期刊文献+
共找到44篇文章
< 1 2 3 >
每页显示 20 50 100
轻量S盒密码性质研究 被引量:6
1
作者 贾平 徐洪 戚文峰 《密码学报》 CSCD 2015年第6期497-504,共8页
S盒是对称密码算法中的重要组成部分,作为主要的非线性部件,其密码性质的好坏直接影响到整体算法的安全性.差分均匀度和线性度(非线性度)是衡量S盒密码性质的两个基本指标,它们分别刻画了S盒抵抗差分密码分析和线性密码分析的能力,并且... S盒是对称密码算法中的重要组成部分,作为主要的非线性部件,其密码性质的好坏直接影响到整体算法的安全性.差分均匀度和线性度(非线性度)是衡量S盒密码性质的两个基本指标,它们分别刻画了S盒抵抗差分密码分析和线性密码分析的能力,并且在仿射变换下保持不变.由于硬件成本限制,轻量密码算法通常采用4比特S盒,其差分均匀度和线性度的下界为4,达到下界的S盒称为最优S盒,Leander等将它们分成了16个仿射等价类.在此基础上,我们对现有典型轻量算法中的S盒按仿射等价关系进行了分类.为了对抗多差分分析、多线性分析及各种变形攻击方法的威胁,还希望S盒具有最大差分概率的差分对个数、具有最优线性逼近关系的掩码个数越少越好,有时甚至需要对单比特输入输出的差分特征和线性特征做更细致的分析,因此我们进一步对上述各轻量S盒达最大差分概率的差分对个数、具有最优线性逼近关系的掩码个数、单比特输入输出差分特征和单比特线性逼近关系的个数,以及单比特情况下的差分均匀度和线性度进行了详细的分析和统计,上述结论可为相关轻量密码算法的分析提供重要的理论依据. 展开更多
关键词 S盒 密码算法 仿射等价 差分均匀度 线性度
下载PDF
25轮T-TWINE-128的中间相遇攻击
2
作者 刘亚 刘采玥 +1 位作者 颜勇 曲博 《小型微型计算机系统》 CSCD 北大核心 2024年第5期1228-1234,共7页
T-TWINE-128是基于广义Feistel结构的轻量级可调分组密码,密钥长度为128比特,加密的数据块大小为64比特.由于轻量级分组密码在设计时为了追求更高的软硬件实现效率,往往会牺牲部分安全性,因此必须评估其安全强度.本文通过计算机编程得到... T-TWINE-128是基于广义Feistel结构的轻量级可调分组密码,密钥长度为128比特,加密的数据块大小为64比特.由于轻量级分组密码在设计时为了追求更高的软硬件实现效率,往往会牺牲部分安全性,因此必须评估其安全强度.本文通过计算机编程得到了T-TWINE-128的轮密钥的一些线性关系,再结合调柄值生成算法的特性,利用区分器自动搜索算法,搜索出11轮T-TWINE-128的中间相遇攻击区分器,在此区分器前面接5轮,后面接9轮,形成25轮T-TWINE-128的中间相遇攻击路径,整个攻击过程共耗时652.39ms,攻击需要数据、时间和存储复杂度分别为256个选择明文、2126.41次加密、265个64比特块;最后搜索密钥编排算法的冗余性发现T-TWINE-128很难进行更高轮中间相遇攻击. 展开更多
关键词 T-TWINE 中间相遇攻击 可调分组密码 自动搜索算法
下载PDF
基于NFSR的分组密码算法SPRING 被引量:7
3
作者 田甜 戚文峰 +1 位作者 叶晨东 谢晓锋 《密码学报》 CSCD 2019年第6期815-834,共20页
本文详细介绍分组密码算法SPRING的设计.根据分组长度和密钥长度的不同,SPRING具体包括三个算法版本SPRING-128-128、SPRING-128-256、SPRING-256-256,其中SPRING-n-m表示分组长度为n且密钥长度为m.SPRING是SP结构的分组密码,主要面向... 本文详细介绍分组密码算法SPRING的设计.根据分组长度和密钥长度的不同,SPRING具体包括三个算法版本SPRING-128-128、SPRING-128-256、SPRING-256-256,其中SPRING-n-m表示分组长度为n且密钥长度为m.SPRING是SP结构的分组密码,主要面向硬件实现设计,采用基于非线性反馈移位寄存器(NFSR)的32-比特S-盒和基于非线性反馈移位寄存器的密钥扩展算法.由于没有S-盒的存储,SPRING算法的硬件实现面积比较小.根据不同的应用需求,例如面积小或加/解密速率高,可以采用不同的实现方式.基于轮的实现,硬件面积最小,在TSMC 16 nm工艺库下,SPRING-128-128算法的硬件实现面积约1046μm^2;全轮展开实现,加/解密速率最大,SPRING-128-128算法的加密速率可以达到17482 Mbps,此时硬件实现面积约8079μm^2.SPRING的含义为SP结构分组密码和环状串联非线性反馈移位寄存器(A ring-like cascade connection of NFSRs). 展开更多
关键词 分组密码 非线性反馈移位寄存器 密码 SPRING
下载PDF
LiCi分组密码算法的不可能差分分析 被引量:8
4
作者 韦永壮 史佳利 李灵琛 《电子与信息学报》 EI CSCD 北大核心 2019年第7期1610-1617,共8页
LiCi是由Patil等人(2017)提出的轻量级分组密码算法。由于采用新型的设计理念,该算法具有结构紧凑、能耗低、占用芯片面积小等优点,特别适用于资源受限的环境。目前该算法的安全性备受关注,Patil等人声称:16轮简化算法足以抵抗经典的差... LiCi是由Patil等人(2017)提出的轻量级分组密码算法。由于采用新型的设计理念,该算法具有结构紧凑、能耗低、占用芯片面积小等优点,特别适用于资源受限的环境。目前该算法的安全性备受关注,Patil等人声称:16轮简化算法足以抵抗经典的差分攻击及线性攻击。该文基于S盒的差分特征,结合中间相遇思想,构造了一个10轮的不可能差分区分器。基于此区分器,向前后各扩展3轮,并利用密钥编排方案,给出了LiCi的一个16轮的不可能差分分析方法。该攻击需要时间复杂度约为283.08次16轮加密,数据复杂度约为259.76选择明文,存储复杂度约为276.76数据块,这说明16轮简化的LiCi算法无法抵抗不可能差分攻击。 展开更多
关键词 分组密码算法 LiCi算法 不可能差分分析 差分特征
下载PDF
电话拔号盘式全机械密码锁
5
《沿海企业与科技》 2004年第5期58-58,共1页
关键词 电话 拔号盘 全机械密码 密码量
下载PDF
PRESENT的多模型差分错误分析 被引量:1
6
作者 唐明 沈菲 +4 位作者 邓慧 尹鹏 邱镇龙 马啸 张焕国 《计算机工程与科学》 CSCD 北大核心 2011年第10期39-44,共6页
PRESENT密码是一种适用于传感器网络、RFID标签等小规模硬件的轻量加密算法。本文对PRESENT算法的差分错误分析方法进行研究,提出了针对PRESENT密码的四种差分错误模型,并对它们进行分析对比,从而找到针对PRESENT算法最好的差分错误分... PRESENT密码是一种适用于传感器网络、RFID标签等小规模硬件的轻量加密算法。本文对PRESENT算法的差分错误分析方法进行研究,提出了针对PRESENT密码的四种差分错误模型,并对它们进行分析对比,从而找到针对PRESENT算法最好的差分错误分析方法。就我们收集到的现有发表著作显示,此次研究比以往PRESENT的差分错误攻击更为有效。最好结果是,在第28轮和第29轮P置换之间引入8bit随机错误,平均使用17个错误样本分析得到最后一轮64bit白化密钥。 展开更多
关键词 密码分析 差分错误分析 密码 PRESENT密码
下载PDF
减轮SPECK算法的不可能差分分析 被引量:6
7
作者 徐洪 苏鹏晖 戚文峰 《电子与信息学报》 EI CSCD 北大核心 2017年第10期2479-2486,共8页
SPECK系列算法是2013年由美国国家安全局提出的轻量分组密码算法。算法整体为变形的Feistel结构,轮函数为模整数加法、循环移位和异或的组合,即所谓的ARX模块。在不可能差分研究方面,目前仅有LEE等人给出了SPECK 64算法的一些6轮不可能... SPECK系列算法是2013年由美国国家安全局提出的轻量分组密码算法。算法整体为变形的Feistel结构,轮函数为模整数加法、循环移位和异或的组合,即所谓的ARX模块。在不可能差分研究方面,目前仅有LEE等人给出了SPECK 64算法的一些6轮不可能差分特征。该文进一步找到了SPECK 32/64算法和SPECK 48/96算法的一些6轮不可能差分特征,并在其前面添加1轮后面添加3轮,给出了对两个算法的10轮不可能差分分析。 展开更多
关键词 分组密码算法 SPECK算法 不可能差分分析 不可能差分特征
下载PDF
GF(2^(2m))上一个具有轻量硬件实现和已知最优密码学性质的完全置换(英文) 被引量:1
8
作者 唐再良 王明生 《数学进展》 CSCD 北大核心 2017年第1期55-62,共8页
完全置换是在密码算法的设计中广泛适用的特殊置换.在密码应用中,常常要求置换具有低的差分均匀度和高的非线性度,以抵抗差分和线性攻击.在轻量密码算法的应用中,一个置换应当具有低的硬件实现代价.本文在偶数域GF(2^(2m))(m为奇数)上... 完全置换是在密码算法的设计中广泛适用的特殊置换.在密码应用中,常常要求置换具有低的差分均匀度和高的非线性度,以抵抗差分和线性攻击.在轻量密码算法的应用中,一个置换应当具有低的硬件实现代价.本文在偶数域GF(2^(2m))(m为奇数)上给出了一个差分均匀度为4,具有最高非线性度且具有轻量实现代价的完全置换.该置换从域的一个2次子域GF(2~m)的一个置换函数构造而来,这意味该置换具有低的硬件实现代价. 展开更多
关键词 密码S-盒子 差分均匀度 非线性度 密码
原文传递
ANU,ANU-II和LiCi算法的积分区分器搜索 被引量:1
9
作者 王红艳 韦永壮 刘文芬 《小型微型计算机系统》 CSCD 北大核心 2020年第7期1470-1475,共6页
ANU,ANU-II和LiCi算法是近几年相继被提出的新轻量级分组密码算法.由于采用比特级的设计理念,相比于传统字节级更具有结构轻巧、扩散灵活和实现效率高等优点,因而其安全性备受关注.基于以上三个算法的结构特性,构建了新的比特可分性MIL... ANU,ANU-II和LiCi算法是近几年相继被提出的新轻量级分组密码算法.由于采用比特级的设计理念,相比于传统字节级更具有结构轻巧、扩散灵活和实现效率高等优点,因而其安全性备受关注.基于以上三个算法的结构特性,构建了新的比特可分性MILP模型,并给出了ANU,ANU-II和LiCi算法的积分区分器自动化搜索方法.通常而言,区分器轮数的高低能够较好的衡量密码算法的安全性.研究结果表明:ANU,ANU-II和LiCi算法分别存在9轮、8轮和12轮的积分区分器,所需的数据复杂度为263,260和261个选择明文,这是目前已知分析方法中轮数最高和选择明文量最优的区分器结果.另外,提出了一种新的LiCi算法的等价结构. 展开更多
关键词 分组密码算法 ANU ANU-II LiCi 可分性 MILP(混合线性整数规划) 积分区分器
下载PDF
A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States 被引量:2
10
作者 张盛 王剑 +1 位作者 唐朝京 张权 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第8期268-272,共5页
It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocom... It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocombine two or more quantum protocols.To fill this gap,we propose a composed quantum protocol,containing bothquantum identity authentication and quantum key distribution,using squeezed states.Hence,not only the identity canbe verified,but also a new private key can be generated by our new protocol.We also analyze the security under anoptimal attack,and the efficiency,which is defined by the threshold of the tolerant error rate,using Gaussian errorfunction. 展开更多
关键词 quantum key distribution quantum cryptography composed protocol
下载PDF
Quantum Secure Communication Using a Class of Three-Particle W State 被引量:2
11
作者 DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第8期359-362,共4页
A theoretical scheme of quantum secure communication using a class of three-particle W states is proposed. In the scheme,two communicators may communicate after they test the security of the quantum channel.The receiv... A theoretical scheme of quantum secure communication using a class of three-particle W states is proposed. In the scheme,two communicators may communicate after they test the security of the quantum channel.The receiver can obtain the secret message determinately if the quantum channel is safe.The present scheme can be realized without using teleportation. 展开更多
关键词 quantum cryptography quantum secret communication W state
下载PDF
The Braid-Based Bit Commitment Protocol 被引量:1
12
作者 王励成 曹珍富 +1 位作者 曹锋 钱海峰 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期200-204,共5页
With recent advances of quantum computanon, new threats key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought for... With recent advances of quantum computanon, new threats key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought forward the first braid-based bit commitment protocol. The security proof manifests that the proposed protocol is computationally binding and information-theoretically hiding. Furthermore, the proposed protocol is also invulnerable to currently known quantum attacks. 展开更多
关键词 bit commitment braid-based cryptography quantum attacks
下载PDF
Asymmetrical Quantum Encryption Protocol Based on Quantum Search Algorithm 被引量:2
13
作者 LUO Wenjun LIU Guanli 《China Communications》 SCIE CSCD 2014年第9期104-111,共8页
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way f... Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required. 展开更多
关键词 quantum cryptography asymmetrical encryption information-theoreticalsecurity quantum search algorithms
下载PDF
Quantum Dense Coding Without Joint Measurement 被引量:1
14
作者 FANG Xian-Mei GAO Xiao-Bo CAO Zhuo-Liang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第7期33-36,共4页
We propose two schemes for quantum dense coding without Bell states measurement. One is deterministic, the other is probabilistic. In the deterministic scheme, the initial entangled state will be not destructed. In th... We propose two schemes for quantum dense coding without Bell states measurement. One is deterministic, the other is probabilistic. In the deterministic scheme, the initial entangled state will be not destructed. In the proba-bilistic scheme, the initial unknown nonmaximal entangled state will be transformed into a maximal entangled one. Our schemes require two auxiliary particles and perform single-qubit measurements on them. Thus our schemes are simple and economic. 展开更多
关键词 quantum dense coding entangled state single-qubit measurement
下载PDF
Quantum Probabilistic Encryption Scheme Based on Conjugate Coding 被引量:2
15
作者 杨理 向憧 李宝 《China Communications》 SCIE CSCD 2013年第2期19-26,共8页
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp... We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack. 展开更多
关键词 quantum cryptography probabil-istic encryption information-theoretic in-distinguishability
下载PDF
Quantum Secure Direct Communication Using Entangled Photon Pairs and Local Measurement 被引量:2
16
作者 YI Xiao-Jie NIE Yi-You +3 位作者 ZHOU Nan-Run HUANG Yi-Bing HONG Zhi-Hui LI Song-Song 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第7期81-84,共4页
We present a scheme for quantum secure direct communication,in which the message is encoded bylocal unitary operations,transmitted through entangled photons,and deduced from both the sender and receiver's localmea... We present a scheme for quantum secure direct communication,in which the message is encoded bylocal unitary operations,transmitted through entangled photons,and deduced from both the sender and receiver's localmeasurement results.In such a scheme,only one pair of entangled photons is consumed,and there is no need to transmitthe sender's qubit carrying the secret message in a public channel,in order to transmit two-bit classical information. 展开更多
关键词 quantum secure direct communication quantum cryptography information security
下载PDF
减轮SPECK 32/64算法的积分分析
17
作者 苏鹏晖 徐洪 《信息工程大学学报》 2018年第3期343-346,共4页
考虑对SPECK32/64算法的积分分析,找到SPECK 32/64算法的6轮积分区分器,与目前找到的最长零相关特征和最长不可能差分特征的轮数一致。基于找到的6轮积分区分器,在其后面添加3轮,给出对SPECK 32/64算法的9轮积分分析。在对SPECK 32/64... 考虑对SPECK32/64算法的积分分析,找到SPECK 32/64算法的6轮积分区分器,与目前找到的最长零相关特征和最长不可能差分特征的轮数一致。基于找到的6轮积分区分器,在其后面添加3轮,给出对SPECK 32/64算法的9轮积分分析。在对SPECK 32/64算法的分析中,采用部分和技术降低计算复杂度,共需要猜测42比特的子密钥,所需时间复杂度约为263. 5,数据复杂度为231个选择明文。 展开更多
关键词 SPECK算法 分组密码算法 积分分析 积分区分器
下载PDF
Quantum Encryption Protocol Based on Continuous Variable EPR Correlations
18
作者 HE Guang-Qiang ZENG Gui-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第1X期61-64,共4页
A quantum encryption protocol based on Gaussian-modulated continuous variable EPR correlations is proposed. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate opt... A quantum encryption protocol based on Gaussian-modulated continuous variable EPR correlations is proposed. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier (NOPA). For general beam splitter eavesdropping strategy, the mutual information I(α, ε) between Alice and Eve is caJculated by employing Shannon information theory. Finally the security analysis is presented. 展开更多
关键词 quantum cryptography quantum encryption EPR correlations NOPA
下载PDF
Scheme for Quantum Dense Coding with Secret Sharing in Cavity QED
19
作者 ZOU Chang-Lin XUE Zheng-Yuan CAO Zhuo-Liang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第2期365-368,共4页
Quantum dense coding (QDC) is a process originally proposed to send two classical bits information from a sender to a receiver by sending only one qubit. Our scheme of QDC is proposed following some ideas on secret ... Quantum dense coding (QDC) is a process originally proposed to send two classical bits information from a sender to a receiver by sending only one qubit. Our scheme of QDC is proposed following some ideas on secret sharing with entanglement in cavity QED. Based on the theory of secret sharing the QDC process can be more secure. 展开更多
关键词 quantum dense coding quantum secret sharing cavity QED
下载PDF
Quantum Key Distribution Scheme Based on Dense Encoding in Entangled States 被引量:4
20
作者 ZHANGXiao-Long ZHANGYue-Xia GAOKe-Lin 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第4期627-630,共4页
A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the f... A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss. 展开更多
关键词 quantum key distribution dense coding quantum entanglement
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部