期刊文献+

AC分组密码 被引量:5

The AC block cipher
下载PDF
导出
摘要 本文推出了一个分组长度和密钥长度均为128bit的分组密码—AC(a cipher),它的整体结构是SP网络,加解密是相似的。AC分组密码的设计结合了宽轨迹策略和比特块技术,以确保算法对差分密码分析和线性密码分析的安全性。本文的目的是寻求公众对AC分组密码的测试、分析和评估。 AC(a cipher) is a 128-bit block cipher that accepts a 128-bit key. The cipher is a substitution-permutation network whose decryption only differs from the encryption in the key schedule. The cipher design combines the wide trail strategy and bit-slice technology that ensure the resistance AC against differential and linear cryptanalysis. The goal of this paper is the publication of the AC block cipher for public scrutiny.
出处 《通信学报》 EI CSCD 北大核心 2002年第5期130-134,共5页 Journal on Communications
基金 国家自然科学基金资助项目(60103023)
关键词 AC分组密码 SP网络 密码学 block cipher key encryption decryption key schedule
  • 相关文献

参考文献12

  • 1[1]RIJNDAEL.RC6,Serpent[EB/OL].http://www.nist.gov/aes.2000.
  • 2[2]NOEKEON.NUSH[EB/OL].http://www.cryptonessie.org,2000.
  • 3[3]BIHAM E,SHAMIR A.Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptology,1991,4(1):3-72.
  • 4[4]MATSUI M.Linear cryptanalysis method for DES cipher[A].Advances in Cryptology-EUROCRYPT'93 Proceedings[C].Berlin: Springer-Verlag,1994.386-397.
  • 5[5]KNUDSEN L R.Truncated and higher order differentials[A].Fast Software Encryption,2th International Workshop Proceedings[C].Berlin: Springer-Verlag,1995.196-211.
  • 6[6]LAI X.Higher order derivations and differential cryptanalysis[A].Proc Symposium on Communication,Coding and Cryptography[C].Monte-erita,Ascona,Switzerland,1994.
  • 7[7]BIHAM E,BIRYUKOV A,SHAMIR A.Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[EB/OL].http://www.cryptography.com,1999.
  • 8[8]JAKOBSEN T.The interpolation attack on block cipher[A].Fast Software Encryption,4th International Workshop Proceedings[C].Springer-Verlag,1997.
  • 9[9]BIHAM E.New types of cryptanalytic attacks using related keys[J].Journal of Cryptology,1994,7(4):229-246.
  • 10[10]WAGNER D.The boomerang attack[A].Fast Software Encryption,6th International Workshop Proceedings[C].Berlin: Springer- Verlag,1999.

同被引文献33

  • 1袁家斌,叶峰.一种全新的基于置换密钥矩阵加密算法[J].南京航空航天大学学报,2005,37(6):754-759. 被引量:3
  • 2张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 3RIJNDAEL.RC6, Serpent.http://www.nist.gov/aes.2000.
  • 4NOEKEON.NUSH.http://www.cryptonessie.org, 2000.
  • 5BIHAM E,SHAMIR A.Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptology, 1991 ;4( 1 ) :3~72.
  • 6MATSUI M.Linear cryptanalysis method for DES cipher[C].In :Advances in Cryptology-EUROCRYPT′93 Proceedings,Berlin :SpringerVerlag, 1994: 386~397.
  • 7JoanDaemenVincentRijmen著 谷大武译.高级加密标准(AES)算法-Rijndael的设计[M].北京:清华大学出版社,2003.39-40,53-64.
  • 8KNUDSEN L R.Truncated and higher order differentials[C].In :Proceedings of the 2nd International Workshop on Fast Software Encryption,Berlin: Springer-Verlag, 1995:196~211.
  • 9JAKOBSEN T.The interpolation attack on block cipher[C].In:Proceedings on of the 4th International Workshop on Fast Software Encryption, Springer-Verlag, 1997.
  • 10BIHAM E.New types of cryptanalytic attacks using related keys[J].Journal of Cryptology, 1994;7(4) :229~246.

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部