期刊文献+
共找到587篇文章
< 1 2 30 >
每页显示 20 50 100
A Novel Framework to Construct S-Box Quantum Circuits Using System Modeling: Application to 4-Bit S-Boxes
1
作者 Yongjin Jeon Seungjun Baek Jongsung Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期545-561,共17页
Quantum computers accelerate many algorithms based on the superposition principle of quantum mechanics.The Grover algorithm provides significant performance to malicious users attacking symmetric key systems.Since the... Quantum computers accelerate many algorithms based on the superposition principle of quantum mechanics.The Grover algorithm provides significant performance to malicious users attacking symmetric key systems.Since the performance of attacks using quantum computers depends on the efficiency of the quantum circuit of the encryption algorithms,research research on the implementation of quantum circuits is essential.This paper presents a new framework to construct quantum circuits of substitution boxes(S-boxes)using system modeling.We model the quantum circuits of S-boxes using two layers:Toffoli and linear layers.We generate vector spaces based on the values of qubits used in the linear layers and apply them to find quantum circuits.The framework finds the circuit bymatching elements of vector spaces generated fromthe input and output of a given S-box,using the forward search or themeet-in-the-middle strategy.We developed a tool to apply this framework to 4-bit S-boxes.While the 4-bit S-box quantum circuit construction tool LIGHTER-R only finds circuits that can be implemented with four qubits,the proposed tool achieves the circuits with five qubits.The proposed tool can find quantum circuits of 4-bit odd permutations based on the controlled NOT,NOT,and Toffoli gates,whereas LIGHTER-R is unable to perform this task in the same environment.We expect this technique to become a critical step toward optimizing S-box quantum circuits. 展开更多
关键词 System modeling quantum circuit s-box circuit quantum computer
下载PDF
A High Efficiency Hardware Implementation of S-Boxes Based on Composite Field for Advanced Encryption Standard
2
作者 Yawen Wang Sini Bin +1 位作者 Shikai Zhu Xiaoting Hu 《Journal of Computer and Communications》 2024年第4期228-246,共19页
The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization... The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization implementation of the S-box is proposed based on the composite field inverse operation in this paper. This proposed S-box implementation is modeled using Verilog language and synthesized using Design Complier software under the premise of ensuring the correctness of the simulation result. The synthesis results show that, compared to several current S-box implementation schemes, the proposed implementation of the S-box significantly reduces the area overhead and critical path delay, then gets higher hardware efficiency. This provides strong support for realizing efficient and compact S-box ASIC designs. 展开更多
关键词 Advanced Encryption Standard (AES) s-box Tower Field Hardware Implementation Application Specific Integration Circuit (ASIC)
下载PDF
A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm
3
作者 Yazeed Yasin Ghadi Mohammed SAlshehri +4 位作者 Sultan Almakdi Oumaima Saidani Nazik Alturki Fawad Masood Muhammad Shahbaz Khan 《Computers, Materials & Continua》 SCIE EI 2023年第10期781-797,共17页
Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal ... Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal role in many symmetric encryption systems.This study introduces an innovative approach to creating S-boxes for encryption algorithms.The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme.The nonlinearity measure of the proposed S-boxes is 112.These qualities significantly enhance its resistance to common cryptographic attacks,ensuring high image data security.Furthermore,to assess the robustness of the S-boxes,an encryption system has also been proposed and the proposed S-boxes have been integrated into the designed encryption system.To validate the effectiveness of the proposed encryption system,a comprehensive security analysis including brute force attack and histogram analysis has been performed.In addition,to determine the level of security during the transmission and storage of digital content,the encryption system’s Number of Pixel Change Rate(NPCR),and Unified Averaged Changed Intensity(UACI)are calculated.The results indicate a 99.71%NPCR and 33.51%UACI.These results demonstrate that the proposed S-boxes offer a significant level of security for digital content throughout its transmission and storage. 展开更多
关键词 s-box CHAOS artificial bee colony image encryption
下载PDF
一种基于Hierarchy LUT的可重构S-box实现方法
4
作者 方震 赵伟 刘勇 《电子技术应用》 2023年第1期41-44,共4页
基于查找表方法构建的Substitution box (S-box)在可重构分组密码实现中广泛使用,然而因消耗的资源过大,其面积利用效率低。为提高可重构S-box面积利用效率,提出一种基于4R/1W存储结构的分层查找表(Hierarchy LUT),构建可重构S-box。所... 基于查找表方法构建的Substitution box (S-box)在可重构分组密码实现中广泛使用,然而因消耗的资源过大,其面积利用效率低。为提高可重构S-box面积利用效率,提出一种基于4R/1W存储结构的分层查找表(Hierarchy LUT),构建可重构S-box。所提出的4R/1W存储结构能减少存储单元的例化数量,提高存储密度。在40nmCMOS工艺下,实现基于HierarchyLUT的可重构S-box,其面积利用效率得到改善,对比TableLookupUnit (TLU)和Memory Sharing的可重构S-box方案,效率分别提高了51.76%和6.88%。 展开更多
关键词 可重构 s-box 4R/1W Hierarchy LUT
下载PDF
A Novel S-Box GenerationMethodology Based on the Optimized GANModel
5
作者 Runlian Zhang Rui Shu +2 位作者 Yongzhuang Wei Hailong Zhang Xiaonian Wu 《Computers, Materials & Continua》 SCIE EI 2023年第8期1911-1927,共17页
S-boxes can be the core component of block ciphers,and how to efficiently generate S-boxes with strong cryptographic properties appears to be an important task in the design of block ciphers.In this work,an optimized ... S-boxes can be the core component of block ciphers,and how to efficiently generate S-boxes with strong cryptographic properties appears to be an important task in the design of block ciphers.In this work,an optimized model based on the generative adversarial network(GAN)is proposed to generate 8-bit S-boxes.The central idea of this optimized model is to use loss function constraints for GAN.More specially,the Advanced Encryption Standard(AES)S-box is used to construct the sample dataset via the affine equivalence property.Then,three models are respectively built and cross-trained to generate 8-bit S-boxes based on three extended frameworks of GAN,i.e.,Deep Convolution Generative Adversarial Networks(DCGAN),Wasserstein Generative Adversarial Networks(WGAN),and WassersteinGenerativeAdversarial NetworkwithGradient Penalty(WGANGP).Besides,an optimized model based onWGAN-GP referred to asWGPIM is also proposed,which adds the loss function constraints to the generator network of the WGAN-GP model,including bijection loss,differential uniformity loss,and nonlinearity loss.In this case,8-bit S-boxes can be generated with cross-training.Experimental results illustrate that the WGP-IM model can generate S-boxes with excellent cryptographic properties.In particular,the optimal differential uniformity of the generated S-boxes can be reduced to 8,and the nonlinearity can be up to 104.Compared with previous S-box generation methods,this new method is simpler and it can generate S-boxes with excellent cryptographic properties. 展开更多
关键词 s-box generative adversarial network loss function affine equivalence
下载PDF
实现AES算法中S-BOX和INV-S-BOX的高效方法 被引量:5
6
作者 韩少男 李晓江 《微电子学》 CAS CSCD 北大核心 2010年第1期103-107,共5页
介绍了AES中的S-BOX和INV-S-BOX的算法原理,分析目前广泛使用的实现S-BOX和INV-S-BOX的三种方法:直接查表法,扩展欧几里德算法和基于复合域GF((22)2)2)的算法。对直接查表法和基于复合域GF((22)2)2)的算法进行改进,提出了两种改进电路... 介绍了AES中的S-BOX和INV-S-BOX的算法原理,分析目前广泛使用的实现S-BOX和INV-S-BOX的三种方法:直接查表法,扩展欧几里德算法和基于复合域GF((22)2)2)的算法。对直接查表法和基于复合域GF((22)2)2)的算法进行改进,提出了两种改进电路结构。通过综合仿真,给出了按照上述方法实现的硬件电路的面积和关键路径上的时间延迟。结果表明,提出的两种新实现方法与传统实现方法相比,电路面积分别有28%和22%的优化。 展开更多
关键词 AES算法 s-box INV-s-box GALOIS FIELD 复合Galois FIELD 乘法逆运算
下载PDF
Rijndael S-box仿射运算研究 被引量:4
7
作者 刘景美 韦宝典 王新梅 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2005年第1期94-97,129,共5页
证明了有限域上q 多项式、n阶矩阵和线性函数间的等价关系;然后通过证明有限域上同一线性函数在严格不同基下对应不同矩阵,扩展出一种通用的方法快速确定有限域上线性函数和n阶矩阵间的线性关系;提出了有限域上q 多项式和n阶矩阵相互确... 证明了有限域上q 多项式、n阶矩阵和线性函数间的等价关系;然后通过证明有限域上同一线性函数在严格不同基下对应不同矩阵,扩展出一种通用的方法快速确定有限域上线性函数和n阶矩阵间的线性关系;提出了有限域上q 多项式和n阶矩阵相互确定的一种新方案,从本质上解释了RijndaelS box代数表达式的简洁性. 展开更多
关键词 AES RIJNDAEL s-box 有限域 q-多项式
下载PDF
一种基于有限域求逆的S-Box实现算法 被引量:2
8
作者 潘宏亮 高德远 +1 位作者 张盛兵 曹良帅 《微电子学与计算机》 CSCD 北大核心 2006年第3期109-111,115,共4页
S-Box是AES密码算法硬件实现的关键,目前主要有两种实现方法:一种是基于查找表,一种是基于有限域求逆。文章首先经过数学变换将有限域GF(28)上的元素映射到有限域GF(24)2上,并把GF(24)2上的一个元素变换为GF(24)上的两个元素的线性运算... S-Box是AES密码算法硬件实现的关键,目前主要有两种实现方法:一种是基于查找表,一种是基于有限域求逆。文章首先经过数学变换将有限域GF(28)上的元素映射到有限域GF(24)2上,并把GF(24)2上的一个元素变换为GF(24)上的两个元素的线性运算。在此基础上,把GF(28)上的求逆问题转化为GF(24)上的求逆,从而提出了一种基于有限域求逆的低硬件开销的S-Box实现算法。该算法和查找表实现相比,面积减少了57%,适用于诸如智能卡、移动设备等对面积要求比较严格的场合。 展开更多
关键词 s-box 逆变换 有限域 查找表
下载PDF
AES的结构及其S-box分析 被引量:14
9
作者 王衍波 《解放军理工大学学报(自然科学版)》 EI 2002年第3期13-17,共5页
分析了 AES的加解密原理和密钥生成器的结构 ,S- box的分布特性。指出了 AES与其密钥生成器之间存在一种结构上的同步性 ,这种同步性可能成为 AES的弱点 ;AES的 S- box具有短周期 ,不具有良好的分布特性。这给 AES的密码分析提供了可能 ... 分析了 AES的加解密原理和密钥生成器的结构 ,S- box的分布特性。指出了 AES与其密钥生成器之间存在一种结构上的同步性 ,这种同步性可能成为 AES的弱点 ;AES的 S- box具有短周期 ,不具有良好的分布特性。这给 AES的密码分析提供了可能 ,也许会成为 AES的致命弱点。 展开更多
关键词 高级数据加密标准(AES) s-box 密钥生成器
下载PDF
一种基于离散混沌系统的S-Box候选算法设计 被引量:1
10
作者 丁文霞 王浩 《国防科技大学学报》 EI CAS CSCD 北大核心 2013年第1期83-88,共6页
S-Box是现行分组密码中唯一的非线性部件,主要提供了分组密码算法中必需的混淆作用,其密码强度决定了整个分组密码的安全强度。为进一步提高S-Box的强度,结合离散混沌系统的内在随机性、有界性、非周期性及对初始条件和参数极度敏感等特... S-Box是现行分组密码中唯一的非线性部件,主要提供了分组密码算法中必需的混淆作用,其密码强度决定了整个分组密码的安全强度。为进一步提高S-Box的强度,结合离散混沌系统的内在随机性、有界性、非周期性及对初始条件和参数极度敏感等特点,提出一种采用多混沌映射和交叉映射生成S-Box的生成算法。实验分析表明,该算法生成的样本密钥敏感性强,随机性好,既能较好地满足S-Box设计所要求的各项准则和特性,安全性高,同时又能降低计算复杂度,提高计算速度,且易于生成和扩展,因而是一种性能良好的S-Box候选算法。 展开更多
关键词 应用密码学 混沌 s-box 严格雪崩准则 输出比特间独立性
下载PDF
AES加密算法中S-BOX的算法与VLSI实现 被引量:1
11
作者 张志峰 林正浩 《计算机工程与应用》 CSCD 北大核心 2006年第19期67-68,共2页
基于GF(24)域映射的方法,采用定制方式完成了AES加密算法中关键部件S-Box的设计与实现。设计上基于中芯国际(SMIC)的0.18滋m1P6M设计工艺,经过电路设计与验证、电路仿真、版图设计与验证、版图后仿真得到最终物理版图实现。经过与基于... 基于GF(24)域映射的方法,采用定制方式完成了AES加密算法中关键部件S-Box的设计与实现。设计上基于中芯国际(SMIC)的0.18滋m1P6M设计工艺,经过电路设计与验证、电路仿真、版图设计与验证、版图后仿真得到最终物理版图实现。经过与基于自动综合和布局布线得到的设计的时延和面积的比较,证明该设计是有效的。 展开更多
关键词 AES s-box 定制
下载PDF
用Dillon方法构造完全bent型S-Box
12
作者 王章雄 《成都信息工程学院学报》 2006年第3期454-456,共3页
bent函数是一类具有良好密码特性的编码组合函数,而S-box既可以对块密码的明文也可以在流密码中作为对密钥流的加密装置。将bent的优良性质带入S-box是一个很有意义的研究课题。以前用函数序列半群和置换群来构造bent型S-box。现通过陪... bent函数是一类具有良好密码特性的编码组合函数,而S-box既可以对块密码的明文也可以在流密码中作为对密钥流的加密装置。将bent的优良性质带入S-box是一个很有意义的研究课题。以前用函数序列半群和置换群来构造bent型S-box。现通过陪集方法得到bent函数组,又利用适当的指标函数来构造S-box,使得其中任意一个部分组的非零线性组合仍然是bent函数,从而保证S-box的输出端具有很高的密码强度。 展开更多
关键词 BENT函数 完全bent型s-box Walsh-Hadamard矩阵 平衡函数 陪集
下载PDF
基于均匀化混沌系统的S-Box生成算法
13
作者 黄慧芳 《数据挖掘》 2018年第3期104-111,共8页
该文给出了一个新的二次多项式混沌系统,并基于系统的概率密度函数对其进行均匀化处理。基于均匀化后的混沌系统构造了新的S-Box生成算法。对生成的S-Box进行性能检测,包括双射特性,非线性度,差分概率(DP)和线性概率(LP)分析,结果表明... 该文给出了一个新的二次多项式混沌系统,并基于系统的概率密度函数对其进行均匀化处理。基于均匀化后的混沌系统构造了新的S-Box生成算法。对生成的S-Box进行性能检测,包括双射特性,非线性度,差分概率(DP)和线性概率(LP)分析,结果表明本文均匀化后混沌系统产生的S-Box具有较好的密码特性,适合用于加密系统。 展开更多
关键词 混沌系统 均匀化 s-box 差分概率 线性概率
下载PDF
AES算法中S-box和列混合单元的优化及FPGA实现 被引量:2
14
作者 夏克维 李冰 《现代电子技术》 2009年第24期11-14,共4页
由于AES算法的硬件实现较为复杂,在此提出一种优化算法中S-box和列混合单元的方法。其中S-box通过组合和有限域映射的方法进行优化,列混合单元使用算式重组的方法进行优化。这些优化设计通过组合逻辑实现,经过仿真并在Xilinx Spartan 3... 由于AES算法的硬件实现较为复杂,在此提出一种优化算法中S-box和列混合单元的方法。其中S-box通过组合和有限域映射的方法进行优化,列混合单元使用算式重组的方法进行优化。这些优化设计通过组合逻辑实现,经过仿真并在Xilinx Spartan 3系列FPGA上进行综合验证,可以将结构简化,使AES电路面积得到优化,明显节约硬件资源。 展开更多
关键词 AES算法 s-box 列混合 结构优化 FPGA实现
下载PDF
AES加密算法的S-box设计分析及其改进 被引量:2
15
作者 汪培芬 《淮海工学院学报(自然科学版)》 CAS 2014年第4期18-21,共4页
在AES密码设计中,S-box作为实现数据非线性置换的组件有重要地位,其安全性直接影响整个密码的安全性。分析了AES加密算法中S-box的设计原理及其循环迭代周期。指出S-box循环迭代周期都远远小于256的短周期,使AES存在着差分攻击的可能。... 在AES密码设计中,S-box作为实现数据非线性置换的组件有重要地位,其安全性直接影响整个密码的安全性。分析了AES加密算法中S-box的设计原理及其循环迭代周期。指出S-box循环迭代周期都远远小于256的短周期,使AES存在着差分攻击的可能。提出了改进方案,并得到新的S-box。改进的S-box循环迭代周期扩大到256整个空间,提高了算法的安全性。 展开更多
关键词 AES s-box 循环迭代周期
下载PDF
AES加密算法及S-box改进策略 被引量:1
16
作者 翁小杰 宋中山 杨娜 《电脑知识与技术》 2007年第10期63-64,共2页
介绍了高级加密标准AES加密算法的理论基础与实现,详细分析了AES加密算法中S-box的迭代输出周期性,提出了S-box的改进策略,提高了AES算法抗击差分密码分析及线性密码分析的能力。
关键词 AES s-box 仿射变换
下载PDF
An image encryption algorithm based on improved baker transformation and chaotic S-box 被引量:4
17
作者 Xing-Yuan Wang Huai-Huai Sun Hao Gao 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第6期216-225,共10页
The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic sys... The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic system as an encryption key. Specifically, in the image scrambling stage, the algorithm primarily uses an improved baker transform method to process the image. In the image diffusion stage, the algorithm first uses the chaotic S-box method to process the encryption key. Secondly, an exclusive OR(XOR) operation is performed on the image and the encryption key to initially diffuse the image. Finally, the image is again diffused using the method of ortho XOR. Simulation analysis shows that the algorithm can achieve good encryption effect, simple and easy implementation, and good security. In the digital image communication transmission, it has good practical value. 展开更多
关键词 image encryption improved baker transformation chaotic s-box chaotic sequence
下载PDF
基于遗传算法的S-box设计方法研究
18
作者 谷晓辰 丁文霞 《现代电子技术》 2013年第7期101-104,共4页
S-box是分组密码中惟一的非线性部件,它的密码强度决定了整个分组密码的安全强度。提出了一种基于遗传算法的S-box设计方法,并对S-box的双射性、非线性度、严格雪崩准则、输出比特间独立性和差分均匀性进行了测试和分析。分析结果表明,... S-box是分组密码中惟一的非线性部件,它的密码强度决定了整个分组密码的安全强度。提出了一种基于遗传算法的S-box设计方法,并对S-box的双射性、非线性度、严格雪崩准则、输出比特间独立性和差分均匀性进行了测试和分析。分析结果表明,利用该算法产生的S-box具有良好的密码学特性,适合用于开发新的分组密码算法。 展开更多
关键词 s-box 遗传算法 密码学 性能分析
下载PDF
A low-power Rijndael S-Box based on pass transmission gate and composite field arithmetic 被引量:2
19
作者 ZENG Yong-hong ZOU Xue-cheng +1 位作者 LIU Zheng-lin LEI Jian-ming 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第10期1553-1559,共7页
Using composite field arithmetic in Galois field can result in the compact Rijndael S-Box. However, the power con- sumption of this solution is too large to be used in resource-limited embedded systems. A full-custom ... Using composite field arithmetic in Galois field can result in the compact Rijndael S-Box. However, the power con- sumption of this solution is too large to be used in resource-limited embedded systems. A full-custom hardware implementation of composite field S-Box is proposed for these targeted domains in this paper. The minimization of power consumption is implemented by optimizing the architecture of the composite field S-Box and using the pass transmission gate (PTG) to realize the logic functions of S-Box. Power simulations were performed using the netlist extracted from the layout. HSPICE simulation results indicated that the proposed S-Box achieves low power consumption of about 130 μW at 10 MHz using 0.25 μm/2.5 V technology, while the consumptions of the positive polarity reed-muller (PPRM) based S-Box and composite field S-Box based on the conventional CMOS logic style are about 240 μW and 420 μW, respectively. The simulations also showed that the presented S-Box obtains better low-voltage operating property, which is clearly relevant for applications like sensor nodes, smart cards and radio frequency identification (RFID) tags. 展开更多
关键词 Composite field Rijndael s-box FULL-CUSTOM Pass transmission gate (PTG) Low power consumption LOW-VOLTAGE
下载PDF
Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes 被引量:1
20
作者 Xuan-Ping Zhang Rui Guo +2 位作者 Heng-Wei Chen Zhong-Meng Zhao Jia-Yin Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期170-178,共9页
Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusi... Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusion. In this paper, we analyze the defects of this structure based on the example of an article and crack it using a simpler method. To address the defects of the asynchronous encryption structure, a novel encryption scheme is proposed, in which the structure of synchronous substitution and diffusion based on double S-boxes is utilized, so the processes of substitution and diffusion are combined together and the attackers cannot crack the cryptosystem by any of the processes. The simulation results and security analysis show that the proposed encryption scheme is safer and more efficient to expediently use in the real-time system. 展开更多
关键词 image encryption s-box CRACK synchronous substitution and diffusion
下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部