期刊文献+

基于Camellia算法的快速流密码算法设计与特性研究 被引量:1

Design and Characteristic Study on Fast Stream Cipher Algorithm Based on Camellia
下载PDF
导出
摘要 Camellia算法作为欧洲分组密码加密标准,与AES算法具有一致的安全性与适用性。以Camellia算法为核心部件,从部分轮函数F中提取4个字节的中间状态作为密钥流输出,设计了一种新的快速流密码算法,并分析了它的相关特性。分析结果表明,该算法的密钥流生成速度和密钥流随机性与同类型的LEX算法大致相当,但由于每个Camellia模块的输入与密钥均发生了改变,因此该算法可以有效地抵抗LEX算法所不能抵抗的滑动攻击。 As the encryption standard of the block cipher of NESSIE,Camellia algorithm has the same security and applicability as AES algorithm.In this paper,a novel fast stream cipher algorithm was proposed based on Camellia algorithm.The idea is to extract parts of the internal state at certain round function F and give them as the output keystream.We analyzed the relative characteristics of the new algorithm.The result shows that the new algorithm achieves almost the same performance as the optimal performance obtained in LEX,in terms of keystream generation speed and randomness.Besides,it can resist slide attack,with both input and key changing in each Camellia module.
作者 丁杰 石会 龚晶 邓元庆 DING Jie SHI Hui GONG Jing DENG Yuan-qing(College of Communications Engineering, PLA University of Science & Technology, Nanjing 210007,China)
出处 《计算机科学》 CSCD 北大核心 2017年第8期146-150,共5页 Computer Science
基金 国家自然科学基金项目(61501512)资助
关键词 流密码 CAMELLIA 随机性 安全性 快速 Stream cipher Camellia Randomness Security Fast
  • 相关文献

参考文献2

二级参考文献16

  • 1尤加勇,李超.针对LEX算法的截断滑动攻击[J].信息安全与通信保密,2007,29(9):96-98. 被引量:5
  • 2Alex B. A new 128 bit key stream cipher LEX[EB/OL]. [2005 06-13]. http://www, ecrypt, eu. org/stream/ciphers/lex/lex. pdf.
  • 3National Institute of Standards and Technology(NIST). An- nouncing the Advanced Encryption Standard(AES) FEB/OLd. (2001-11-26). http://csrc, nist. gov/publications/fips/fips197/ fips-197, pdf.
  • 4Henricksen M. Flexible Block Ciphers : Modifying LEX [C]// Proceedings of ICCSIT2010. Chengdu, 2010.
  • 5Boneh D,DeMillo R A, Lipton R J. On the importance of chec- king cryptographic protocols for faults]-M]//Advances in Cryp- tology- EUROCRYPT 97. 1997 : 37-51.
  • 6Biham E, Shamir A. Differential fault analysis of secret key cryptosystems[M] // Advances in Crytpology- CRYPTO 97. 1997:37 51.
  • 7Huang J,Susilo W,Seberry J. Differential fault analysis of LEX [C]//Proeeedings of SCN 2010. Amalfi,Italy,2010.
  • 8Skorobogatov S, Anderson R. Optical fault induction attacks [M]// Cryptographic Hardware and Embedded System-CHES 2002. 2003:2-12.
  • 9Giraud {2. DFA on AES[M] // Advanced Eneryption Stardard- AES. 2005 : 27-41.
  • 10随机性检测规范:GM/T00052012[s].北京:中国标准出版社,2012.

共引文献1

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部