期刊文献+

改进的CBC模式及其安全性分析 被引量:4

Improved CBC mode of operation and its security analysis
下载PDF
导出
摘要 针对CBC模式在分块适应性攻击模型下不安全这一问题,提出了一个新的分组密码工作模式。新方案引进了Gray码,改变了原有模式的输入方式,打乱了前后输出输入的内在联系。同时,利用规约的思想对其安全性进行了分析。结果表明,在所用分组密码是伪随机置换的条件下,方案在分块适应性攻击模型下是可证明安全的。 A novel scheme of block-cipher mode of operation was proposed to solve the secure problem under the blockwise adaptive attack model. The Gray code was introduced to improve the input manner and disturb the intrinsic relation of input and output data. The security of the scheme was analyzed in the reduction-based cryptography. Investigation shows that the scheme is provable security under the blockwise adaptive attack model if the underlying block cipher is a pseudorandom permutation.
出处 《通信学报》 EI CSCD 北大核心 2007年第3期52-56,共5页 Journal on Communications
基金 国家自然科学基金资助项目(90604036 60373059) 国家重点基础研究发展计划("973"计划)(2004CB318004) 教育部博士点基金资助项目(20040013007) 济南大学博士基金资助项目(B0631) 济南大学科技基金资助项目(Y0609)~~
关键词 密码学 分组密码 工作模式 可证明安全性 GRAY码 cryptography block cipher mode of operation provable security Gray code
  • 相关文献

参考文献9

  • 1National Bureau of Standards,DES Modes of Operation[S].FIPS-pub.46,National Bureau of Standards U.S Department of Commerce,Washington D.C,December 1980.
  • 2DIFFIE W,HELLMAN M.Privacy and authentication:an introduction to cryptography[A].Proceedings of the IEEE[C].1979.397-427.
  • 3GOLDWASSER S,MICALI S.Probabilistic encryption[J].J of Computer and System Sciences,1984,28(4):270-299.
  • 4BELLARE M,DESAI A,et al.A concrete security treatment of symmetric encryption:analysis of the DES modes of operation[A].Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS97),IEEE[C].Washington,1997.394-403.
  • 5JOUX A,MARTINET G,et al.Blockwise adaptive attackers:revisiting the (in) security of some provably secure encryptions modes:CBC,GEM,IACBC[A].Crypto '02,LNCS 2442[C].Springer-Verlag,2002.17-31.
  • 6LUBY M,RACKOFF C.How to construct pseudorandom permutations from pseudorandom functions[J].SIAM Journal on Computing,1988,17(2):373-386.
  • 7BELLARE M,KILIAN J,et al.The security of the cipher block chaining message authentication code[J].Journal of Computer and System Sciences,2000,61(3):362-399.
  • 8SHOUP V.Sequences of games:a tool for taming complexity in security proofs[A].Cryptology Eprint Report 2004/ 332[C].2004.
  • 9BELLARE M,ROGAWAY P.The Game-playing technique,December 11,2004 (draft 0.4)[EB/OL].http//eprint.Iacr.org/2004/33/,2004-12-11.

同被引文献23

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部