期刊文献+

MDS矩阵和对合MDS矩阵的新构造方法 被引量:4

New construction methods for MDS matrices and involution MDS matrices
在线阅读 下载PDF
导出
摘要 首先对Lacan等人给出的由Vandermonde矩阵构造MDS码的方法进行了研究,指出了其中存在的问题,给出了由两个Vandermonde矩阵构造MDS矩阵的充要条件;然后利用矩阵乘的方法,给出了由标量乘Vandermonde矩阵构造MDS矩阵的充要条件;最后在Sajadieh等人给出的由两个Vandermonde矩阵构造对合MDS矩阵方法的基础之上,给出了标量乘Vandermonde矩阵构造对合MDS矩阵的方法。对标量乘矩阵来讲,可以通过调控标量中分量的大小来调整标量乘矩阵元素大小和元素重量大小来满足其软、硬件实现性能,因此该构造MDS矩阵及对合MDS矩阵的方法具有实用价值。 Firstly this paper studied the method of constructing MDS codes by Vandermonde matrices proposed by Lacan et al and point out the problems existing in this method, and proposed the necessary and sufficient conditions of constructing MDS matrices by two Vandermonde matrices. Then, using the method of matrix multiplication, this paper proposed the necessary and sufficient conditions of constructing MDS matrices by scalar multiplication Vandermonde matrices. Finally, based on the method of constructing involution MDS matrices from two Vandermonde matrices proposed by Sajadieh et al, this paper proposed the method of constructing involution MDS matrices by scalar multiplication Vandermonde matrices. For scalar multiplication matrices, it could adjust elements size and weight in scalar multiplication matrices through regulating the size of scalar components to meet the implementation performance of software and hardware. So the methods of constructing MDS matrices and involution MDS matrices have practical value.
出处 《计算机应用研究》 CSCD 北大核心 2014年第1期222-225,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(6127041)
关键词 分组密码 扩散结构 分支数 MDS矩阵 VANDERMONDE矩阵 block cipher diffusion structure branch number MDS(maximum distance separable) matrices Vandermonde matrices
  • 相关文献

参考文献13

  • 1DAEMEN J, RIJMEN V. The wide trail design strategy[ C]//Proc of the 8th IAM International Conference Cirencester. Berlin: Springer- Verlag, 2001: 222-238.
  • 2RIJMEN V, DAEMEN J, PRENEEL B,et al. The cipher SHARK [ C]//Proc of Fast Software Encryption-FSE. [S. l. ] : Springer-Ver- lag, 1996 : 99-111.
  • 3JU S K, SEOKHIE H, SANGJIN L, et al. Practical and provable se- curity against differential and linear cryptanalysis for substitution-per- mutation networks[J]. ETRI Journal, 2001, 23(4) : 158-167.
  • 4DAEMEN J, RHMEN V. The design of Rijndael : AES-the advanced encryption standard [ M ]. Berlin : Springer-Verlag, 2002.
  • 5BARRETO P, RIJMEN V. The Khazad legacy-level block cipher [ EB/OL ]. (2000) [ 2006-12-03 ]. http ://www. cryptonessie, org.
  • 6JEROME L, JEROME F. Systematic MDS erasure codes based on vandermonde matrices[ J]. IEEE Communications Letters, 2004, 8(9) : 570-572.
  • 7MATHUR C N, NARAYNA K, SUBBALAKSHMI K P. High diffusion cipher: encryption and error correction in a single cryptographic primi- tive [ C ]/!LNCS, vol 3989. Berlin : Springer-Verlag,2006:309- 324.
  • 8XIAO L,HEYS H M, Hardware design and analysis of block cipher com- ponents [ C ]//Proc of the 5th International Conference on Information Se- curity and Cryptology-ICISC. Berlin :Springer-Verlag,2003 : 164-181.
  • 9JORGE N J,eLCIO A.A new involutory MDS matrix for the AES[J]. International Journal of Net Work Security, 2009,9 (2) : 109-116.
  • 10崔霆,金晨辉.对合Cauchy-Hadamard型MDS矩阵的构造[J].电子与信息学报,2010,32(2):500-503. 被引量:15

二级参考文献9

  • 1王念平,金晨辉,余昭平.对合型列混合变换的研究[J].电子学报,2005,33(10):1917-1920. 被引量:10
  • 2Schneier B, Kelsey J, and Whiting D, et al.. Twofish: A 128-bit block cipher. Available at http://www.schneier.com/, 2007-2-2.
  • 3Wang Mei-qin. Differential cryptanalysis of present. Cryptology ePrint Archive, Report 2007/408.
  • 4Wu Wen-ling, Zhang Wen-tao, and Feng Deng-guo. Impossible differential cryptanalysis of reduce round ARIA and camellia. Journal of Computer Science and Technology, 2007, 22(3): 449-456.
  • 5Daemen J. Cipher and hash function design strategies based on linear and differential cryptanalysis. [Ph.D. dissertation], KU, Leuven, 1995.
  • 6Kang Ju-sung, Hong Seokhie, and Lee Sangjin, et al.. Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks. ETRI Journal, 2001, 23(4): 158-167.
  • 7Xiao L and Heys H. Hardware design and analysis of block cipher components. Proceedings of the 5th International Conference on Information Security and Cryptology- ICISC'02, 2003 LNCS 2587: 164-181.
  • 8Youssef A, Mister S, and Tavares S. On the design of linear transformations for substitution permutation encryption networks. Workshop on Selected Areas in Cryptography- SAC'97, Ottawa, Workshop record, 1997: 40-48.
  • 9Blomer J, Kalfane M, and Karpinski M, et al.. An Xor-based erasure-resilient coding scheme. Technical Report TR-95-048. International Computer Science Institute, August 1995.

共引文献14

同被引文献14

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部