期刊文献+

一种AES扩展密钥隐藏方法

Research on AES Keys Hiding Method
下载PDF
导出
摘要 磁盘加密软件大多采用了AES算法实现加密,面对冷启动等内存获取攻击容易泄露加密密钥。提出了一种AES扩展密钥隐藏方案。该方案通过密钥结构布局混淆、密钥间的代数关系混淆和环境数据填充等3种可选策略,增强了AES算法的安全性,同时保证了算法的高效性。此外,该方案中的加固思想不仅适用于AES算法,而且对于其他加密算法具有通用性。 Most disk encryption softwares adopt AES algorithm to implement the encryption and decryption. The keys of AES are easy to figure out under coldboot attack and memory analysis. This paper proposesed a scheme to hide the AES Schedule keys. The scheme strengthens the security of the AES algorithm and ensures its high efficiency through three optional strategy, which are confusing the layout of key structure, the algebraic relationship between keys and filling the environmental data. In addition, the reinforcement idea of the scheme can go not only for AES al- gorithm, but also for other encryption algorithm.
出处 《计算机科学》 CSCD 北大核心 2015年第B10期79-83,共5页 Computer Science
基金 本文受国家社会科学基金(14BFX156),重庆市教委科学技术研究项目(Ⅺ1400428)资助.
关键词 AES 磁盘加密软件 TrueCrypt AES,Disk encryption software,TrueCrypt
  • 相关文献

参考文献9

  • 1Halderman J A,Schoen S D,Heninger N,et al.Lest we remember:coid-boot attacks on encryption keys[J].Communications of the ACM,2009,52(5):91-98.
  • 2Hargreaves C,Chivers H.Recovery of encryption keys from memory using a linear scan[C]//Third International Conference on Availability,Reliability and Security,2008(ARES 08).IEEE,2008:1369-1376.
  • 3Tsow A.An improved recovery algorithm for decayed AES key schedule images[C]// Selected Areas in Cryptography.Springer Berlin Heidelberg,2009:215-230.
  • 4Mliller T,Freiling F C,Dewald A.TRESOR Runs Encryption Securely Outside RAM[C]// USENIX Security Symposium.2011:17-17.
  • 5Stallings W.Cryptography and Network Security;Principles and Practice[M]//Pearson Education,2002:441-471.
  • 6Chow S,Eisen P,Johnson H,et al.White-Box Cryptography and an AES Implementation[M]// Selected Areas in Cryptography Springer Berlin Heidelberg,2003:250-270.
  • 7Bringer J,Chabanne H,Dottax E.White Box Cryptography:Another Attempt[J].IACR Cryptology ePrint Archive,2006,2006:468.
  • 8Biryukov A,Bouillaguet C,Khovratovich D.Cryptographic schemes based on the ASASA structure:Black-box,white-box,and public-key[M]// Advances in Cryptology-ASIACRYPT 2014.Springer Berlin Heidelberg,2014:63-84.
  • 9林婷婷,来学嘉.白盒密码研究[J].密码学报,2015,2(3):258-267. 被引量:9

二级参考文献12

  • 1Dan Boneh,Richard A. DeMillo,Richard J. Lipton.On the Importance of Eliminating Errors in Cryptographic Computations[J]. Journal of Cryptology . 2001 (2)
  • 2Hohl F.Time limited blackbox security:protecting mobile Agents from malicious hosts. Mobile Agent and Security . 1998
  • 3Sander T,Tschudin CF.Protecting mobile agents against malicious hosts. Mobile Agent and Security . 1998
  • 4Paillier P.Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology,Eurocrypt’99 . 1999
  • 5Biham E,Shamir A.Differential Fault Analysis of Secret Key Cryptosystems. CRYPTO 97 . 1997
  • 6BIHAM E,SHAMIR A.Power analysis of the key scheduling of the AES candidates. The 2nd AES Candidate Conference . 1999
  • 7Chow S,Eisen P,Johnson H,et al.A white-box DES implementation for DRM applications. Digital Rights Management . 2003
  • 8Bringer J,Chabanne H,Dottax E.White box cryptography.Another attempt. IACR Cryptology ePrint Archive . 2006
  • 9R. Canetti,R. R. Dakdouk.Obfuscating point functions with multibitoutput. Advances in Cryptology Eurocrypt2005 . 2008
  • 10Barak B,Goldreich O,Impagliazzo R,et al.On the(im)possibility of obfuscating programs. Advances in Cryptology-Crypto2001 . 2001

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部