期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
Designing Pair of Nonlinear Components of a Block Cipher over Gaussian Integers 被引量:1
1
作者 Muhammad Sajjad Tariq Shah Robinson Julian Serna 《Computers, Materials & Continua》 SCIE EI 2023年第6期5287-5305,共19页
In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the ... In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the points of elliptic curves has been published.The main purpose of these studies is to hide data and improve the security levels of crypto algorithms.In this work,we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers(GI).The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters.But the prime field dependent on the Elliptic curve(EC)provides one S-box at a time by fixing three parameters a,b,and p.The newly designed pair of S-boxes are assessed by various tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability. 展开更多
关键词 Gaussian integers residue class of gaussian integers block cipher s-boxes analysis of s-boxes
在线阅读 下载PDF
Nonlinear Components of a Block Cipher over Eisenstein Integers
2
作者 Mohammad Mazyad Hazzazi Muhammad Sajjad +2 位作者 Zaid Bassfar Tariq Shah Ashwag Albakri 《Computers, Materials & Continua》 SCIE EI 2023年第12期3659-3675,共17页
In block ciphers,the nonlinear components,also known as substitution boxes(S-boxes),are used with the purpose to induce confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the poi... In block ciphers,the nonlinear components,also known as substitution boxes(S-boxes),are used with the purpose to induce confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the points of elliptic curves,chaotic maps,and Gaussian integers has been published.The main purpose of these studies is to hide data and improve the security levels of crypto algorithms.In this work,we design pair of nonlinear components of a block cipher over the residue class of Eisenstein integers(EI).The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters.However,in the same way,by taking three fixed parameters only one S-box is obtained through a prime field-dependent Elliptic curve(EC),chaotic maps,and Gaussian integers.The newly designed pair of S-boxes are assessed by various tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability. 展开更多
关键词 Eisenstein integers residue class of Eisenstein integers block cipher s-boxes analysis of s-boxes
在线阅读 下载PDF
DBST:a lightweight block cipher based on dynamic S-box 被引量:2
3
作者 Liuyan YAN Lang LI Ying GUO 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第3期177-185,共9页
IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight ... IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight block cipher based on dynamic S-box named DBST.It is introduced for devices with limited hardware resources and high throughput requirements.DBST is a 128-bit block cipher supporting 64-bit key,which is based on a new generalized Feistel variant structure.It retains the consistency and significantly boosts the diffusion of the traditional Feistel structure.The SubColumns of round function is implemented by combining bit-slice technology with subkeys.The S-box is dynamically associated with the key.It has been demonstrated that DBST has a good avalanche effect,low hardware area,and high throughput.Our S-box has been proven to have fewer differential features than RECTANGLE S-box.The security analysis of DBST reveals that it can against impossible differential attack,differential attack,linear attack,and other types of attacks. 展开更多
关键词 internet of things 5G dynamic s-box bit-slice technology lightweight block cipher
原文传递
Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption 被引量:1
4
作者 Nazli Sanam Asif Ali +1 位作者 Tariq Shah Ghazanfar Farooq 《Computers, Materials & Continua》 SCIE EI 2021年第4期1-21,共21页
The substitution box(S-box)is a fundamentally important component of symmetric key cryptosystem.An S-box is a primary source of non-linearity in modern block ciphers,and it resists the linear attack.Various approaches... The substitution box(S-box)is a fundamentally important component of symmetric key cryptosystem.An S-box is a primary source of non-linearity in modern block ciphers,and it resists the linear attack.Various approaches have been adopted to construct S-boxes.S-boxes are commonly constructed over commutative and associative algebraic structures including Galois fields,unitary commutative rings and cyclic and non-cyclic finite groups.In this paper,first a non-associative ring of order 512 is obtained by using computational techniques,and then by this ring a triplet of 8×8 S-boxes is designed.The motivation behind the designing of these S-boxes is to upsurge the robustness and broaden the key space due to non-associative and noncommutative behavior of the algebraic structure under consideration.A novel color image encryption application is anticipated in which initially these 3 S-boxes are being used to produce confusion in three layers of a standard RGB image.However,for the sake of diffusion 3D Arnold chaotic map is used in the proposed encryption scheme.A comparison with some of existing chaos and S-box dependent color image encryption schemes specs the performance results of the anticipated RGB image encryption and observed as approaching the standard prime level. 展开更多
关键词 block cipher s-box nonlinearity color image encryption 3D chaotic map
在线阅读 下载PDF
An Innovative Technique for Constructing Highly Non-Linear Components of Block Cipher for Data Security against Cyber Attacks 被引量:1
5
作者 Abid Mahboob Muhammad Asif +4 位作者 Rana Muhammad Zulqarnain Imran Siddique Hijaz Ahmad Sameh Askar Giovanni Pau 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2547-2562,共16页
The rapid advancement of data in web-based communication has created one of the biggest issues concerning the security of data carried over the internet from unauthorized access.To improve data security,modern cryptos... The rapid advancement of data in web-based communication has created one of the biggest issues concerning the security of data carried over the internet from unauthorized access.To improve data security,modern cryptosystems use substitution-boxes.Nowadays,data privacy has become a key concern for consumers who transfer sensitive data from one place to another.To address these problems,many companies rely on cryptographic techniques to secure data from illegal activities and assaults.Among these cryptographic approaches,AES is a well-known algorithm that transforms plain text into cipher text by employing substitution box(S-box).The S-box disguises the relationship between cipher text and the key to guard against cipher attacks.The security of a cipher using an S-box depends on the cryptographic strength of the respective S-box.Therefore,various researchers have employed different techniques to construct high order non-linear S-box.This paper provides a novel approach for evolving S-boxes using coset graphs for the action of the alternating group A5 over the finite field and the symmetric group S256.The motivation for this work is to study the symmetric group and coset graphs.The authors have performed various analyses against conventional security criteria such as nonlinearity,differential uniformity,linear probability,the bit independence criterion,and the strict avalanche criterion to determine its high cryptographic strength.To evaluate its image application performance,the proposed S-box is also used to encrypt digital images.The performance and comparison analyses show that the suggested S-box can secure data against cyber-attacks. 展开更多
关键词 block cipher coset graphs s-box triangular group
在线阅读 下载PDF
ANALYSIS OF MINIMUM NUMBERS OF LINEARLY ACTIVE S-BOXES OF A CLASS OF GENERALIZED FEISTEL BLOCK CIPHERS
6
作者 Xiaopei GUO Kejian XU +1 位作者 Tongsen SUN Xiubin FAN 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2012年第5期1014-1031,共18页
For a class of generalized Feistel block ciphers, an explicit formula for the minimum numbers of linearly active S-boxes of any round r is presented.
关键词 block cipher generalized Feistel structure linear spread value the minimum number oflinearly active s-boxes.
原文传递
A Chaotic Block Encryption Scheme Based on the Piecewise Nonlinear Map
7
作者 WEI Pengcheng LIAO Xiaofeng +1 位作者 ZHANG Wei YANG Huaqian 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1521-1524,共4页
In order to improve communication security, proposed a chaotic block cryptographic scheme based on the coupled piecewise nonlinear map. Using the coupled chaotic systems to generate random binary sequences, a key-depe... In order to improve communication security, proposed a chaotic block cryptographic scheme based on the coupled piecewise nonlinear map. Using the coupled chaotic systems to generate random binary sequences, a key-dependent shill approach permated the plain-text block and then using the classical chaotic masking technique encrypted the plain-text block. Simulation results show that the proposed algorithm has excellent cryptographic properties such as diffusion and confusion properties and it can resist the know plaintext attacks and chosen plain-text attacks. 展开更多
关键词 CHAOS block cipher piecewise nonlinear map
在线阅读 下载PDF
New construction of highly nonlinear resilient S-boxes via linear codes
8
作者 Haixia ZHAO Yongzhuang WEI 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第3期175-181,共7页
Highly nonlinear resilient functions play a crucial role in nonlinear combiners which are usual hardware oriented stream ciphers.During the past three decades,the main idea of construction of highly nonlinear resilien... Highly nonlinear resilient functions play a crucial role in nonlinear combiners which are usual hardware oriented stream ciphers.During the past three decades,the main idea of construction of highly nonlinear resilient functions are benefited from concatenating a large number of affine subfunctions.However,these resilient functions as core component of ciphers usually suffered from the guess and determine attack or algebraic attack since the n-variable nonlinear Boolean functions can be easily given rise to partial linear relations by fixing at most nil variables of them.How to design highly nonlinear resilient functions(S-boxes)without concatenating a large number of nil variables affine subfunctions appears to be an important task.In this article,a new construction of highly nonlinear resilient functions is proposed.These functions consist of two classes subfunctions.More specially,the first class(nonlinear part)contains both the bent functions with 2k variables and some affine subfUnctions with n/2-k variables which are attained by using[n/2-k,m,d]disjoint linear codes.The second class(linear part)includes some linear subfunctions with nil variables which are attained by using[n/2,m,d]disjoint linear codes.It is illustrated that these resilient functions have high nonlinearity and high algebraic degree.In particular,It is different from previous well-known resilient S-boxes,these new S-boxes cannot be directly decomposed into some affine subftinctions with nil variables by fixing at most nil variables.It means that the S-boxes(vectorial Boolean functions)which use these resilient functions as component functions have more favourable cryptography properties against the guess and determine attack or algebraic attacks. 展开更多
关键词 stream cipher s-box disjoint linear codes resiliency nonlinearity
原文传递
Upper Bounds of Differential Characteristic Probability for Unbalanced Feistel Network Employing DSM
9
作者 GUO Jiansheng HU Xiaoliang LUO Wei 《Wuhan University Journal of Natural Sciences》 CAS 2014年第2期173-177,共5页
In this paper, for the unbalanced Feistel network which employs diffusion matrices in a switching way, we study the fixed number of its differential active S-boxes. Firstly we obtain some lower bounds of the different... In this paper, for the unbalanced Feistel network which employs diffusion matrices in a switching way, we study the fixed number of its differential active S-boxes. Firstly we obtain some lower bounds of the differential active S-boxes for m, 2m and 3m rounds of Feistel structure, respectively. By concatenating these rounds, a fixed number of differential active S-boxes for arbitrary round number is derived. Our results imply that the unbalanced Feistel network using DSM is more secure than the traditional structure. 展开更多
关键词 block cipher unbalanced Feistel network differen- tial active s-box branch number
原文传递
提高S盒非线性度的有效算法 被引量:4
10
作者 陈华 吴文玲 冯登国 《计算机科学》 CSCD 北大核心 2005年第10期68-70,86,共4页
S盒是分组密码算法中的重要的非线性部件。WilliamMillan曾给出一个能改善S盒非线性度的HillClimbing算法,它通过交换S盒的两个输出向量来提高S盒的非线性度直到非线性度达到一个局部最优值,即交换任何两个输出向量也不能提高S盒的非线... S盒是分组密码算法中的重要的非线性部件。WilliamMillan曾给出一个能改善S盒非线性度的HillClimbing算法,它通过交换S盒的两个输出向量来提高S盒的非线性度直到非线性度达到一个局部最优值,即交换任何两个输出向量也不能提高S盒的非线性度。本文研究了如何同时改变S盒的三个输出向量的位置来提高S盒的非线性度,并给出了MHC算法,它能在HillClimbing算法的基础上进一步提高非线性度。实验证明,MHC算法对随机S盒的优化效果明显大于HillClimbing算法。 展开更多
关键词 分组密码 S盒 非线性度 非线性度 有效算法 S盒 分组密码算法 输出向量 非线性部件 实验证明 MHC 最优值
在线阅读 下载PDF
一种改进的非线性正形置换构造方法及其性能分析 被引量:10
11
作者 谷大武 肖国镇 《西安电子科技大学学报》 EI CAS CSCD 北大核心 1997年第4期477-481,共5页
对L.Mitenthal提出的非线性正形置换的构造方法进行了改进,指出了原方法中存在的问题.通过改进一个最大线性正形置换方法得到了非线性正形置换的个数下限.最后,引入了差值非线性度的概念。
关键词 正形置换 分组密码 S盒 密码学
在线阅读 下载PDF
基于NFSR的分组密码算法SPRING 被引量:12
12
作者 田甜 戚文峰 +1 位作者 叶晨东 谢晓锋 《密码学报》 CSCD 2019年第6期815-834,共20页
本文详细介绍分组密码算法SPRING的设计.根据分组长度和密钥长度的不同,SPRING具体包括三个算法版本SPRING-128-128、SPRING-128-256、SPRING-256-256,其中SPRING-n-m表示分组长度为n且密钥长度为m.SPRING是SP结构的分组密码,主要面向... 本文详细介绍分组密码算法SPRING的设计.根据分组长度和密钥长度的不同,SPRING具体包括三个算法版本SPRING-128-128、SPRING-128-256、SPRING-256-256,其中SPRING-n-m表示分组长度为n且密钥长度为m.SPRING是SP结构的分组密码,主要面向硬件实现设计,采用基于非线性反馈移位寄存器(NFSR)的32-比特S-盒和基于非线性反馈移位寄存器的密钥扩展算法.由于没有S-盒的存储,SPRING算法的硬件实现面积比较小.根据不同的应用需求,例如面积小或加/解密速率高,可以采用不同的实现方式.基于轮的实现,硬件面积最小,在TSMC 16 nm工艺库下,SPRING-128-128算法的硬件实现面积约1046μm^2;全轮展开实现,加/解密速率最大,SPRING-128-128算法的加密速率可以达到17482 Mbps,此时硬件实现面积约8079μm^2.SPRING的含义为SP结构分组密码和环状串联非线性反馈移位寄存器(A ring-like cascade connection of NFSRs). 展开更多
关键词 分组密码 非线性反馈移位寄存器 轻量密码 SPRING
在线阅读 下载PDF
Rijndael分组密码的研究与分析 被引量:5
13
作者 陈勤 周丽 《计算机工程与应用》 CSCD 北大核心 2002年第13期113-115,共3页
该文对Rijndael分组密码进行了较为深入的研究,将字节代替变换中的有限域GF(28)上模乘求逆运算和仿射变换归并成了一个8×8的S盒,将圈中以字节为单位进行的行移位、列混合、密钥加三种运算归并成了一个广义仿射变换,归并结果表明Rij... 该文对Rijndael分组密码进行了较为深入的研究,将字节代替变换中的有限域GF(28)上模乘求逆运算和仿射变换归并成了一个8×8的S盒,将圈中以字节为单位进行的行移位、列混合、密钥加三种运算归并成了一个广义仿射变换,归并结果表明Rijndael密码实质上是一个形如仿射变换的非线性迭代算法。基于分析给出了Rijndael密码算法的精简描述,并指出了算法预计算快速实现的有效方法。 展开更多
关键词 分组密码 Rijndael密码 字节代替变换 非线性迭代算法 密码学
在线阅读 下载PDF
Rijndael分组密码与差分攻击 被引量:2
14
作者 陈勤 周律 《小型微型计算机系统》 CSCD 北大核心 2003年第4期676-679,共4页
深入研究了Rijndael分组密码,将字节代替变换中的有限域GF(28)上模乘求逆运算和仿射变换归并成了一个8×8的S盒,将圈中以字节为单位进行的行移位、列混合、密钥加三种运算归并成了一个广义仿射变换.基于归并将Rijndael密码算法了进... 深入研究了Rijndael分组密码,将字节代替变换中的有限域GF(28)上模乘求逆运算和仿射变换归并成了一个8×8的S盒,将圈中以字节为单位进行的行移位、列混合、密钥加三种运算归并成了一个广义仿射变换.基于归并将Rijndael密码算法了进行简化,结果表明Rijndael密码实质上是一个形如仿射变换Y=A(?)S(X)(?)K的非线性迭代算法,并以分组长度128比特、密钥长度128比特作为特例,给出了二轮Rijndael密码的差分攻击.文中还给出了Rijndael密码算法的精简描述,并指出了算法通过预计算快速实现的有效方法. 展开更多
关键词 分组密码 Rijndael密码 仿射变换 S盒 非线性迭代算法 差分攻击 信息安全
在线阅读 下载PDF
Reverse Engineering Analysis Based on Differential Fault Analysis Against Secret S- boxes 被引量:2
15
作者 Tang Ming Qiu Zhenlong +2 位作者 Deng Hui Liu Shubo Zhang Huanguo 《China Communications》 SCIE CSCD 2012年第10期10-22,共13页
To evaluate the security of cipher algo- rithrrs with secret operations, we built a new reverse engineering analysis based on Differential Fault Analysis (DFA) to recover the secret S-boxes in Secret Private Network... To evaluate the security of cipher algo- rithrrs with secret operations, we built a new reverse engineering analysis based on Differential Fault Analysis (DFA) to recover the secret S-boxes in Secret Private Network (SPN) and Feistel structures, which are two of the most typical structures in block ciphers. This paper gives the general definitions of these two structures and proposes the reverse engineering analysis of each structure. Furthermore, we evaluate the complexity of the proposed reverse analyses and theoretically prove the effectiveness of the reverse method. For the Twoflsh-like and AES-like algorithrm, the experimental results verify the correctness and efficiency of the reverse analysis. The proposed reverse analysis can efficiently recover the secret S-boxes in the encryp'don algorithms writh SPN and Feistel structures. It can successfully recover the Twoflsh- like algorithm in 2.3 s with 256 faults and the AES- like algorithm in 0.33 s with 23 faults. 展开更多
关键词 DFA reverse engmeenng analysis block cipher SPN feistel s-box
在线阅读 下载PDF
S盒抗DPA能力与非线性度的关系 被引量:1
16
作者 刘连浩 沈增晖 +1 位作者 刘上力 段绍华 《计算机工程》 CAS CSCD 北大核心 2008年第20期193-195,共3页
S盒作为高级加密标准(AES)中的唯一非线性部件,是影响算法性能的重要因素之一,在研究其性质的基础上,将透明阶作为衡量密码系统抗差分功耗分析(DPA)能力的一个指标,推导出高非线性函数透明阶的下界计算公式。实验结果表明,该算法是有效... S盒作为高级加密标准(AES)中的唯一非线性部件,是影响算法性能的重要因素之一,在研究其性质的基础上,将透明阶作为衡量密码系统抗差分功耗分析(DPA)能力的一个指标,推导出高非线性函数透明阶的下界计算公式。实验结果表明,该算法是有效的,在类似AES的分组密码中,S盒非线性度与密码抗DPA能力成反比关系。 展开更多
关键词 透明阶 非线性度 分组密码 差分功耗分析 高级加密标准
在线阅读 下载PDF
模2^n加和模2加混合运算的异或分支数 被引量:1
17
作者 常亚勤 金晨辉 《软件学报》 EI CSCD 北大核心 2011年第7期1652-1660,共9页
研究了扩散结构为二元域上非线性变换的异或分支数.给出了扩散结构为二元域上非线性变换的异或分支数的定义及其与分组密码抗差分攻击和线性分析能力的关系,证明了以模2n加和模2加的混合运算为扩散结构的异或分支数等于将模2n加换成模2... 研究了扩散结构为二元域上非线性变换的异或分支数.给出了扩散结构为二元域上非线性变换的异或分支数的定义及其与分组密码抗差分攻击和线性分析能力的关系,证明了以模2n加和模2加的混合运算为扩散结构的异或分支数等于将模2n加换成模2加且将各变元系数模2后所得的二元域上线性变换的异或分支数,从而简化了此类非线性扩散结构异或分支数的计算问题. 展开更多
关键词 分组密码 非线性扩散结构 异或分支数 混合运算 可证明安全性
在线阅读 下载PDF
一种检测S盒能量信息泄漏的t检验方法 被引量:2
18
作者 严迎建 郑震 +1 位作者 郭朋飞 朱春生 《北京理工大学学报》 EI CAS CSCD 北大核心 2021年第5期542-547,共6页
提升t检验对分组密码能量信息泄漏的检测效率.介绍了t检验检测能量信息泄漏的基本步骤,通过布尔函数Walsh谱对S盒的非线性性质进行了研究,引入透明阶的概念并推导了其与非线性度的关系式,进而明确了S盒输出位的非线性度与能量信息泄漏... 提升t检验对分组密码能量信息泄漏的检测效率.介绍了t检验检测能量信息泄漏的基本步骤,通过布尔函数Walsh谱对S盒的非线性性质进行了研究,引入透明阶的概念并推导了其与非线性度的关系式,进而明确了S盒输出位的非线性度与能量信息泄漏情况之间的关系.提出了一种对S盒输出位实施t检验的顺序进行确定的方法:按照S盒输出位非线性度由大到小的顺序依次进行检验.以DES加密算法第一轮S盒为例进行了验证,结果表明该方法能有效提升t检验对能量信息泄漏的检测效率. 展开更多
关键词 T检验 分组密码 能量信息泄漏 非线性度 透明阶
在线阅读 下载PDF
一种分组密码算法的功耗分析新方法
19
作者 刘连浩 刘上力 崔杰 《计算机工程》 CAS CSCD 北大核心 2007年第23期148-150,153,共4页
功耗分析能够有效地析出内嵌密码芯片的分组密码的密钥,Walsh谱变换是一种研究分组密码布尔函数的重要工具。该文在相关功耗分析的基础上,提出了一种基于Walsh谱的功耗分析新方法,证明了分组密码布尔函数的非线性度越高,密码防范功耗分... 功耗分析能够有效地析出内嵌密码芯片的分组密码的密钥,Walsh谱变换是一种研究分组密码布尔函数的重要工具。该文在相关功耗分析的基础上,提出了一种基于Walsh谱的功耗分析新方法,证明了分组密码布尔函数的非线性度越高,密码防范功耗分析的能力就越弱的结论。实验表明,相对差分功耗分析、相关功耗分析而言,基于Walsh谱的功耗分析能有效地提高析出密钥的效率和精度。 展开更多
关键词 分组密码 相关功耗分析 高级加密标准 WALSH谱 非线性度
在线阅读 下载PDF
33轮SHACAL-2的差分非线性攻击
20
作者 韦永壮 胡予濮 陈杰 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2010年第1期102-106,118,共6页
利用SHACAL-2的一个17轮差分非线性区分器,结合被猜测子密钥空间分割的方法和快速傅立叶变换,提出了一种攻击33轮SHACAL-2的新方法.该方法攻击33轮SHACAL-2需要244的选择明文、2496.6的33轮SHACAL-2加密和2502次算术运算,攻击成功概率为... 利用SHACAL-2的一个17轮差分非线性区分器,结合被猜测子密钥空间分割的方法和快速傅立叶变换,提出了一种攻击33轮SHACAL-2的新方法.该方法攻击33轮SHACAL-2需要244的选择明文、2496.6的33轮SHACAL-2加密和2502次算术运算,攻击成功概率为99%.与已有的结果相比较,新攻击有效地提高了单密钥下SHACAL-2的攻击轮数. 展开更多
关键词 分组密码 差分非线性攻击 SHACAL-2算法 计算复杂度
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部