期刊文献+

频率不相关性及其在单钥密码系统中的应用 被引量:2

Frequency irrelevance and its applications in one-key cryptosystems
下载PDF
导出
摘要 探讨频率测度论在保密通信中的应用,研究单钥密码系统中加密变换非线性性质的相关问题.针对目前常见分组密码算法在非线性性质方面缺乏理论规范描述和严格证明的现状,探讨一般单钥密码系统中非线性加密变换严格的数学描述和实现方法.利用频率测度论中的不相关概念,引入不相关单钥密码系统这一新概念,指出这类不相关基本单钥密码系统的存在性,并在理论上严格证明了强大数定律,即在利用不相关基本单钥密码系统进行所有可能的保密通信过程中,当明文单元序列服从离散无记忆均匀分布且密钥周期性更换时,明文序列与密文序列将必然不相关. This paper explores applications of frequency measure theory in secrecy communication systems and studies the nonlinearity of encryption transformation in one-key cryptosystems. Aiming at the lack of normative description and strict demonstration in the theory for the nonlinearity of familiar block cipher systems, we introduce a strict mathematical definition and its implementation on nonlinear encryption transformation in general one-key cryptosystems. Based on the notion of irrelevance in the frequency measure theory, we propose a new definition called “irrelevant one-key cryptosystem” and testify to the existence of irrelevant basic one-key cryptosystems. In addition, we prove the following strong law of large numbers theoretically: sequences of message units and their corresponding cryptograph units are certainly irrelevant in probability 1 for any periodic sequence of secret keys on condition that the sequence of message units has a discrete memoryless uniform distribution during the secrecy communication process when an irrelevant basic one-key cryptosystem is used to transmit all possible messages secretly.
作者 田传俊
出处 《深圳大学学报(理工版)》 EI CAS CSCD 北大核心 2015年第1期32-39,共8页 Journal of Shenzhen University(Science and Engineering)
基金 国家自然科学基金资助项目(61070252)~~
关键词 数据安全 保密通信系统 不相关单钥密码系统 强大数定律 频率测度论 不相关性 data security secrecy communication system irrelevant one-key cryptosystem strong law of large numbers frequency measure theory irrelevance
  • 相关文献

参考文献8

二级参考文献55

  • 1国家密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].(2006-04-20)[2011-05-30].ht-tp://www.oscca.gov.cn/Doc/6/News_1106.htm.
  • 2吴鹤龄.幻方及其他[M].北京:科学出版社,2005.15-90.
  • 3沈康身.数学魅力(四)[M].上海:上海辞书出版社,2006,7:57-85.
  • 4SchneierB.应用密码学一协议/算法和c源代码[M].北京:机械工业出版社,2000.
  • 5Ghada Z, Kachouri A, Peyrard F, et al. On Dynamic chaotic S-Box [ C ]//Information Infrastructure Symposium, 2009 (GIIS'09. Global) :1 -5.
  • 6Wang Y, Yang L, Li M,et al. A method for designing S-Box based on chaotic neural network[ C]//2010 Sixth International Conference on Natural Computation ( ICNC 2010 ) : 1033 - 1037.
  • 7Xu G, Zhao G. The design of dynamical S-Boxes based on discrete chaos map system[ C]//Communications, Circuits and Systems, 2009 (ICCCAS 2009) : 876 - 880.
  • 8Goce J, Ljupco K. Chaos and cryptography. Block encryption ciphers based on chaotic maps[ J]. IEEE Tarns. Circuits and Systems-I, 2001,48(2) : 163 - 169.
  • 9Goce J, Ljupco K. Differenytial and linear probabilities of a block-encryption cipher [ J ]. IEEE Trans. Circuits and Systems-I, 2003, 50( 1 ) : 121 - 123.
  • 10Tang G P, Liao X F, et al. A novel method for designing S- Boxes based on chaotic maps [ J ]. Chaos, Solutions and Fractals, 2005,23:413 -419.

共引文献9

同被引文献10

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部