期刊文献+

多态密码机制的改进及其严格雪崩特性分析 被引量:4

Improvement of the Polymorphic Cipher and Its Analysis of the Strict Avalanche Criterion
下载PDF
导出
摘要 C.B.Roellgen多态密码机制(PMC)广泛应用于磁盘文件的加密,具有强安全性和高速性等优点,但不适用于复杂的网络应用环境.针对该问题对PMC进行了改进,提出了满足严格雪崩准则(SAC)的强单向函数和构造S盒的新方法,使构造满足SAC函数的方法更加方便快捷.最后从满足SAC方面分析和验证了该方法的安全性.实验结果表明,改进后的PMC能快速而大量地产生符合密码学特性的长周期序列,并形成网络环境中通信双方会话的对称密钥. C.B. Roellgen polymorphic cipher (PMC) has been found wide application in encrypting diskette, but it is not suitable for complicated network environments. For this reason, PMC was improved and a new construction method of S-box was proposed based on a strong one-way function which could satisfy the Strict Avalanche Criterion (SAC). It could create function which could satisfy SAC quickly and conveniently. Finally, the security of the method was analyzed and verified in terms of SAC. The experimental results show that many long periodic sequences which can satisfy cryptography characteristics can be produced quickly and largely by the improved PMC and used as the session keys to both communication parties in network.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2009年第6期851-855,共5页 Journal of Beijing University of Technology
基金 国家自然科学基金资助项目(60473029) 国家“九七三”资助项目(2007CB311201)
关键词 密码 单向函数 密钥 严格雪崩准则 cryptography one-way function secret key the strict avalanche criterion
  • 相关文献

参考文献12

  • 1ROELLGEN C B.Polymorphic cipher theory[EB/OL].(2003-03-20)[2004-05-27].http://www,ciphers,de/.
  • 2GOLDREICH O.Foundations of cryptography basic tools[M].Cambridge:Press Syndicate of the University of Cambridge,2001:75-89.
  • 3胡子濮,张玉清,肖国镇.对称密码学[M].北京:机械工业出版社,2002:56-57.
  • 4BUCCI M,LUZZI R.Design of testable random bit generators[C]//CHES 2005,Edinburgh,UK:Springer-Verlag,2005:147-156.
  • 5YIN Yi-feng,LI Xin-she,HU Yu-pu.Fast S-box security mechanism research based on the polymorphic cipher[J].Information Sciences,2008,178(6).1603-1610.
  • 6BIHAM E,SHAMIR A.Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptology,1991,4(1):3-72.
  • 7CLARK J A,JACOB J L,STEPNEY S.The design of S-boxes by simulated annealing[J].New Generation Computing,2005,23(3):219-231.
  • 8GUPTA K C,SARKAR P.Improved construction of nonlinear resilient S-boxes[J].IEEE Transactions on Information Theory,2005,51(1):339-348.
  • 9SANTIS A D,FERRARA A L,MASUCCI B.Enforcing the security of a time-bound hierarchical key assignment scheme[J].Information Sciences,2006,176(12):1684-1694.
  • 10MATSUI M.Linear cryptanalysis method for DES cipher[C] // Advances in Cryptology Eurocrypt' 93 Proc,Berlin:Springer-Verlag,1994:386-397.

二级参考文献17

  • 1张雅,冯登国.换位密码及其前景展望[J].北京邮电大学学报,2003,26(z1):134-136. 被引量:7
  • 2卢开澄.计算机密码学(第2版)[M].北京:清华大学出版社,1998..
  • 3Prenneel B, Biryukov A, Oswald E, et al. NESSIE security report, version2.0 [ EB/OL ]. Download from., http: // www. cosic, esat. kuleuven, ac. be/nessie/deliverables, 2003-02-19.
  • 4SCHNEIER B.Applied Cryptography,Protocols,Algorithm and Source Code in C[M].New York:John Wiley and Sons,1996.
  • 5ADAMS C,LLOYD S.Understanding Publickey Infrastructure: Standard and Deployment Considerations[M].Indiana:Macmillan Technical Publishing,1999.
  • 6KATZENBEISSER S,PETITCOLAS F A P.Information Hinding Techniques for Steganography and Digital Watermarking[M].Boston:ARTECH HOUSE,2000.
  • 7BENNETT C H,BESSETTE F,BRASSARD G,et al.Experimental quantum cryptography[J].J Cryptology 1992,5(3):3-28.
  • 8EKERT A K.Quantum cryptography bases on Bell's theorem[J].Phys Rev Lett,1991,67:661.
  • 9D.Anastassiou.Genomic Signal Processing[J].IEEE Signal Processing Magazine 2001,18(4):8-20.
  • 10D.Anastassiou.Frequency-domain analysis of biomolecular sequence[J].Bioinformatics,2000,16(12):1073-1081.

共引文献26

同被引文献21

  • 1耿彬彬,朱范华,王江燕.基于改进的Logistic映射和Henon映射图像加密算法[J].科技经济导刊,2019,0(31):158-158. 被引量:3
  • 2刘向东,焉德军,朱志良,王光兴.基于排序变换的混沌图像置乱算法[J].中国图象图形学报(A辑),2005,10(5):656-660. 被引量:35
  • 3严蔚敏 吴伟民.数据结构[M].北京:清华大学出版社,1994..
  • 4Hector Carcia-Molina, Jeffrey D Ullman, Jennifer Widom. Database System Implementation[ M ].北京:机械工业出版社,2002:170-184.
  • 5Witold Litwin. Linear hashing:a new tool for file and table addressing[ C 1//Proe 6th Conf on Very Large Databases, New York : ACM Press, 1980:212 - 223.
  • 6Saeb M. Hardware Implementation of The Chameleon Polymorphic Cipher- 192[J].IJCSNS,2009,9(11):240.
  • 7Yin Y.Li X.Hu Y.Fast S,box Security Mechanism Research based on the Polymorphic Cipher [J].Information Sdences. 2008.178(6):1603-1610.
  • 8Vega J.Practical random number g~neration in software[C] //Computer Security Applications Conference,2003. Proceedings 19th Annual.IEEE,2003: 129-140.
  • 9OveriU R. E.Foundations of Cryptography:Basic Tools [J]. Journal of Logic and COmputation, 2002,12(3):543-544.
  • 10Fore R.The Strict Avalanche Criterion:Spectral Properties of" Boolean Functions and An Extended Definition[C] //Proceedings on Advances in cryptology. Springer-Verlag New York,Inc.,1990:450-468.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部