期刊文献+

一种基于非线性对等变换的分组密码模型

Block cipher model based on nonlinear involutory transformation
下载PDF
导出
摘要 为了使密码算法兼具Feistel型和SP型密码算法的优点,提出了一种构造交换环上m维线性空间的对等非线性变换的方法,并依此设计了基于对等变换的类Feistel密码模型和一种新的分组加密模型。新的加密模型既有Feistel模型的对称性,又有SP网络模型扩散速度快的优点。同时,该模型具有相当大的灵活度,通过选取不同的环,参数a、b以及非线性函数f(x)可以演变出多种分组密码算法。因此,该模型具有较广的应用前景。 A method was proposed to construct nonlinear involutory transformation on m dimensional linear space in commutative ring,and a block cipher model based on involutory transformation was designed.The new encryption model not only has the symmetry of Feistel model,but also the fast spread speed of SP network model.Moreover,this model has lots of flexibility and can evolve a variety of block ciphers easily through choosing different ring,parameters a and b,or nonlinear function f(x).So,it has wide application prospects.
出处 《解放军理工大学学报(自然科学版)》 EI 北大核心 2013年第4期355-359,共5页 Journal of PLA University of Science and Technology(Natural Science Edition)
基金 河北省自然科学基金数学研究专项资助项目(08M009)
关键词 分组密码 对等变换 Feistel模型 SP网络模型 block cipher involutory transformation Feistel model SP network model
  • 相关文献

参考文献8

  • 1Eli Biham, Orr Dunkelman, KELLER N. New com- bined attacks on block ciphers [J]. Lecture Notes in Computer Science, 2005,3557 : 126-144.
  • 2BIRYUKOV A, Christophe De Canni~re. Block ci- phers and systems of quadratic equations [J]. Lecture Notes in Computer Science,2003,2887 : 274-289.
  • 3THOMAS J,LARS R K. Attacks on block ciphers of low algebraic degree [J]. Journal of Cryptology,2001, 14(3) : 197-210.
  • 4Horst Feistel. Cryptography and computer privacy [J]. Scientific American,1973,228(5) : 15-23.
  • 5MASUDA N,JAKIMOSKI G, AIHARA K, et al. Chaotic block ciphers: from theory to practical algo- rithms [J]. IEEE Transactions on Circuits and Sys- tems I : Regular Papers,2006,53(6) : 1341-1352.
  • 6SHANNON C E. Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949,28 656-715.
  • 7LAI Xuejia. On the design and security of block ci- phers[D]. Xiran:Xidian University, 1992.
  • 8王邦菊,王玉华,李春子,张焕国.一个新的类FEISTEL密码方案[J].海军工程大学学报,2007,19(3):12-16. 被引量:1

二级参考文献12

  • 1SCHNEIER B.应用密码学[M].吴世忠,译.北京:机械工业出版社,2000.
  • 2KRISHNA S N, RAMA R. Breaking DES using P systems [J]. Theoretical Computer Science, 2003,299(1): 495--508.
  • 3DIFFIE W, HELLMAN M E. New directions in cryptography [J]. IEEE Trans, on Information Theory, 1976, IT--22 (6) :644--654.
  • 4FLOREA A F, MATULA D W, THORNTON M A. Addition-based exponentiation modulo 2^k[J]. Electronics Letters 20th, 2005,41(2) :56--57.
  • 5NEDJAH N, MOURELLE L D M. Four hardware implementations for the M-ary modular exponentiation [C]// ITNG 2006, Nevada: IEEE Computer Society,2006.
  • 6CHANG C C, LOUD C. Fast parallel computation of multi-exponentiation for public key cryptosystems [C]// Proceedings of International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT). Chengdu, China, 2003.
  • 7MEYER H. Abstracts of articles and recent literature [J]. Computers & Security, 1999,18:149--154.
  • 8COURTOIS N. The best differential characteristics and subtleties of the Biham-shamir Attacks on DES [DB/OL]. http ://eprint. iacr. org, 1005-02-02/2006-12-01.
  • 9COURTOIS N. Feistel Schemes and Bi-Linear Cryptanalysis [DB/OL]. http://eprint.iacr. Org,/2005. 2004-08- 15/2006-12-01.
  • 10BIHAM E, BIRYUKOV A. How to strengthen DES using existing hardware [C]// Advances in Cryptology, Lecture Notes in Computer Science 917, proceedings of ASIACRYPT'94, Wollongong, 1995.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部