期刊文献+

模2~n剩余类环上线性变换的异或线性分支数

On the XOR Linear Branch Numbers of Linear Transformations over Z/(2~n)
原文传递
导出
摘要 异或线性分支数是衡量分组密码扩散结构的扩散性能的一个重要指标,它对分组密码抵抗线性密码分析的能力有重要的影响.二元域上的非线性变换也常用作分组密码的扩散结构,本文给出了此类扩散结构的异或线性分支数的一个定义及其与分组密码抗线性逼近攻击能力的关系,证明了以模2n剩余类环上的线性变换为扩散结构的异或线性分支数等于将其奇系数换成1、偶系数换成0且将模2n加换成模2加所得的二元域上线性变换的异或线性分支数,从而将这类扩散结构的异或线性分支数归结为二元域上线性变换的异或线性分支数. The xor linear branch numbers is used to evaluate the diffusion structure,and it indicates the security of the block cipher against linear cryptanalysis.The nonlinear transformations over the finite field GF(2) are also usually used for the diffusion structures of the block ciphers.This paper gives a definition of the xor linear branch numbers of this kind of diffusion structures and the relations between it as well as the strength of a cipher against liner cryptanalysis,and then we prove that the xor linear branch numbers of the diffusion structure over the residue class ring modulo Z/(2n) is equal to that of the diffusion structure over the finite field GF(2),which we substitute 0 for the odd coefficient and 1 for the even coefficient and the linear transformations over Z/(2n) for the linear transformations over GF(2).Consequently,we convert the problem of the xor linear branch numbers of the diffusion structure over Z/(2n) to that of the diffusion structure over the finite field GF(2),which has been studied in many papers.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2010年第6期678-682,共5页 Journal of Wuhan University:Natural Science Edition
关键词 分组密码 非线性扩散结构 异或线性分支数 模2n剩余类环 可证明安全性 block cipher nonlinear diffusion structure xor linear branch number residue class ring modulo 2n provable security
  • 相关文献

参考文献10

  • 1Daemen J. Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis [D]. Brussel..Katholieke Universiteit Leuven,1995.
  • 2Daemen J, Rijmen V. AES proposel: Rijndael [DB/ OL]. [2009-09-08]. http: / / www. cosic, esat. leuleuven. ac. be/- rijmen /. 1998.
  • 3Daemen J,Knudsen R L, Rijmen V . The block cipher square [ C ]//Fast Software Encryption. Berlin: Springer-Verlag, 1997 : 149-165.
  • 4Kwon Daesung, Kim Jaesung, Sangwoo Park, et al. New Block Cipher: ARIA[J]. Information Security and Cryptology ,2003,8(10) :432-445.
  • 5Kanda M, Moriai S,Aoki K,et al. E2-A new 128-bit block cipher [DB/OL]. [2009-09-08]. http://www. cosic, esat. kuleuven, ac. be/-rijmen/. 2000.
  • 6Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, et al. Camellia:A 128-Bit Block Cipher Suitable for Multiple Platforms[DB/OL]. [2009-09-08]. http ://www. cosic, esat. kuleuven, ac. be/ness ie/work shop/submissions/Camellia, zip 2001.
  • 7Hong S,Lee S, Lim J,et al. Provable security against differential and linear cryptanalysis for the SPN structure[C]//7th International Workshop, Fast Software Encryption 2000 (LNCS 1978), New York: Springer- Verlag, 2000 : 273-283.
  • 8Massey J, Khachatrian G H, Kuregian M K. The SAFER+ + Block Encryption Algorithm[DB/OL]. [2009-09-08]. http://cryptonessie, org,2007-01-01.
  • 9金晨辉.有限域和剩余类环上非奇异反馈多项式的谱刻划[J].通信学报,2000,21(1):74-77. 被引量:7
  • 10Kang J S, Hong S, Lee S,et al. Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks[J].Electronics and Telecommuciations Research Institute Journal, 2001, 23(4) : 158-167.

二级参考文献3

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部