期刊文献+

一种具有最小实现代价的AES改进方法 被引量:2

Improvement of AES with minimal implementation complexity
下载PDF
导出
摘要 针对AES加密和解密过程实现的不对称性,对其仿射变换和列混合运算的变换常量进行优化,给出一种改进的AES.除了密钥安排顺序,改进后的AES加解密实现过程都是对称的,在计算列混合和逆列混合时仅需要2次Xtime乘法和4次加法运算.并且加密和解密可共享同样的实现资源,有效降低了软硬件实现的代价. It is known that the implementation of AES is asymmetrical, so it will cost more time and space resource. Based on the affine transformation and the MixColumn,an improved AES is presented to reduce the implementation cost. The whole architecture of Rijndae[ encryption and decryption is symmetrical except for the arranging sequence of the key. When calculating MixColumn or InvMixColumn, only 2 times Xtime multiplication and 4 times addition operation are needed. It slso has the advantage that the eneryption and deeryption can share the same logic implementation resource, which decreases the implementation cost.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2009年第1期52-57,共6页 Journal of Xidian University
基金 国家自然科学基金资助(90604009,60503010,60773022) 国家“十一五”密码发展基金资助 863项目资助(2007AA01Z472) 高等学校创新引智基地资助(B08038)
关键词 AES RIJNDAEL S盒 AES Rijndael Sbox
  • 相关文献

参考文献11

  • 1Daemen J, Rijmen V. AES Proposal: Rijndael[EB/OL]. [1999-10-05]. http://www.east. kuleuven. ac. be/-rijmen/ rijndael.
  • 2Jongsung K, Seokhie H, Preneel B. Related-Key Rectangle Attacks on Reduced AES-192 and AES-256[C]//FSE 2007, LNCS 4593. Berlin: Springer-Verlag, 2007: 225-241.
  • 3Biryukov A, Khovratovich D. Two New Techniques of Side-Channel Cryptanalysis[C]//CHES 2007, LNCS 4727. Berlin: Springer-Verlag, 2007: 195-208.
  • 4刘景美,韦宝典,王新梅.Rijndael S-box仿射运算研究[J].西安电子科技大学学报,2005,32(1):94-97. 被引量:4
  • 5National Inst of Standards and Technology. Federal Information Processing Standard 46-3. The Data Encryption Standard (DES)[EB/OL]. [2006-10-11]. http://csre. nist. gov/publications/fips/.
  • 6Algredo-Badillo I, Feregrino-Uribe C, Cumplido R. Design and Implementation of an FPGA-Based 1. 452-Gbps Nonpipelined AES Architecture[C]//ICCSA 2006, LNCS 3982. Berlin: Springer-Verlag, 2006: 456-465.
  • 7Pramstaller N, Mangard S, Dominikus S, et al. Efficient AES Implementations on ASICs and FPGAs[C]//AES 2004, LNCS 3373. Berlin: Springer-Verlag, 2005: 98-112.
  • 8Tillich S, Herbst C. Boosting AES Performance on a Tiny Processor Core[C]//CT-RSA 2008, LNCS 4964. Berlin: Springer-Verlag, 2008: 170-186.
  • 9Henry K, Verbauwhede I. Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm [C]//CHES 2001, LNCS 2162. Berlin: Springer-Verlag, 2001: 51-64.
  • 10Rudra A, Dubey P K, Jutla C S, et al. Efficient Rijndael Encryption Implementation with Composite Field Arithmetic [C]//Proe Worksho Cryptographic Hardware and Embedded Systems-CHES 2001. Berlin: Springer-Verlag, 2001 : 171- 184.

二级参考文献9

  • 1李娜 陈卫红.一类S盒密码学性质的研究[A]..第八届中国密码学学术会议[C].北京:科学出版社,2004.64-71.
  • 2Daemen J, Rijmen V. AES Proposal : Rijndael[ EB/OL]. http://www. east. kuleuven. ac. be/- rijmen/rijndael, 1999-10-05.
  • 3National Institute of Standard and Technolog. Advanced Eneryption Standard FIPSI97[ S]. 2001-11-26.
  • 4Sannon C E. Communication Theory of Secrecy Systems[J]. The Bell System Technical Journal, 1982, 28(4) : 656-715.
  • 5Scife C, Flawed C C. Cryptographers Claim[J]. Science, 2002, 297:2 193.
  • 6Courtois N T, Pieptzyk J. Cryptanalysis of block Ciphers with Overdefined Systems of Equations[A]. Asia Crypt 2002[C]. Berlin:Spfiner-Verlag, 2002. 267-287.
  • 7Murphy S, Robshaw M. Essential Algebraic Structure Within the AES[A]. Advances in Cryptology: CRYPTO'02[C]. Berlin: Springer-Veralg, 2002. 1-6.
  • 8Wei Baodian, Liu Jingwei, Wang Xinmei. Trace Representations of coordinates of Finite Field Elements and Their Cryptographic Applications[A]. China Crypt'2004[C]. Beijing: Science Press, 2004. 42--49.
  • 9韦宝典,马文平,王新梅.AES S盒的代数表达式[J].西安电子科技大学学报,2003,30(1):29-32. 被引量:17

共引文献3

同被引文献26

  • 1NESSIE: New European Schemes for Signatures, Integrity and Encryption, Performance of Optimized Implementations of the NESSIE Primitives, Version 2.0 EEB/OL]. [2000-11-1]. https://www, cosic, esat. kuleuven, be/nessie/ deliverables/D21-v2, pdf.
  • 2Aoki K, Ichikawa T, Kanda M, et al. Camellia: a 128-bit Block Cipher Suitable for Multiple Platforms Design and Analysis [C] //Proceedings of TACS 1997 : LNCS 1281. Berlin : Springer-Verlag, 1997 : 39-56.
  • 3Matsui M. New Block Encryption Algorithm MISTY [C]//Proceedings of FSE1997: LNCS1267. Berlin: Springer- Verlag, 1997: 54-68.
  • 4Daemen J, Rijnmen V. The design of Rijndael AES: the Advanced Encryption Standard [M]. 1st ed. Berlin: Springer- Verlag, 2002, 30-45.
  • 5Handschuh H, Naccache D. SHACAL, NESSIE[EB/OL]. [2001-6-1]. https://www, cosic, esat.kuleuven, be/nessie.
  • 6National Institute of Standards and Technology. Federal Information Processing Standards Publication 180-1 (FIPS180-1) --Secure Hash Standard (SHA) [EB/OL]. [1995-04-103. http://csrc, nist. gov/publications/fips/fips180/fips-180, pdf.
  • 7Lai Xuejia, Massey J-L, Murphy S. Markov Ciphers and Differential Cryptanalysis[C]//Proeeedings of EUROCRYPT1991 : LNCS547. Berlin: Springer-Verlag, 1992 : 17-38.
  • 8Hong S, Kim J, Kim G, et al. Impossible Differential Attack 30-round SHACAL-2 [C] //Proceedings of INDOCRYPT2003: LNCS2904. Berlin: Springer-Verlag, 2003: 97-106.
  • 9Shin Y, Kim J, Kim G, et al. Differential-linear Type Attacks on Reduced Rounds of SHACAL-2[C]//Proceedings of ACISP2004: LNCS3108. Berlin: Springer-Verlag, 2004: 110-122.
  • 10Kim J, Kirn G, Lee S, et al. Related-key Attacks on Reduced Rounds of SHACAL-2[C]//Proceedings of INDOCRYPT2004: LNCS 3348. Berlin: Springer-Verlag, 2004: 175-190.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部