期刊文献+

广义可调加密方案 被引量:2

Generalized tweakable enciphering schemes
下载PDF
导出
摘要 可调加密方案是一类大分组的可调分组密码.为发现更多高效的可调加密方案以及更多的可调加密方案的实现方法,提出广义可调加密方案.通过定义加密方案的可用函数序列,函数序列的不同构造方法以及函数与方案之间的映射关系,得到一系列新的高效的可调加密方案.在所有这些方案中,部分可调加密方案在效率上优于原方案,其他方案在效率上和原方案相当.同时,也发现几种可调加密方案新的实现方法. The tweakable enciphering scheme is a kind of wide-block tweakable block cipher. In order to find more efficient tweakable enciphering schemes and more implementation methods, we propose generalized tweakable enciphering schemes. By defining an allowed function sequence, different construction methods for the function sequence, and the mapping from the function sequence to the enciphering scheme, we get many new tweakabte enciphering schemes. Among them, some are better than the original scheme in efficiency, others are comparable to it in efficiency. At the same time, some new implementation methods for the tweakable enciphering scheme are discovered.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2009年第4期686-690,共5页 Journal of Xidian University
基金 国家自然科学基金资助(90604009 60503010)
关键词 密码学 分组密码 可调加密方案 数据保密 cryptography block cipher tweakable enciphering scheme security of data
  • 相关文献

参考文献16

  • 1Liskov M, Rivest L R, Wagner D. Tweakable Block Ciphers[C]//CRYPTO 2002:2442. Berlin: Springer-Verlag, 2002: 31-46.
  • 2韦宝典,刘景伟,王新梅.NESSIE分组密码及其安全性分析[J].西安电子科技大学学报,2004,31(3):377-382. 被引量:5
  • 3Rogaway P. Efficient Instantiations of Tweakable Blockciphers and Refinemets to Modes OCB and PAMC[C]// ASIACRYPT 2004: 3329. Berlin: Springer-Verlag, 2004: 16-31.
  • 4Luby M, Rackoff C. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions[J]. SIAM Journal on Computing, 1988, 17(2): 373-386.
  • 5Naor M, Reingold O. On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited[J]. Journal of Cryptology, 1999, 12(1): 29-66.
  • 6Halevi S, Rogaway P. A Tweakable Enciphering Mode[C]//CRYPTO 2003: 2729. Berlin: Springer-Verlag, 2003: 482- 499.
  • 7Halevi S, Rogaway P. A Parallelizable Enciphering Mode[C]//CT-RSA 2004: 2964. Berlin: Springer-Verlag: 292-304.
  • 8Halevi S. EME^* : Extending EME to Handle Arbitrary-Length Messages With Associated Data[C]//INDOCRYPT 2004: 3348. Berlin: Springer-Verlag, 2004: 315-327.
  • 9MeGrew A D, Fluhrer S. The Extended Codebook(XCB) Mode of Operation[EB/OL]. [2007-05-03]. http..//eprint. iacr. org/2004/278.
  • 10Wang P, Feng D, Wu W. ttCTR: a Viriable-Input-Length Enciphering Mode[C]//CISC 2005: 3822. Berlin: Springer- Verlag, 2005: 175-188.

二级参考文献2

共引文献4

同被引文献11

  • 1MOSES L,RONALD L R,DAVID W.Tweakable block ciphers[A].CRTPTO 2002[C].California,USA,Springer,Heidelberg,2002.31-46.
  • 2HALEVI S,ROGWAY P.A tweakable enciphering mode[A].CRYPTO 2003[C].California,USA,Springer,Heidelberg,2002.482-499.
  • 3HALEVI S,ROGWAY P.A parallelizable enciphering mode[A].CTR-RSA 2004[C].San Francisco,CA,USA,Springer,Heidelberg,2004.292-304.
  • 4WANG P,FENG D G,WU W L.HCTR:a variable-input-length enciphering mode[A].CISC 2005[C].Beijing,2005.175-188.
  • 5LOPEZ M C.Efficient implementations of some tweakable enciphering schemes inreconfigurable handware[A].Indocrypt 2007[C].Chennai,India,Springer-verlag,2007.414-424.
  • 6KAZUHIKO M.Tweakable enciphering schemes from hash-sum-expansion[A].Indocrypt 2007[C].Chennai,India,Springer-verlag,2007.252-267.
  • 7DAVID G,SUSAN H.On tweaking luby-backoff blockciphers[A].ASIACRYPT 2007[C].Kuching,Malaysia,2007.342-356.
  • 8MATSUI M.New structure of block ciphers with provable security against differential and linear cryptanalysis[A].FSE 1996[C].Cambrige,UK,Springer-verlag,1996.206-218.
  • 9WEN F T,YIN L Z.On tweaking dual MISTY-type blockciphers[A].Proc ICCSIT 2009[C].Beijing,2009.281-283.
  • 10KANG J S.Pseudorandomness of MISTY-type transformations and the block cipher KASUMI[A].Proc ACISP 2001[C].Sydney,Australia,Springer-Verlag,2001.60-73.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部