期刊文献+
共找到334篇文章
< 1 2 17 >
每页显示 20 50 100
A High Efficiency Hardware Implementation of S-Boxes Based on Composite Field for Advanced Encryption Standard
1
作者 Yawen Wang Sini Bin +1 位作者 Shikai Zhu Xiaoting Hu 《Journal of Computer and Communications》 2024年第4期228-246,共19页
The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization... The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization implementation of the S-box is proposed based on the composite field inverse operation in this paper. This proposed S-box implementation is modeled using Verilog language and synthesized using Design Complier software under the premise of ensuring the correctness of the simulation result. The synthesis results show that, compared to several current S-box implementation schemes, the proposed implementation of the S-box significantly reduces the area overhead and critical path delay, then gets higher hardware efficiency. This provides strong support for realizing efficient and compact S-box ASIC designs. 展开更多
关键词 advanced encryption standard (aes) S-BOX Tower Field Hardware Implementation Application Specific Integration Circuit (ASIC)
下载PDF
A New Method for Impossible Differential Cryptanalysis of 8-Round Advanced Encryption Standard
2
作者 CHEN Jie HU Yupu WEI Yongzhuang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1559-1562,共4页
This paper first presents an impossible differential property for 5-round Advanced Encryption Standard (AES) with high probability. Based on the property and the impossible differential cryptanalytic method for the ... This paper first presents an impossible differential property for 5-round Advanced Encryption Standard (AES) with high probability. Based on the property and the impossible differential cryptanalytic method for the 5-round AES, a new method is proposed for cryptanalyzing the 8-round AES-192 and AES-256. This attack on the reduced 8-round AES-192 demands 2^121 words of memory, and performs 2^148 8-round AES-192 encryptions. This attack on the reduced 8-round AES-256 demands 2^153 words of memory, and performs 2^180 8-round AES-256 encryptions. Furthermore, both AES-192 and AES-256 require about 2^98 chosen plaintexts for this attack, and have the same probability that is only 2^-3 to fail to recover the secret key. 展开更多
关键词 impossible differential cryptanalysis eryptanalysis advanced encryption standard
下载PDF
A Modern Method for Constructing the S-Box of Advanced Encryption Standard
3
作者 W. Eltayeb Ahmed 《Applied Mathematics》 2019年第4期234-244,共11页
The substitution table (S-Box) of Advanced Encryption Standard (AES) and its properties are key elements in cryptanalysis ciphering. We aim here to propose a straightforward method for the non-linear transformation of... The substitution table (S-Box) of Advanced Encryption Standard (AES) and its properties are key elements in cryptanalysis ciphering. We aim here to propose a straightforward method for the non-linear transformation of AES S-Box construction. The method reduces the steps needed to compute the multiplicative inverse, and computes the matrices multiplication used in this transformation, without a need to use the characteristic matrix, and the result is a modern method constructing the S-Box. 展开更多
关键词 advanced encryption standard S-BOX Extended Euclidean Algorithm GREATEST Common DIVISOR XOR Operation
下载PDF
Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi
4
作者 Doaa Sami Khafaga Sarah M.Alhammad +3 位作者 Amal Magdi Osama ElKomy Nabil ALashin Khalid M.Hosny 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1967-1986,共20页
Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentica... Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentication increases.Many techniques,such as watermarking and encryption,are used for securing images transmitted via the Internet.The majority of watermarking systems are PC-based,but they are not very portable.Hardwarebased watermarking methods need to be developed to accommodate real-time applications and provide portability.This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the transmitted color images using multi-channel orthogonal Legendre Fourier moments of fractional orders(MFrLFMs)and the advanced encryption standard(AES)algorithm on a low-cost Raspberry Pi.In order to increase embedding robustness,the watermark picture is scrambled using the Arnold method.Zero watermarking is implemented on the Raspberry Pi to produce a real-time ownership verification key.Before sending the ownership verification key and the original image to the monitoring station,we can encrypt the transmitted data with AES for additional security and hide any viewable information.The receiver next verifies the received image’s integrity to confirm its authenticity and that it has not been tampered with.We assessed the suggested algorithm’s resistance to many attacks.The suggested algorithm provides a reasonable degree of robustness while still being perceptible.The proposed method provides improved bit error rate(BER)and normalized correlation(NC)values compared to previous zero watermarking approaches.AES performance analysis is performed to demonstrate its effectiveness.Using a 256×256 image size,it takes only 2 s to apply the zero-watermark algorithm on the Raspberry Pi. 展开更多
关键词 Zero watermarking Raspberry Pi advanced encryption standard
下载PDF
Dynamically Reconfigurable Encryption System of the AES
5
作者 WANG Youren WANG Li YAO Rui ZHANG Zhai CUI Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1569-1572,共4页
Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption S... Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level. 展开更多
关键词 dynamically reconfigurable hardware field programmable gate array (FPGA) advanced encryption standard aes algorithm cipher key
下载PDF
基于AES通信的新能源汽车监控仿真系统设计
6
作者 邹丹 《通信电源技术》 2024年第21期37-39,共3页
为提升新能源汽车监控系统的安全性与实时性,设计并实现了一种基于高级加密标准(Advanced Encryption Standard,AES)通信的监控仿真系统。系统通过车载数据管理单元采集数据,并采用AES-256算法进行加密,保障数据传输安全性。实验结果表... 为提升新能源汽车监控系统的安全性与实时性,设计并实现了一种基于高级加密标准(Advanced Encryption Standard,AES)通信的监控仿真系统。系统通过车载数据管理单元采集数据,并采用AES-256算法进行加密,保障数据传输安全性。实验结果表明,该系统在多种驾驶工况下均表现出高效的数据压缩,具有高加解密速度和低延迟,显著提升了监控系统运行的安全性和实时性。 展开更多
关键词 高级加密标准(aes)通信 新能源汽车 监控仿真 数据安全
下载PDF
基于Tent和Bernouli映射的改进AES算法
7
作者 昝卫博 王海珍 《高师理科学刊》 2024年第6期38-42,共5页
随着加密算法被广泛应用,高级加密标准(Advanced Encryption Standard,AES)轮密钥之间具有强关联性的缺点也被发现.提出了一种基于Tent映射和Bernouli映射的改进AES算法,使用两种混沌映射产生的随机序列生成轮密钥,对原始的密钥扩展算... 随着加密算法被广泛应用,高级加密标准(Advanced Encryption Standard,AES)轮密钥之间具有强关联性的缺点也被发现.提出了一种基于Tent映射和Bernouli映射的改进AES算法,使用两种混沌映射产生的随机序列生成轮密钥,对原始的密钥扩展算法进行改进和优化,该方法生成的轮密钥之间无关联性,密钥空间足够大,并且每次生成的序列及轮密钥都不同,增强了AES抵御攻击的能力.通过对随机序列的安全测试分析,表明改进后的AES能够保证密钥扩展算法有足够的安全性,解决了轮密钥关联性的问题,并实现了一次一密的效果. 展开更多
关键词 高级加密标准 密钥扩展 混沌映射
下载PDF
AES Encrypted FSK Generation at X-Band Frequency using a Single Reflex Klystron
8
作者 Mohuya Chakraborty Amiya Kumar Mallick 《China Communications》 SCIE CSCD 2010年第3期1-9,共9页
This paper describes a high security data transmission system over X-band microwave frequency. The paper has two parts. The first part deals with encryption of binary data by Advanced Encryption Standard (AES) using V... This paper describes a high security data transmission system over X-band microwave frequency. The paper has two parts. The first part deals with encryption of binary data by Advanced Encryption Standard (AES) using VHDL modeling of Field Programmable Gate Array (FPGA). The second part deals with a novel idea of transmitting the encrypted data by using a single klystron. This requires the simultaneous generation of a pair of two independent RF frequencies from a reflex klystron working for X-band frequency range. In this scheme, the klystron is suitably biased on the repeller terminal and superimposed on a train of AES encrypted binary data so as to create two RF frequencies one corresponding to negative peaks and the other one to the positive peaks of the data resulting in an Frequency Shift Keying (FSK) signal. The results have been verified experimentally. 展开更多
关键词 advanced encryption standard aes dual frequency generation FSK modulation FPGA Reflex Klystron VHDL
下载PDF
简评美国公布的15个AES候选算法 被引量:15
9
作者 吴文玲 冯登国 卿斯汉 《软件学报》 EI CSCD 北大核心 1999年第3期225-230,共6页
文章对美国国家标准和技术研究所(NIST)最近公布的15个AES候选算法的基本设计思想作了简要介绍。
关键词 aes算法 加密 解密 密钥 信息安全
下载PDF
基于AES的数据加密方案 被引量:12
10
作者 林茂琼 李敏强 +1 位作者 寇纪淞 熊 凯 《计算机工程》 CAS CSCD 北大核心 2002年第4期140-142,共3页
将最新的数据加密标准(AES)算法Rijndael与目前国际上应用最广泛的公开密钥密码技术(RSA)相结合,提出了一种新的数据加密方案。
关键词 数据加密 高级加密标准 RSA aes 信息安全 计算机安全 公开密钥密码
下载PDF
高级加密标准AES及其实现技巧 被引量:20
11
作者 黄智颖 冯新喜 张焕国 《计算机工程与应用》 CSCD 北大核心 2002年第9期112-115,共4页
介绍美国联邦信息处理标准(FIPS)草案——高级加密标准AES,用ANSIC高效实现了此算法,并给出了其执行性能。
关键词 密码 密钥 高级加密标准 信息安全 aes
下载PDF
Reconfigurable implementation of AES algorithm IP core based on pipeline structure 被引量:6
12
作者 李冰 夏克维 梁文丽 《Journal of Southeast University(English Edition)》 EI CAS 2010年第1期21-25,共5页
In order to improve the data throughput of the advanced encryption standard (AES) IP core while reducing the hardware resource consumption and finally achieving a tradeoff between speed and area, a mixed pipeline ar... In order to improve the data throughput of the advanced encryption standard (AES) IP core while reducing the hardware resource consumption and finally achieving a tradeoff between speed and area, a mixed pipeline architecture and reconfigurable technology for the design and implementation of the AES IP core is proposed. The encryption and decryption processes of the AES algorithm are achieved in the same process within the mixed pipeline structure. According to the finite field characterizations, the Sbox in the AES algorithm is optimized. ShiftRow and MixColumn, which are the main components in AES round transformation, are optimized with the reconfigurable technology. The design is implemented on the Xilinx Virtex2p xc2vp20-7 field programmable gate array (FPGA) device. It can achieve a data throughput above 2.58 Gbit/s, and it only requires 3 233 slices. Compared with other related designs of AES IP cores on the same device, the proposed design can achieve a tradeoff between speed and area, and obtain satisfactory results in both data throughput and hardware resource consumption. 展开更多
关键词 advanced encryption standard aes algorithm RECONFIGURABLE PIPELINE finite field round transformation
下载PDF
基于AES的S盒图像置乱算法研究 被引量:3
13
作者 肖华勇 李建辉 边笛 《西北工业大学学报》 EI CAS CSCD 北大核心 2008年第1期74-78,共5页
提出了一种基于密码学最新加密算法AES中的S盒对图像进行置乱的技术。该技术包括灰度置乱、行列置乱、块置乱及3种置乱技术的综合运用。文中对置乱的效果提出了灰度直方图、平均差异度、置乱图与原图的相关系数评价方法,并采用该方法对... 提出了一种基于密码学最新加密算法AES中的S盒对图像进行置乱的技术。该技术包括灰度置乱、行列置乱、块置乱及3种置乱技术的综合运用。文中对置乱的效果提出了灰度直方图、平均差异度、置乱图与原图的相关系数评价方法,并采用该方法对各种置乱技术进行了实验分析。从实验结果来看,达到了很好的效果。文中还对该置乱算法复杂性、置乱的安全性、周期性等进行了分析。结果表明该技术对图像置乱简单高效,安全性高。 展开更多
关键词 aes(advanced encryption standard)的S盒 相关系数 图像置乱 周期性 安全性
下载PDF
基于超混沌AES图像加密算法 被引量:19
14
作者 陈在平 蔡鹏飞 董恩增 《吉林大学学报(信息科学版)》 CAS 2013年第2期158-164,共7页
为提高图像加密算法的安全性能,提出了一种改进的AES(Advanced Encryption Standard)超混沌加密算法。该算法根据超混沌系统产生的混沌序列进行排列组成S盒,对明文图像做像素值替换;利用加入外部密钥的混沌序列分别对图像像素点进行行... 为提高图像加密算法的安全性能,提出了一种改进的AES(Advanced Encryption Standard)超混沌加密算法。该算法根据超混沌系统产生的混沌序列进行排列组成S盒,对明文图像做像素值替换;利用加入外部密钥的混沌序列分别对图像像素点进行行、列位置置乱,并对加密算法的安全性能进行了深入分析。仿真实验结果表明,该算法具有更高的系统安全性,不仅具有较大的密钥空间和较高的密钥敏感性,而且能有效抵抗统计攻击和差分攻击等。 展开更多
关键词 超混沌 高级加密标准 图像加密 差分攻击
下载PDF
AES算法原理及其实现 被引量:50
15
作者 何明星 林昊 《计算机应用研究》 CSCD 北大核心 2002年第12期61-63,共3页
在研究分析了AES加密原理的基础上着重说明了AES算法实现的具体步骤,并用C语言完整地实现了AES算法,并利用密文分组链接(CBC)方式将其用于对文件的加密/解密(密钥长度可选)。AES结合其它技术还可实现更为广泛的安全协议。
关键词 aes算法 分组密码 对称密码体制 密码学 数据加密标准
下载PDF
高级加密标准(AES)算法的研究 被引量:13
16
作者 郎荣玲 夏煜 戴冠中 《小型微型计算机系统》 CSCD 北大核心 2003年第5期905-908,共4页
本文重点介绍了高级加密标准算法的要求及评价标准,分析了最终的五个候选算法的特点及异同,并主要分析了被选为高级加密标准算法的Rijndael算法.
关键词 高级加密标准算法 数据加密标准 数据加密算法 密码学 数据安全 Rijindael算法
下载PDF
AES算法优化及其在ARM上的实现 被引量:8
17
作者 张月华 张新贺 刘鸿雁 《计算机应用》 CSCD 北大核心 2011年第6期1539-1542,共4页
为了提高高级加密标准(AES)算法在ARM上的执行效率,针对明文长度和密钥长度均为128位的AES算法,提出了一种在ARM上高效运行并且占用较少ROM空间的实现方案。S盒采用即时计算的方法生成,将列混合和逆列混合修改为针对32位字的操作,密钥... 为了提高高级加密标准(AES)算法在ARM上的执行效率,针对明文长度和密钥长度均为128位的AES算法,提出了一种在ARM上高效运行并且占用较少ROM空间的实现方案。S盒采用即时计算的方法生成,将列混合和逆列混合修改为针对32位字的操作,密钥扩展采用即时密钥扩展。在S3C2440处理器上实现的实验结果表明,AES算法的优化方案可以在ARM处理器上高效运行并占用了较少的ROM空间。该方案可以应用于存储空间较小的嵌入式系统中。 展开更多
关键词 高级加密标准 加密 密钥扩展 ARM 算法优化
下载PDF
基于MapReduce的并行AES加密算法 被引量:10
18
作者 付雅丹 杨庚 +1 位作者 胡持 闵兆娥 《计算机应用》 CSCD 北大核心 2015年第11期3079-3082,3134,共5页
针对云计算环境的隐私保护问题,采用加密数据存储是一个可行的选择。为了提高数据加密解密的速度,结合云环境的并行计算特点和AES加密算法,设计了一种并行AES加密方案,给出了具体的并行算法,分析了算法的性能,并通过实验证明了方法的有... 针对云计算环境的隐私保护问题,采用加密数据存储是一个可行的选择。为了提高数据加密解密的速度,结合云环境的并行计算特点和AES加密算法,设计了一种并行AES加密方案,给出了具体的并行算法,分析了算法的性能,并通过实验证明了方法的有效性。实验结果表明该并行算法在MapReduce模式下,在16核4节点构成的云计算集群上能够达到15.9的加速比,总加密时间减少了72.7%。 展开更多
关键词 云计算 MAPREDUCE 并行加密 高级加密标准
下载PDF
AES加密条码在白酒溯源系统中的应用 被引量:5
19
作者 万长林 刘波平 +3 位作者 裘锋 李沐华 戴欢 王蕾 《计算机应用与软件》 CSCD 北大核心 2014年第12期329-333,共5页
为了解决白酒追溯码溯源的加密和防伪问题,提出一种十进制加密算法(AES10)。该算法通过对AES加密算法四种核心运算的调整,实现了以十进制数为基本处理单位的加密和解密,并克服了现有十进制加密算法只能处理特定长度明文的缺点。扩散率... 为了解决白酒追溯码溯源的加密和防伪问题,提出一种十进制加密算法(AES10)。该算法通过对AES加密算法四种核心运算的调整,实现了以十进制数为基本处理单位的加密和解密,并克服了现有十进制加密算法只能处理特定长度明文的缺点。扩散率软件仿真实验结果表明,该算法具有较好的安全特性。基于AES10算法,设计了一种适用于白酒溯源系统的加密条码和应用该加密条码的追溯码溯源过程,取得了较好的溯源加密和防伪效果。 展开更多
关键词 十进制加密 追溯码 条码 白酒 高级加密标准
下载PDF
AES算法的结构分析与优化实现 被引量:9
20
作者 袁巍 胡亮 +3 位作者 林宇 张云龙 黄瑞 李宏图 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2008年第5期885-890,共6页
描述了高级加密标准(Advanced Encryption Standard,AES)算法的各部分功能,并分析了AES算法的结构及实现.对算法单轮执行步骤进行了优化合并.为降低解密算法的实现复杂度,改变了解密算法的工作顺序,使解密算法与加密算法具有相同的结构.
关键词 高级加密标准 子密钥 加密算法
下载PDF
上一页 1 2 17 下一页 到第
使用帮助 返回顶部