduce the design rationales, security model, research results and the state-of-the-art of research on block cipher mode of operation in this paper.
出处 《计算机学报》 EI CSCD 北大核心 2006年第1期21-36,共16页 Chinese Journal of Computers
基金 国家自然科学基金(60373047) 国家"九七三"重点基础研究发展规划项目基金(2004CB318004)资助
关键词 工作模式 分组密码 加密 认证 HASH函数 mode of operation block cipher encryption authentication hash function
  • 相关文献

参考文献1

二级参考文献26

  • 1Luby M, Rackoff C. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 1988, 17(2): 373-386. (A preliminary version including other results appeared in Proceedings of the 18th ACM Symposium on Theory of Computing, 1986, pp.356-363).
  • 2Schnorr C P. On the construction of random number generators and random function generators. In Advances in Cryptology Eurocrypt'88, LNCS 330, Springer-Verlag,Davos, Switzerland, May 1988, pp.225-232.
  • 3Rueppel R A. On the security of Schnorr's pseudorandom generator. In Advances in Cryptology-Eurocrypt'89, LNCS 434,Springer-Verlag, Houthalen, Belgium, April 1989, pp.423-428.
  • 4Zheng.Y, Matsumoto T, Imai H. Impossibility and optimality results on constructing pseudorandom permutations. In Advances in Cryptology-Eurocrypt'89, LNCS 434, SpringerVerlag, Houthalen, Belgium, April 1989, pp.412-422.
  • 5Zheng Y, Matsumoto T, Imai H. On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In Advances in Cryptology-Crypto'89, LNCS 435,Springer-Verlag, New York, USA, Aug. 1989, pp.461-480.
  • 6Pieprzyk J. How to construct pseudorandom permutations from single pseudorandom functions, in Advances in Cryptology Eurocrypt'90, LNCS 473, Springer-Verlag,Aarhus, Denmark, May 1990, pp.140-150.
  • 7Patarin J. New results on pseudorandom permutation generators based on the DES Scheme. In Advances in Cryptology-Crypto'91, LNCS 547, Springer-Verlag, Brighton, UK, April 1991, pp.72-77.
  • 8Sadeghiyan B, Pieprzyk J. On the necessary and sufficient conditions for the construction of super pseudorandom permutations. In Advances in Cryptology-Asiacrypt'91, LNCS 739, Springer-Verlag, Sydney, Australia, Dec. 1991, pp.117-123.
  • 9Pieprzyk J, Sadeghiyan B. Optimal Perfect Randomizers. In Advances in Cryptology Asiacrypt'91, LNCS 739, SpringerVerlag, Sydney, Australia, Dec. 1991, pp.225-236.
  • 10Maurer U M. A simplified and generaiized treatment of LubyRackoff pseudorandom permutation generators. In Advances in Cryptology-Eurocrypt'92, LNCS 658, Springer-Verlag, Balatonffired, Hungary, May 1992, pp.239-255.

共引文献4

同被引文献222

引证文献40

二级引证文献107

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部