期刊文献+

递归扩散层的权值系数计算方法 被引量:1

Computing Method for Weight Coefficient of Recursive Diffusion Layer
下载PDF
导出
摘要 递归扩散层是一种新型的密码函数线性扩散层,具有良好的结构特征,能达到最优扩散层的效果,但其构造函数中的参数比较复杂,搜索空间也较大。为此,对递归扩散层的结构特点进行分析,从低阶扩散层的结构出发,结合最优扩散层的相关理论基础,得到递归扩散层的一般性结论,在此基础上设计权值系数计算方法,并通过仿真实现得到部分低阶递归扩散层的构造函数。分析结果表明,该方法构造的扩散层只需要少数的XOR运算、旋转运算和简单的求反运算,满足最优扩散层的性质,具有较好的安全特性。 Recursive diffusion layer is a new type of cryptographic linear diffusion layer. It has good structure characteristics,and can achieve the optimal effect of diffusion layer. It is more complex in the concrete implementation process because its function structure parameters in the search space is large. It seriously impacts on its cryptographic function in the actual application ability. After analyzing the structure and the lower order based on the structure of the diffusion layer,and combining with the optimal diffusion layer of relevant theoretical basis,this paper gets some general conclusions of recursive diffusion layer,and based on this,it gives a method to design the recursive diffusion layer and puts forward a scheme to improve the coefficient’s implementation of recursive diffusion layer. By the simulation realization,it gets the results of recursive diffusion layer’ s structure in low order. The diffusion layer only needs a few XOR operation, rotating operations and some simple complementation operations,and it has a better security character.
出处 《计算机工程》 CAS CSCD 2014年第11期126-129,134,共5页 Computer Engineering
关键词 线性扩散层 递归扩散层 分支数 线性函数 权值系数 仿真实现 linear diffusion layer recursive diffusion layer branch number linear function weight coefficient simulation realization
  • 相关文献

参考文献10

二级参考文献32

  • 1国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http://www.oscca.gov.cn/UpFil/200622026423297990.pdf.
  • 2Daemen J.Cipher and hash function design strategies based on linear and differential cryptanalysis[D].Leuven K U, 1995.
  • 3Zhang X,Parhi K K.An efficient 21.56 Gbps AES implementation on FPGA[C]//Thirty-Eighth Asilomar Conference on Signals,Systems and Computers,Nov 7-10,2004, 1:465-470.
  • 4Rodriguez-Henriquez F,Saqib N A,Diaz-Perez A.4.2 Gbit/s singlechip FPGA implementation of AES algorithm[J].Electronics Letters, 2003,39(15):1115-1116.
  • 5Satoh A,Morioka S,Takano K,et al.A compact Rijndael hardware architecture with S-box optimization[C]//Proc ASIACRYPT 2001, Gold Coast,Australia,Dec 2000:239-254.
  • 6Barreto P S L M,Rijmen V.The Anubis block cipher[EB/OL].http:// cryptonessie.org.
  • 7Zhang Huan-guo,Liu Yu-zhen.Introduction to cryptology[M].Wuhan:Wuhan University Press,2003.
  • 8Mac Williams F J,Sloane N J A.The theory of error correcting codes[M].North-Holland Publishing Company,1977.
  • 9Daemen J,Rijmen V.AES proposal:RIJNDAEL[EB/ OL].http://www.nist.gov./aes,2004,01.
  • 10Heys H M,Tavares S E.The design of substitution-permutation networks resistant to differential and linear cryptanalysis[C].Proceedings of 2nd ACM Conference on Computer and Communications Security,Fairfax,Virginia,1994,148-155.

共引文献25

同被引文献13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部