期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Permutation Code Encryption—New Achievement Based on Path Encryption
1
作者 WU Jinmu LIU Maohua FU Guiqin GUO Lina 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1581-1584,共4页
By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path ... By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path encryption. We present permutation code encryption which is based on path encryption. Now permutation code encryption is a patent of Chinese invention. In Permutation Code Encryption, we use a pseudo-random sequence of the keys to control the paths. The simulation result shows that for n-bit block the encryption strength is novel higher than 2^n and the algorithm can finish the encryption of one block in 7.5 ns, which is unrelated with the block length. 展开更多
关键词 ATTACK encryption strength path encryption permutation code encryption block cipher
下载PDF
The New Concept of Path Contributing to the Cryptographic Strength Exceeding 2~N
2
作者 WU Jinmu FU Guiqin LIU Yi GUO Lina 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1585-1588,共4页
First this paper introduces the kinds of category of Cipher and the current situation of the Block Cipher. Then it talks about the old concepts holding back the Block Cipher and presents a new concept. Finally, it int... First this paper introduces the kinds of category of Cipher and the current situation of the Block Cipher. Then it talks about the old concepts holding back the Block Cipher and presents a new concept. Finally, it introduces our patent-Permutation Code and the Encipher/Decipher. Its encryption strength exceeds 2^N. With DES having been proved unsafe, we should not enhance the encryption strength just by increasing its block length just as AES does. 展开更多
关键词 CIPHER encryption DECRYPTION permutation code encryption block cipher
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部