期刊文献+

一种混沌DES算法的单片机实现

Microcontroller Implementation of DES Algorithm Based on Chaotic
下载PDF
导出
摘要 针对DES(数据加密标准)算法所存在的不足和混沌序列的特点,提出了一种新的基于Lorenz混沌模型的改进DES加密算法,并在C8051F020单片机上进行了实现。该算法将混沌模型与DES算法相结合,对加密时所用的初始密钥和16轮迭代过程进行了改进,采用一次一密的加密方法。理论分析和实验结果表明,与原始DES算法相比,该算法扩展了密钥的选择空间,有效地提高了算法的安全性能和抵抗攻击的能力,并提高了算法的运算速度。 In view of the deficiency in DES(Data Encryption Standard) algorithm and the characteristics of chaotic sequences,this paper presents a new improved DES encryption algorithm based on Lorenz chaotic model,and then it's realized on the C8051F020 microcontroller.The scheme combines chaos sequence with DES algorithm to improve the initial keys of encryption and sixteen times iteration procedures,and it uses one-time password encryption method.Theoretical analysis and experimental results show that the algorithm is able to extend the key space compared with the original DES algorithm,also it has a higher speed of operation and improves the property of algorithm's security as well as the anit-attack ability effectively.
出处 《青岛大学学报(工程技术版)》 CAS 2011年第3期51-55,共5页 Journal of Qingdao University(Engineering & Technology Edition)
基金 国家自然科学基金资助项目(61074126)
关键词 DES算法 混沌 C8051F单片机 DES algorithm chaotic C8051F microcontroller
  • 相关文献

参考文献14

二级参考文献53

  • 1赵莉,张雪锋,范九伦.一种改进的混沌序列产生方法[J].计算机工程与应用,2006,42(23):31-33. 被引量:20
  • 2李翔宇,孙义和.采用数据流模式提高乱序执行密码芯片的安全性[J].电子学报,2007,35(2):202-206. 被引量:2
  • 3M L Akkar, C Girand. An implementation of DES and AES secure against some attacks[A]. Cryptographic Hardware Embedded System-CHES 2001 [C]. Paris: Springer-Verlag, 2001. 309 - 318.
  • 4J A Fournier, S Moore,H Li,R D MuUins,G. S Taylor. Security evaluation of asynchronous circuits[ A]. Cryptographic Hard- ware Embedded System-CHES 2003[ C]. Cologne: Springer- Verlag,2003. 137 - 151.
  • 5S Mangard. Hardware countermeasures against DPA-a statistical analysis of their effectiveness [ A ]. CT-RSA 2004 [ C ]. San Francisco: Springer-Verlag, 2004. 222 - 235.
  • 6G Yeap. Practical Low Power Digital VLSI Design[M]. USA: Kluwer Academic Publishers, 1998.
  • 7E Brier, C Clavier, F Olivier. Correlation power analysis with a leakage model [ A ]. Cryptographic Hardware Embedded System-CHES 2004[ C]. Boston: Springer-Verlag, 2004.16 - 29.
  • 8Federal Information Processing Standards Publication 46- 3 (FIPS PUB 46 - 3) : Data Encryption Standard[S].
  • 9T S Messerges,E A Dabbish,R H Sloan. Examining smartcard security under the threat of power analysis attacks [J]. IEEE Transactions on Computers,2002,51 (5):541 -552.
  • 10S Micali, L Reyzin. Physically observable cryptography (extended abstract) [A]. 1st Theory of Cryptography Conference [C]. Cambridge, MA: Springer-Verlag, 2004.278 - 296.

共引文献126

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部