期刊文献+

一种带有猫映射动态置换盒的分组密码 被引量:2

A block cipher with dynamic S-boxes based on arnold map
下载PDF
导出
摘要 对猫映射的混沌特性进行研究,提出一种基于迭代二维猫映射的动态置换盒(S-盒)生成方法,由此构造一种基于S-盒的加密算法。将明文划分成组,与不同S-盒进行加密,通过32轮的替代和循环左移得到密文分组。为了提高密码系统的安全性,利用密文反馈来改变猫映射的状态值,使得S-盒与明文相关,可提高密码系统的混淆与扩散性能。由于加密使用了动态S-盒,密码系统不会遇到固定结构分组密码的问题。实验结果表明,该密码系统具有较高的安全性,适用于保密通信。 Chaotic characteristics of Arnold map are studied,and a method for generating substitution boxes(S-boxes) based on the iterating Arnold map is presented.On this basis,a block encryption scheme based on dynamic S-boxes is proposed.The plaintexts are divided into blocks and encrypted with different S-boxes.The cipher blocks are obtained by 32 rounds of substitution and left cyclic shift.To improve the security of the cryptosystem,a cipher feedback is used to change the state value of the Arnold map,which makes the S-boxes relate to the plaintext and enhances the confusion and diffusion properties of the cryptosystem.Since dynamic S-boxes are used in the encryption,the cryptosystem does not suffer from the problem of fixed structure block ciphers.Theoretical and experimental results indicate that the cryptosystem has high security and is suitable for secure communications.
作者 胡滨 范九伦
出处 《西安邮电学院学报》 2012年第1期13-17,共5页 Journal of Xi'an Institute of Posts and Telecommunications
基金 陕西省社会发展科技攻关基金资助项目(2010K17-07)
关键词 分组密码 混沌系统 动态置换盒(S-盒) 猫映射 block cipher chaos-based cryptosystem S-boxes arnold map
  • 相关文献

参考文献13

二级参考文献37

  • 1张敏,杨慧.基于混沌加密的盲音频水印算法[J].中国民航学院学报,2005,23(3):37-41. 被引量:10
  • 2王向阳,赵红.用于MP3作品版权保护的数字水印新算法[J].小型微型计算机系统,2006,27(12):2363-2368. 被引量:2
  • 3张雪锋,范九伦.基于位运算的数字图像隐藏技术[J].信息安全与通信保密,2007,29(5):149-150. 被引量:6
  • 4邢冀鹏 邹雪城 郭旭.Ultra-low power S-Boxes architecture for AES.The Journal of China Universities of Posts and Telecommunications(中国邮电高校学报:英文版),2008,15(1):112-117.
  • 5JAKIMOSKI Goce, KOCAREV Ljupco. Chaos and cryptography: Block encryption ciphers based on chaotic maps [ J]. IEEE Trans Circuits and Systems-Ⅰ, 2001,48(2) : 163-169.
  • 6TANG Guo-ping, LIAO Xiao-feng , CHEN Yong. A novel method for designing S-boxes based on chaotic maps [ J ]. Chaos, Solitons and Fractals, 2005, 23: 413-419.
  • 7BRANSTAD D K, GAIT J , KATZKE S. Report on the Workshop on Cryptography in Support of Computer Security[ M ]. USA: NBSIR National Bureau of Standards, 1976: 77-121.
  • 8ADMS C M, TAVARES S E. The Structured Design of Cryptographically Good S-Boxes[ J]. Journal of Cryptology, 1990, 1(3) : 27-41.
  • 9HEYS H M, TAVARES S E. The Design of SubstitutionPermutation Networks Resistant to Differential and Linear Cryptaualysis [ C ] // Proceedings of the 2^nd Annual ACM Conference on Computer and Communications Security. New York: ACM Press, 1994:148-155.
  • 10YI Xun, CHENG Shi-xin, YOU Xiao-hu. A Method for Obtaining Cryptographically Strong 8 × 8 S-boxes [ C ]// Proceedings of Global Telecommunications Conference 1997, Phoenix, AZ. USA :IEEE press, 1997 : 689-693.

共引文献6

同被引文献16

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部