期刊文献+

基于k-分割Feistel网络的FPE方案 被引量:2

FPE scheme based on k-splits Feistel network
下载PDF
导出
摘要 基于对保留格式加密(FPE,format-preserving encryption)方案中Feistel网络构造特点的分析,针对当前使用2-分割Feistel网络构造的FPE密码分组长度范围较小的问题,提出基于k-分割type-2 Feistel网络的FPE方案,以适应各种长度数据的加密需求。通过实验验证,type-2 Feistel网络可以使用较小规模伪随机函数构造各种分组长度密码,具有广泛实用性。 The construction features and discipline of Feistel network-based FPE(format-preserving encryption) schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher's block size was in narrow range,a type-2 Feistel network-based FPE scheme,which was suitable for constructing FPE cipher with scalable block size,was presented.Experiment show that type-2 Feistel network is able to use small-scaled pseudorandom function to construct cipher with scalable block size and that is practical.
出处 《通信学报》 EI CSCD 北大核心 2012年第4期62-68,共7页 Journal on Communications
基金 国家自然科学基金资助项目(60973141) 天津市自然科学基金资助项目(09JCYBJ00300) 高等学校博士学科点专项科研基金资助项目(20100031110030) 网络安全与密码技术福建省高校重点实验室开放课题基金资助项目(2011004) 中央高校基本科研业务费专项基金资助项目~~
关键词 保留格式加密 FEISTEL网络 type-2 FEISTEL网络 format-preserving encryption Feistel network type-2 Feistel network
  • 相关文献

参考文献20

  • 1SPIES T. Format preserving encryption unpublished white paper[EB/OL].http://www.voltage.com,2008.
  • 2RADHAKRISHNAN R,KHARRAZI M,MEMON N. Data masking:a new approach for steganography[J].Journal of VLSI Signal Processing,2005,(03):293-303.
  • 3BELLARE M,RISTENPART T,ROGAWAY P. Format-preserving encryption[A].Springer-verlag,2009.295-312.
  • 4STUTZ T,UHL A. Efficient format-compliant encryption of regular languages:block-based cycle-walking[A].Springer-verlag,2010.81-92.
  • 5BLACK P,ROGAWAY P. Ciphers with arbitrary finite domains[A].2002.114-130.
  • 6SPIES T. Feistel finite set encryption mode[EB/OL].http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ffsem/ffsem-s pec.pdf,.
  • 7BELLARE M,ROGAWAY P,SPIES T. The FFX mode of operation for format-preserving encryption[EB/OL].http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ffx/ffx-spec.pdf,.
  • 8BELLARE M,ROGAWAY P,SPIES T. Addendum to the FFX mode of operation for format-preserving encryption[EB/OL].http://csrc.ncsl.nist.gov/groups/ST/toolkit/BCM/documents/proDosedmodes/ffx/ffx-spec2.pdf,.
  • 9BRIER F,PEYRIN T,STERN J. BPS:a format-preserving encryption proposal[EB/OL].http://brutus.ncsl.nist.gov/groups/ST/ tookit/BCM/documents/proposedmodes/bps/bps-spec.pdf,.
  • 10CANDA V,TRUNG T. Scalable block ciphers based on Feistel-like structure[J].Tara Mt Math Publ,2002.39-66.

二级参考文献60

  • 1PCI Security Standards Council. Payment Card Industry Data Security Standard[S]. 2006.
  • 2RADHAKR/SHNAN R, KHARRAZI M, MEMON N. Data masking: a new approach for steganography[I]. Journal of VLSI Signal Processing, 2005, 41(3): 293-303.
  • 3National Bureau of Standards. FIPS PUB 74. Guidelines for Implementing and Using the NBS Data Eucryption Standard[S]. 1981.
  • 4SMITH H, BRIGHTWELL M. Using datatype-preserving encryption to enhance data warehouse security[A]. NIST 20th National Information Systems Security Conference[C]. 1997. 141.
  • 5BLACK P, ROGAWAY P. Ciphers with arbitrary finite domains[A]. Topics in Cryptology-CT-RSA'02[C]. Springer, 2002. 114-130.
  • 6MORRIS B, ROGAWAY P, STEGERS T. How to encipher messages on a small domain[A]. Cryptology-CRYPTO'09[C]. 2009.
  • 7SPIES T. Format preserving encryption unpublished white paper[EB/OL], http://www.voltage.com, 2008.
  • 8SPIES T. Feistel finite set encryption mode[EB/OL], http://csrc.nist. gov/groups/ST/toolkit/BCMIdocuments/proposedmodes/ffsem/ffsem-s pec.pdf.
  • 9BELLARE M, RISTENPART T, ROGAWAY E et al. Format- preserving encryption[A]. Selected Areas in Cryptography (SAC 21)09)[C]. Springer, 2009.
  • 10BELLARE M, ROGAWAY P, SPIES T. The FFX mode of operation for format-preserving encryption[EB/OL], http://csrc.nist.gov/groups/ ST/toolkit/BCM/documents/proposedmodes/ffx/ffx-spec.pdf.

共引文献21

同被引文献4

引证文献2

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部