期刊文献+

基于分组密码的认证加密工作模式 被引量:15

Authenticated Encryption Modes Based on Block Ciphers
在线阅读 下载PDF
导出
摘要 近年来认证加密工作模式的研究迅速发展,提出适应各行各业、性能优秀、安全性好、成本低廉且结构简单的认证加密模式已成为必然趋势。基于分组密码的认证加密工作模式是使用分组密码来设计,用以解决用户信息的隐私性和真实性等实际问题的密码方案。由于其具有实现速度快、易于标准化和便于软硬件实现等特点,广泛使用于计算机通信和信息安全等领域。文章主要介绍了基于分组密码的认证加密工作模式及其发展前景。 It is an inevitable trend to provide authentication encryption modes of operation, which satisfy all kinds of requirements, and have good performance such as high-efficiency, high security, low-cost and simple structure. Authenticated encryption modes based on block ciphers provide both privacy and authenticity of users’ information. As they have many good properties: high-speed, easy standardization, high-efficiency in hardware and software implementation, they have been widely used in the field of information security. In this paper, we give a survey on authenticated encryption modes based on block ciphers, and discuss further research trend in the future.
出处 《信息网络安全》 2014年第11期8-17,共10页 Netinfo Security
基金 国家自然科学基金[61271271]
关键词 对称密码学 分组密码 认证加密 可证明安全 symmetric cryptography block cipher authenticated encryption provable security
  • 相关文献

参考文献55

  • 1CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. [EB/OL]http://competitions.cr.yp.to/caesar.hnnl.
  • 2Alizadeh J, Aref M 1k, Bagheri N. JHAE: An authenticated encryption mode based on JH [J]. IACR Cryptology ePrint Archive, 2014: 193-214, available from http://eprint.iacr.org.
  • 3Andreeva E, Bogdanov A. Parallelizable and authenticated online ciphers [C]. Sako K, Sarkar P (Eds.) ASIACRYPT 2013, 8269, 2013: 424-443.
  • 4Andreeva E, Bilgin B, Bogdanov A, et al. APE: authenticated permutation-based encryption for lightweight cryptography [J]. IACIZ Cryptology ePrint Archive, 2013(791), available from http://eprint.iacr.org.
  • 5Aoki K, Yasuda K. The security of the OCB mode of operation without the SPRP assumption [C]. ProvSec 2013, 8209, Springer-Verlag, 2013: 202-220.
  • 6Bertoni G, Daemen J. Permutation based encryption, authentication and authenticated encryption [J]. DIAC 2012, available from http://www. hyperelliptic.org.
  • 7Bellare M, Desai A, Jokipii E, et al. A Concrete Security treatment of symmetric encryption [C]. In Proceedings of the 38th symposiun on FOCS, IEEE, 1997: 394-403.
  • 8Bertoni G, Daemen J, Peeters M, et al. Duplexing the sponge: Single- pass authenticated encryption and other applications [C]. SAC 2011 , Springer, 2011: 320-337.
  • 9Bogdanov A, Mendel F, Regazzoni F. ALE: AES-based lightweight authenticated encryption [C]. In Fast Software Encryption, FSE 2013, Lecture Notes in Computer Science, Moriai S (ed.), Springer-Verlag, 2013.
  • 10Bellare M, Namprempre C. Authenticated encryption: Relations among notions and analysis of the genetic composition paradigm [C]. In Proc. ASIACRYPT, Okamoto T, Ed. Berlin, Germany: Springer-Verlag, 1976. 2000: 531-545.

同被引文献63

  • 1刘益和,沈昌祥.一个信息安全函数及应用模型[J].计算机辅助设计与图形学学报,2005,17(12):2734-2738. 被引量:7
  • 2Suh G E, Devadas S. Physical unclonable functions for device authentication and secret key generation[C]//Proceedings of the 44th annual Design Automation Conference. ACM, 2007: 9-14.
  • 3Wang Y, Yu W, Wu S, et al. Flash memory for ubiquitous hardware security functions: true random number generation and device fingerprints[C]//Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 2012: 33-47.
  • 4Van Herrewege A, van der Leest V, Schaller A, et al. Secure PRNG seeding on commercial off-the-shelfmicrocontrollers[C]//Proceedings of the 3rd international workshop on Trustworthy embedded devices. ACM, 2013: 55-64.
  • 5Roel M. Physically unclonable functions: Constructions, properties and applications[D]. Ph.D. thesis, Dissertation, University of KU Leuven, 2012.
  • 6Reardon J, Capkun S, Basin D A. Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory[C]//USENIX Security Symposium. 2012: 333-348.
  • 7Xu S Q, Yu W, Suh G E, et al. Understanding sources of variations in flash memory for physical unclonable functions[C]//Memory Workshop (IMW), 2014 IEEE 6th International. IEEE, 2014: 1-4.
  • 8文晓阳,高能,夏鲁宁,荆继武.高效的验证码识别技术与验证码分类思想[J].计算机工程,2009,35(8):186-188. 被引量:26
  • 9袁红林,胡爱群.射频指纹的产生机理与惟一性[J].东南大学学报(自然科学版),2009,39(2):230-233. 被引量:22
  • 10徐洪波,李颖华.DES加密算法在保护文件传输中数据安全的应用[J].信息网络安全,2009(6):24-26. 被引量:12

引证文献15

二级引证文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部