期刊文献+

基于Feistel网络的AES密钥扩展算法

A Novel AES Key Expansion Based on Feistel Network
下载PDF
导出
摘要 Rijndaes算法被美国国家标准技术研究所(NIST)定做分组密码标准后,在安全领域得到广泛的应用,并被随后的NESSIE工程直接吸纳为标准。但同时,由于AES应用的广泛性和基础性,对其的研究和分析,不可避免地成为一个热点。本文结合被NESSIE工程所提出的其他的分组密码算法,提出了一种新的密钥扩展算法,该算法基于一种变形的Feistel网络结构,并在Matlab平台上得以实现。最后分析和证明了和原有算法相比具有的速度效率和安全性能优势。 This paper first points out some AES deficiency that has been found by cryptology researcher and then presents a new key schedule algorithm tbr AES. The new idea is based on a deformed Feistel network structure. It has been realized on Maflab platform. It is proved that the new algorthim is safer and quicker than the original algorithm.
作者 李政
出处 《计算机与现代化》 2007年第9期27-30,共4页 Computer and Modernization
基金 国家自然科学基金资助项目(60373077)
关键词 AES KEY SCHEDULE 分组密码 FEISTEL网络 AES key schedule cipher block Feistel network
  • 相关文献

参考文献9

  • 1C N Chen,S M Yen.Differential fault analysis on AES key schedule[C]// Proc.of ACISP 2003 (Sydney,Australia),2003.
  • 2S M Yen.Amplified differential power cryptanalysis of some enhanced Rijndael implementations[C]//Proc.of ACISP 2003 (Sydney,Australia),2003.
  • 3Jingmei Liu,Baodian Wei,Xiangguo Cheng,et al.An AES S-box to increase complexity and cryptographic analysis[C]//AINA 2005,2005.
  • 4Lucks S.Attacking seven rounds of Rijndael under 192-bit and 256-bit keys[C]//Proceedings of the Third Advanced Encryption Standard Conference,NIST,Apr 2000:242-246.
  • 5Murphy S,Robshaw M J B.Essential algebraic structure within the AES[C]//Proceedings of Crypto' 02 (Yung med.),2002.
  • 6Chien-NingChen,Sung-MingYen.Differential Fault Analysis on AES Key Schedule and Some Countermeasures[M].Springer-Verlag,Berlin Heidelberg,2003.
  • 7A Biryukov,D Canniere Braeken.On some weak extensions of AES and BES,information and communications security[J].ICICS,2004,3269:414-426.
  • 8Wang Jingfa,Chang Sunwei,Lin Pochuan.A novel round function architecture for AES encryption/decryption utilizing look-up table[C]//IEEE 37th Annual 2003 International Carnahan Conference on Security Technology.Taipei:IEEE Press,2003:132-136.
  • 9肖国镇,白恩健,刘晓娟.AES密码分析的若干新进展[J].电子学报,2003,31(10):1549-1554. 被引量:31

二级参考文献27

  • 1M Matsui. Linear cryptanalysis method for DES cipher[ A]. Advances in Cryptology, Proceedings of Eurocrypt ' 93 [ C ].Lofthus, Norway:Spfinger-Verlag. 1994.386 - 397.
  • 2J Daemen,L Knudsen, V Rijnmen. The block cipher Square[ A]. Fast So-ftware Encryption, Fourth International Workshop[ C]. Haifa, Israel:Springer-Verlag. 1997.149 - 165.
  • 3L R Knudsen. Block ciphers: state of the art[ R]. Copies of transparencies for lecture at the International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography. Katholieke Unive-rsiteit Leuven, Belgium, 1997.
  • 4Y Hu, Y Zhang, G Xiao. Integral cryptanalysis of SAFER + [ J]. Electroni-es Letters, 1999,35(17) : 1458 - 1459.
  • 5L R Knudsen, D Wagner. Integral cryptanalysis [ EB ]. Available:https://www. cosic. esat. kuleuven, ac. be/nessie.
  • 6N Ferguson, J Kelsey, et al. Improv-ed cryptanalysis of Rijndael[ A].Fast Software Encryption, 7th lnternat-ional Workshop, FSE 2000[ C ].NewYork, USA: Springer-Verlag, 2001.213 - 230.
  • 7T Jakobsen, L Knudsen. The interpolation attack on block ciphers[ A].Fast software encryption, fouth international workshop[ C ]. Haifa, Israel: Springer-Verlag. 1997.28 - 40.
  • 8Paul Kocher, Joshua Jaffe, Benjamin Jun, Introduction to differential power analysis and related attacks[ EB]. Available: http://www. cryptography. com/dpa./technical.
  • 9P Kocher, J Jatte, B Jun. Differential power analysis[A]. Advanced in Cryptology-CRYPTO' 99 [ C ]. California, USA: Springer Verlag. 1999.388 - 397.
  • 10J Damen, V Rijmen. Resistance againstimplementation attacks, a comparative study of the AES proposals[A] .Second AES Conference[C].Rome, Itary, 1999. Available: http://csrc. nist. gov/CryptoTcolkit/aes/roundl/conf2/aes2conf, htm.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部