期刊文献+

AES密码分析的若干新进展 被引量:31

Some New Developments on the Cryptanalysis of AES
在线阅读 下载PDF
导出
摘要 20 0 1年 11月 ,美国国家标准和技术研究所 (NIST)确定Rijndael算法为新的数据加密标准 高级数据加密标准 (AES) .AES的密码分析是目前最受注目的一个研究问题 .本综述介绍AES密码分析的一些新进展 :包括积分密码分析 ,功耗分析和代数攻击等 .作者就目前国内外的研究现状作了评述 ,并提出了AES密码分析的一些研究方向 。 Rijndael has been selected by NIST to become the Advanced Encryption Standard(AES)and published as FIPS 197 in November 2001.The cryptanalysis of AES is the most attentive problem at present.In this paper,some new developments on cryptanalysis of AES including Integral Cryptanalysis,Power Analysis and Algebraic Attack are introduced and some potential research ways are presented so as to draw our attention.
出处 《电子学报》 EI CAS CSCD 北大核心 2003年第10期1549-1554,共6页 Acta Electronica Sinica
基金 973项目 (G1 9990 3580 4 ) 武器装备预研基金项目 (51 4 360 30 2 0 1DZ0 1 0 5)
关键词 AES 积分分析 功耗分析 代数攻击 AES integral cryptanalysis power analysis algebraic attack
  • 相关文献

参考文献27

  • 1M Matsui. Linear cryptanalysis method for DES cipher[ A]. Advances in Cryptology, Proceedings of Eurocrypt ' 93 [ C ].Lofthus, Norway:Spfinger-Verlag. 1994.386 - 397.
  • 2J Daemen,L Knudsen, V Rijnmen. The block cipher Square[ A]. Fast So-ftware Encryption, Fourth International Workshop[ C]. Haifa, Israel:Springer-Verlag. 1997.149 - 165.
  • 3L R Knudsen. Block ciphers: state of the art[ R]. Copies of transparencies for lecture at the International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography. Katholieke Unive-rsiteit Leuven, Belgium, 1997.
  • 4Y Hu, Y Zhang, G Xiao. Integral cryptanalysis of SAFER + [ J]. Electroni-es Letters, 1999,35(17) : 1458 - 1459.
  • 5L R Knudsen, D Wagner. Integral cryptanalysis [ EB ]. Available:https://www. cosic. esat. kuleuven, ac. be/nessie.
  • 6N Ferguson, J Kelsey, et al. Improv-ed cryptanalysis of Rijndael[ A].Fast Software Encryption, 7th lnternat-ional Workshop, FSE 2000[ C ].NewYork, USA: Springer-Verlag, 2001.213 - 230.
  • 7T Jakobsen, L Knudsen. The interpolation attack on block ciphers[ A].Fast software encryption, fouth international workshop[ C ]. Haifa, Israel: Springer-Verlag. 1997.28 - 40.
  • 8Paul Kocher, Joshua Jaffe, Benjamin Jun, Introduction to differential power analysis and related attacks[ EB]. Available: http://www. cryptography. com/dpa./technical.
  • 9P Kocher, J Jatte, B Jun. Differential power analysis[A]. Advanced in Cryptology-CRYPTO' 99 [ C ]. California, USA: Springer Verlag. 1999.388 - 397.
  • 10J Damen, V Rijmen. Resistance againstimplementation attacks, a comparative study of the AES proposals[A] .Second AES Conference[C].Rome, Itary, 1999. Available: http://csrc. nist. gov/CryptoTcolkit/aes/roundl/conf2/aes2conf, htm.

同被引文献218

引证文献31

二级引证文献106

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部