期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
1
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(s-box)
下载PDF
Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes 被引量:1
2
作者 Xuan-Ping Zhang Rui Guo +2 位作者 Heng-Wei Chen Zhong-Meng Zhao Jia-Yin Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期170-178,共9页
Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusi... Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusion. In this paper, we analyze the defects of this structure based on the example of an article and crack it using a simpler method. To address the defects of the asynchronous encryption structure, a novel encryption scheme is proposed, in which the structure of synchronous substitution and diffusion based on double S-boxes is utilized, so the processes of substitution and diffusion are combined together and the attackers cannot crack the cryptosystem by any of the processes. The simulation results and security analysis show that the proposed encryption scheme is safer and more efficient to expediently use in the real-time system. 展开更多
关键词 image encryption s-box CRACK synchronous substitution and diffusion
下载PDF
S-box:six-dimensional compound hyperchaotic map and artificial bee colony algorithm 被引量:1
3
作者 Ye Tian Zhimao Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期232-241,共10页
Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes th... Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes that simultaneously meet with multiple cryptographic criteria such as bijection,non-linearity,strict avalanche criterion(SAC),bits independence criterion(BIC),differential probability(DP) and linear probability(LP).To deal with this problem,a chaotic S-box based on the artificial bee colony algorithm(CSABC) is designed.It uses the S-boxes generated by the six-dimensional compound hyperchaotic map as the initial individuals and employs ABC to improve their performance.In addition,it considers the nonlinearity and differential uniformity as the fitness functions.A series of experiments have been conducted to compare multiple cryptographic criteria of this algorithm with other algorithms.Simulation results show that the new algorithm has cryptographically strong S-box while meeting multiple cryptographic criteria. 展开更多
关键词 substitution boxes(s-boxes) multiple cryptographic criteria six-dimensional compound hyperchaotic map artificial bee colony algorithm(ABC).
下载PDF
Effective method for the design of S-Boxes satisfying the strict avalanche criterion(SAC)
4
作者 高胜 Ma Wenping +1 位作者 Zhuo Zepeng Li Xiaoping 《High Technology Letters》 EI CAS 2013年第1期88-91,共4页
The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fu... The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fulfilling the SAC until now.In this paper,to construct S-boxes satisfying the SAC directly,we generalize the concatenation techniques of Boolean functions to S-boxes.Using the idea of concatenating small variable S-boxes,we present a simple yet effective construction method of S-boxes satisfying the SAC.Finally,a simple example on how to construct SAC S-boxes with large input variables by small variables SAC S-boxes is given. 展开更多
关键词 CRYPTOGRAPHY Boolean functions substitution boxes (s-boxes) strict avalanche criterion (SAC) CONCATENATION CONSTRUCTION
下载PDF
A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes
5
作者 Sankhanil Dey Ranjan Ghosh 《Advances in Pure Mathematics》 2018年第3期272-306,共35页
4-bit linear relations play an important role in cryptanalysis of 4-bit crypto S-boxes. 4-bit finite differences have also been a major part of cryptanalysis of 4-bit S-boxes. Existence of all 4-bit linear relations h... 4-bit linear relations play an important role in cryptanalysis of 4-bit crypto S-boxes. 4-bit finite differences have also been a major part of cryptanalysis of 4-bit S-boxes. Existence of all 4-bit linear relations have been counted for all of 16 input and 16 output 4-bit bit patterns of 4-bit Crypto S-boxes said as S-boxes has been reported in Linear Cryptanalysis of 4-bit S-boxes. Count of existing finite differences from each element of output S-boxes to distant output S-boxes have been noted in Differential Cryptanalysis of S-boxes. In this paper a brief review of these two cryptanalytic methods for 4-bit S-boxes has been introduced in a very lucid and conceptual manner. Two new analysis techniques, one to search for the existing linear approximations among the input vectors (IPVs) and output Boolean functions (BFs) of a particular S-box has also been introduced in this paper. The search is limited to find the existing linear relations or approximations in the contrary to count the number of existent linear relations among all 16, 4-bit input and output bit patterns within all possible linear approximations. Another is to find number of balanced BFs in difference output S-boxes. Better the number of Balanced BFs, Better the security. 展开更多
关键词 Linear CRYPTANALYSIS Differential CRYPTANALYSIS substitution BOXES s-boxes CRYPTOGRAPHY CRYPTANALYSIS
下载PDF
Dynamic inhomogeneous S-Boxes in AES: a novel countermeasure against power analysis attacks
6
作者 陈毅成 《High Technology Letters》 EI CAS 2008年第4期390-393,共4页
Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.Th... Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.The masking strategies in algorithm level view each S-Box as an independent moduleand mask them respectively,which are costly in size and power for non-linear characteristic of S-Boxes.The new method uses dynamic inhomogeneous S-Boxes instead of traditional homogeneous S-Boxes,andarranges the S-Boxes randomly.So the power and data path delay of substitution unit become unpre-dictable.The experimental results demonstrate that this scheme takes advantages of the circuit character-istics of various S-Box implementations to eliminate the correlation between crypto operation and power.Itneeds less extra circuits and suits resource constrained applications. 展开更多
关键词 advanced encryption standard (AES) substitution box (s-box correlation power analysis
下载PDF
高级加密标准Rijndael算法中的S盒及其实现 被引量:7
7
作者 师军 张福泰 +1 位作者 王耀燕 张永铂 《小型微型计算机系统》 CSCD 北大核心 2003年第7期1207-1209,共3页
本文详细描述了 Rijndael加密算法中非线性变换 S盒的实现过程 .首先介绍生成 S盒所需的数学基础 ,然后给出实现 S盒的算法以及相应的
关键词 RIJNDAEL 字节替换 S盒
下载PDF
Rijndael分组密码的研究与分析 被引量:5
8
作者 陈勤 周丽 《计算机工程与应用》 CSCD 北大核心 2002年第13期113-115,共3页
该文对Rijndael分组密码进行了较为深入的研究,将字节代替变换中的有限域GF(28)上模乘求逆运算和仿射变换归并成了一个8×8的S盒,将圈中以字节为单位进行的行移位、列混合、密钥加三种运算归并成了一个广义仿射变换,归并结果表明Rij... 该文对Rijndael分组密码进行了较为深入的研究,将字节代替变换中的有限域GF(28)上模乘求逆运算和仿射变换归并成了一个8×8的S盒,将圈中以字节为单位进行的行移位、列混合、密钥加三种运算归并成了一个广义仿射变换,归并结果表明Rijndael密码实质上是一个形如仿射变换的非线性迭代算法。基于分析给出了Rijndael密码算法的精简描述,并指出了算法预计算快速实现的有效方法。 展开更多
关键词 分组密码 Rijndael密码 字节代替变换 非线性迭代算法 密码学
下载PDF
Rijndael分组密码与差分攻击 被引量:2
9
作者 陈勤 周律 《小型微型计算机系统》 CSCD 北大核心 2003年第4期676-679,共4页
深入研究了Rijndael分组密码,将字节代替变换中的有限域GF(28)上模乘求逆运算和仿射变换归并成了一个8×8的S盒,将圈中以字节为单位进行的行移位、列混合、密钥加三种运算归并成了一个广义仿射变换.基于归并将Rijndael密码算法了进... 深入研究了Rijndael分组密码,将字节代替变换中的有限域GF(28)上模乘求逆运算和仿射变换归并成了一个8×8的S盒,将圈中以字节为单位进行的行移位、列混合、密钥加三种运算归并成了一个广义仿射变换.基于归并将Rijndael密码算法了进行简化,结果表明Rijndael密码实质上是一个形如仿射变换Y=A(?)S(X)(?)K的非线性迭代算法,并以分组长度128比特、密钥长度128比特作为特例,给出了二轮Rijndael密码的差分攻击.文中还给出了Rijndael密码算法的精简描述,并指出了算法通过预计算快速实现的有效方法. 展开更多
关键词 分组密码 Rijndael密码 仿射变换 S盒 非线性迭代算法 差分攻击 信息安全
下载PDF
基于Rijndael算法的研究和应用 被引量:2
10
作者 张青凤 张凤琴 《山西大同大学学报(自然科学版)》 2012年第1期14-16,共3页
Rijndael作为下一代分组密码算法标准,是一种最新流行的加密算法。本文对这一算法进行了较深入地研究和分析,阐述了该算法的实现原理和过程,并给出了Rijndael算法在文件加解密过程实现的关键代码。
关键词 RIJNDAEL S-盒 分组密码 仿射变换 字节变换
下载PDF
基于FPGA的AES硬件实现及优化 被引量:3
11
作者 于松林 王文工 +2 位作者 陈博 陈祥 张霞 《电子设计工程》 2017年第6期75-78,83,共5页
AES(Advanced Encryption Standard)是一种非常流行的对称加密算法,字节替换是AES算法中十分重要的部分。针对采用复合域方法来实现字节替换吞吐率小的问题,本文利用先计算的方法进行了5级轮内流水线设计,去除关键路径上的一些计算来降... AES(Advanced Encryption Standard)是一种非常流行的对称加密算法,字节替换是AES算法中十分重要的部分。针对采用复合域方法来实现字节替换吞吐率小的问题,本文利用先计算的方法进行了5级轮内流水线设计,去除关键路径上的一些计算来降低关键路径延迟提高吞吐率。在FPGA器件Virtex-6 XC6VLX240T上,通过Xilinx ISE 14.7进行仿真实验,结果表明在面积增加相对不大的情况下,提高了吞吐率以及吞吐率/面积比。 展开更多
关键词 AES 字节替换 复合域 先计算方法
下载PDF
基于随机加法链的高级加密标准抗侧信道攻击对策 被引量:13
12
作者 黄海 冯新新 +4 位作者 刘红雨 厚娇 赵玉迎 尹莉莉 姜久兴 《电子与信息学报》 EI CSCD 北大核心 2019年第2期348-354,共7页
侧信道攻击已经对高级加密标准(AES)的硬件安全造成严重威胁,如何抵御侧信道攻击成为目前亟待解决的问题。字节替换操作作为AES算法中唯一的非线性操作,提高其安全性对整个加密算法有重要意义。该文提出一种基于随机加法链的AES抗侧信... 侧信道攻击已经对高级加密标准(AES)的硬件安全造成严重威胁,如何抵御侧信道攻击成为目前亟待解决的问题。字节替换操作作为AES算法中唯一的非线性操作,提高其安全性对整个加密算法有重要意义。该文提出一种基于随机加法链的AES抗侧信道攻击对策,该对策用随机加法链代替之前固定的加法链来实现有限域GF(28)上的乘法求逆操作,在此基础上研究随机加法链对算法安全性和有效性方面的影响。实验表明,所提随机加法链算法比之前固定的加法链算法在抵御侧信道攻击上更加安全、有效。 展开更多
关键词 高级加密标准 侧信道攻击 字节替换 加法链
下载PDF
基于FPGA的高速AES实现 被引量:7
13
作者 何德彪 胡进 陈建华 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第2期101-104,共4页
通过对高级数据加密标准进行分析,给出了一种基于全流水线的的实现方法.这种实现方法同时支持加密和解密,具有低实现代价、高吞吐量等特点.采用Xilinx公司的Virtex-4 XC4VLX 1000-12芯片进行实现,结果表明吞吐量可以达到39.93 Gbit/s,... 通过对高级数据加密标准进行分析,给出了一种基于全流水线的的实现方法.这种实现方法同时支持加密和解密,具有低实现代价、高吞吐量等特点.采用Xilinx公司的Virtex-4 XC4VLX 1000-12芯片进行实现,结果表明吞吐量可以达到39.93 Gbit/s,适合高性能的加密应用要求. 展开更多
关键词 高级加密标准 可编程门列阵(FPGA) 字节替换 列混合变换 行移位变换 轮密钥加
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部