期刊文献+

一类轻量化线性MDS变换的设计与分析 被引量:3

Design and Analysis of Lightweight Linear MDS Transformation
下载PDF
导出
摘要 线性MDS变换是对称密码算法的主要扩散部件,具有最优的分支数。提出了一类基于循环移位和异或运算的轻量化线性MDS变换的最简形式和构造方法,给出了该类线性MDS变换的计数结果和相应实例,从而为实际应用中的密码算法设计提供大量轻量化的扩散部件。此外,通过与公开算法中扩散部件的比较分析,说明提出的最简形式线性MDS变换具有时延低、运算快、计算资源小等特性,可以满足移动互联网、物联网中诸多资源受限应用场景下的密码算法扩散部件的设计要求。 Linear MDS transformation,as the main diffusion components of symmetric cryptographic algorithm,has the maximal number of branches.The simplest form and construction method of lightweight linear MDS transformation based on cyclic shift and abnormal operation is proposed,and the counting results of the linear MDS transform and the corresponding examples are given,so as to provide a large number of lightweight components for the design of cryptographic algorithms in practical applications.In addition,comparison and analysis of the diffusion components in the existing algorithms indicate that the proposed simplest form of linear MDS transformation has the characteristics of low delay,fast computation and small computing resources,and could meet the design requirements of the cryptographic algorithm diffusion components for some resource-constrained application scenarios in the mobile Internet and the Internet of Things.
作者 董新锋 董新科 胡建勇 DONG Xin-feng;DONG Xin-ke;HU Jian-yong(Science and Technology on Communication Security Laboratory,Chengdu Sichuan 610041,China;School of Computer Science and Tech.,Southwest University of Science and Technology,Mianyang Sichuan 621010,China)
出处 《通信技术》 2018年第3期653-658,共6页 Communications Technology
基金 国家重点研发计划(No.2017YFB0802000)~~
关键词 MDS变换 线性变换 密码算法 轻量化扩散部件 MDS transformation linear transformation cryptographic algorithm lightweight diffusion component
  • 相关文献

参考文献1

二级参考文献9

  • 1王念平,金晨辉,余昭平.对合型列混合变换的研究[J].电子学报,2005,33(10):1917-1920. 被引量:10
  • 2Schneier B, Kelsey J, and Whiting D, et al.. Twofish: A 128-bit block cipher. Available at http://www.schneier.com/, 2007-2-2.
  • 3Wang Mei-qin. Differential cryptanalysis of present. Cryptology ePrint Archive, Report 2007/408.
  • 4Wu Wen-ling, Zhang Wen-tao, and Feng Deng-guo. Impossible differential cryptanalysis of reduce round ARIA and camellia. Journal of Computer Science and Technology, 2007, 22(3): 449-456.
  • 5Daemen J. Cipher and hash function design strategies based on linear and differential cryptanalysis. [Ph.D. dissertation], KU, Leuven, 1995.
  • 6Kang Ju-sung, Hong Seokhie, and Lee Sangjin, et al.. Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks. ETRI Journal, 2001, 23(4): 158-167.
  • 7Xiao L and Heys H. Hardware design and analysis of block cipher components. Proceedings of the 5th International Conference on Information Security and Cryptology- ICISC'02, 2003 LNCS 2587: 164-181.
  • 8Youssef A, Mister S, and Tavares S. On the design of linear transformations for substitution permutation encryption networks. Workshop on Selected Areas in Cryptography- SAC'97, Ottawa, Workshop record, 1997: 40-48.
  • 9Blomer J, Kalfane M, and Karpinski M, et al.. An Xor-based erasure-resilient coding scheme. Technical Report TR-95-048. International Computer Science Institute, August 1995.

共引文献15

同被引文献9

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部