期刊文献+

动态化DES算法变体研究

VARIANT OF DYNAMIC DES ALGORITHM
下载PDF
导出
摘要 针对数据加密标准(DES)算法密钥短和静态置换数组的缺陷,提出延长密钥并动态化置换数组的DES变体。对DES算法与差分功耗分析进行讨论,提出利用卷积算法生成随机数来达到动态化置换数组的目的。针对延长密钥,提出利用哈希算法生成哈希密钥来解决变体密钥兼容性的问题。与DES算法相比,该变体能够抗暴力破解与差分功耗分析,并具有相近的加密表现(均匀性和雪崩效应)与时间、空间复杂度。同时,该变体较其他的近似变体具有更理想的运行效率。 Aiming at the drawbacks of short key and static permutation array in data encryption standard(DES)algorithm,we propose a variant of DES algorithm by extending the key and dynamically displacing the array.We discussed the DES algorithm and differential power analysis(DPA),and proposed the convolution algorithm to generate random numbers so as to achieve the dynamic permutation array.For the extended key,the hash algorithm was proposed to generate the hash key to solve the problem of variant key compatibility.Compared with the origin DES algorithm,the variant can resist brute force and DPA.It has similar encryption performance in terms of uniformity and avalanche effect and has similar time and space complexity.The variant has better operation efficiency than other approximate variants.
作者 周煜轩 曾连荪 Zhou Yuxuan;Zeng Liansun(College of Information Engineering,Shanghai Maritime University,Shanghai 201306,China)
出处 《计算机应用与软件》 北大核心 2022年第5期342-349,共8页 Computer Applications and Software
关键词 数据加密标准 动态化 差分功耗分析 卷积算法 哈希算法 Data encryption standard(DES) Dynamic Differential power analysis(DPA) Convolution algorithm Hash algorithm
  • 相关文献

参考文献10

二级参考文献66

  • 1韩军,曾晓洋,汤庭鳌.DES密码电路的抗差分功耗分析设计[J].Journal of Semiconductors,2005,26(8):1646-1652. 被引量:11
  • 2陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 3李昌刚,张昕,朱芳来,应艳杰,汪永斌.一种新的密钥流发生器设计算法[J].计算机工程,2007,33(10):138-140. 被引量:3
  • 4Anderson R J,Kuhn M G.Low cost attacks on tamper resistant devices[C] //Proceedings of the 5th International Workshop on Security Protocols,Paris,1997:125-136.
  • 5Kocher P,Jaffe J,Jun B.Differential power analysis[C] //Proccedings of Advances in Cryptoiogy-CRYPTO'99,Santa Barbara,CA,USA,1999:388-397.
  • 6Rabsey J M.Digital integrated circuits[M].Englewood Cliffs,NJ:Prentice-Hall,1996.
  • 7Messerges T S,Dabbish E A,Sloan R H.Examining smart card security under the throat of power analysis attacks[J].IEEE Trans on Computers,2002,51(5):541-552.
  • 8Guilley S,Hoogvorst P,Pacalet R.Differential power analysis model and some results[C] //CARDIS 2004.2004:127-142.
  • 9URMl,IAIK,KURLD.Final report modeling & simulation of SCA effects,IST-2002-507270[R].Europe:IAIK,2005.
  • 10Data Encryption Standard.Federal Information Processing Standard(FIPS)[S].US Department of Commerce,Washington DC,1977.

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部