期刊文献+

无线网络机制中分组密码标准安全性分析

On the Security Analysis of Block Ciphers in the Wireless Network
下载PDF
导出
摘要 分组密码算法凭借其在各种软件和硬件平台上的高效率特点,广泛地应用在无线通信系统的安全认证及保密机制中。本文对几种著名分组密码标准(美国高级加密标准AES算法、韩国分组加密标准SEED算法、欧洲分组加密标准Camellia算法和中国商用密码标准SMS4算法)的安全性进行了分析,通过研究分组密码算法中的非线性结构S盒的密码学性质,对比分组密码算法抵抗插入攻击、差分密码分析攻击和线性密码分析攻击的能力,揭示各种算法的安全性。 With the characteristics of high efficiency in a variety of software and hardware platforms, block ciphers are widely used in wireless communication systems security authentication and privacy. A detailed analysis of the cryptographic properties of several well known block ciphers, such as AES, SEED, Camellia and SMS4, is made in this paper. S-box, which brings nonlinearity to block cipher, is well investigated and the attack capability resisting to insertion attacks, differential cryptanalysis and linear cryptanalysis is also provided. The security of AES, SEED, Camellia and SMS4 is revealed as compared with each other.
作者 刘佳
出处 《价值工程》 2013年第9期196-199,共4页 Value Engineering
基金 省部产学研项目(2011B090400507) 广东省科技计划高新技术产业化项目(2012B010100048) 广东省科技计划项目(2012B020314007) 广州市科技计划项目(11C42190700)
关键词 分组密码 S盒 布尔函数 差分密码分析攻击 线性密码分析攻击 block cipher S-boxes boolean function differential cryptanalysis attack linear cryptanalysis attack
  • 相关文献

参考文献1

二级参考文献13

  • 1李志杰.公钥密码技术在移动通信网络中的应用[J].中国科技信息,2005(8):33-33. 被引量:3
  • 2国家密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].(2006-04-20)[2011-05-30].ht-tp://www.oscca.gov.cn/Doc/6/News_1106.htm.
  • 3The LAN/MAN Standards Committee of the IEEE Computer Society.Wireless LAN medium access control and physical layer specification[S].IEEEstd802.11-1997.
  • 4Chiba M,Dommety D,Eklund M,et al.Dynamic AuthorizationExtensions to Remote Authentication Dial in User Service(RADIUS)[S].Request for Comments:5176,Network Working Group,2008.
  • 5Sterman B,Sadolevsky D,Schwartz D,et al.RADIUS Extension forDigest Authentication[S].Request forComments:5090,Network Working Group,2008.
  • 6Sharma M J,Leung V C M.Improved IP Multimedia SubsystemAuthentication mechanism for 3G-WLAN networks[C].2011 IEEE Conferenceon Computer Communications Workshops,2011:1000-1005.
  • 7Hyosun R,Souhwan J.Session key exchange and mutual authenticationscheme between mobile machines in WLAN based ad hoc networks[C].Conference on Information and Communication Technology Convergence.2010:482-483.
  • 8Bellare M,Rogaway P.Optional asymmetric encryption[C].Advances inCryptology—Proceedings of EUROCRYPT,LNCS 950,1994:92-111.
  • 9Harn L,Xu Y.Design of generalised ElGamal type digital signatureschemes based on discrete logarithm[J].IEE Electronics letters,1994,30(24):2025-2026.
  • 10Bellare M,Rogaway P.The Exact Security of Digital Signatures—Howto Sign with RSA and Rabin[C].Advances in Cryptology—Proceedings ofEUROCRYPT,LNCS 1070,1996:399-416.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部