一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

一種基于完全性的不可能差分區(qū)分器構(gòu)造方法

李俊志 關(guān)杰

李俊志, 關(guān)杰. 一種基于完全性的不可能差分區(qū)分器構(gòu)造方法[J]. 電子與信息學報, 2018, 40(2): 430-437. doi: 10.11999/JEIT170422
引用本文: 李俊志, 關(guān)杰. 一種基于完全性的不可能差分區(qū)分器構(gòu)造方法[J]. 電子與信息學報, 2018, 40(2): 430-437. doi: 10.11999/JEIT170422
LI Junzhi, GUAN Jie . A Method of Constructing Impossible Differential Distinguishers Based on Completeness[J]. Journal of Electronics & Information Technology, 2018, 40(2): 430-437. doi: 10.11999/JEIT170422
Citation: LI Junzhi, GUAN Jie . A Method of Constructing Impossible Differential Distinguishers Based on Completeness[J]. Journal of Electronics & Information Technology, 2018, 40(2): 430-437. doi: 10.11999/JEIT170422

一種基于完全性的不可能差分區(qū)分器構(gòu)造方法

doi: 10.11999/JEIT170422
基金項目: 

國家自然科學基金(61572516, 61272041, 61272488)

A Method of Constructing Impossible Differential Distinguishers Based on Completeness

Funds: 

The National Natural Science Foundation of China (61572516, 61272041, 61272488)

  • 摘要: 基于混合運算的密碼算法(MOC)以安全性高、軟硬件實現(xiàn)效率高等特點受到人們的廣泛關(guān)注。完全性指輸出的每一比特都包含有輸入每一比特的信息,達到完全性是密碼算法設(shè)計的一個基本原則。該文提出針對MOC算法完全性分析的通用算法,并在此基礎(chǔ)上提出利用完全性尋找MOC算法的不可能差分區(qū)分器的方法,此構(gòu)造方法可直接給出MOC算法高重量的不可能差分區(qū)分器且搜索效率高,為MOC算法不可能差分區(qū)分器的實際構(gòu)造提供了理論指導(dǎo)和技術(shù)支持。應(yīng)用此方法找到了SIMON系列算法全部現(xiàn)有的最長不可能差分區(qū)分器,并找到了SPECK系列算法更多的不可能差分區(qū)分器。
  • WU Wenling, ZHANG Wentao, and FENG Dengguo. Impossible differential cryptanalysis of reduced-round ARIA and Camellia[J]. Journal of Computer Science and Technology, 2007, 22(3): 449-456. doi: 10.1007/s11390-007- 9056-0.
    付立仕, 金晨輝. MIBS-80的13輪不可能差分分析[J]. 電子與信息學報, 2016, 38(4): 848-855. doi: 10.11999/JEIT150673.
    FU Lishi and JIN Chenhui. Impossible differential cryptanalysis on 13-round MIBS-80[J]. Journal of Electronics Information Technology, 2016, 38(4): 848-855. doi: 10.11999/JEIT150673.
    唐學海, 李超, 王美一, 等. 3D密碼的不可能差分攻擊[J]. 電子與信息學報, 2010, 32(10): 2516-2520. doi: 10.3724/SP.J. 1146.2009.01375.
    TANG Xuehai, LI Chao, WANG Meiyi, et al. Impossible differential attack on 3D cipher[J]. Journal of Electronics Information Technology, 2010, 32(10): 2516-2520. doi: 10.3724/SP.J.1146.2009.01375.
    張凱. 基于混合運算密碼模型的安全性研究[D]. [博士論文], 信息工程大學, 2016.
    ZHANG Kai. Research on the security evaluation against mixed operation based cipher model[D]. [Ph.D. dissertation], Information Engineering University, 2016.
    HONG D, SUNG J, HONG S, et al. HIGHT: A new block cipher suitable for low-resource device[C]. International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, 2006: 46-59. doi: 10.1007/11894063_4.
    BEAULIEU R, TREATMAN-CLARK S, SHORS D, et al. The SIMON and SPECK lightweight block ciphers[C]. 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), Texas, 2015: 1-6. doi: 10.1145/2744769.2747946.
    BIHAM E, BIRYUKOV A, and SHAMIR A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials [C]. International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech, 1999: 12-23. doi: 10.1007/3-540-48910-X_2.
    National Security Agency. Skipjack and KEA algorithm specifications, Version 2.0.[OL]. http: scrc.nist.gov/ Crypto Toolkit/skipjack/skipjack-kea.htm. 1998.
    BIHAM E, DUNKELMAN O, and KELLER N. Related-key impossible differential attacks on 8-round AES-192[C]. Topics in Cryptology-CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, 2006: 21-33. doi: 10.1007/11605805_2.
    CHEN J, WANG M, and PRENEEL B. Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT[C]. International Conference on Cryptology in Africa. Ifrance, Morocco, 2012: 117-137. doi: 10.1007/978-3-642-31410-0_8.
    SUN Siwei, HU Lei, WANG Peng, et al. Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers[C]. International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 2014: 158-178. doi: 10.1007 /978-3-662-45611-8_9.
    李俊志. 三類非線性反饋移存器模型的代數(shù)性質(zhì)研究及應(yīng)用[D]. [碩士論文], 信息工程大學, 2015.
    LI Junzhi. Algebraic properties and applications on three non-linear feedback models[D]. [Master. dissertation], Information Engineering University, 2015.
    金晨輝, 鄭浩然, 張少武, 等. 密碼學[M]. 北京: 高等教育出版社, 2009: 166-167.
    JIN Chenhui, ZHENG Haoran, ZHANG Shaowu, et al. Cryptography[M]. Beijing: Higher Education Press, 2009: 166-167.
  • 加載中
計量
  • 文章訪問數(shù):  1360
  • HTML全文瀏覽量:  218
  • PDF下載量:  145
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2017-05-08
  • 修回日期:  2017-09-26
  • 刊出日期:  2018-02-19

目錄

    /

    返回文章
    返回