期刊文献+

一种DES组合算法 被引量:3

A Combination Algorithm Based on DES
下载PDF
导出
摘要 随着计算机运算速度的增长,DES算法由于密钥长度较小,不能抵御暴力攻击,已经不适应当今网络对数据加密安全性的要求,增加密钥及分组长度是提高加密算法抗暴力攻击的主要方法。设计并实现了一种DES组合算法,通过将两组DES进行串联及耦合,使密钥长度增加至112 bits,明文/密文分组长度增加至128 bits,从而有效地抵御暴力破解的攻击。 With the growth of computing speed,DES algorithm can't resist brute force attacks and no longer meets today's network security requirements of data encryption because of short key length.One way to improve its anti-attack performance is to increase the length of the key and the texts.The design and implementation of an algorithm is introduced,which improves DES Algorithm by adding the key's length to 112 bits and adding the plaintexts'/ciphertexts' length to 128 bits at the same time.So the algorithm can resist the attacks from brute force more effectively.
出处 《南京邮电大学学报(自然科学版)》 2011年第5期83-86,96,共5页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
关键词 DES 雪崩效应 串联 耦合 暴力破解 DES avalanche effect series coupling brute force attack
  • 相关文献

参考文献11

  • 1National Bureau of Standards. Data Eneryption Standard[ S]. 1977.
  • 2DIFFIE W, HELLMAN M. Exhaustive Cryptanalysis of the NBS Data Encryption Standard [ J ].IEEE Computer, 1977,10 ( 6 ) : 74 - 84.
  • 3BIHAM E, SHAMIR A. Differential cryptanalysis of DES-like cryptosystems [ J ]. Journal of Cryptology, 1991 ,4 ( 1 ) :3 - 72.
  • 4MATSUI M. The First Experimental Cryptanalysis of the Data Eneryption Standard [ J ]. Lecture Notes in Computer Science, 1994, 839:1 -ll.
  • 5MATSUI M. Linear Cryptanalysis Method for DES Cipher [ J ]. Lecture Notes in Computer Science, 1994,765:386- 397.
  • 6王立胜,王磊,顾训穰.数据加密标准DES分析及其攻击研究[J].计算机工程,2003,29(13):130-132. 被引量:18
  • 7American Bankers Association. ANSI X9.52-1998,Triple Data Encryption Algorithm Modes of Operation[ S]. 1998.
  • 8JOAN D, VINCENT R. The design of Rijndael : AES--the advanced encryption standard [ M ]. Berlin : Springer-Verlag ,2001:31 - 50.
  • 9LU Kaicheng. Computer cryptography Data privacy and security in the computer network [ M ]. 3ed. Beijiug: Tsinghua University Press,2003:351 - 353.
  • 10HU Yupu. Symmetric Cryptography [ M ]. Beijing: China Machine Press,2002. ( in Chinese).

二级参考文献3

  • 1Schbeier B. Applied Cryptography (Second Edition): Protocols, Algorithms,and Source Code in C. California:Sons Inc.,2001 : 162-212.
  • 2Stinson D R. Cryptography---Theory and Practice. Tokyo: CRC Press. 1995.
  • 3冯登国 裴定一.密码学引导[M].北京:科学出版社,1999.196-198.

共引文献17

同被引文献18

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部