期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
无线网络机制中分组密码标准安全性分析
1
作者 刘佳 《价值工程》 2013年第9期196-199,共4页
分组密码算法凭借其在各种软件和硬件平台上的高效率特点,广泛地应用在无线通信系统的安全认证及保密机制中。本文对几种著名分组密码标准(美国高级加密标准AES算法、韩国分组加密标准SEED算法、欧洲分组加密标准Camellia算法和中国商... 分组密码算法凭借其在各种软件和硬件平台上的高效率特点,广泛地应用在无线通信系统的安全认证及保密机制中。本文对几种著名分组密码标准(美国高级加密标准AES算法、韩国分组加密标准SEED算法、欧洲分组加密标准Camellia算法和中国商用密码标准SMS4算法)的安全性进行了分析,通过研究分组密码算法中的非线性结构S盒的密码学性质,对比分组密码算法抵抗插入攻击、差分密码分析攻击和线性密码分析攻击的能力,揭示各种算法的安全性。 展开更多
关键词 分组密码 S盒 布尔函数 差分密码分析攻击 线性密码分析攻击
下载PDF
基于混沌映射的彩色图像多层交互加密算法 被引量:3
2
作者 李蓝航 丘森辉 +2 位作者 王文仪 肖丁维 罗玉玲 《广西师范大学学报(自然科学版)》 CAS 北大核心 2021年第6期72-86,共15页
本文提出一种基于耦合混沌映射的新型彩色图像加密算法。首先,提取明文信息并结合外部密钥产生与明文相关联的初始密钥值;其次,将彩色图像分解为R、G、B分量并同时得到3个一维序列,各个序列分别被分组并置乱;然后,由混沌映射生成伪随机... 本文提出一种基于耦合混沌映射的新型彩色图像加密算法。首先,提取明文信息并结合外部密钥产生与明文相关联的初始密钥值;其次,将彩色图像分解为R、G、B分量并同时得到3个一维序列,各个序列分别被分组并置乱;然后,由混沌映射生成伪随机序列进而构造3个索引序列,利用索引序列依次对R、G、B分量序列再次置乱;最后,通过异或运算得到最终密文图像。实验结果及安全性分析证明该方案具有良好的加密效果,可以有效抵抗常见的密码分析攻击,例如统计分析攻击、差分攻击、裁剪攻击、噪声攻击等。此外,与其他文献的对比结果证明本方案所得到的密文信息熵更接近理想值8,相关系数更接近0,加密效率更高。 展开更多
关键词 图像加密 混沌映射 置乱 扩散 密码分析攻击
下载PDF
对DES类密码体制的差分密码分析
3
作者 Eli Biham Adi Shamir 罗昭武 《信息安全与通信保密》 1991年第3期59-67,共9页
在民用场合,数据加密标准(DES)是最为有名的密码体制,而且己经被人们广泛使用。在七十年代中期,DES由IBM公司提出,并被美国国家标准局采用。从公开的文献看,到目前为止,DES已经成功地经受住了各种已发表的密码攻击。本文提出一种新的密... 在民用场合,数据加密标准(DES)是最为有名的密码体制,而且己经被人们广泛使用。在七十年代中期,DES由IBM公司提出,并被美国国家标准局采用。从公开的文献看,到目前为止,DES已经成功地经受住了各种已发表的密码攻击。本文提出一种新的密码分析攻击法。在个人计算机上,这种攻击能够在几分钟内破开八圈以下的DES,并且破开十五圈以下DES的速度也比穷尽搜索来得快。这种新的攻击法适用于大量DES类型的替换/置乱密码体制,同时也显示出(尚未公开的)密码设计原则的重要作用。 展开更多
关键词 密码体制 DES 差分密码分析 密码分析攻击 子密钥 密码攻击 个人计算机 异或门 破开 数据加密标准
原文传递
Cryptanalysis of Cryptosystems Based on General Linear Group 被引量:1
4
作者 Jianwei Jia Jinhui Liu Huanguo Zhang 《China Communications》 SCIE CSCD 2016年第6期217-224,共8页
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai... Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work. 展开更多
关键词 CRYPTOGRAPHY post quantum computational cryptography CRYPTANALYSIS non-abelian algebraic structures linear equations
下载PDF
An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things 被引量:1
5
作者 LI Wei TAO Zhi +4 位作者 GU Dawu SUN Li QU Bo LIU Zhiqiang LIU Ya 《China Communications》 SCIE CSCD 2014年第6期129-139,共11页
Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of ... Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network(SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems. 展开更多
关键词 internet of things CRYPTANALYSIS differential fault analysis serpent.
下载PDF
A NEW METHOD FOR RESYNCHRONIZATION ATTACK
6
作者 Chen Jie Wang Baocang Hu Yupu 《Journal of Electronics(China)》 2006年第3期423-427,共5页
This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degr... This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(2^17), and that of 0(2^67) for LILI-128. 展开更多
关键词 Stream ciphers Resynchronization attack Algebraic attacks Differential cryptanalysis Computational complexity
下载PDF
Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks
7
作者 Meng-zhou GAO Dong-qin FENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第9期1098-1111,共14页
Security issues in networked control systems(NCSs) have received increasing attention in recent years.However, security protection often requires extra energy consumption, computational overhead, and time delays,whi... Security issues in networked control systems(NCSs) have received increasing attention in recent years.However, security protection often requires extra energy consumption, computational overhead, and time delays,which could adversely affect the real-time and energy-limited system. In this paper, random cryptographic protection is implemented. It is less expensive with respect to computational overhead, time, and energy consumption,compared with persistent cryptographic protection. Under the consideration of weak attackers who have little system knowledge, ungenerous attacking capability and the desire for stealthiness and random zero-measurement attacks are introduced as the malicious modification of measurements into zero signals. NCS is modeled as a stochastic system with two correlated Bernoulli distributed stochastic variables for implementation of random cryptographic protection and occurrence of random zero-measurement attacks; the stochastic stability can be analyzed using a linear matrix inequality(LMI) approach. The proposed stochastic stability analysis can help determine the proper probability of running random cryptographic protection against random zero-measurement attacks with a certain probability. Finally, a simulation example is presented based on a vertical take-off and landing(VTOL) system. The results show the effectiveness, robustness, and application of the proposed method, and are helpful in choosing the proper protection mechanism taking into account the time delay and in determining the system sampling period to increase the resistance against such attacks. 展开更多
关键词 Networked control systems Security Cyber attacks Stochastic stability Cryptographic protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部