期刊文献+

改进型多态性密码的安全机制研究 被引量:1

Security Analysis of Mechanisms for the Improved Polymorphic Cipher
下载PDF
导出
摘要 和大多数通常已知的对称性加密算法(包括AES的代表算法,例如Rijndael和Twofish)相比较,多态性密码可以抵御差分密码攻击。这种算法主要用于磁盘文件的加密。要解决的问题是在P2P网络中改进多态性密码机制,为通信双方提供大量安全的会话密钥。构造了满足严格雪崩准则和输出位独立性的强单向函数,并对其进行了安全性分析,用实验数据和相关理论进行了论证。 In contrast to most or all commonly known symmetric encryption algorithm designs (including the AES candidates such as Rijndael and Twofish) ,the Polymorphic Cipher (PMC) can immunize differential power attack. The algorithm is mostly used to encrypt disk files. The problem that would be solved is to improve the Polymorphic Cipher in P2P,and to provide mass-produced session keys for two parties across a communication channel. A strong one-way function satisfing the Strict Avalanche Criterion (SAC) was constructed. The security of the function was analyzed by some experimental results and correlated theories.
出处 《计算机科学》 CSCD 北大核心 2009年第11期71-74,共4页 Computer Science
基金 国家自然科学基金项目(60473029)资助
关键词 多态性密码 P2P 严格雪崩准则 强单向函数 Polymorphic cipher, Bit independence criterion, Strong one-way function
  • 相关文献

参考文献10

  • 1Roellgen C B. Polymorphic Cipher Theory [OL]. http://www. pmc-ciphers.com/technology/roellgen02generalizedPMCmodel.pdf.
  • 2Bucci M, Luzzi R. Design of Testable Random Bit Generators in Cryptographic Hardware and Embedded Systems[C]//CHES 2005. Springer-Verlag,2005:147-156.
  • 3Yin Yifeng, Li Xinshe, Hu Yupu. Fast S-box security mechanism research based on the polymorphic cipher[J]. Information Sciences, 2008,178(6):603-1610.
  • 4Ripeanu M , Foster I. Mapping the Gnutella Network ; Macro - scopic Properties of Large-scale Peer-to-Peer Systems [C]// IPTPS ' 02. MIT Faculty Club, Cambridge, MA, USA, March 2002.
  • 5Viega J. Practical Random Number Generation in Software[C] //Proc. 19th Annual Computer Security Applications Conference. Dec. 2003.
  • 6Goldreich O. Foundations of Cryptography Basic Tools [ M ] . Press Syndicate of the University of Cambridge, 2001:75-89.
  • 7Menezes A, Oorschot P, Vanstone S. Handbook of Applied Cryptography [M]. CRC, 1996 : 169-190.
  • 8Molina M, Niccolini S, Duffield N G. A Comparative Experimental Study of Hash Functions Applied to Packet Sampling[C]//Proceedings of ITC-19. Beijing, China, 2005.
  • 9Stallings W. Network Security Essentials : Applications and St - andards[M]. New Jersey: Pearson Education, 2004 : 164-166.
  • 10张三峰,赵生慧,方群,于坤,吴国新.P2P网络可用性关键技术研究进展[J].计算机科学,2008,35(9):34-38. 被引量:3

二级参考文献51

  • 1王怀民,唐扬斌,尹刚,李磊.互联网软件的可信机理[J].中国科学(E辑),2006,36(10):1156-1169. 被引量:59
  • 2Melville L, Walkerdine J, Sommerville I. Method definition for dependability specification for P2P systems. TR0306F03_Method Def. 2003
  • 3Clark D D,Wroelawski J ,Sollins K R. Tussle in Cyberspaee, Defining Tomorrow's Intemet // Proe. ACM SIGCOMM. 2002: 347-356
  • 4纽约时报.http://www.nytimes.com/2007/10/03/business/worldbusiness/03broadband.html,2007
  • 5BitTorrent. http://bitconjurer. org/BitTorrent/
  • 6Karnvar S D. The eigenTrust algorithm for reputation management in P2P networks//Proceedings of the Twelfth International WWW Conference. Budapest, Hungary, May 2003
  • 7Comelli F, Damiani E. Choosing reputable servents in a P2P network//Proc, of the Eleventh International WWW Conference. Honolulu, Hawaii, May 2002
  • 8Aberer K,Despotovic Z. Managing trust in a peer-to-peer information system// Proceedings the 10th international Conference on Information and Knowledge Management. Atlanta, Georgia, USA, 2002
  • 9Prashant D, Partha D. Securing reputation data in peer-to-peer networks//PDCS 2004. MIT Cambridge, USA, 2004
  • 10Felegyhazi M, Buttydn L, Hubaux J-P. Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoe Networks - The Static Case. PWC,2003

共引文献2

同被引文献8

  • 1Saeb M. Hardware Implementation of The Chameleon Polymorphic Cipher- 192[J].IJCSNS,2009,9(11):240.
  • 2Yin Y.Li X.Hu Y.Fast S,box Security Mechanism Research based on the Polymorphic Cipher [J].Information Sdences. 2008.178(6):1603-1610.
  • 3Vega J.Practical random number g~neration in software[C] //Computer Security Applications Conference,2003. Proceedings 19th Annual.IEEE,2003: 129-140.
  • 4OveriU R. E.Foundations of Cryptography:Basic Tools [J]. Journal of Logic and COmputation, 2002,12(3):543-544.
  • 5Fore R.The Strict Avalanche Criterion:Spectral Properties of" Boolean Functions and An Extended Definition[C] //Proceedings on Advances in cryptology. Springer-Verlag New York,Inc.,1990:450-468.
  • 6李新社,杜晓辉,尹毅峰,胡予濮.多态密码机制的改进及其严格雪崩特性分析[J].北京工业大学学报,2009,35(6):851-855. 被引量:4
  • 7尹毅峰,丁汉清,胡予濮.多态性密钥交换协议的位独立性安全分析[J].计算机科学,2012,39(3):51-53. 被引量:3
  • 8胡予濮,肖国镇.IDEA的随机群和随机置换[J].西安电子科技大学学报,2000,27(2):237-242. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部