期刊文献+
共找到46篇文章
< 1 2 3 >
每页显示 20 50 100
Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes 被引量:1
1
作者 张选平 郭瑞 +2 位作者 陈恒伟 赵仲孟 王嘉寅 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期170-178,共9页
Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusi... Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusion. In this paper, we analyze the defects of this structure based on the example of an article and crack it using a simpler method. To address the defects of the asynchronous encryption structure, a novel encryption scheme is proposed, in which the structure of synchronous substitution and diffusion based on double S-boxes is utilized, so the processes of substitution and diffusion are combined together and the attackers cannot crack the cryptosystem by any of the processes. The simulation results and security analysis show that the proposed encryption scheme is safer and more efficient to expediently use in the real-time system. 展开更多
关键词 image encryption s-box CRACK synchronous substitution and diffusion
下载PDF
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
2
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(s-box)
下载PDF
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
3
作者 Muhammad Fahad Khan Khalid Saleem +4 位作者 Mohammed Alotaibi Mohammad Mazyad Hazzazi Eid Rehman Aaqif Afzaal Abbasi Muhammad Asif Gondal 《Computers, Materials & Continua》 SCIE EI 2022年第11期2679-2696,共18页
Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them suscept... Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them susceptible to various kinds of security threats.These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field.In this regard,block cipher has been one of the most reliable options through which data security is accomplished.The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes.For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques.On the other side,literature endorse the true random numbers for information security due to the reason that,true random numbers are purely non-deterministic.In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes.Secondly,a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes.Based on the outcome of Systematic Literature Review(SLR),genetic algorithm is chosen for the optimization of s-boxes.The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers.Moreover,our results showed that the proposed substitution boxes achieve better cryptographic strength as compared with state-of-the-art techniques. 展开更多
关键词 IoT security sensors data encryption substitution box generation True Random Number Generators(TRNG) heuristic optimization genetic algorithm
下载PDF
一种基于离散混沌系统的S-Box候选算法设计 被引量:1
4
作者 丁文霞 王浩 《国防科技大学学报》 EI CAS CSCD 北大核心 2013年第1期83-88,共6页
S-Box是现行分组密码中唯一的非线性部件,主要提供了分组密码算法中必需的混淆作用,其密码强度决定了整个分组密码的安全强度。为进一步提高S-Box的强度,结合离散混沌系统的内在随机性、有界性、非周期性及对初始条件和参数极度敏感等特... S-Box是现行分组密码中唯一的非线性部件,主要提供了分组密码算法中必需的混淆作用,其密码强度决定了整个分组密码的安全强度。为进一步提高S-Box的强度,结合离散混沌系统的内在随机性、有界性、非周期性及对初始条件和参数极度敏感等特点,提出一种采用多混沌映射和交叉映射生成S-Box的生成算法。实验分析表明,该算法生成的样本密钥敏感性强,随机性好,既能较好地满足S-Box设计所要求的各项准则和特性,安全性高,同时又能降低计算复杂度,提高计算速度,且易于生成和扩展,因而是一种性能良好的S-Box候选算法。 展开更多
关键词 应用密码学 混沌 s-box 严格雪崩准则 输出比特间独立性
下载PDF
S-box:six-dimensional compound hyperchaotic map and artificial bee colony algorithm 被引量:1
5
作者 Ye Tian Zhimao Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期232-241,共10页
Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes th... Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes that simultaneously meet with multiple cryptographic criteria such as bijection,non-linearity,strict avalanche criterion(SAC),bits independence criterion(BIC),differential probability(DP) and linear probability(LP).To deal with this problem,a chaotic S-box based on the artificial bee colony algorithm(CSABC) is designed.It uses the S-boxes generated by the six-dimensional compound hyperchaotic map as the initial individuals and employs ABC to improve their performance.In addition,it considers the nonlinearity and differential uniformity as the fitness functions.A series of experiments have been conducted to compare multiple cryptographic criteria of this algorithm with other algorithms.Simulation results show that the new algorithm has cryptographically strong S-box while meeting multiple cryptographic criteria. 展开更多
关键词 substitution boxes(s-boxes) multiple cryptographic criteria six-dimensional compound hyperchaotic map artificial bee colony algorithm(ABC).
下载PDF
A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes
6
作者 Sankhanil Dey Ranjan Ghosh 《Advances in Pure Mathematics》 2018年第3期272-306,共35页
4-bit linear relations play an important role in cryptanalysis of 4-bit crypto S-boxes. 4-bit finite differences have also been a major part of cryptanalysis of 4-bit S-boxes. Existence of all 4-bit linear relations h... 4-bit linear relations play an important role in cryptanalysis of 4-bit crypto S-boxes. 4-bit finite differences have also been a major part of cryptanalysis of 4-bit S-boxes. Existence of all 4-bit linear relations have been counted for all of 16 input and 16 output 4-bit bit patterns of 4-bit Crypto S-boxes said as S-boxes has been reported in Linear Cryptanalysis of 4-bit S-boxes. Count of existing finite differences from each element of output S-boxes to distant output S-boxes have been noted in Differential Cryptanalysis of S-boxes. In this paper a brief review of these two cryptanalytic methods for 4-bit S-boxes has been introduced in a very lucid and conceptual manner. Two new analysis techniques, one to search for the existing linear approximations among the input vectors (IPVs) and output Boolean functions (BFs) of a particular S-box has also been introduced in this paper. The search is limited to find the existing linear relations or approximations in the contrary to count the number of existent linear relations among all 16, 4-bit input and output bit patterns within all possible linear approximations. Another is to find number of balanced BFs in difference output S-boxes. Better the number of Balanced BFs, Better the security. 展开更多
关键词 Linear CRYPTANALYSIS Differential CRYPTANALYSIS substitution boxES s-boxes CRYPTOGRAPHY CRYPTANALYSIS
下载PDF
Effective method for the design of S-Boxes satisfying the strict avalanche criterion(SAC)
7
作者 高胜 Ma Wenping +1 位作者 Zhuo Zepeng Li Xiaoping 《High Technology Letters》 EI CAS 2013年第1期88-91,共4页
The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fu... The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fulfilling the SAC until now.In this paper,to construct S-boxes satisfying the SAC directly,we generalize the concatenation techniques of Boolean functions to S-boxes.Using the idea of concatenating small variable S-boxes,we present a simple yet effective construction method of S-boxes satisfying the SAC.Finally,a simple example on how to construct SAC S-boxes with large input variables by small variables SAC S-boxes is given. 展开更多
关键词 严格雪崩准则 SAC S盒 s-box 设计 加密系统 连接技术 布尔函数
下载PDF
Dynamic inhomogeneous S-Boxes in AES: a novel countermeasure against power analysis attacks
8
作者 陈毅成 《High Technology Letters》 EI CAS 2008年第4期390-393,共4页
Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.Th... Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.The masking strategies in algorithm level view each S-Box as an independent moduleand mask them respectively,which are costly in size and power for non-linear characteristic of S-Boxes.The new method uses dynamic inhomogeneous S-Boxes instead of traditional homogeneous S-Boxes,andarranges the S-Boxes randomly.So the power and data path delay of substitution unit become unpre-dictable.The experimental results demonstrate that this scheme takes advantages of the circuit character-istics of various S-Box implementations to eliminate the correlation between crypto operation and power.Itneeds less extra circuits and suits resource constrained applications. 展开更多
关键词 AES 代码 关联功率分析 通讯技术
下载PDF
基于随机平滑的通用黑盒认证防御
9
作者 李瞧 陈晶 +3 位作者 张子君 何琨 杜瑞颖 汪欣欣 《计算机学报》 EI CAS CSCD 北大核心 2024年第3期690-702,共13页
近年来,基于深度神经网络(DNNs)的图像分类模型在人脸识别、自动驾驶等关键领域得到了广泛应用,并展现出卓越的性能.然而,深度神经网络容易受到对抗样本攻击,从而导致模型错误分类.为此,提升模型自身的鲁棒性已成为一个主要的研究方向.... 近年来,基于深度神经网络(DNNs)的图像分类模型在人脸识别、自动驾驶等关键领域得到了广泛应用,并展现出卓越的性能.然而,深度神经网络容易受到对抗样本攻击,从而导致模型错误分类.为此,提升模型自身的鲁棒性已成为一个主要的研究方向.目前大部分的防御方法,特别是经验防御方法,都基于白盒假设,即防御者拥有模型的详细信息,如模型架构和参数等.然而,模型所有者基于隐私保护的考虑不愿意共享模型信息.即使现有的黑盒假设的防御方法,也无法防御所有范数扰动的攻击,缺乏通用性.因此,本文提出了一种适用于黑盒模型的通用认证防御方法.具体而言,本文首先设计了一个基于查询的无数据替代模型生成方案,在无需模型的训练数据与结构等先验知识的情况下,利用查询和零阶优化生成高质量的替代模型,将认证防御场景转化为白盒,确保模型的隐私安全.其次,本文提出了基于白盒替代模型的随机平滑和噪声选择方法,构建了一个能够抵御任意范数扰动攻击的通用认证防御方案.本文通过分析比较原模型和替代模型在白盒认证防御上的性能,确保了替代模型的有效性.相较于现有方法,本文提出的通用黑盒认证防御方案在CIFAR10数据集上的效果取得了显著的提升.实验结果表明,本文方案可以保持与白盒认证防御方法相似的效果.与之前基于黑盒的认证防御方法相比,本文方案在实现了所有L p的认证防御的同时,认证准确率提升了20%以上.此外,本文方案还能有效保护原始模型的隐私,与原始模型相比,本文方案使成员推理攻击的成功率下降了5.48%. 展开更多
关键词 深度神经网络 认证防御 随机平滑 黑盒模型 替代模型
下载PDF
基于混合整数线性规划模型的SPONGENTS盒紧凑约束分析
10
作者 石一鹏 刘杰 +2 位作者 祖锦源 张涛 张国群 《计算机应用》 CSCD 北大核心 2023年第5期1504-1510,共7页
应用基于混合整数线性规划(MILP)模型的S盒紧凑约束计算方法,可以较好地解决SPONGENT在差分密码分析过程中差分路径搜索效率低下的问题;为寻找S盒的最优描述,提出一种紧凑性验证算法从约束条件存在必要性的角度验证S盒的不等式约束的紧... 应用基于混合整数线性规划(MILP)模型的S盒紧凑约束计算方法,可以较好地解决SPONGENT在差分密码分析过程中差分路径搜索效率低下的问题;为寻找S盒的最优描述,提出一种紧凑性验证算法从约束条件存在必要性的角度验证S盒的不等式约束的紧凑性问题。首先,引入MILP模型分析SPONGENT S盒的不等式约束,得到了由23个不等式组成的约束;然后,提出一种用于评价约束不等式存在必要性的指标,并基于该指标提出了一种验证约束不等式组紧凑程度的紧凑性验证算法;最后,使用所提算法验证所求得的SPONGENT S盒约束的紧凑性。计算分析表明,23个不等式都具有唯一可以排除的不可能差分模式,即每个不等式都有存在的必要性;同时,对于同一案例,与利用贪心算法原理筛选的不等式相比,数量减少了20%。因此,所得到的SPONGENT的S盒不等式约束是紧凑的,且所提紧凑性验证算法的效果要优于对比的贪心算法。 展开更多
关键词 差分密码分析 混合整数线性规划 代换‒置换网络 SPONGENT S盒
下载PDF
基于持续性故障的分组密码算法S盒表逆向分析
11
作者 王安 谷睿 +3 位作者 丁瑶玲 张雪 袁庆军 祝烈煌 《电子学报》 EI CAS CSCD 北大核心 2023年第3期537-551,共15页
基于故障注入的逆向分析技术通过向运行保密算法的设备中注入故障,诱导异常加密结果产生,进而恢复保密算法内部结构和参数.在除S盒表外其他运算结构已知的前提下,本文基于持续性故障提出了一种分组密码算法S盒表逆向分析方法.我们利用... 基于故障注入的逆向分析技术通过向运行保密算法的设备中注入故障,诱导异常加密结果产生,进而恢复保密算法内部结构和参数.在除S盒表外其他运算结构已知的前提下,本文基于持续性故障提出了一种分组密码算法S盒表逆向分析方法.我们利用算法中使用故障元素的S盒运算将产生错误中间状态并导致密文出错这一特点,构造特殊的明文和密钥,诱导保密算法第二轮S盒运算取到故障值,从而逆向推导出第一轮S盒运算的输出,进而恢复出保密算法S盒表的全部元素.以类AES-128(Advanced Encryption Standard-128)算法为例,我们的方法以1441792次加密运算成功恢复出完整S盒表,与现有的其他逆向分析方法进行对比,新方法在故障注入次数和计算复杂度上有明显优势.进一步,我们将该方法应用于类SM4算法,并以1900544次加密运算恢复出保密S盒表.最后,我们综合考虑了分组密码算法的两种典型结构Feistel和SPN(Substitution Permutation Network)的特点,对新方法的普适性进行了讨论,总结出适用算法需具备的条件. 展开更多
关键词 逆向分析 持续性故障 分组密码 S盒表
下载PDF
Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field 被引量:3
12
作者 Naveed Ahmed AZAM Umar HAYAT Ikram ULLAH 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第10期1378-1389,共12页
Elliptic curve cryptography has been used in many security systems due to its small key size and high security compared with other cryptosystems. In many well-known security systems, a substitution box (S-box) is the ... Elliptic curve cryptography has been used in many security systems due to its small key size and high security compared with other cryptosystems. In many well-known security systems, a substitution box (S-box) is the only non-linear component. Recently, it has been shown that the security of a cryptosystem can be improved using dynamic S-boxes instead of a static S-box. This necessitates the construction of new secure S-boxes. We propose an efficient method to generate S-boxes that are based on a class of Mordell elliptic curves over prime fields and achieved by defining different total orders. The proposed scheme is devel-oped in such a way that for each input it outputs an S-box in linear time and constant space. Due to this property, our method takes less time and space than the existing S-box construction methods over elliptic curves. Computational results show that the pro-posed method is capable of generating cryptographically strong S-boxes with security comparable to some of the existing S-boxes constructed via different mathematical structures. 展开更多
关键词 substitution box Finite field Mordell ELLIPTIC CURVE Total order COMPUTATIONAL COMPLEXITY
原文传递
考虑顾客替代选择的城市配送备选服务选项集多目标优化研究
13
作者 高敏 邱晗光 徐广业 《计算机集成制造系统》 EI CSCD 北大核心 2023年第11期3922-3936,共15页
在顾客可选末端交付方式和时间窗等服务选项的情境下,为被拒绝的配送需求提供备选服务选项集是供应商平衡顾客满意度和服务成本的重要措施之一。首先使用嵌套Logit模型分析顾客对配送服务选项的替代选择行为,然后构建考虑期望距离最小... 在顾客可选末端交付方式和时间窗等服务选项的情境下,为被拒绝的配送需求提供备选服务选项集是供应商平衡顾客满意度和服务成本的重要措施之一。首先使用嵌套Logit模型分析顾客对配送服务选项的替代选择行为,然后构建考虑期望距离最小和顾客替代选择累计转移率最大的城市配送备选服务选项集多目标优化模型。仿真发现:在配送点分布呈分散和聚集结合的情形下,非支配排序遗传算法更适用于配送点数量更多的算例,可以有效降低车辆行驶距离、车辆数量等成本因素;随着时间窗偏差阈值增大,总收益逐渐下降,其中送货上门服务收益下降趋势明显,自提柜服务收益则震荡上升;顾客替代选择累计转移率最小约束值对收益的影响不存在线性关系;在时间窗偏差阈值较小、顾客替代选择累计转移率最小约束值较大的区域,往往能获取更高的总收益。 展开更多
关键词 城市配送 替代选择 送货上门交付 自提柜交付 时间窗 动态车辆路径 多目标优化
下载PDF
Novel Scheme for Robust Confusion Component Selection Based on Pythagorean Fuzzy Set
14
作者 Nabilah Abughazalah Mohsin Iqbal +1 位作者 Majid Khan Iqtadar Hussain 《Computers, Materials & Continua》 SCIE EI 2023年第3期6523-6534,共12页
The substitution box,often known as an S-box,is a nonlinear component that is a part of several block ciphers.Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults.A Multi-Criteri... The substitution box,often known as an S-box,is a nonlinear component that is a part of several block ciphers.Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults.A Multi-Criteria Decision Making(MCDM)problem has a complex selection procedure because of having many options and criteria to choose from.Because of this,statistical methods are necessary to assess the performance score of each S-box and decide which option is the best one available based on this score.Using the Pythagorean Fuzzy-based Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)method,the major objective of this investigation is to select the optimal S-box to be implemented from a pool of twelve key choices.With the help of the Pythagorean fuzzy set(PFS),the purpose of this article is to evaluate whether this nonlinear component is suitable for use in a variety of encryption applications.In this article,we have considered various characteristics of S-boxes,including nonlinearity,algebraic degree,strict avalanche criterion(SAC),absolute indicator,bit independent criterion(BIC),sum of square indicator,algebraic immunity,transparency order,robustness to differential cryptanalysis,composite algebraic immunity,signal to noise ratio-differential power attack(SNR-DPA),and confusion coefficient variance on some standard S-boxes that are Advanced Encryption Following this,the findings of the investigation are changed into Pythagorean fuzzy numbers in the shape of a matrix.This matrix is then subjected to an analysis using the TOPSIS method,which is dependent on the Pythagorean fuzzy set,to rank the most suitable S-box for use in encryption applications. 展开更多
关键词 Decision making substitution box TOPSIS multi-criterion decision making fuzzy set Pythagorean fuzzy set
下载PDF
基于替代模型的批量零阶梯度符号算法
15
作者 李炎达 范纯龙 +1 位作者 滕一平 于铠博 《计算机科学》 CSCD 北大核心 2023年第S02期851-856,共6页
在面向神经网络的对抗攻击领域中,针对黑盒模型进行的通用攻击,如何生成导致多数样本输出错误的通用扰动是亟待解决的问题。然而,现有黑盒通用扰动生成算法的攻击效果不佳,且生成的扰动易被肉眼察觉。针对该问题,以典型卷积神经网络为... 在面向神经网络的对抗攻击领域中,针对黑盒模型进行的通用攻击,如何生成导致多数样本输出错误的通用扰动是亟待解决的问题。然而,现有黑盒通用扰动生成算法的攻击效果不佳,且生成的扰动易被肉眼察觉。针对该问题,以典型卷积神经网络为研究对象,提出基于替代模型的批量零阶梯度符号算法。该算法通过对替代模型集合进行白盒攻击来初始化通用扰动,并在黑盒条件下查询目标模型,实现对通用扰动的稳定高效更新。在CIFAR-10和SVHN两个数据集上的实验结果表明,与基线算法对比,该算法攻击能力显著提升,其生成通用扰动的性能提高了近3倍。 展开更多
关键词 卷积神经网络 通用扰动 对抗攻击 黑盒攻击 替代模型
下载PDF
高级加密标准Rijndael算法中的S盒及其实现 被引量:7
16
作者 师军 张福泰 +1 位作者 王耀燕 张永铂 《小型微型计算机系统》 CSCD 北大核心 2003年第7期1207-1209,共3页
本文详细描述了 Rijndael加密算法中非线性变换 S盒的实现过程 .首先介绍生成 S盒所需的数学基础 ,然后给出实现 S盒的算法以及相应的
关键词 RIJNDAEL 字节替换 S盒
下载PDF
响应面优化小麦粉制备脂肪替代物的酶解工艺 被引量:4
17
作者 钟昔阳 徐玉红 +2 位作者 张淑芬 吴欣 郑志 《中国粮油学报》 EI CAS CSCD 北大核心 2013年第7期12-18,共7页
以响应面法优化耐高温α-淀粉酶酶解小麦粉制备脂肪替代物的酶解工艺条件,并建立数学模型。以持水性、DE值为指标,通过单因素试验确定底物浓度、酶解时间、酶添加量的取值范围,采用Box-Be-hnken设计寻找制备脂肪替代物的最优工艺条件。... 以响应面法优化耐高温α-淀粉酶酶解小麦粉制备脂肪替代物的酶解工艺条件,并建立数学模型。以持水性、DE值为指标,通过单因素试验确定底物浓度、酶解时间、酶添加量的取值范围,采用Box-Be-hnken设计寻找制备脂肪替代物的最优工艺条件。经过Design-Expert 8.0软件预测出最优工艺参数:底物浓度(质量分数)25.60%,酶添加量2.33 U/g,酶解时间6.77 min,在此条件下持水性最大为282.25%。通过验证试验测得持水性为273.69%,表明模型的预测较为准确。在此基础上,对最优条件下脂肪替代物的凝胶性质和微观结构进行了初步研究评价,结果表明脂肪替代物的凝胶强度随溶液质量分数增加而增大,其分子结构受酶解作用而遭到破坏。 展开更多
关键词 小麦粉 脂肪替代物 酶解 box—Behnken设计
下载PDF
多路并行S盒替代操作指令研究 被引量:1
18
作者 戴紫彬 孟涛 +1 位作者 陈韬 张永福 《计算机工程》 CAS CSCD 北大核心 2008年第8期135-137,共3页
在分析DES,AES,IDEA等41种分组密码算法结构的基础上,研究了4×4,6×4,8×8,8×324种常用S盒替代的操作特征和S盒的实现方式。提出一种可高效、灵活地完成4种常用S盒替代操作的专用S盒运算指令、配置指令模型,给出了专... 在分析DES,AES,IDEA等41种分组密码算法结构的基础上,研究了4×4,6×4,8×8,8×324种常用S盒替代的操作特征和S盒的实现方式。提出一种可高效、灵活地完成4种常用S盒替代操作的专用S盒运算指令、配置指令模型,给出了专用S盒指令的超长指令字(VLIW)扩展指令模型,设计并实现了S盒替代的硬件单元,并对专用S盒操作指令执行效率进行了分析。 展开更多
关键词 分组密码 S盒 查找表 超长指令字
下载PDF
基于AES的S盒图像置乱算法研究 被引量:3
19
作者 肖华勇 李建辉 边笛 《西北工业大学学报》 EI CAS CSCD 北大核心 2008年第1期74-78,共5页
提出了一种基于密码学最新加密算法AES中的S盒对图像进行置乱的技术。该技术包括灰度置乱、行列置乱、块置乱及3种置乱技术的综合运用。文中对置乱的效果提出了灰度直方图、平均差异度、置乱图与原图的相关系数评价方法,并采用该方法对... 提出了一种基于密码学最新加密算法AES中的S盒对图像进行置乱的技术。该技术包括灰度置乱、行列置乱、块置乱及3种置乱技术的综合运用。文中对置乱的效果提出了灰度直方图、平均差异度、置乱图与原图的相关系数评价方法,并采用该方法对各种置乱技术进行了实验分析。从实验结果来看,达到了很好的效果。文中还对该置乱算法复杂性、置乱的安全性、周期性等进行了分析。结果表明该技术对图像置乱简单高效,安全性高。 展开更多
关键词 AES(Advanced ENCRYPTION Standard)的S盒 相关系数 图像置乱 周期性 安全性
下载PDF
基于改进粒子群优化算法的S盒优化设计 被引量:2
20
作者 毕晓君 盛磊 陈剑 《计算机工程》 CAS CSCD 北大核心 2011年第23期149-151,共3页
采用传统方法设计的S盒性能较差,而常用智能设计方法又存在设计时间过长、容易陷入局部最优的缺点。为此,提出一种基于改变粒子群优化算法的S盒优化设计方法。通过改变惯性权重来提高搜索速度和精度,从而增大算法效率。实验结果表明,该... 采用传统方法设计的S盒性能较差,而常用智能设计方法又存在设计时间过长、容易陷入局部最优的缺点。为此,提出一种基于改变粒子群优化算法的S盒优化设计方法。通过改变惯性权重来提高搜索速度和精度,从而增大算法效率。实验结果表明,该方法可以快速地搜索到能有效抵抗差分密码分析和线性密码分析的S盒,改善其密码性能。 展开更多
关键词 粒子群优化算法 S盒 差分均匀度 非线性度 雪崩性
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部