一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內容
驗證碼

一種結合離散混沌映射和Feistel網絡的分組加密算法

彭軍 廖曉峰 岡本栄司 張偉 李學明

彭軍, 廖曉峰, 岡本栄司, 張偉, 李學明. 一種結合離散混沌映射和Feistel網絡的分組加密算法[J]. 電子與信息學報, 2006, 28(4): 707-711.
引用本文: 彭軍, 廖曉峰, 岡本栄司, 張偉, 李學明. 一種結合離散混沌映射和Feistel網絡的分組加密算法[J]. 電子與信息學報, 2006, 28(4): 707-711.
Peng Jun, Liao Xiao-Feng, Okamoto Eiji, Zhang Wei, Li Xue-Ming. A Block Encryption Algorithm Combined with the Discrete Chaotic Map and Feistel Network[J]. Journal of Electronics & Information Technology, 2006, 28(4): 707-711.
Citation: Peng Jun, Liao Xiao-Feng, Okamoto Eiji, Zhang Wei, Li Xue-Ming. A Block Encryption Algorithm Combined with the Discrete Chaotic Map and Feistel Network[J]. Journal of Electronics & Information Technology, 2006, 28(4): 707-711.

一種結合離散混沌映射和Feistel網絡的分組加密算法

A Block Encryption Algorithm Combined with the Discrete Chaotic Map and Feistel Network

  • 摘要: 論文提出了一種新穎的結合一維離散混沌映射與Feistel網絡結構的分組密碼算法(CFCEA)。分組長度為64 bit,密鑰長度為128bit,并使用了一個128bit長的輔助密鑰。在輪函數(shù)中用Logistic混沌映射和3個代數(shù)群算子進行混合運算,此外還特別設計了子密鑰生成算法。對CFCEA的密碼學特性進行了分析,結果表明該算法具有嚴格的雪崩效應,擴散性能和擾亂性能理想。并且算法在64bit分組長度下差分概率和線性概率的理論上界分別近似為2-52.92和2-49.206,具備抵抗一定強度的差分和線性密碼分析的能力。
  • Pecora L M, Carroll T L. Synchronization in chaotic systems[J].Phys. Rev. Lett.1990, 64(8):821-824[2]Pecora L M, Carroll T L. Driving systems with chaotic signals[J].Phys. Rev. A.1991, 44(4):2374-2383[3]Matthews R. On the derivation of a chaotic encryption algorithm.Cryptologia, 1989, XIII (1): 29-42.[4]Yang T, Wu C W, Chua L O. Cryptography based on chaotic systems[J].IEEE Trans. on CAS-I.1997, 44(5):469-472[5]Sivaprakasam S, Shore K A. Message encoding and decoding using chaotic external-cavity diode lasers[J].IEEE Journal of Quantum Electronics.2000, 36(1):35-39[6]Habutsu T, Nishio Y, Sasase I, et al.. A secret cryptosystem by iterating a chaotic map[J].Advance in cryptology - EUROCRYPT91, Berlin, Springer-Verlag.1991, LNCS 547:127-140[7]Erdmann D, Murphy S. Henon stream cipher[J].Electronics Letters.1992, 28(9):893-895[8]Chen H C, Yen J C. A new cryptography system and its VLSI realization[J].Journal of Systems Architecture.2003, 49(7-9):355-367[9]Kocarev L, Jakimoski G. Logistic map as a block encryption algorithm[J].Phys. Lett. A.2001, 289 (4-5):199-206[10]Jakimoski G, Kocarev L. Chaos and cryptography: block encryption ciphers based on chaotic maps[J].IEEE Trans. on CAS-I.2001, 48(2):163-169[11]Pareek N K, Patidar V, Sud K K. Discrete chaotic cryptography using external key. Phys. Lett. A. 2003, 309 (1-2): 75-82.[12]Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps[J].Int. J. Bifurcation and Chaos.1998, 8(6):1259-1284[13]Salleh M, Ibrahim S, Isnin I F. Enhanced chaotic image encryption algorithm based on Baker's map. ISCAS03, Bangkok Thailand, May 2003, Vol.2: 25-28.[14]Chen G R, Mao Y B and Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos, Solitons Fractals.2004, 21(3):749-761[15]Feigenbaum M J. Quantitative universality for a class of nonlinear transformations[J].Journal of Statistical Physics.1978,19(1):25-52[16]Lai X, Massey J L. A proposal for a new block encryptionstandard. Advances in Cryptology - EUROCRYPT90, Berlin Springer-Verlag, 1991, LNCS 473, 389-404.[17]Merkle R C. Fast software encryption functions[J].Advances in Cryptology - CRYPT090, Springer-Verlag, Berlin.1991, LNCS 537:476-501[18]GOST R 34.11-94, Gosudarstvennyi Standard of Russian Federation. Information technology, cryptographic data security, hashing function. Government Committee of the Russia for Standards, 1994.[19]Shannon C E. Communication theory of secrecy system. The Bell System Technical Journal, 1949, 28(4): 656-715.[20]Kocarev L. Chaos-based cryptography: A brief overview. IEEE Trans. on CAS-I, 2001, 1(3): 6-21.[21]Feistel H. Cryptography and computer privacy. Scientific American, 1973, 228(5): 15-23.[22]Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems[J].Advances in Cryptology - CRYPTO90, Berlin Springer-Verlag.1991, LNCS 537:2-21[23]Biham E, Shamir A. Differential cryptanalysis of the data encryption standard. Berlin Springer-Verlag, 1993.[24]Matsui M. Linear cryptanalysis method for DES cipher[J].Advances in Cryptology-EUROCRYPT93, Berlin Springer- Verlag.1994, LNCS 765:386-397[25]Nyberg K, Knudsen L. Provable security against a differential attack. Journal of Cryptology, 1995, 8(1): 27-37.
  • 加載中
計量
  • 文章訪問數(shù):  2665
  • HTML全文瀏覽量:  86
  • PDF下載量:  1020
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2004-08-23
  • 修回日期:  2005-01-04
  • 刊出日期:  2006-04-19

目錄

    /

    返回文章
    返回