期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Akelarre分组密码算法的奇偶校验分析
1
作者 张聪娥 刘军霞 《计算机工程》 CAS CSCD 北大核心 2011年第16期111-113,共3页
Akelarre分组密码算法的圈函数和循环移位操作使其输入输出的奇偶性保持不变,明文和密文间存在一个形式简单的关系式,从而降低算法安全性。为此,提出一种可对任意轮数的Akelarre分组密码算法进行攻击的奇偶校验分析方法。结果表明,该方... Akelarre分组密码算法的圈函数和循环移位操作使其输入输出的奇偶性保持不变,明文和密文间存在一个形式简单的关系式,从而降低算法安全性。为此,提出一种可对任意轮数的Akelarre分组密码算法进行攻击的奇偶校验分析方法。结果表明,该方法在穷举量约为241时,能恢复出输入输出变换的子密钥信息以及密文对应的明文信息。 展开更多
关键词 Akelarre分组密码 穷举量 奇偶校验分析 加密算法
下载PDF
Confidential Procedure Model:a Method for Quantifying Confidentiality Leakage 被引量:1
2
作者 Zhang Yong Li Xiangxue +2 位作者 Zhou Yuan Li Zhibin Qian Haifeng 《China Communications》 SCIE CSCD 2012年第11期117-126,共10页
In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality lo... In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality loss is formalized as a dynamic procedure, instead of a static function, and described via the "waterfall" diagram; 2) confidentiality loss is quantified in a relative manner, i.e., taken as a quantitative metric, the ratio of the conditional entropy being reserved after observing the entropy of the original full confidential information; 3) the optimal attacks including exhaustive attacks as well as all possible attacks that have (or have not even) been discovered, are taken into account when defining the novel concept of the confidential degree. To elucidate the proposed model, we analyze the information leakage in side-channel attacks and the anonymity of DC-net in a quantitative manner. 展开更多
关键词 CONFIDENTIALITY quantitative analysis perfect secrecy side-channel attack ANONYMITY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部