期刊文献+

TOYOCRYPT-HS1算法高速实现研究

High-speed architecture for TOYOCRYPT-HS1 algorithm
下载PDF
导出
摘要 提出了一种TOYOCRYPT-HS1算法高速实现架构,不仅能够满足算法中LFSR特征多项式可变的要求,而且实现了LFSR和非线性布尔函数的并行化设计,显著提高了算法的处理性能。最后通过实验验证和性能比较可以看出,该TOYOCRYPT-HS1算法高速实现架构具有较大的性能优势,最大吞吐率达到1.54 Gb/s。 In this paper, a high-speed architecture for TOYOCRYPT-HS1 algorithm is proposed, which can not only satisfy requirements of variable characteristic polynomials of LFSR, but also realize parallel processing of LFSR and nonlinear Boolean function. Finally, implementation and performance comparison have also been accomplished. The results prove that the proposed high-speed architecture for TOYOCRYPT-HS1 algorithm has obvious performance advantage and its maximum throughput can achieve 1.54 Gb/s.
出处 《电子技术应用》 北大核心 2012年第7期144-146,150,共4页 Application of Electronic Technique
关键词 序列密码 TOYOCRYPT—HS1 线性反馈移位寄存器 非线性布尔函数 并行处理 stream cipher TOYOCRYPT-HS1 linear feedback shift register nonlinear boolean function parallel processing
  • 相关文献

参考文献8

  • 1罗启彬,张健.流密码的现状和发展[J].信息与电子工程,2006,4(1):75-80. 被引量:18
  • 2Self evaluation report TOYOCRYPT-HSI[S]. October 2000.
  • 3Cryptographic techniques sSpecifications TOYOCRYPT-HR1 IS]. October 2000.
  • 4DAWSON E, CLARK A, GUSTAFSON H, et al. Evalua- tion of TOYOCRYPT-HRI[D]. Information Security Rese- arch Centre Queensland University of Technology. 2001.
  • 5MIHALJEVIC M, IMAI H. Cryptanalysis of Toyocrypt-HS1stream cipher[J]. IEICE Transactions on Fundamentals, 2002(E85-A):66-73.
  • 6金晨辉,张少武,胡斌,等.密码学[M].北京:高等教育出版社,2007:93-111.
  • 7ANTHONY T D, BERSON T, GONG G. The W7 stream cipher algorithm[EB]. Internet Draft, 2002.
  • 8秦晓懿,王瀚晟,曾烈光.线性和非线性寄存器系统的并行化技术[J].电子学报,2003,31(3):406-410. 被引量:5

二级参考文献23

  • 1张晓如,曾烈光.帧同步扰码器的并行化技术[J].通信学报,1996,17(2):126-130. 被引量:8
  • 2周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97. 被引量:99
  • 3[3]C E Shannon.A Mathematical Theory of Communication[J].Bell System Technical Journal,1948,27(4):379-423,623-656.
  • 4[4]C E Shannon.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4):656-715.
  • 5[7]Rueppel,R A.Good Stream Cipher Are Hard To Design[A].Proceedings of International Camahan Conference on Security Technology[C].1989.163-174.
  • 6[8]Fuster-Sabater.A family ofkeystream generator with large linear complexity[J].Applied Mathematics Letters,2004,17(6):739-740.
  • 7[9]Z D Dai.ProofofRueppel's Linear Complexity Conjecture[J].IEEE Transactions on Information Theory,1986,It-32(3):440-443.
  • 8[10]H Niederreiter.The Linear Complexity Profile and the Jump Complexity of Keystream Sequences[A].Advances in Cryptology EURO -CRYPT' 90 Proceedings[C].New York:Springer-Verlag,1991.174-188.
  • 9[11]S W Golomb.Shift Register Sequences[M].San Francisco:Holden-Day,1967.
  • 10[12]H Beker,F Piper.Cipher Systems:The Protection of Communications[M].London:Northwood Books,1982.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部