期刊文献+

S盒和P置换安全性指标评估方法的研究与比较

Research and Comparison on Security Evaluation Method of S⁃box and P⁃value Permutation
下载PDF
导出
摘要 分组密码具有速度快、易于标准化和便于软硬件实现等特点,是信息与网络安全中实现数据加密和认证的核心体制。分组密码算法的思想是通过混淆和扩散来克服统计分析,由此引入了两个关键部件:S盒与P置换。S盒的安全指标主要有差分均匀度、非线性度、代数次数与代数项数、扩散性、严格雪崩性、代数免疫度,P置换的安全指标主要以矩阵分支数为主。针对S盒与P置换的安全指标,本文提出P置换新的评估算法,并与已有的评估算法进行比较分析,在此基础上,针对现行的多种S盒与P置换方案进行评估和比较分析,得出在安全性和实现效率最具优势的S盒和P置换方案。 As the core framework to realize data encryption and authentication in information and net⁃work security,block ciphers have the characteristics of fast speed,easy to standardize,convenient to implement with software and hardware,which overcome the statistical analysis through confusion and diffusion,thus inducing two key components of S⁃box and the P⁃value permutation.Security metrics of the S⁃box mainly include differential uniformity,nonlinearity,algebraic degree and algebraic terms number,diffusion,strict avalanche criterion,and algebraic immunity,and the security metric of the P⁃value permutation is matrix branch number.In this paper,for the security metrics of the S⁃box and the P⁃value permutation,a novel evaluation algorithm for the P⁃value permutation is proposed,and a com⁃parison with existing evaluation algorithms is presented,based on which,multiple S⁃box and the P⁃per⁃mutation schemes in use are evaluated and compared,and the scheme with highest security and effi⁃ciency is determined.
作者 刘继荣 王克 曹宇轩 LIU Jirong;WANG Ke;CAO Yuxuan(Beijing Electronic Science and Technology Institute,Beijing 100070,P.R.China;Key Laboratory of Cryptography of Zhejiang Province,Hangzhou Normal University,Hangzhou 311121,P.R.China)
出处 《北京电子科技学院学报》 2023年第3期39-54,共16页 Journal of Beijing Electronic Science And Technology Institute
基金 浙江省密码技术重点实验室开放课题(ZCL21009)。
关键词 对称密码 S盒 P置换 安全性测试 设计 FEISTEL结构 Symmetric cipher S⁃box P⁃value permutation Security testing Design Feistel structure
  • 相关文献

参考文献4

二级参考文献40

  • 1殷新春,杨洁.基于遗传算法的S盒的构造[J].计算机应用研究,2007,24(3):91-93. 被引量:6
  • 2Daemen J,Rijmen V.The Wide Trail Design Strategy[EB/OL].(2001-03-12).http://130.203.133.150/viewdoc/summary?doi= 10.1.1.85.2588.
  • 3Wang Meiqin.Differential Cryptanalysis of Present[EB/OL].(2007-10-14).http://eprint.iacr.org/2007/408.
  • 4Rijmen V,Daemen J,Preneel B,et al.The Cipher Shark[EB/OL].(1996-04-20).http://link.springer.com/chapter/ 10.1007%2F3-540-60865-6_47.
  • 5Kang Ju-sung,Hong Seokhie,Lee Sangjin,et al.Practical and Provable Security Against Differential and Linear Cryptanalysis for Substitution-permutation Networks[J].ETRI Journal,2001,23(4):158-167.
  • 6Aoki K,Ichikawa T,Kanda M,et al.Camellia:A 128-bit Block Cipher Suitable for Multiple Platforms-design and Analysis[EB/OL].(2000-04-09).http://citeseerx.ist.psu.edu/ viewdoc/summary?doi=10.1.1.25.9586.
  • 7NTT-Nippon Telegraph and Telephone Corporation.E2:Effi-cient Encryption Algorithm[EB/OL].(2007-02-02).http://info.isl.ntt.co.jp/e2.
  • 8Kwon D,Kim J,Park S,et al.New Block Cipher:ARIA[EB/OL].(2004-05-10).http://link.springer.com/chapter/10.1007%2F978-3-540-24691-6_32?LI=true.
  • 9Gao Ying,Guo Guifeng.Unified Approach to Construct 8×8 Matrices with Branch Number 5[C]//Proc.of CDEE’10.Qinhuangdao,China:[s.n.],2010.
  • 10Aslan B,Sakall M T.Algebraic Construction of Crypto-graphically Good Binary Linear Transformations[EB/OL].(2012-05-09).http://onlinelibrary.wiley.com/doi/10.1002/sec.556/abstract.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部