期刊文献+
共找到128篇文章
< 1 2 7 >
每页显示 20 50 100
Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers 被引量:2
1
作者 Wenqin Cao Wentao Zhang 《Cybersecurity》 EI CSCD 2021年第1期501-518,共18页
For block ciphers,Bogdanov et al.found that there are some linear approximations satisfying that their biases are deterministically invariant under key difference.This property is called key difference invariant bias.... For block ciphers,Bogdanov et al.found that there are some linear approximations satisfying that their biases are deterministically invariant under key difference.This property is called key difference invariant bias.Based on this property,Bogdanov et al.proposed a related-key statistical distinguisher and turned it into key-recovery attacks on LBlock and TWINE-128.In this paper,we propose a new related-key model by combining multidimensional linear cryptanalysis with key difference invariant bias.The main theoretical advantage is that our new model does not depend on statistical independence of linear approximations.We demonstrate our cryptanalysis technique by performing key recovery attacks on LBlock and TWINE-128.By using the relations of the involved round keys to reduce the number of guessed subkey bits.Moreover,the partial-compression technique is used to reduce the time complexity.We can recover the master key of LBlock up to 25 rounds with about 260.4 distinct known plaintexts,278.85 time complexity and 261 bytes of memory requirements.Our attack can recover the master key of TWINE-128 up to 28 rounds with about 261.5 distinct known plaintexts,2126.15 time complexity and 261 bytes of memory requirements.The results are the currently best ones on cryptanalysis of LBlock and TWINE-128. 展开更多
关键词 Key-alternating cipher Key difference invariant bias Multidimensional linear cryptanalysis Lblock TWINE
原文传递
Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers
2
作者 Wenqin Cao Wentao Zhang 《Cybersecurity》 EI CSCD 2022年第1期10-27,共18页
For block ciphers,Bogdanov et al.found that there are some linear approximations satisfying that their biases are deterministically invariant under key difference.This property is called key difference invariant bias.... For block ciphers,Bogdanov et al.found that there are some linear approximations satisfying that their biases are deterministically invariant under key difference.This property is called key difference invariant bias.Based on this property,Bogdanov et al.proposed a related-key statistical distinguisher and turned it into key-recovery attacks on LBlock and TWINE-128.In this paper,we propose a new related-key model by combining multidimensional linear cryptanalysis with key difference invariant bias.The main theoretical advantage is that our new model does not depend on statistical independence of linear approximations.We demonstrate our cryptanalysis technique by performing key recovery attacks on LBlock and TWINE-128.By using the relations of the involved round keys to reduce the number of guessed subkey bits.Moreover,the partial-compression technique is used to reduce the time complexity.We can recover the master key of LBlock up to 25 rounds with about 2^(60.4)distinct known plaintexts,2^(78.85)time complexity and 2^(61)bytes of memory requirements.Our attack can recover the master key of TWINE-128 up to 28 rounds with about 2^(61.5)distinct known plaintexts,2^(126.15)time complexity and 261 bytes of memory requirements.The results are the currently best ones on cryptanalysis of LBlock and TWINE-128. 展开更多
关键词 Key-alternating cipher Key difference invariant bias Multidimensional linear cryptanalysis Lblock TWINE
原文传递
Linear cryptanalysis of NUSH block cipher 被引量:2
3
作者 吴文玲 冯登国 《Science in China(Series F)》 2002年第1期59-67,共9页
NUSH is a block cipher as a candidate for NESSIE. NUSH is analyzed by linear crypt-analysis . The complexity δ = (ε , η) of the attack consists of data complexity ε and time complexity η. Three linear approximati... NUSH is a block cipher as a candidate for NESSIE. NUSH is analyzed by linear crypt-analysis . The complexity δ = (ε , η) of the attack consists of data complexity ε and time complexity η. Three linear approximations are used to analyze NUSH with 64-bit block. When |K| = 128 bits, the complexities of three attacks are (258, 2124), (260, 278) and (262, 255) respectively. When |K| = 192 bits, the complexities of three attacks are (258, 2157) (260, 2%) and (262, 258) respectively. When |K| = 256 bits, the complexities of three attacks are (258, 2125), (260, 278) and (262, 253) respectively. Three linear approximations are used to analyze NUSH with 128-bit block. When |K|= 128 bits, the complexities of three attacks are (2122, 295), (2124, 257) and (2126, 252) respectively. When |K| = 192 bits, the complexities of three attacks are (2122, 2142), (2124, 275) and (2126, 258) respectively. When |K|= 256 bits, the complexities of three attacks are (2122, 2168), (2124, 281) and (2126, 264) respectively. Two linear approximations are used to analyze NUSH with 256-bit block. When |K|= 128 bits, the complexities of two attacks are (2252, 2122) and (2254, 2119) respectively. When |K|= 192 bits, the complexities of two attacks are (2252, 2181) and (2254, 2177) respectively. When |K|=256 bits, the complexities of two attacks are (2252, 2240) and (2254, 2219) respectively. These results show that NUSH is not immune to linear cryptanalysis, and longer key cannot enhance the security of NUSH. 展开更多
关键词 block cipher linear cryptanalysis linear approximation.
原文传递
Improved Linear Attacks on the Chinese Block Cipher Standard 被引量:4
4
作者 刘明洁 陈佳哲 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第6期1123-1133,共11页
The block cipher used in the Chinese Wireless LAN Standard (WAPI), SMS4, was recently renamed as SM4, and became the block cipher standard issued by the Chinese government. This paper gives a method for finding the ... The block cipher used in the Chinese Wireless LAN Standard (WAPI), SMS4, was recently renamed as SM4, and became the block cipher standard issued by the Chinese government. This paper gives a method for finding the linear approximations of SMS4. With this method, 19-round one-dimensional approximations are given, which are used to improve the previous linear cryptanalysis of SMS4. The 19-round approximations hold with bias 2-62.27; we use one of them to leverage a linear attack on 23-round SMS4. Our attack improves the previous 23-round attacks by reducing the time complexity. Furthermore, the data complexity of our attack is further improved by the multidimensional linear approach. 展开更多
关键词 block cipher SMS4 linear cryptanalysis multidimensional linear cryptanalysis
原文传递
ANALYSIS OF MINIMUM NUMBERS OF LINEARLY ACTIVE S-BOXES OF A CLASS OF GENERALIZED FEISTEL BLOCK CIPHERS
5
作者 Xiaopei GUO Kejian XU +1 位作者 Tongsen SUN Xiubin FAN 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2012年第5期1014-1031,共18页
For a class of generalized Feistel block ciphers, an explicit formula for the minimum numbers of linearly active S-boxes of any round r is presented.
关键词 block cipher generalized Feistel structure linear spread value the minimum number oflinearly active S-boxes.
原文传递
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON 被引量:4
6
作者 于晓丽 吴文玲 +3 位作者 石振青 张建 张蕾 汪艳凤 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第6期1358-1369,共12页
In June 2013, the U.S. National Security Agency proposed two families of lightweight block ciphers, called SIMON and SPECK respectively. These ciphers are designed to perform excellently on both hardware and software ... In June 2013, the U.S. National Security Agency proposed two families of lightweight block ciphers, called SIMON and SPECK respectively. These ciphers are designed to perform excellently on both hardware and software platforms. In this paper, we mainly present zero-correlation linear cryptanalysis on various versions of SIMON. Firstly, by using miss- in-the-middle approach, we construct zero-correlation linear distinguishers of SIMON, and zero-correlation linear attacks are presented based oi1 careful analysis of key recovery phase. Secondly, multidimensional zero-correlation linear attacks are used to reduce the data complexity. Our zero-correlation linear attacks perform better than impossible differential attacks proposed by Abed et al. in ePrint Report 2013/568. Finally, we also use the divide-and-conquer technique to improve the results of linear cryptanalysis proposed by Javad et al. in ePrint Report 2013/663. 展开更多
关键词 lightweight block cipher SIMON linear cryptanalysis ZERO-CORRELATION dual property
原文传递
Improved Linear Cryptanalysis of CAST-256
7
作者 赵静远 王美琴 温隆 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第6期1134-1139,共6页
CAST-256, a first-round AES (Advanced Encryption Standard) candidate, is designed based on CAST-128. It is a 48-round Generalized-Feistel-Network cipher with ]28-bit block accepting 128, 160, 192, 224 or 256 bits ke... CAST-256, a first-round AES (Advanced Encryption Standard) candidate, is designed based on CAST-128. It is a 48-round Generalized-Feistel-Network cipher with ]28-bit block accepting 128, 160, 192, 224 or 256 bits keys. Its S-boxes are non-surjective with 8-bit input and 32-bit output. Wang et al. identified a 21-round linear approximation and gave a key recovery attack on 24-round CAST-256. In ASIACRYPT 2012, Bogdanov et al. presented the multidimensional zero-correlation linear cryptanalysis of 28 rounds of CAST-256. By observing the property of the concatenation of forward quad-round and reverse quad-round and choosing the proper active round function, we construct a linear approximation of 26-round CAST-256 and recover partial key information on 32 rounds of CAST-256. Our result is the best attack according to the number of rounds for CAST-256 without weak-key assumption so far. 展开更多
关键词 CAST-256 linear cryptanalysis block cipher Generalized-Feistel-Network
原文传递
Algebraic attacks on two kinds of special nonlinear filter generators
8
作者 杨文峰 Hu Yupu Qiu Hua 《High Technology Letters》 EI CAS 2012年第2期151-154,共4页
This letter proposes algebraic attacks on two kinds of nonlinear filter generators with symmetric Boolean functions as the filter fimctions. Different fxom the classical algebraic attacks, the proposed attacks take th... This letter proposes algebraic attacks on two kinds of nonlinear filter generators with symmetric Boolean functions as the filter fimctions. Different fxom the classical algebraic attacks, the proposed attacks take the advantage of the combinational property of a linear feedback shift register (LFSR) and the symmetric Boolean function to obtain a tow-degree algebraic relation, and hence the complexities of the proposed attacks are independent of the algebraic immunity (AI) of the filter functions. It is shown that improper combining of the LFSR with the filter function can make the filter generator suffer from algebraic attacks. As a result, the bits of the LFSR must be selected properly to input the filter function with large AI in order to withstand the proposed algebraic attacks. 展开更多
关键词 stream cipher linear feedback shift register (LFSR) Boolean function algebraic attack cryptanalysis
下载PDF
对LBlock算法的多重零相关线性分析 被引量:4
9
作者 罗芳 周学广 欧庆于 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2014年第5期173-179,共7页
为了降低对LBlock进行零相关线性分析所需的数据复杂度,提出了对LBlock进行多重零相关线性分析的方法,证明了14轮LBlock存在26条零相关线性逼近,并给出了其具体构造.利用26条14轮零相关线性逼近为区分器,并基于正态分布的概率计算模型... 为了降低对LBlock进行零相关线性分析所需的数据复杂度,提出了对LBlock进行多重零相关线性分析的方法,证明了14轮LBlock存在26条零相关线性逼近,并给出了其具体构造.利用26条14轮零相关线性逼近为区分器,并基于正态分布的概率计算模型对22轮LBlock进行了多重零相关线性攻击,攻击的数据复杂度约为263.45个已知明文,计算复杂度约为276.27次22轮LBlock加密,成功实施攻击的概率为0.85.结果表明,该方法有效解决了需要利用整个明文空间对LBlock进行零相关线性分析的问题. 展开更多
关键词 轻量级分组密码 Lblock算法 多重零相关线性逼近 密码分析 数据复杂度
下载PDF
CS-CIPHER两个变体的线性密码分析 被引量:4
10
作者 吴文玲 卿斯汉 《电子学报》 EI CAS CSCD 北大核心 2002年第2期283-285,共3页
CS CIPHER是NESSIE公布的 17个候选算法之一 ,它的分组长度为 6 4 比特 .本文对CS CIPHER的两个变体进行了线性密码分析 .对第一个变体的攻击成功率约为 78 5 % ,数据复杂度为 2 52 ,处理复杂度为 2 3 2 .对第二个变体的攻击成功率约为... CS CIPHER是NESSIE公布的 17个候选算法之一 ,它的分组长度为 6 4 比特 .本文对CS CIPHER的两个变体进行了线性密码分析 .对第一个变体的攻击成功率约为 78 5 % ,数据复杂度为 2 52 ,处理复杂度为 2 3 2 .对第二个变体的攻击成功率约为 78 5 % ,数据复杂度为 2 52 ,处理复杂度为 2 112 . 展开更多
关键词 分组密码 线性密码分析 保密通信 CS-cipher
下载PDF
多维零相关线性分析模型的改进及在23轮LBlock-s算法中的应用
11
作者 李灵琛 吴文玲 汪艳凤 《计算机学报》 EI CSCD 北大核心 2017年第5期1192-1202,共11页
基于相关性为零的线性逼近的多维零相关线性密码分析是目前最重要的分组密码分析手段之一.该文主要对多维零相关线性分析模型的密钥恢复阶段进行了深入的研究,通过定义等价密钥的距离来刻画等价密钥在压缩表达式中的位置关系,进一步约... 基于相关性为零的线性逼近的多维零相关线性密码分析是目前最重要的分组密码分析手段之一.该文主要对多维零相关线性分析模型的密钥恢复阶段进行了深入的研究,通过定义等价密钥的距离来刻画等价密钥在压缩表达式中的位置关系,进一步约简区分器候选集合同时优化密钥猜测顺序,从而改进了原有的多维零相关线性分析的攻击模型.改进的模型首先找到所有最长的多维零相关线性区分器,然后利用密钥编排算法求得密钥恢复阶段所涉及的独立猜测密钥量,以此筛选区分器候选集合.最后,根据等价密钥的距离对候选区分器进行再次筛选,同时得到相应的密钥猜测顺序.LBlock-s算法是CAESAR竞赛中所提交的认证加密算法LAC的核心分组算法.与Lblock算法不同,LBlock-s采用具有更快混淆速度的密钥编排算法.基于改进的优化模型,该文分析了该算法抵抗多维零相关线性攻击的能力.研究表明,攻击23轮LBlock-s算法所需的数据复杂度为2^(62.3)个选择明文,时间复杂度为2^(73.75)次23轮LBlock-s加密,存储复杂度为2^(56)字节.这是目前针对LBlock-s算法的最优攻击结果. 展开更多
关键词 分组密码 Lblock-s 多维零相关线性分析 逐步压缩技术 等价密钥
下载PDF
A New Block-Predictor Corrector Algorithm for the Solution of y’’’=f(x, y, y’, y’’)
12
作者 Adetola O. Adesanya Mfon O. Udo Adam M. Alkali 《American Journal of Computational Mathematics》 2012年第4期341-344,共4页
We consider direct solution to third order ordinary differential equations in this paper. Method of collection and interpolation of the power series approximant of single variable is considered to derive a linear mult... We consider direct solution to third order ordinary differential equations in this paper. Method of collection and interpolation of the power series approximant of single variable is considered to derive a linear multistep method (LMM) with continuous coefficient. Block method was later adopted to generate the independent solution at selected grid points. The properties of the block viz: order, zero stability and stability region are investigated. Our method was tested on third order ordinary differential equation and found to give better result when compared with existing methods. 展开更多
关键词 COLLECTION INTERPOLATION Power Series APPROXIMANT linear MULTISTEP Continuous COEFFICIENT block Method
下载PDF
从线性校验子分析方法浅析曾肯成先生的密码分析思想
13
作者 冯登国 《密码学报(中英文)》 CSCD 北大核心 2024年第2期255-262,共8页
曾肯成先生于1986年洞察到了密码体制中的熵漏现象,后来在此基础上提出著名的线性校验子分析方法.本文全面剖析了线性校验子分析方法的发展历程,由此深刻揭示了曾先生的密码分析思想的精髓.首先,介绍曾先生通过观察Geffe序列生成器的熵... 曾肯成先生于1986年洞察到了密码体制中的熵漏现象,后来在此基础上提出著名的线性校验子分析方法.本文全面剖析了线性校验子分析方法的发展历程,由此深刻揭示了曾先生的密码分析思想的精髓.首先,介绍曾先生通过观察Geffe序列生成器的熵漏现象,提出线性校验子分析方法的朴素思想的过程及其蕴含的思想方法;其次,介绍曾先生通过在Geffe序列生成器基础上凝练出的一般问题,提出解决这一问题的一般方法—线性校验子分析方法的过程及其蕴含的思想方法;再次,介绍曾先生通过分析线性校验子分析方法存在的缺陷,进一步完善和改进线性校验子分析方法的过程及其蕴含的思想方法;最后,通过分析从相关分析方法到线性校验子分析方法的进阶之路,阐述了线性校验子分析方法这把利剑的威力. 展开更多
关键词 序列密码 密码分析 线性校验子分析方法 相关分析方法 择多原理
下载PDF
两类动态密码结构抵抗不可能差分和零相关线性能力评估 被引量:1
14
作者 沈璇 刘国强 +1 位作者 孙兵 何俊 《电子学报》 EI CAS CSCD 北大核心 2024年第3期709-718,共10页
动态密码的设计与分析是当前密码学领域研究的热点.本文针对类CLEFIA动态密码结构和四分组CLEFIA变换簇抵抗不可能差分和零相关线性分析的能力进行评估.当两类动态密码结构的轮函数为双射时,通过研究密码组件的可交换性质,证明了这两类... 动态密码的设计与分析是当前密码学领域研究的热点.本文针对类CLEFIA动态密码结构和四分组CLEFIA变换簇抵抗不可能差分和零相关线性分析的能力进行评估.当两类动态密码结构的轮函数为双射时,通过研究密码组件的可交换性质,证明了这两类动态密码结构各自置换等价于标准静态密码结构.利用建立的置换等价关系,通过构造静态密码结构不可能差分和零相关线性区分器,证明了4n轮类CLEFIA动态密码结构所有结构均存在8轮的不可能差分和零相关线性区分器,证明了4n轮四分组CLEFIA变换簇所有结构均存在9轮的不可能差分和零相关线性区分器. 展开更多
关键词 分组密码 动态密码 类CLEFIA动态密码结构 四分组CLEFIA变换簇 不可能差分 零相关线性
下载PDF
基于MILP对轻量级密码算法FBC-128的差分分析
15
作者 赵琪 樊婷 韦永壮 《电子学报》 EI CAS CSCD 北大核心 2024年第6期1896-1902,共7页
FBC(Feistel-based Block Cipher)是入围全国密码算法设计竞赛第二轮的轻量级分组密码.由于它具备算法结构简洁、安全性高及软硬件实现性能卓越等优点,备受业界广泛关注.FBC密码算法的数据分组长度和密钥长度至少为128比特,记为FBC-128... FBC(Feistel-based Block Cipher)是入围全国密码算法设计竞赛第二轮的轻量级分组密码.由于它具备算法结构简洁、安全性高及软硬件实现性能卓越等优点,备受业界广泛关注.FBC密码算法的数据分组长度和密钥长度至少为128比特,记为FBC-128.目前对FBC-128算法差分攻击的最好结果是12轮,时间复杂度为293.41次加密,数据复杂度为2122个选择明文对.然而,FBC算法是否存在更长的差分区分器,能否对其进行更高轮数的密钥恢复攻击仍有待解决.本文基于混合整数线性规划(MILP)的自动化搜索方法,提出了“分段统计法”来求解FBC-128的差分特征.实验测试结果表明:FBC-128存在15轮差分区分器,其概率为2-121.然后将其向后扩展1轮,对16轮FBC-128算法发起密钥恢复攻击,其数据复杂度为2121个选择明文数据量,时间复杂度为292.68次加密.与已有结果相比,差分区分器和密钥恢复攻击都提升了4轮,并且所需的数据复杂度和时间复杂度更低. 展开更多
关键词 自动化分析 混合整数线性规划 分组密码算法 差分区分器 密钥恢复攻击 FBC算法
下载PDF
CLEFIA动态密码结构的零相关线性区分器构造研究
16
作者 沈霞民 熊涛 +1 位作者 李华 沈璇 《信息网络安全》 CSCD 北大核心 2024年第6期948-958,共11页
随着分组密码应用研究的不断深入,研究者发现,“动态可变”分组密码设计可有效提升分组密码算法的应用灵活性和部署安全性。CLEFIA算法遵循“动态可变”思想,一些学者对CLEFIA算法的线性变换层加以改进,使得第6t(t≥1)轮中的扩散层可以... 随着分组密码应用研究的不断深入,研究者发现,“动态可变”分组密码设计可有效提升分组密码算法的应用灵活性和部署安全性。CLEFIA算法遵循“动态可变”思想,一些学者对CLEFIA算法的线性变换层加以改进,使得第6t(t≥1)轮中的扩散层可以从{0,1}4上的多个线性双射变换中任意选取。为分析评估CLEFIA动态密码结构的安全性能,文章主要采取零相关线性分析理论,利用中间相错技术和矩阵表示方法,分析构造CLEFIA动态密码结构的零相关线性区分器。研究证明,在轮函数为双射的前提条件下,CLEFIA动态密码结构动态线性层控制参数μ_(i)∈F_(2),(0≤i≤4)无论取何值,总存在8轮零相关线性区分器;当控制参数μ_(0)=0时,存在9轮零相关线性区分器。 展开更多
关键词 分组密码 CLEFIA动态密码结构 零相关线性分析 中间相错技术 矩阵表示
下载PDF
Camellia算法更精确的差分和线性安全界
17
作者 王一博 龚萍 +3 位作者 苗旭东 董新锋 杨明帅 张文政 《通信技术》 2024年第8期855-860,共6页
Camellia算法的线性扩散层是8阶字节级(0,1)-矩阵。由于该矩阵的分组较宽且异或项数较多,因此难以建立精确的字节级自动化分析评估模型。目前,仅利用线性扩散矩阵分支数为5的性质评估出的算法得到的差分和线性活跃S盒偏少。针对以上问题... Camellia算法的线性扩散层是8阶字节级(0,1)-矩阵。由于该矩阵的分组较宽且异或项数较多,因此难以建立精确的字节级自动化分析评估模型。目前,仅利用线性扩散矩阵分支数为5的性质评估出的算法得到的差分和线性活跃S盒偏少。针对以上问题,提出了一种基于混合整数线性规划(Mixed Integer Linear Programming,MILP)来建立复杂(0,1)-线性扩散矩阵字节级评估模型的通用方法。该方法利用线性扩散矩阵的内部性质快速且较精确地搜索出Camellia算法的差分和线性活跃S盒,从而能够得到Camellia算法更紧致的差分和线性安全界。该方法对基于(0,1)-线性扩散矩阵设计的密码算法有一定的指导意义,能够更清楚地评估出算法的安全界。 展开更多
关键词 线性扩散层 差分活跃S盒 线性活跃S盒 MILP 分组密码算法
下载PDF
2轮Trivium的多线性密码分析 被引量:8
18
作者 贾艳艳 胡予濮 +1 位作者 杨文峰 高军涛 《电子与信息学报》 EI CSCD 北大核心 2011年第1期223-227,共5页
作为欧洲流密码发展计划eSTREAM的7个最终获选算法之一,Trivium的安全性考察表明至今为止还没有出现有效的攻击算法。该文针对2轮Trivium,通过找出更多线性逼近方程,对其进行了多线性密码分析,提出了一种更有效的区分攻击算法。与现有... 作为欧洲流密码发展计划eSTREAM的7个最终获选算法之一,Trivium的安全性考察表明至今为止还没有出现有效的攻击算法。该文针对2轮Trivium,通过找出更多线性逼近方程,对其进行了多线性密码分析,提出了一种更有效的区分攻击算法。与现有的单线性密码分析算法相比,该算法攻击成功所需的数据量明显减少,即:若能找到n个线性近似方程,在达到相同攻击成功概率的前提下,多线性密码分析所需的数据量只有单线性密码分析的1/n。该研究结果表明,Trivium的设计还存在一定的缺陷,投入实用之前还需要实施进一步的安全性分析。 展开更多
关键词 密码学 流密码 密码分析 Trivium 线性近似
下载PDF
一类广义Feistel密码的安全性评估 被引量:18
19
作者 吴文玲 贺也平 《电子与信息学报》 EI CSCD 北大核心 2002年第9期1177-1184,共8页
该文评估一类广义Feistel密码(GFC)抵抗差分和线性密码分析的能力:如果轮函数是双射且它的最大差分和线性特征的概率分别是p和q,则16轮GFC的差分和线性特征的概率的上界为p^7和q^7;如果轮函数采用SP结构且是双射,S盒的最大差分和线性特... 该文评估一类广义Feistel密码(GFC)抵抗差分和线性密码分析的能力:如果轮函数是双射且它的最大差分和线性特征的概率分别是p和q,则16轮GFC的差分和线性特征的概率的上界为p^7和q^7;如果轮函数采用SP结构且是双射,S盒的最大差分和线性特征的概率是ps和qs,P变换的分支数为Pd,则16轮GFC的差分和线性特征的概率的上界为(ps)^(3Pd+1)和(qs)^(3Pd+1)。 展开更多
关键词 差分密码分析 线性密码分析 分支数 Feistel密码 安全性
下载PDF
嵌套Feistel结构的SP型分组密码的可证明安全性 被引量:6
20
作者 张文涛 卿斯汉 吴文玲 《计算机研究与发展》 EI CSCD 北大核心 2004年第8期1389-1397,共9页
给出一个嵌套Feistel结构的SP型分组密码的模型及其抵抗差分密码分析和线性密码分析的可证明安全性 ,所获得的结果主要基于对SP型密码的可证明安全性的一个推广性结果的证明 依照模型 。
关键词 分组密码 Feistel型网络 SP型网络 差分密码分析 线性密码分析 可证明安全性
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部