期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Security research with Square attack to a variant Camellia cipher
1
作者 Xiangyang XU Guangsheng ZHANG 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2010年第4期482-487,共6页
This paper investigates the relation between the choice of S-boxes and Square attack.A variant Camellia,which uses only a single S-box instead of four,is proposed.The security of the variant Camellia against Square at... This paper investigates the relation between the choice of S-boxes and Square attack.A variant Camellia,which uses only a single S-box instead of four,is proposed.The security of the variant Camellia against Square attack is studied in detail.Result shows that it needs only 28 chosen plaintexts to recover a byte of the 6th round-key of variant Camellias,while the original Camellia needs either 28 chosen plaintexts to recover a byte of the 6th round-key and a byte of some constant or 216 chosen plaintexts to recover a byte of the 6th roundkey.Furthermore,Square attacks on other round-reduced variant Camellia are proposed,and the time complexity of 11-round attack is reduced from 2^(250)to 2^(225.5).The weaker variant Camellia indicates that the choice of S-box and the order of different S-boxes have influence on Square attack. 展开更多
关键词 block cipher camellia square attack
原文传递
对于5轮Camellia密码的Square攻击 被引量:3
2
作者 贺也平 吴文玲 卿斯汉 《中国科学院研究生院学报》 CAS CSCD 2001年第2期177-180,共4页
讨论了Square方法对于Camellia密码的攻击 .结果表明 ,Square方法是攻击Camellia密码最有效的方法之一 .Camellia密码是欧洲NESSIE密码计划中 ,分组密码候选加密算法之一 .它是 1 2 8比特密码分组 ,支持 1 2 8、1 92和 2 5
关键词 分组密码 camellia密码 square攻击 ∧集 网络安全 加密算法 比特密钥
下载PDF
变种Camellia对Square攻击的安全性 被引量:2
3
作者 李清玲 李超 《应用科学学报》 CAS CSCD 北大核心 2006年第5期485-490,共6页
讨论了Camellia1对Square攻击的安全性,并就FL/FL-1函数对Camellia与Camellia1抗Square攻击能力的影响进行了分析.结果表明Camellia1对Square攻击的安全性远大于Camellia,FL/FL-1函数中的比特循环移位运算对Camellia及Camellia1抗Squar... 讨论了Camellia1对Square攻击的安全性,并就FL/FL-1函数对Camellia与Camellia1抗Square攻击能力的影响进行了分析.结果表明Camellia1对Square攻击的安全性远大于Camellia,FL/FL-1函数中的比特循环移位运算对Camellia及Camellia1抗Square攻击的能力并无明显影响。 展开更多
关键词 分组密码 camellia算法 square攻击
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部