期刊文献+

基于模糊评价的分组密码随机性评估模型 被引量:6

A Fuzzy-Based Randomness Evaluation Model for Block Cipher
下载PDF
导出
摘要 检测评估是研究密码算法安全性的重要技术手段.随机特性是其中重要而实用的测评内容.针对密码算法的随机性,已有多种不同的检测方法,但是对繁杂的随机性检测结果,尚不存在一个完整实用的量化评估体系和模型.选择分组密码为实例,研究了对密码算法随机性的量化评估.根据分组密码的设计准则,提出一个分组密码随机性的评估指标体系,以模糊多准则决策为基础给出了一个实用的分组密码随机性评估模型.该模型采用模糊数学中的隶属度函数方法,对随机性检测结果进行模糊化处理,能够反映出随机性的连续和渐变特点,有效解决了单纯的阈值方法造成的评估信息丢失问题.该模型的优点是实现了对分组密码随机性的量化评估,为密码算法的综合评估提供基础.同时,给出了对单个指标和属性的通用的评估流程,因此,该模型也可稍加修改和扩展,应用于其他类型密码算法的随机性评估中. Evaluation plays an important role in security of cryptology, among which randomness is one of the most practical contents. There exist several test methods and software packages for randomness test now. But there isn't an integrated and applied quantitative evaluation model for manipulating the vast results at present. In this paper, randomness evaluation of cryptography is studied and block cipher is selected as a research instance. A tree-type index system for randomness is proposed by analyzing design principles of block cipher, and an evaluation model is built based on fuzzy multi-criteria decision-making. In this model, membership function is used to process randomness result, which can express the continuous and gradual character of randomness and can overcome the problem of information loss introduced by threshold method. This model has some advantages such as offering an effective method to quantitatively evaluate the randomness of block cipher, and providing a foundation of comprehensive evaluation of cryptography. The analysis also shows that the model is practical because its consumption of space and time is very low. Furthermore the model provides a general evaluation process for single index and attribute, and it can be easily modified to deal with the case of other fundamental types of cryptographic primitives, such as stream cipher.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第12期2095-2101,共7页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60503014,60603013) 国家“八六三”高技术研究发展计划基金项目(2007AA01Z470,2008AA01Z417) 京市自然科学基金项目(4072026)~~
关键词 密码算法 随机性检测 评估模型 模糊评价 隶属度函数 cryptography randomness test evaluation model fuzzy evaluation membership function
  • 相关文献

参考文献13

  • 1Junod P. Statistical cryptanalysis of block ciphers [D]. Switzerland: Federal Polytechnic School of Lausanne, 2004.
  • 2Shannon C E. Communication theory of secrecy system [J]. Bell System Technical Journal, 1949, 28(4) : 656-715.
  • 3ISO/IEC-15408. Common Criteria for Information Technology Security Evaluation (CC) Version 2. 3 [S]. Geneva, Switzerland : International Organization for Standardization, 2005.
  • 4National Institute of Standards and Technology. Security Requirements for Cryptographic Modules, National Institute of Standards and Technology-FIPS140-3 [S/OL]. [2007-10-05]. http://esrc. hist. gov/publications/PubsDrafts. html FIPS-140-3.
  • 5Schindler W, Killmann W. Evaluation criteria for true (Physical) random number generators used in cryptographic applications [C] //Proc of Workshop on Cryptographic Hardware and Embedded Systems (CHES2002). Berlin: Springer, 2003:431-449.
  • 6周津慧,王宗,杨宗奎,刘霞.基于模糊评价方法的软件质量评价研究[J].系统工程与电子技术,2004,26(7):988-991. 被引量:32
  • 7潘启树,徐若冰,李煜华,宋昱雯.科学论文质量的模糊综合评价模型研究[J].哈尔滨工业大学学报,2001,33(5):612-616. 被引量:17
  • 8李煜华.管理信息系统的模糊综合评价模型研究[J].哈尔滨工业大学学报,2004,36(8):1128-1131. 被引量:27
  • 9穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 10Lai X, Massey J, Murphy S. Markov ciphers and differential cryptanalysis [C] //Proc of Advances in Cryptology (EUROCRYPT'91). Berlin: Springer, 1991:17-38.

二级参考文献21

  • 1[1]Raymond McLeod, Jr. George Schell. Management Information System (Eighth Edition) [ M ]. Prentice Hall,Inc., 2002:238-256.
  • 2汪培庄,应用模糊数学,1989年,180页
  • 3ISO/IEC JTC1/SC7/WG6, ISO/IEC 9126-1: Information Technology-Software Quality Characteristics and Metrics - Part 1: Quality Model[S].
  • 4ISO/IEC JTC1/SC7/WG6, ISO/IEC 14598 Part1-Part6: Information Technology-Evaluation of Software Product[S].
  • 5杨纶标 高英仪.模糊数学--原理及应用(第三版)[M].广州:华南理工大学出版社,2002..
  • 6Richard Stiennon. Intrusion Detection Is Dead-Long Live Intrusion Prevention. http: ∥ www. sans. org/rr/papers/index.php? id= 1028, 2003-06-11.
  • 7Peng Ning, Dingbang Xu. Learning attack strategies from intrusion alerts. The 10th ACM Conf. Computer and Communications Security (CCS' 03), Washington D.C., 2003.
  • 8Dan Schnackenberg, Harley Holliday, Randall Smith, et al.Cooperative intrusion traceback and response architecture.DARPA Information Survivability Conference and Exposition(DISCEX II'01), Anaheim, California, 2001.
  • 9Peng Ning, Y. Cui. An intrusion alert correlator based on prerequisites of intrusion. Department of Computer Science,North Carolina State University, Tech. Rep.: TR-2002-01,2002.
  • 10F. Cuppens, A. Miege. Alert correlation in a cooperative intrusion detection framework. The IEEE Symposium on Security and Privacy, Oakland, CA, 2002.

共引文献121

同被引文献50

  • 1余振华.EM算法及其加速[J].南昌水专学报,2004,23(4):25-28. 被引量:2
  • 2彭巍,周亮.分组密码算法测试平台设计[J].成都信息工程学院学报,2005,20(5):530-534. 被引量:1
  • 3苏桂平,刘争春,姚旭初,殷学文.一种信息安全系统中序列随机性检验方法[J].计算机工程,2006,32(8):153-154. 被引量:12
  • 4毛和瑞,萧元星.基于层次分析的决策支持系统[J].系统工程与电子技术,1996,18(7):15-20. 被引量:7
  • 5张阐军,杨明忠,郭顺生.柔性企业信息化评价系统的设计与应用[J].计算机集成制造系统,2007,13(5):978-983. 被引量:8
  • 6Cover T M, Thomas J A. Elements of information theory [M]. 2nd ed. Somerset, USA: john Wiley:Sons, Inc, 2006.
  • 7Rukhin, Andrew LA Statistical Test suite for random and pseu dorandom number generators for cryptographic applications[D]. Washington DC, USA: Information Technology Labora- tory of National Institute of Standards and Technology.NIST SP800 22 Rev la, 2010.
  • 8BSI AIS-20, AIS-30. Application notes and interpretation of the scheme functionality classes and evaluation methodology for deterministic & physical random number generators [S]. Ber- lin, Germany: German Federal Office for Informaion Security, 2008.
  • 9SHI Hongsong, ZHANG Chongbin, YANG Yongsheng, et al. On the randomness test and its incompleteness [J]. Jour- nal of Tsinghua University (Sci &Tech), 2011, 51 (10): 1269-1273 (in Chinese).
  • 10National Institute of Standards and Technology. Download documentation and software [ DB/OL ]. http: // csrc. nist. gov/groups/ST/toolkit/rng/documentatio-n _ soft- ware. html, 2010.

引证文献6

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部