期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
多中心的基于密钥策略的属性加密方案的安全性分析
1
作者 何凯 庞浩霖 付有才 《东莞理工学院学报》 2022年第3期38-42,共5页
多中心的属性基加密(ABE)系统能够减少属性基加密系统对单中心的依赖,其中每个中心实体管理一组属性集合,并为拥有其属性的用户颁发相应的私钥。最近,Zhang等人提出了一种改进的隐私保护的多中心的密钥策略的属性基加密方案,其声称方案... 多中心的属性基加密(ABE)系统能够减少属性基加密系统对单中心的依赖,其中每个中心实体管理一组属性集合,并为拥有其属性的用户颁发相应的私钥。最近,Zhang等人提出了一种改进的隐私保护的多中心的密钥策略的属性基加密方案,其声称方案能够抵抗用户合谋攻击,并在判定双线性迪菲-赫尔曼假设下证明了其方案是安全的。然而,我们发现其方案不能抵抗合谋攻击,并对其方案给出了具体的攻击过程。 展开更多
关键词 密码安全分析 多中心化基于属性加密 隐私保护 访问控制
下载PDF
基于时间相关单光子计数技术的密码芯片光辐射分析 被引量:3
2
作者 王红胜 纪道刚 +5 位作者 高艳磊 张阳 陈开颜 陈军广 吴令安 王永仲 《物理学报》 SCIE EI CAS CSCD 北大核心 2015年第5期414-420,共7页
密码芯片运行时的光辐射可泄露其操作和数据的重要特征信息.基于单光子探测技术,设计并构建了针对CMOS半导体集成电路芯片光辐射信号的采集、传输、处理和分析的光电实验系统.以AT89C52单片机作为实验对象,采用时间相关单光子计数技术,... 密码芯片运行时的光辐射可泄露其操作和数据的重要特征信息.基于单光子探测技术,设计并构建了针对CMOS半导体集成电路芯片光辐射信号的采集、传输、处理和分析的光电实验系统.以AT89C52单片机作为实验对象,采用时间相关单光子计数技术,对不同工作电压下密码芯片的光辐射强度进行了对比,分析了芯片指令级光辐射信息的操作依赖性和数据依赖性.此外,使用示波器对时间相关单光子计数技术在芯片光辐射分析上的可行性进行了验证.实验结果表明,采用时间相关单光子计数技术对密码芯片进行光辐射分析,是一种直接有效的中低等代价光旁路分析攻击手段,对密码芯片的安全构成了严重的现实威胁. 展开更多
关键词 密码芯片安全分析 旁路攻击 时间相关单光子计数 光辐射的操作/数据依赖性
原文传递
Security Analysis and Enhanced Design of a Dynamic Block Cipher 被引量:3
3
作者 ZHAO Guosheng WANG Jian 《China Communications》 SCIE CSCD 2016年第1期150-160,共11页
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o... There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement. 展开更多
关键词 cryptography block cipher encryption algorithm safety analysis
下载PDF
Novel Hyper-Combined Public Key Based Cloud Storage Key Management Scheme
4
作者 SONG Ningning CHEN Yucyun 《China Communications》 SCIE CSCD 2014年第A02期185-194,共10页
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme... In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system 展开更多
关键词 cloud storage hyperelliptic curve combined public key key management hiddenmapping
下载PDF
Unified Impossible Differentia Cryptanalysis of ARIA
5
作者 Xue Weijia Lai Xuejia 《China Communications》 SCIE CSCD 2012年第8期129-134,共6页
Unified Irrpossible Differential (UID) cryptanalysis is a systeimtic method for finding impossible differentials for block ciphers. Regarding to the problem of automatically retrieving the impossible differential ch... Unified Irrpossible Differential (UID) cryptanalysis is a systeimtic method for finding impossible differentials for block ciphers. Regarding to the problem of automatically retrieving the impossible differential characteristics of block ciphers, with the use of particular intermediate difference state expression, UID gets the same or better results compared with other present cryptanalysis results. ARIA is a Korean block cipher expecting that there are no impossible differentials on four or rmre rounds. Based on a property of the Diffusion layer (DL) of ARIA, a specific selection is used before conflict searching to optimize. UID is applied to ARIA, and 6 721 impossible differential chains are found. The length of those chains is four rounds, the same as eisting results, but more varied in form Moreover, ARIA is a Substitution-Penmtation Network (SPN), not a Feistel structure or generalized Feistel structure as UID was applied to before. 展开更多
关键词 impossle differential cryptanalysis unified impossble differential ARIA block cipher
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部