期刊文献+

用马尔可夫链模型化两个密码分析问题

Modeling Two Cryptanalysis Problems with Markov Chains
下载PDF
导出
摘要 将马尔可夫链作为模型,解决了SPN型分组密码差分分析中差分扩散率的计算问题和RSA-OAEP体制IND-CCA安全性证明中仿真程序错误概率的估算问题。事实表明,马尔可夫链模型对上述两个密码分析问题是简单有效的。 In this paper,Markov chains are adopted as a model to solve the problem of computing the differential diffusion probability in the differential cryptanalysis of block ciphers which are of SPN form.This model is also employed to solve the problem of evaluating the error probability of the simulating procedure in the IND-CCA security argument of RSA-OAEP.It is shown that the model of Markov chains is straightforward and effective to both of the cryptanalytic problems above,and is expected to be applied to solve more cryptanalytic problems.
出处 《信息工程大学学报》 2010年第2期156-159,共4页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(60803154)
关键词 马尔可夫链 差分分析 安全性证明 Markov chains differential cryptanalysis security argument
  • 相关文献

参考文献8

  • 1Bellare M,Rogaway P.Random Oracles are Practical:a Paradigm for Designing Efficient Protocols[C]//First ACM Conference on Computer and Communications Security.New York:ACM Press,1993:62-66.
  • 2Bellare M,Rogaway P.Optimal Asymmetric Encryption[C]//Advances in Cryptology-EUROCRYPT'94.Berlin:Springer-Verlag Press,1995:92-97.
  • 3毛文波.现代密码学理论与实践[M].北京:电子工业出版社,2004:165-190.
  • 4Shoup V.OAEP Reconsidered[C]//Advances in Cryptology-Proceedings of CRYPTO'01.Berlin:Springer-Verlag Press,2001:239-248.
  • 5Fujisaki E,Okamoto T,Pointcheval D.Stern J.RSA-OAEP is Secure under the RSA Assumption[C]//Advances in Cryptology-Proceedings of CRYPTO'01.Berlin:Springer-Verlag Press,2001:260-268.
  • 6Biham E,Shamir A.Differential Cryptanalysis of DES-like Cryptosystems[C]//Advances in Cryptology-Proceedings of CRYPTO'90.Berlin:Springer-Verlag Press,1991:2-10.
  • 7Biham E,Shamir A.Differential Cryptanalysis of the Full 16-Round DES[C]//Advances in Cryptology-Proceedings of CRYPTO'92.Berlin:Springer-Verlag Press,1993:487-497.
  • 8Heys H M,Tavares S E.Substitution-Permutation Networks Resistant to Differential Cryptanalysis and Linear Cryptanalysis[J].Journal of Cryptology,1996,9:1-19.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部