期刊文献+

DES的S盒的布尔性质 被引量:2

Boolean Properties of DES's S-Boxes
原文传递
导出
摘要 在密码学的历史上,数据加密标准DES是上个世纪七十年代提出的一个非常重要的对称密码算法,布尔函数的代数免疫度是2003年提出来的抵抗流密码的代数攻击的一个重要指标。S盒是DES中唯一的非线性部分,从布尔函数的观点,研究DES的八个S盒所构造的32布尔函数的代数免疫度和非线性度等密码学性质,这些函数都是六个变量的布尔函数。文中的计算结果表明,所有32个布尔函数的代数免疫度都达到了其理论上的最大值3。 In the history of cryptography, DES (Data Encryption Standard), developed by IBM around 1974 and adopted as a national standard in 1977, is one of the most important symmetric encryption algorithm. However, the algebraic immunity was proposed in 2003 to resist the algebraic attack on stream ciphers. The eight S-boxes are the only nonlinear part of the algorithm. From the viewpoint of Boolean functions, the algebraic immunities and the nonlinearities of the 32 Boolean functions generated from DES' s eight S-boxes are studied, and these 32 functions are Boolean functions of six variables. Experiments result shows that the algebraic immunities of all the 32 Boolean functions could reach their theoretical maximal value 3.
作者 董军武
出处 《通信技术》 2012年第12期66-70,共5页 Communications Technology
关键词 数据加密标准 S盒 布尔函数 代数免疫度 DES(Data Encryption Standard) S-box Boolean function algebraic immunity
  • 相关文献

参考文献11

  • 1BIHAM E, SHAMIR A. Differential Cryptanalysis ofDES-like Cryptosystem[J]. Journal of Cryptology,1991(04):3-72.
  • 2MATSUI M. Linear Cryptanalysis Method for DESCipher[C]//Advances in EUR0CRYPT93. Berlin:Springer, 1994:386-397.
  • 3COURTOIS N. Fast Algebraic Attacks on Stream Cipherswith Linear Feedback[C]// Advances in Cryptology,Berlin:Springer, 2003:176-194.
  • 4DALAI D K, GUPTA K C, MAITRA S. Results on AlgebraicImmunity for Cryptographically SignificantBoolean Functions[C]// Advances in INDOCRYPT,Berlin:Springer, 2004:92-106.
  • 5DALAI D K, MAITRA S,SARKAR S.Basic Theory inConstruction of Boolean Functions with MaximumPossible Annihilator Immunity[J]. Designs, Codesand Cryptography, 2006(40):41-58.
  • 6LI N, QI W F. Construction and Analysis of BooleanFunctions of 2t+l Variables with Maximum AlgebraicImmunity[C]// Advances in ASIACRYPT 2006,Heidelberg: Springer, 2006:84-98.
  • 7STINSON DR.密码学原理与实践[M].冯登国,译.北京:电子工业出版社,2003.
  • 8COURTOIS N, MEIER W.Algebraic Attacks on StreamCiphers with Linear Feedback[C]// Advances inEUR0CRYPT, Springer Verlag, 2003:345-359.
  • 9惠越超,汪一鸣.基于S盒优化的轻量级加密算法设计[J].通信技术,2010,43(5):103-105. 被引量:7
  • 10侯有利.数据库加密中的二级密钥设计[J].通信技术,2011,44(5):52-53. 被引量:6

二级参考文献16

共引文献26

同被引文献14

  • 1GONG G, Rcnjom S, Helleseth T. Fast Discrete Fourier Spectra Attacks on Stream Ciphers [ J ]. IEEE Transac- tions on Information Theory. 2011, 57: 5555-5565.
  • 2王品晶.序列密码的快速离散傅里叶频谱攻击[D].上海交通大学硕士论文,2013:13-34.
  • 3Courtois N. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback [ C ]. Advances in Cryptology - CRYPT() 2003. Springer-Verlag. 2003,2729 : 176-194.
  • 4Armknecht F. Improving Fast Algebraic Attacks [ C ~. FSE 2004. Springer-Verlag. 2004, 3017: 65-82.
  • 5Courtois N, Meier W. Algebraic Attacks on Streanl Ciphers with Linear Feedback [ C 1- Advances in Cryptology - Euro- crypt' 2003. Springer-Verlag. 2003,2656:345-359.
  • 6Armkneeht F, Krause M. Algebraic Attacks on Combin- ers with Memory [ C 1. Advances in Cryptology - CRYP- TO 2003. Springer-Verlag. 2003,2729.:162-176.
  • 7Helleseth T, Rcnjom S. Simplifying Algebraic Attacks with Univariate Analysis [ C ]. Information Theory and Applications Workshop (ITA) , 2011. [ S. 1. ] : IEEE, 2011 : 1-7.
  • 8WANG Jing-jing, CHEN Ke-fei, ZHU Shi-xiong. An- nihilators of Fast Discrete Fourier Spectra Attacks [ C ]. Advances in Information and Computer Security. Heidel- berg : Springer, 2012 : 182-196.
  • 9Ronjom S, Gong G, Helleseth T. On Attacks on Filte- ring Generators Using l,inear Subspaee Structures [ C ~. Sequences, Subsequences, and Consequences. Berlin Heidelberg: Springer, 2007, 4893: 204-217. ~,.
  • 10曹浩,魏仕民,焦胜军.具有最大代数免疫阶弹性函数的构造[J].安徽科技学院学报,2011,25(1):48-52. 被引量:3

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部