期刊文献+

DNA计算与数据加密标准 被引量:1

DNA Computing and Data Encryption Standards
下载PDF
导出
摘要 DNA计算就是借助某些生物酶对特定的DNA链进行一系列的生物操作.在简要介绍了DNA链上的生物操作及Adleman破解有向哈密儿顿路问题的DNA算法后,重点讨论了Boneh用DNA计算机破解DES的方法,并指出可利用DES算法的一个互补特性将破解DES的时间缩短大约一半.最后分析了用类似于Boneh的方法破解AES算法的可能性. DNA computing is just a series of bio-operations on DNA strands by some special enzymes. After the bio-operations on DNA strands and the Adleman's DNA algorithm for solving directed Hamiltonian path problem were introduced, the Boneh's method for attacking data encryption standard (DES) by DNA computing was discussed. The time cost can be reduced about a half by making use of a complementarity of DES algorithm. The possibility of attacking advanced encryption standard (AES) by a method similar to Boneh's was analyzed.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2004年第2期77-83,共7页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金重大研究计划资助项目(90104004) 国家"973计划"资助项目(1998030420).
关键词 DNA计算 分子计算机 DES 数据加密标准 Cryptography Data processing DNA Enzymes Molecules
  • 相关文献

参考文献1

二级参考文献3

  • 1[1]Biham Eli, Shamir Adi. Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991,4(1):3-72.
  • 2[2]Matsui Mitsuru. Linear cryptanalysis method for DES cipher. Lecture Notes in Computer Science[J]. Springer-Verlag,1993,765:368-397.
  • 3[3]Joan Daemen, Vincent Rijmen. AES proposal: the rijndael block cipher[R]. 1999.

共引文献10

同被引文献8

  • 1张玉安,冯登国.一种实用的仿一次一密分组加密方案[J].北京邮电大学学报,2005,28(2):101-104. 被引量:16
  • 2Bellare M,Kilian J,Rogaway P.The security of the cipher block chaining message authentication code[J].Journal of Computer and System Sciences,2000,61(3):362-399.
  • 3National Bureau of Standards-1980,DES modes of operation[S].
  • 4Diffie W,Hellman M.Privacy and authentication:an introduction to cryptography[A].Proceedings of the IEEE[C].1979,67(3):397-427.
  • 5Rogaway P.OCB mode:parallelizable authenticat-ed encryption[J].ACM Transactions on Information and System Security,2003,6(3):365-403.
  • 6Gligor V,Donescu P.Fast encryption and authentication:XCBC encryption and XECB authentication modes[A].FSE 2001[C].LNCS.Springer-Verlag,2001.92-108.
  • 7Goldwasser S,Micali S.Probabilistic encryption[J].Joural of Somputer and System Sciences,1984,28(4):270-299.
  • 8Bellare M,Desai A,Jokipii E,et al.A concrete security treatment of symmetric encryption:analysis of the DES modes of operation[A].Proceedings of 38th Annual Symposium on Founda-tions of Computer Science [C].IEEE,1997.394-403.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部