期刊文献+

两个编码环节的相容性研究

Consistency of Two Code Links
下载PDF
导出
摘要 2个运算的相容性反映了其中一种运算代替另一种运算所产生的误差大小,或者改变含这2种运算的混合等式中2个变量的位置或运算顺序所造成的误差大小.模2^n+1加和模2^n-1加是密码算法设计中的2个编码环节,分析了模2^n+1加和模2^n-1加之间在相等、分配律和结合律3种情况下的相容性.针对上述3种情况,分别给出了相等、在分配律情况下相等以及在结合律情况下相等的概率公式.最后,根据概率公式给出了这些相容性的特点,这对进一步认识和应用这2个编码环节有一定的实际意义. Consistency of two operations means the error generated in substituting one with the other,or in changing the location and order of two variables in equations that contains both of them.Addition modulo 2^n+1 and addition modulo 2^n-1 are two code links which are used in cryptography algorithms.This paper analyzed the consistency of addition modulo 2^n+1 and addition modulo 2~n-1 under equality,distributive law and associative law.According to these three case,the probability formulas of equality,equality under distributive law and equality under associative law are presented.Finally,the consistency characters in different case are given with respect to probability formulas.
作者 白淑君
出处 《信息安全研究》 2016年第8期706-711,共6页 Journal of Information Security Research
关键词 模2^n+1加 模2^n-1加 相容性 相容概率 计数 addition modulo 2^n+1 addition modulo 2^n-1 consistency consistent probablity counting
  • 相关文献

参考文献4

二级参考文献22

  • 1张龙,吴文玲,温巧燕.mod 2^n加运算与F2上异或运算差值的概率分布和递推公式[J].北京邮电大学学报,2007,30(1):85-89. 被引量:12
  • 2Ekdahl P, Johansson T. A new version of the stream cipher SNOW[C]// SAC 2002. [ S. l. ] : Springer-Verlag, 2002 : 47-61.
  • 3Biham E, Seberry J, Gonzalez N. Py(Roo) : a fast and secure stream cipher using rolling arrays [ EB/OL ]. (2005) [2009-06-15]. http://www. ecrypt. eu. org/ stream/ 2005/023.
  • 4Lai Xuejia, Massey J L. A proposal for a new block encryption standard [ C ] // EUROCRYPT'90. [S. l.] : Springer-Verlag, 1990 : 389-404.
  • 5Sekar G, Paul S, Preneel B. Distinguishing attacks on the stream cipher Py[EB/OL]. (2005) [ 2009-06-15 ]. http ://www. ecrypt, eu. org/stream/2005/081.
  • 6Crowley P. Improved eryptanalysis of Py [ EB/OL ]. (2006) [ 2009-06-15 ]. http://www. ecrypt. eu. org/ stream/2006/010.
  • 7Baigneres T, Junod P, Vandenay S. How far can we go beyond linear cryptanalysis [ C ] //Asiacrypt 2004. Jeju Island : Springer-Verlag, 2004 : 432-450.
  • 8Ekdahl P, Johansson T. A new version of the stream cipher Snow[ C ]// Proc of Selected Areas in Cryptography - SAC 2002, LNCS 2595 : 47 -61.
  • 9Doug W, Bruce S, Stefan L, et al. Helix: fast encryption and authentication in a single cryptographic primitive [ C ]//Proc of Fast Software Encryption 2003, Berlin: Springer-Verlag, 2003 : 330 - 347.
  • 10Biham E, Seberry J, Neito G. Py (Roo) : A fast and secure stream cipher using rolling arrays [ R ]. ESTREAM, ECRYT Stream Cipher Project, Report 2005/023, 2005.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部