期刊文献+

MDS矩阵变换的线性分支结构和比特级线性表示 被引量:1

Linear Branch Structure and Bit Level Linear Representation of MDS Matrix
下载PDF
导出
摘要 MDS矩阵在分组密码和杂凑函数中应用广泛。研究MDS矩阵的线性分支结构和比特级线性表示两类问题。在MDS矩阵给定的情况下,给出了快速得到MDS矩阵的所有线性分支结构的理论基础和算法以及快速得到MDS矩阵比特级线性表示的理论基础和算法,并通过AES中的MDS矩阵进行了编程验证。 Maximum distance separable (MDS) matrixes are widely used in block ciphers and hash functions. This paper deals with linear branch structures and bit level linear representations of MDS matrixes. Under the condition of a given MDS matrix, theory foundations and algorithms are presen- ted on how to get all linear branch structures and how to get bit level linear representations of the given MDS matrix, and theory results are proved by the MDS matrix in AES.
机构地区 信息工程大学
出处 《信息工程大学学报》 2013年第3期289-291,311,共4页 Journal of Information Engineering University
关键词 MDS矩阵变换 线性密码分析 线性分支结构 线性逼近 MDS matrix linear cryptanalysis linear branch structure linear approximation
  • 相关文献

参考文献10

  • 1Daemen J,Rijmen V. The design of Rijndael : AES-The Advanced Encryption Standard [ M]. Berlin Heidelberg: Springer-verlag,2002.
  • 2Wu Hongjun. The Hash Function JH[ EB/OL]. [ 2011-02-01]. http://www.csrc.nist.gov/groups/ST/hash/sha-3/Round3/submissions _ rndl. html.
  • 3Matsui M. Linear cryptanalysis method for DES cipher[ C] / /Proceedings of Advances in Cryptology-EUROGRYPT , 93. 1994 :386-397.
  • 4Youssef A M , Tavares S E, Heys H M. A new class of substitution-permutation networks[ C]//Workshop on Selected Areas inCryptography-SAC,96. 1996; 132-147.
  • 5Youssef A M , Mister S, Tavares S E. On the design of linear transformations for substitution permutation encryption networks[C]//Workshop on Selected Areas in Cryptography-SAC ’ 97. 1997 : 40-48.
  • 6崔霆,金晨辉.对合Cauchy-Hadamard型MDS矩阵的构造[J].电子与信息学报,2010,32(2):500-503. 被引量:16
  • 7李强,李超.基于自对偶MDS码的P置换研究[J].计算机工程与科学,2006,28(1):131-134. 被引量:2
  • 8周旋,张欣,瞿成勤.MDS矩阵的比特变换性质及计数研究[J].计算机工程与科学,2010,32(4):33-35. 被引量:3
  • 9Ju-Sung Kang, Seokhie Hong, Sangjin Lee, et al. Practical and provable security against differential and linear cryptanalysisfor substitution-permutation networks[ J]. ETRI Journal, 2001,23(4) ; 158-167.
  • 10MacWilliams F, Sloane N. The theory of error correcting codes[ M]. New York: North-Holland Publishing Company, 1977.

二级参考文献19

  • 1王念平,金晨辉,余昭平.对合型列混合变换的研究[J].电子学报,2005,33(10):1917-1920. 被引量:10
  • 2李强,李超.基于自对偶MDS码的P置换研究[J].计算机工程与科学,2006,28(1):131-134. 被引量:2
  • 3Schneier B, Kelsey J, and Whiting D, et al.. Twofish: A 128-bit block cipher. Available at http://www.schneier.com/, 2007-2-2.
  • 4Wang Mei-qin. Differential cryptanalysis of present. Cryptology ePrint Archive, Report 2007/408.
  • 5Wu Wen-ling, Zhang Wen-tao, and Feng Deng-guo. Impossible differential cryptanalysis of reduce round ARIA and camellia. Journal of Computer Science and Technology, 2007, 22(3): 449-456.
  • 6Daemen J. Cipher and hash function design strategies based on linear and differential cryptanalysis. [Ph.D. dissertation], KU, Leuven, 1995.
  • 7Kang Ju-sung, Hong Seokhie, and Lee Sangjin, et al.. Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks. ETRI Journal, 2001, 23(4): 158-167.
  • 8Xiao L and Heys H. Hardware design and analysis of block cipher components. Proceedings of the 5th International Conference on Information Security and Cryptology- ICISC'02, 2003 LNCS 2587: 164-181.
  • 9Youssef A, Mister S, and Tavares S. On the design of linear transformations for substitution permutation encryption networks. Workshop on Selected Areas in Cryptography- SAC'97, Ottawa, Workshop record, 1997: 40-48.
  • 10Blomer J, Kalfane M, and Karpinski M, et al.. An Xor-based erasure-resilient coding scheme. Technical Report TR-95-048. International Computer Science Institute, August 1995.

共引文献18

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部