期刊文献+

高效适配NLBF型序列密码的全局定向搜索算法 被引量:1

Global directional search algorithm adapting NLBF sequence cryptogram efficiently
下载PDF
导出
摘要 针对序列密码中非线性布尔函数(NLBF)适配算法不具普遍性及资源消耗较多的问题,提出一种基于NLBF与项和真值表相结合的全局定向搜索算法。首先,通过NLBF中与项比率的分析,得出合理的查找表(LUT)适配形式;随后,提出布尔函数归类算法,归类算法从高次到低次搜索NLBF中全部与项,并对各与项进行"吸收"及"合并"处理;最后,提出基于真值表的配置信息生成算法,该算法通过遍历真值表的方式,生成LUT存储的配置信息以完成NLBF的运算。对序列密码进行适配发现,布尔函数归类算法能完成现有NLBF型序列密码的适配,且对常用的ACH-128、Trivium及Grain等算法更易适配;同时从对比结果可以看出,全局定向搜索算法的资源消耗较基于Shannon分解定理的适配算法及遗传算法明显要少;同时从资源消耗情况来看,4输入LUT消耗最多,6输入LUT消耗最少。 In view of the absence of universality and high consumption of sequence cryptogram adaptation algorithms, a global directional searching algorithm based on AND terms of Non-Linear Boolean Function (NLBF) and truth table was proposed. Firstly, adaptive and reasonable models of Look-Up Table (LUT) were gotten by analyzing the ratio of terms in NLBF. Then a classification algorithm for Boolean function was established which can search all AND terms from high-order ones to lows and "absorb" or "unite" the terms. Finally, a configuration generating algorithm was obtained on the basis of truth table, which can generate the configuration information to fulfill the computation of NLBF by traversing truth tables. The existing NLBF sequence cryptograms can be adapted by the proposed classification algorithm, and it is more easy to adapt to the commonly used algorithms such as ACH-128, Trivium and Grain. At the same time, the resource consumption of LUT is obviously less than the adaptation based on Shannon decomposition theory and genetic algorithm; meanwhile, the consumption results show that the adaptation consumes the most in 4-input look-up tables and the least in 6-input ones.
出处 《计算机应用》 CSCD 北大核心 2016年第9期2442-2446,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61404175)~~
关键词 序列密码 非线性布尔函数 查找表 适配算法 归一化 资源优化 sequence cryptogram Non-Linear Boolean Function (NLBF) Look-Up Table (LUT) adaptationalgorithm normalization resource optimization
  • 相关文献

参考文献12

  • 1金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009.
  • 2LU Y, VAUDENAY S. Cryptanalysis of bluetooth keystream generator two-lever E0 [M]// LEE J P. Advances in Cryptology—Asiarcypt 2004, LNCS 3329. Berlin: Springer, 2004:147-158.
  • 3BATINA L, LANO J, MENTENS N, et.al, Energy, performance, area versus security trade-offs for stream ciphers [EB/OL]. [2016-01-02]. http://xueshu.baidu.com/s?wd=paperuri%3A%28f5e4b24c3cdc6f218dbfff977513bb56%29&filter=sc_long_sign&tn=SE_xueshusource_2kduw22v&sc_vurl=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Bjsessionid%3DFF3F4DFE947080373088C232E0F96C28%3Fdoi%3D10.1.1.87.6629%26rep%3Drep1%26type%3Dpdf&ie=utf-8&sc_us=15751774956421205228.
  • 4GALANIS M D, KITSOS P, KOSTOPOULOS G, et al. Comparison of the hardware implementation of stream ciphers [J]. The International Arab Journal of Information Technology, 2005, 2(4): 267-274.
  • 5GVRKAYNAK F K, LUETHI P, BERNOLD N, et al. Hardware evaluation of eSTREAM candidates: Achterbahn, Grain, MICKEY, MOSQUITO, SFINKS, Trivium, VEST, ZK-Crypt [EB/OL]. [2016-01-04]. https://www.cosic.esat.kuleuven.be/ecrypt/stream/papersdir/2006/015.pdf.
  • 6刘邦.序列密码非线性运算单元可重构设计技术研究[D].郑州:信息工程大学,2011.
  • 7纪祥君,陈迅,戴紫彬,常忠祥,张鹏.一种改进的非线性布尔函数硬件设计与实现[J].计算机应用与软件,2014,31(7):283-285. 被引量:3
  • 8纪祥君,宋怀刚,李理,徐昆.非线性布尔函数处理模型研究与设计[J].计算机安全,2014,0(8):8-11. 被引量:1
  • 9ANDERSON J H, WANG Q. Area-efficient FPGA logic elements: architecture and synthesis [C]//ASPDAC '11: Proceedings of the 2011 16th Asia and South Pacific Design Automation Conference. Piscataway, NJ: IEEE, 2011:369-375.
  • 10刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(下)[J].信息安全与通信保密,2006,28(9):17-21. 被引量:7

二级参考文献11

共引文献39

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部