期刊文献+

带延迟的分组密码算法密钥结合模式设计 被引量:1

A Key Delay Design on Block Cipher Algorithm
下载PDF
导出
摘要 提出了一种分组密码算法的延迟结合模式,进行了基于信息论原则的安全性证明,并对加入延迟后的密钥执行效率进行了评估。对于算法公开的分组密码,使用密钥延迟技术加强密码体制本身的强度,弱化种子密钥通过互联网公开分发造成的信息泄漏,特别可以有效阻止中间人唯密文进行的算法还原攻击。 A key delay design on block cipher is proposed and is demonstrated based on provable security with information theory. Furthermore, we evaluate the result of key delay module. For the published block cipher, the key delay technology can enforce the cryptography system and decrease the information leak from key distribution through internet. Especially, this model can prevent the only cipher-text attack by middle attack.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2007年第3期649-651,共3页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金资助项目(60673075) 国家863计划项目(2006AA01Z428)
关键词 分组密码算法 比特延迟 密钥 结合模式 block cipher bit-delay key operation model
  • 相关文献

参考文献6

  • 1NYBERG K.Differentially uniform mappings for cryptography[C]//Prodeeding of eurocrypt'93,Lecture Notes in Computer Science.Berlin:Springer-verlag,1993.
  • 2DAEMEN J,RIJMEN V.AES proposal[EB/OL].Rijndeal http://www.nist.gov/aes,2004-9-10.
  • 3SHANNON C D.A mathematical theory of communication[J].Bell System Technical Journal,1948,27:379-423; 623-656.
  • 4SCHNEIER B,KELSEY J.Unbalanced feistel netwoeks and block cipher design[C]//Fast Software Encryption,LNCS 1039.Berlin:Springer-Verlag,1996:121-144.
  • 5CLIFFORD B.Neuman and theodore Ts'o.kerberos:an authentication service for computer networks[J].IEEE Communications,1994,32(9):33-38.
  • 6MATSUI M.On correlation between the order of s-boxes and the strength of DES[C]//Advances in Cryptology:EUROCRYPT'94,LNCS 950.Berlin:Springer Verlag,1995:366-375.

同被引文献12

  • 1GOLDWASSER S, MICALI S, RACKOFF C. The knowledge complexity of interactive proof systems[J]. SIAM Journal on Computing, 1989, 18(1): 186-208.
  • 2FRANKEL Y, YUNG M. Cryptanalysis of the immunized public key systems[C]//Advances in Cryptology- Euroerypt '95. [S.l.]: Springer-Verlag, 2004: 287-296.
  • 3BELLARE M, ROGAWAY P. Random oracles are practical: a paradigm for designing efficient protocols[C]//ACM Conference on Computer and Communications Security. [S.l.]: ACM, 2007: 62-73.
  • 4BONEH D, DEMILLO R, UPTON R. On the importance of checking cryptographic protocols for faults[C]//Advances in Cryptology-Eurocrypt '97. Konstanz, Germany: Springer-Verlag, 1997:37-51.
  • 5MANGER J. A chosen ciphertext attack on RSA optimal asymmetric encryption padding(OAEP) as standardized in PKCS[C]//Advances in Cryptology-Crypto 2001. Santa Barbara: Springer-Verloag, 2001: 230-238.
  • 6National Institute of Standards and Technology (NI ST). NIST special publication 800-38A[S]. Recommendation for Block Cipher Modes of Operation: Methods and Techniques, 2001.
  • 7FIBIKOVA L. Provable secure scalable block ciphers[D]. Duisburg: University Duisburg-Essen, 2003.
  • 8National Institute of Standards and Teclmology(NIST). NIST special publication 800-38B[S]. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, 2005.
  • 9罗岚,魏正耀,秦志光.分组密码算法链接模式构造单向函数的可证安全性[C]//第十届保密通信年会.桂林:信息安全与通信保密杂志社,2007:40-42.
  • 10National Institute of Standards-and Technology(NIST). NIST special publication 800-38C[S]. Recommendation for Block Cipher Modes of Operation: The GCM Mode for Authentication and Confidentiality, 2007.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部