期刊文献+

基于分布式计算的暴力破解分组密码算法 被引量:10

Brute Force Attack on Block Cipher Algorithm Based on Distributed Computation
下载PDF
导出
摘要 暴力破解分组密码算法是密码学的重要研究方向。该文基于分布式算法,设计具有高通用性的暴力破解分组密码软件。在局域网内对分组密码算法DES和SMS4的暴力破解进行模拟实现,测试其性能并分析DES和SMS4的暴力破解结果。实验结果表明,该软件通用性较强。 Brute force attack on block cipher algorithm is an important direction of cryptology. Software of brute force attack on block cipher algorithms is designed based on distributed computing. Brute force attack on block cipher algorithms DES and SMS4 are simulized in the LAN and the function test to the software is carried on. It analyzes the software and results of brute force attack on DES and SMS4. Experimental results show that this software has strong commonability.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第13期121-123,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60573048,60373040) 中国科学院研究生院科研启动基金资助项目
关键词 暴力破解 分布式计算 分组密码 brute force attack distributed computation block cipher
  • 相关文献

参考文献3

  • 1Electronic Frontier Foundation. Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design[Z]. 1998.
  • 2Curtin M, Dolske J. A Brute Force Search of DES Keyspace. (1998-05-11). http://www.interhack.net/pubs/des-key-crack/.
  • 3付安民.对称密码算法暴力破解的研究现状和进展[C]//北京地区高校研究生学术交流会议论文集.北京:[s.n.],2006.

同被引文献60

  • 1曾剑平,郭东辉.一种有效支持计算机取证的审计机制研究[J].计算机工程,2006,32(6):148-150. 被引量:2
  • 2Wang Xiaoyun, Yu Hongbo. How to Break MD5 and Other Hash Functions[C]//Proceedings of CRYPTO'05. Aarhus, Denmark: [s. n.], 2005.
  • 3Avoine G, Junod P, Oechslin P. Characterization and Improvement of Time-memory Trade-off Based on Perfect Tables[J]. ACM Trans. on Information and System Security, 2008, 11(4): 1-22.
  • 4VIDIA. CUDA[EB/OL]. (2009-03-30). http://www.nvidia.cn/objeet/ cuda home cn.html.
  • 5National Bureau of Standards. Data Encryption Standard[EB/OL]. (1999-10-25). http://csrc.nist.gov/publications/fips/fips46-3/fips46- 3.pdf.
  • 6Biham E, Shamir A. Differential Cryptanalysis of DES Like Crypto Systems[J]. Journal of Cryptography, 1999, 4(4): 70-72.
  • 7Mitsuru M. Linear Cryptanalysis Method for DES Cipher[C] //Proc. of EUROCRYPT’93. Berlin, Germany: Springer-Verlag, 1994.
  • 8Dunkelman O B, Nathan K, Shamir A. A Practical-time Attack on the A5/3 Cryptosystem Used in the 3rd Generation GSM Telephony[EB/OL]. (2010-01-10). http://eprint.iacr.org/2010/013.
  • 9Biham E. New Types of Cryptanalytic Attacks Using Related Keys[J]. Journal of Cryptology, 1994, 7(4): 229-246.
  • 10David W. The Boomerang Attack[J]. Lecture Notes in Computer Science, 1999, 36(16): 156-170.

引证文献10

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部