期刊文献+

面向密码算法的非线性布尔函数实现技术研究 被引量:3

Research on nonlinear Boolean functions realization of cryptographic algorithms
下载PDF
导出
摘要 为了提升密码算法中非线性布尔函数实现效率,设计了串行与电路和以查找表为基础的并行化低次布尔函数实现架构,分别实现高次与项和低次与项。分析了不同并行化查找表实现密码算法中低次布尔函数的效率。结果表明,结合香农分解定理提出的并行化查找表架构处理性能可以达到1.02 GHz,不仅能够灵活适配密码算法中的非线性布尔函数,而且能够节省资源占用。 In order to enhance the non-linear Boolean functions of cryptographic algorithms to achieve efficiency, this paper designs a serial and-circuit for high-order and the table-based parallelization framework to achieve low-order Boolean function. The paper analyzes the efficiency of different parallelization lookup table to achieve the low-order Boolean function of cryptographic algorithms. The results show that,combined with Shannon decomposition theorem,the processing performance of prorosed parallel archtecture of the lookup table can reach 1.02 GHz, which can not only flexiblely adapte the non-linear Boolean function, but also save resource consumption.
出处 《电子技术应用》 北大核心 2014年第7期61-64,共4页 Application of Electronic Technique
关键词 非线性布尔函数 查找表 并行化 适配 nonlinear Boolean tunetion lookup table parallelization adaptation
  • 相关文献

参考文献7

  • 1HUTTON M, SshiIecher J.Improving FPGA performance and area using an adaptive logic module[C].Berlin Heidelberg: J Becker, 2004 : 135-144.
  • 2XU Li-qing CHEN hao.Some results on the algebraic immunity of Boolean functions[J].The Journal of China Universities of Posts and Telecommunications,2011,18(2):102-105. 被引量:1
  • 3KAVUT S,YUCEL M D.9-variable Boolean functions with nonlinearity 242 in the generalized rotation symmetric class[J]. Information and Computation, 2010,208(4): 341- 350.
  • 4GANGOPADHYAY S,SARKAR S.Telang R.On the lower bounds of the second order nonlinearities of some Boolean functions[J].lnformation Science, 2010,180(2) : 266-273.
  • 5CHASKHKM A V.Local complexity of Boolean functions[J]. Discrete Applied Mathematics[J].2004,135(1): 55-64.
  • 6COUCEIRO M, MARICHAL J L.Locally monotone Boolean and pseudo-Boolean functions[J].Discrete Applied Mathe- matics, 2012,160(12) : 1651 - 1660.
  • 7徐建博,戴紫彬,李伟,苏阳.面向序列密码的抽取与插入单元可重构设计研究[J].电子技术应用,2011,37(7):65-67. 被引量:9

二级参考文献22

  • 1罗启彬,张健.流密码的现状和发展[J].信息与电子工程,2006,4(1):75-80. 被引量:18
  • 2刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(上)[J].信息安全与通信保密,2006,28(7):26-28. 被引量:7
  • 3Carlet C. Boolean functions for cryptography and error correcting codes. Cambridge, UK: Cambridge University Press, 2007.
  • 4Armknecht F, Krause M. Algebraic attacks on combiners with memory. Advances in Crytography: Proceedings of the 23rd Annual International Cryptology Conference (Crypto'03), Aug 17-21, 2005, Santa Barbara, CA, USA. LNCS 2729. Berlin, Germany: Springer-Verlag, 2003:162-175.
  • 5Armknecht F. Improving fast algebraic attacks. Proceedings of the Fast Sottware Encryptinn Workshop (FEC'04), Feb 5-7, 2004, New Delhi, India. LNCS 3017. Berlin, Germany: Springer-Verlag, 2004:65-82.
  • 6Canteaut A. Open problems related to algebraic attacks on stream ciphers. Proceedings of the International Workshop on Coding and Cryptography (WCC'05), Mar 14-18, 2005, Bergen, Norway: LNCS 3969. Berlin, Germany: Springer-Verlag, 2005:120-134.
  • 7Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback. Advances in Cryptology: Proceedings of the 22nd International Conference on the Theory and Applications of Cryptographic Techniques (Euroerypt'03), May 4-8, 2003. Warsaw, Poland. LNCS 2656. Berlin, Germany: Springer-Verlag, 2003:345-359.
  • 8Courtois N. Fast algebraic attacks on stream ciphers with linear feedback. Advances in Crytography: Proceedings of the 23rd Annual Intemationai Cryptology Conference (Crypto'03), Aug 17-21, 2005, Santa Barbara, CA, USA. LNCS 2729. Berlin, Germany: Springer-Verlag, 2003:176-194.
  • 9Courtois N, Pieprzyk J. Cryptanalysis of block ciphers with overdetermined systems of equations. Advances in Cryptology:Proceedings of the 8th International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt'02), Dec 1-5, 2002. Queenstown, New Zealand. LNCS 2501. Berlin, Germany: Springer-Verlag, 2002:267-287.
  • 10Meier W, Pasalie C, Carlet C. Algebraic attacks and decomposition of Boolean functions. Advances in Cryptology: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt'04), May 2-6, 2004, Interlaken, Switzerland. LNCS 3027.Berlin, Germany: Springer-Verlag, 2004:474-491.

共引文献8

同被引文献9

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部