期刊文献+

OFBNLF加密工作模式的分析 被引量:1

Analysis of the OFBNLF encryption mode of operation
原文传递
导出
摘要 OFBNLF(output feedback with a nonlinear function)模式是我国分组密码工作模式的国家标准之一,选择明文攻击不可区分(IND-CPA)模型则是用来评判分组密码工作模式的重要安全指标.迄今为止,还没有文献对OFBNLF模式的安全性进行分析或证明,也没有文献对其软件实现进行评估.本文对OFBNLF模式的安全性分析进行了研究,在给出OFBNLF模式的在线加密描述的基础上,采用做游戏(game-playing)的技术,第一次证明了OFBNLF模式在逐分组选择明文攻击不可区分(BWIND-CPA)模型下的安全性.鉴于之前对BW-IND-CPA模型的形式定义并没有对一般的加密模式进行在线的形式化处理,本文在给出在线加密形式定义的基础上,重新对BW-IND-CPA模型进行了定义.同时还对OFBNLF软件实现效率做了评估,并与国家标准中其他的加密模式在安全性和软件实现效率方面分别进行了对比. OFBNLF is one of the national standardized block cipher modes of operation. In this mode, indistinguishability under chosen plaintext attack is an important security index. To the best of our knowledge, to date no analysis of the security and software implementation efficiency of OFBNLF mode has been conducted. In this paper, we analyze the security of OFBNLF and show that OFBNLF is blockwise-IND-CPA(indistinguishability under blockwise-based chosen plaintext attack) using game-playing techniques based on the description of online encryption on OFBNLF. The previous definition of BW-IND-CPA mode was not based on online mode; however, in this paper, we redefine BW-IND-CPA mode on the basis of online encryption. In addition, we compare OFBNLF mode with other encryption modes of the national standard in terms of security and software implementation efficiency.
作者 孙哲蕾 王鹏
出处 《中国科学:信息科学》 CSCD 北大核心 2016年第6期729-742,共14页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:61272477 61472415) 国家重点基础研究发展(973)计划(批准号:2014CB340603) 中国科学院战略性先导科技专项(批准号:XDA06010702)资助项目
关键词 分组密码工作模式 OFBNLF 安全性分析 逐分组选择明文攻击 性能 block cipher mode of operation OFBNLF security analysis indistinguishability under blockwise-based chosen plaintext attack efficiency
  • 相关文献

参考文献25

  • 1Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. Boca Raton: CRC Press, 1996.
  • 2中国标准出版社.信息安全技术分组密码算法的工作模式.GB/T17964-2008.http://webstore.spc.net.cn/produce/showonebook.asp?strid=36837.2008.
  • 3Bellare M, Desai A, Jokipii E, et al. A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, Miami Beach, 1997. 394 403.
  • 4Sung J, Lee S, Lim J I, et al. Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. In: Information Security and Cryptology -- ICISC 2001. Berlin: Springer, 2001. 103-113.
  • 5Jansen C J, Boekee D E. Modes of blockcipher algorithms and their protection against active eavesdropping. In: Advances in Cryptology -- EUROCRYPT'87. Berlin: Springer, 1987. 281 286.
  • 6Jansen C J. Investigations on nonlinear streamcipher systems: construction and evaluation methods. Dissertation for Ph.D. Degree. Delft: Delft University of Technology, 1989.
  • 7Barlow L C. Symmetric encryption with multiple keys: techniques and applications. Dissertation for Master Degree. Corvallis: Oregon State University, 2005.
  • 8Preneel B. Analysis and design of cryptographic hash functions. Dissertation for Ph.D. Degree. Leuven: Katholieke Universiteit te Leuven, 1993.
  • 9Joux A, Martinet G, Valette F. Blockwise-adaptive attackers revisiting the (in) security of some provably secure encryption modes: CBC, GEM, IACBC. In: Advances in Cryptology CRYPTO 2002. Berlin: Springer, 2002. 17-30.
  • 10Bellare M, Rogaway P. The security of triple encryption and a framework for code-based game-playing proofs. In: Advances in Cryptology -- EUROCRYPT 2006. Berlin: Springer, 2006. 409-426.

共引文献2

同被引文献1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部