摘要
修改分组密码IDEA轮函数中的模乘运算,得到一种新的轮函数。对基于此种新轮函数的一种迭代型分组密码进行了差分密码分析。数值试验证实HDEA的DC有用差分的概率均低于HDEA0的相应差分概率。迭代次数足够大的HDEA能抵抗差分密码分析攻击;在8bitCPU环境下软件加密时,24轮HDEA与8轮IDEA的数据加密速率相近,抗差分密码分析的能力大致相同。
By modifying the multiplication modulo 65 537 of 16 bit integer in round construction of the block cipher IDEA, a new round function is obtained. A differential cryptanalysis of the iterated block cipher based on the new round function is presented. The numerical analysis proves that the probabilities of the DC useful' differential of HDEA are lower than those of HDEA0. It is concluded that HDEA with a large enough iteration number can resist the attack of differential cryptanalysis; and that to encrypt software under environment of 8 bit CPU, the encrypting speed of the 24 round HDEA is close to that of the 8 round IDEA, and their abilities to resist the differential cryptanalysis are comparative.
出处
《西南交通大学学报》
EI
CSCD
北大核心
1998年第6期611-616,共6页
Journal of Southwest Jiaotong University