期刊文献+

AES算法EAX加密认证模式优化技术研究

Research on Optimizing Encryption-authentication Mode of EAX in AES Algorithm
下载PDF
导出
摘要 通过深入分析AES算法的EAX加密认证模式,提出一种新加密认证模式PEAX(Parallel-EAX),其中的加密和认证模式分别采用RCTR(Random CTR)和POMAC(Parallel OMAC)模式,使EAX-AES算法处理过程完全并行化,从而在软件和硬件实现上都达到满意的性能.PEAX保持EAX的优点,并能使认证处理和加密处理都基于相同的加密核心单元进行的,有效地降低实现过程的复杂度.最后并通过Visual Studio 2005软件仿真,验证PEAX模式优化的性能. The security issue has been remaining central in the research field of AES. Based on the thorough study on the cipher mode of AES, this paper proposes a new authentication-encryption mode called PEAX (Parallel-EAX), which consists of RCTR(Random CTR) and POMAC(Parallel OMAC) mode. The newly introduced authentication-encryption mode enables the parallel processing of encryption and authorization, and can achieve better performance both in software and hardware implementation. Without sacrificing the advantages of EAX, both encryption and authentication processing in PEAX are conducted on the basis of a single cipher coi'e unit such as AES, resulting with lowest complexity in implementation. The simulation result indicates that the proposed PEAX functions sufficiently well in the Visual Studio 2005 development environment and is up to the technical expectation.
出处 《宁波大学学报(理工版)》 CAS 2009年第1期12-16,共5页 Journal of Ningbo University:Natural Science and Engineering Edition
基金 国家自然科学基金(60372026) 宁波市自然科学基金(2008A610029)
关键词 AES EAX—AES PEAX 加密 认证 AES EAX-AES PEAX encryption authentication
  • 相关文献

参考文献7

  • 1Federal Information Processing Standards Publication 197. Specification for AESI97 [EB/OL]. [2001-11-26]. http://csrc.nist.gov/publications/tips/.
  • 2Daemen J, Rjjmen V. AES proposal: Rijndael [EB/OL]. [2001-02-28]. http://csrc.nist.gov/CryptoToolkit/aes/rijndael/.
  • 3Bellare M, Rogaway P, Wagner D. The EAX Mode of Operation[C]//Proceedings of the 11th Workshop on Fast Software Encryption, Lecture Notes in Computer Science, Springer Verlag, 2004.
  • 4Bellare M, Rogaway E Robust computational secret sharing and a unified account of classical secret-sharing goals[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007.
  • 5马杏池,刘亮.高级加密标准(Rijndael算法)介绍与探讨[J].装备指挥技术学院学报,2003,14(4):75-78. 被引量:5
  • 6吴文玲,冯登国.分组密码工作模式的研究现状[J].计算机学报,2006,29(1):21-36. 被引量:39
  • 7张清华.Rijndael算法的高效实现及其性能分析[J].计算机应用,2004,24(2):12-14. 被引量:4

二级参考文献9

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部