期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
Analysis and Design for Unsymmetrical Block Encryption Algorithm
1
作者 王以刚 孔令飞 《Journal of China Textile University(English Edition)》 EI CAS 1999年第2期50-52,共3页
This article explains the imbalance in DES and introduces the operators in IDEA. At last it puts forward a Unsym-metrical Block Encryption Algorithm which is achieved by adding some operators to DES.
关键词 BLACK CIPHER CIPHER algorithm des IDEA UNSYMMETRICAL block encryption
在线阅读 下载PDF
A Fast FPGA Implementation for Triple DES Encryption Scheme 被引量:2
2
作者 Edni Del Rosal Sanjeev Kumar 《Circuits and Systems》 2017年第9期237-246,共10页
In cryptography, the Triple DES (3DES, TDES or officially TDEA) is a symmetric-key block cipher which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. Electronic payment syst... In cryptography, the Triple DES (3DES, TDES or officially TDEA) is a symmetric-key block cipher which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. Electronic payment systems are known to use the TDES scheme for the encryption/decryption of data, and hence faster implementations are of great significance. Field Programmable Gate Arrays (FPGAs) offer a new solution for optimizing the performance of applications meanwhile the Triple Data Encryption Standard (TDES) offers a mean to secure information. In this paper we present a pipelined implementation in VHDL, in Electronic Code Book (EBC) mode, of this commonly used cryptography scheme with aim to improve performance. We achieve a 48-stage pipeline depth by implementing a TDES key buffer and right rotations in the DES decryption key scheduler. Using the Altera Cyclone II FPGA as our platform, we design and verify the implementation with the EDA tools provided by Altera. We gather cost and throughput information from the synthesis and timing results and compare the performance of our design to common implementations presented in other literatures. Our design achieves a throughput of 3.2 Gbps with a 50 MHz clock;a performance increase of up to 16 times. 展开更多
关键词 Data encryption Standard TRIPLE des des Tdes 3des Non-Pipelined PIPELINED CYCLONE II FPGA VHDL
在线阅读 下载PDF
High-Throughput and Area-Efficient FPGA Implementations of Data Encryption Standard (DES) 被引量:1
3
作者 Raed Bani-Hani Salah Harb +1 位作者 Khaldoon Mhaidat Eyad Taqieddin 《Circuits and Systems》 2014年第3期45-56,共12页
One of the most popular standards for protecting confidential information is the Data Encryption Standard (DES). Although it has been replaced by the Advanced Encryption Standard (AES), it is still widely used in Auto... One of the most popular standards for protecting confidential information is the Data Encryption Standard (DES). Although it has been replaced by the Advanced Encryption Standard (AES), it is still widely used in Automatic Teller Machines (ATM’s), smartcards, and mobile phone SIM cards. In this paper, we present area-efficient and high-throughput FPGA implementations of the DES which are developed using the Xilinx FPGA ISE design suite. In fact, we propose modifications on the fastest DES design reported in the literature and achieve 1.1 times higher speed. Also, we introduce an 8-stage pipelined design that needs only 0.75 times the registers and consumes 0.65 times the power of a similar 16-stages pipelined design. High-speed design and synthesis optimization techniques including pipelining, register retiming, and logic replication are used. Post- layout synthesis results show that the proposed implementations achieve high throughput-to-area ratio. To make a fair comparison, the proposed designs were synthesized using matching FPGA devices as being used by other implementations reported in the literature. 展开更多
关键词 des FPGA PIPELINED ITERATIVE SECURITY Efficiency encryption
暂未订购
Discussion of New Padding Method in DES Encryption 被引量:1
4
作者 Chengxia Liu 《Journal of Software Engineering and Applications》 2012年第12期20-22,共3页
DES is a kind of block cipher and before DES encryption the plain text be divided into the same-size blocks. But sometimes the plain text can’t be divided into the exactly size. So padding step is needed to pad the s... DES is a kind of block cipher and before DES encryption the plain text be divided into the same-size blocks. But sometimes the plain text can’t be divided into the exactly size. So padding step is needed to pad the space of the block. The discussion of the block padding is the emphasis of this paper. A new padding method is given and at the last part of the paper the implementation of DES using new padding method is given. 展开更多
关键词 des encryption CIPHER BLOCK
暂未订购
Internet-Oriented Optimization Schemes for Joint Compression and Encryption
5
作者 WANG Yilei CHANG Xiaotao +2 位作者 Amit Golander Hubertus Franke CHEN Beijing 《China Communications》 SCIE CSCD 2015年第10期158-168,共11页
Compression and encryption are widely used in network traffic in order to improve efficiency and security of some systems.We propose a scheme to concatenate both functions and run them in a paralle pipelined fashion,d... Compression and encryption are widely used in network traffic in order to improve efficiency and security of some systems.We propose a scheme to concatenate both functions and run them in a paralle pipelined fashion,demonstrating both a hardware and a software implementation.With minor modifications to the hardware accelerators,latency can be reduced to half.Furthermore,we also propose a seminal and more efficient scheme,where we integrate the technology of encryption into the compression algorithm.Our new integrated optimization scheme reaches an increase of 1.6X by using parallel software scheme However,the security level of our new scheme is not desirable compare with previous ones.Fortunately,we prove that this does not affect the application of our schemes. 展开更多
关键词 compression and encryption 3des Lempel-Ziv algorithm.
在线阅读 下载PDF
Analyzing Computational Components of Standard Block Encryption Schemes
6
作者 Chu-Wen Cheng Miranda Heather Cantu Sanjeev Kumar 《Journal of Computer and Communications》 2022年第6期81-89,共9页
Encryption is used to secure sensitive computer data which may be at rest or in motion. There are several standard encryption algorithms that have been used to encrypt and protect blocks of sensitive data to ensure co... Encryption is used to secure sensitive computer data which may be at rest or in motion. There are several standard encryption algorithms that have been used to encrypt and protect blocks of sensitive data to ensure confidentiality. The most popular standard block encryption schemes are the Advanced Encryption Standard (AES), Triple Data Encryption Standard (3DES), and the first standardized encryption scheme, which is no longer the standard scheme now, namely the Data Encryption Standard (DES). AES is the current standard for block encryption used worldwide and is implemented on many processors. In this work, we compare the hardware performance of these three encryption schemes. First, we identified the underlying computational components for these three encryption schemes, and then we analyzed to what extent these computational components were being used in these block encryption schemes to encrypt and decrypt a given message. In this paper, we compared the contribution of these computational components to evaluate the overall encryption efficiency in terms of speed and computational delays for encrypting a given block of data for a given hardware platform. AES was found to be the faster scheme in terms of hardware computation speed in accomplishing the same encryption task compared to the other two block encryption schemes, namely, the DES and 3DES schemes. 展开更多
关键词 Data encryption des 3des AES
在线阅读 下载PDF
对DES的Rectangle攻击和Boomerang攻击 被引量:5
7
作者 张蕾 吴文玲 《软件学报》 EI CSCD 北大核心 2008年第10期2659-2666,共8页
作为加密标准,DES(data encryption standard)算法虽然已被AES(advanced encryption standard)算法所取代,但其仍有着不可忽视的重要作用.在一些领域,尤其是金融领域,DES和Triple DES仍被广泛使用着.而近年来又提出了一些新的密码分析方... 作为加密标准,DES(data encryption standard)算法虽然已被AES(advanced encryption standard)算法所取代,但其仍有着不可忽视的重要作用.在一些领域,尤其是金融领域,DES和Triple DES仍被广泛使用着.而近年来又提出了一些新的密码分析方法,其中,Rectangle攻击和Boomerang攻击已被证明是非常强大而有效的.因此,有必要重新评估DES算法抵抗这些新分析方法的能力.研究了DES算法针对Rectangle攻击和Boomerang攻击的安全性.利用DES各轮最优差分路径及其概率,分别得到了对12轮DES的Rectangle攻击和对11轮DES的Boomerang攻击.攻击结果分别为:利用Rectangle攻击可以攻击到12轮DES,数据复杂度为2^(62)个选择明文,时间复杂度为2^(42)次12轮加密;利用Boomerang攻击可以攻击到11轮DES,数据复杂度为2^(58)个适应性选择明密文,时间复杂度为2^(38)次11轮加密.由于使用的都是DES各轮的最优差分路径,所以可以相信,该结果是Rectangle攻击和Boomerang攻击对DES所能达到的最好结果. 展开更多
关键词 des(data encryption standard)算法 Rectangle攻击 Boomerang攻击 差分路径 区分器
在线阅读 下载PDF
基于DES算法的文件加密系统的设计与实现 被引量:2
8
作者 周文婷 马凤伟 孔庆 《计算机安全》 2012年第7期13-16,共4页
随着互联网的普及,信息安全问题逐渐成为热点问题。DES算法,全称为数据加密标准,是一种对二元数据进行加密的算法,通过反复使用加密组块替代和换位两种技术,经过16轮的变换后得到密文,安全性高,在POS、ATM、磁卡及智能卡(IC卡)、加油站... 随着互联网的普及,信息安全问题逐渐成为热点问题。DES算法,全称为数据加密标准,是一种对二元数据进行加密的算法,通过反复使用加密组块替代和换位两种技术,经过16轮的变换后得到密文,安全性高,在POS、ATM、磁卡及智能卡(IC卡)、加油站、高速公路收费站等领域被广泛应用。首先简要介绍了DES算法的原理和流程,分析设计了用VC++实现DES加解密的核心算法,在此基础上制作完成了一个文件加密系统。 展开更多
关键词 des算法 文件加密系统 VC++
在线阅读 下载PDF
Comparative Study of Different Cryptographic Algorithms 被引量:1
9
作者 Baha Eldin Hamouda Hassan Hamouda 《Journal of Information Security》 2020年第3期138-148,共11页
With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of d... With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of data user can be maintained as well as security and privacy of data provided to the user. Symmetric key cryptography is a part of the cryptographic technique which ensures high security and confidentiality of data transmitted through the communication channel using a common key for both encryption and decryption. In this paper I have analyzed comparative encryption algorithms in performance, three most useful algorithms: Data Encryption Standard (DES), Triple DES (3DES) also known as Triple Data Encryption Algorithm (TDEA), and Advanced Encryption Standard (AES). They have been analyzed on their ability to secure data, time taken to encrypt data and throughput the algorithm requires. The performance of different algorithms differs according to the inputs. 展开更多
关键词 CRYPTOGRAPHY des 3des AES encryption DECRYPTION CIPHERTEXT PLAINTEXT
在线阅读 下载PDF
PC TOOLS文件加密功能与DES技术
10
作者 谢峰 《四川理工学院学报(社会科学版)》 1994年第2期72-74,共3页
本文从数据加密的角度,探讨了保护计算机系统资源的一种方法,井结合PC TOOLS的文件加密功能,介绍了著名的数据加密标准(DES)的简单原理。指出了在应用PCSecure软件时应当注意的问题。
关键词 PCSecure encryption DECRYPTION des
在线阅读 下载PDF
Establishment of the Secure Channel between Broker Nodes in Pub/Sub System
11
作者 ZHU Shuren 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1441-1444,共4页
The paper mainly discusses the integrity of the forwarded subscription message guaranteed by secure channel which encrypted in data communication by using data encryption standard (DES) algorithm and chaos code algo... The paper mainly discusses the integrity of the forwarded subscription message guaranteed by secure channel which encrypted in data communication by using data encryption standard (DES) algorithm and chaos code algorithm between broker nodes in the routing process of the contentbased publish/subscribe system. It analyzes the security of the secure channel encrypted with data communication by DES algorithm and chaos code algorithm, and finds out the secure channel can be easily attacked by known plain text. Therefore, the paper proposes the improved algorithm of message encryption and authentication, combining encryption and the generation of the message authentication code together to finish scanning at one time, which enhances both the secure degree and running efficiency. This secure channel system has a certain reference value to the pub/sub system requiring highly communication security. 展开更多
关键词 PUBLISH/SUBSCRIBE routing algorithm subscription message secure channel data encryption standard des
在线阅读 下载PDF
数据加密技术探讨 被引量:1
12
作者 刘艳云 《内蒙古科技与经济》 2006年第10S期85-86,共2页
随着网络技术的发展,网络安全也就成为当今网络社会的焦点中的焦点,病毒、黑客、黑客程序、邮件炸弹、远程侦听等都可以让人谈网色变。现代电脑加密技术就是适应网络安全的需要而产生的,它为我们进行一般的电子商务活动提供了安全保障。
关键词 IDEA(Internation DATA encryption Algorithm) des 密钥 RSA
在线阅读 下载PDF
J2ME网络数据传输的安全策略
13
作者 吴双燕 《福建电脑》 2005年第12期130-130,76,共2页
本文在对HTTP协议的分析基础上,论述了如何在J2ME上实现手机和PC服务器通过特定的无线通讯方式利用HTTP协议来进行可靠的数据传输。另外在数据传输过程中采用DES(Data Encryption Standard)这种常见的对称加密算法对数据进行加密和解密... 本文在对HTTP协议的分析基础上,论述了如何在J2ME上实现手机和PC服务器通过特定的无线通讯方式利用HTTP协议来进行可靠的数据传输。另外在数据传输过程中采用DES(Data Encryption Standard)这种常见的对称加密算法对数据进行加密和解密,并且对DES算法的实现过程加以解释。 展开更多
关键词 HTTP(Hypertext TRANSFER Protocol) des(Data encryption Standard) 加密 解密
在线阅读 下载PDF
Network Security in Remote Supervisory Control
14
作者 Huang Zhenguo(黄振国) 《Journal of Donghua University(English Edition)》 EI CAS 2001年第1期120-122,共3页
After an introduction to the implementation of supervisory computer control (SCC) through networks and the relevant security issues, this paper centers on the core of network security design: intelligent front-end pro... After an introduction to the implementation of supervisory computer control (SCC) through networks and the relevant security issues, this paper centers on the core of network security design: intelligent front-end processor (FEP), encryption/decryption method and authentication protocol. Some other system-specific security measures are also proposed. Although these are examples only, the techniques discussed can also be used in and provide reference for other remote control systems. 展开更多
关键词 REMOTE supervisory control network security frontend PROCESSOR ( FEP ) data encryption standard ( des ) authentication.
在线阅读 下载PDF
Improvement of the Round Key Generation of AES
15
作者 Junshe Wang Han Xu Mingqiu Yao 《International Journal of Communications, Network and System Sciences》 2012年第12期850-853,共4页
The key generation algorithm of AES was introduced;the weaknesses of the key generation design of AES were investigated. According to the key demand put forward a kind of new design idea, and this designing strategy w... The key generation algorithm of AES was introduced;the weaknesses of the key generation design of AES were investigated. According to the key demand put forward a kind of new design idea, and this designing strategy was developed, which can be used to improve the key generation algorithm of AES. An analysis shows that such improvement can enhance the safety of the original algorithm without reducing its efficiency. 展开更多
关键词 AES Data encryption Standard (des) KEY Generation Rijndeal
在线阅读 下载PDF
Timing and hamming weight attacks on minimal cost encryption scheme
16
作者 YUAN Zheng WANG Wei +1 位作者 ZHANG Hua WEN Qiao-yan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第1期81-85,共5页
The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the attack, timing information on encryption processing is... The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the attack, timing information on encryption processing is used to select and collect effective plaintexts for attack. Then the collected plaintexts are utilized to infer the expanded key differences of the secret key, from which most bits of the expanded secret key are recovered. The remaining bits of the expanded secret key are deduced by the correlations between Hamming weight values of the input of the S-boxes in the first-round. Finally, from the linear relation of the encryption time and the secret key's Hamming weight, the entire 56 bits of the secret key are thoroughly recovered. Using the attack, the minimal cost encryption scheme can be broken with 2^23 known plaintexts and about 2^21 calculations at a success rate a 〉 99%. The attack has lower computing complexity, and the method is more effective than other previous methods. 展开更多
关键词 timing and hamming weight attacks des minimal cost encryption scheme digital right management (DRM)
原文传递
Security Framework for Distributed Database System
17
作者 Allajabu Dafalla Khamis Saad Subair 《Journal of Data Analysis and Information Processing》 2019年第1期1-13,共13页
This research aims to study various Symmetrical Algorithms, while the main objective of this study is to find out a suitable algorithm for the encryption of any specific size of text file where the experiment of each ... This research aims to study various Symmetrical Algorithms, while the main objective of this study is to find out a suitable algorithm for the encryption of any specific size of text file where the experiment of each algorithm is based on encryption of different sizes of the text files, which are in “10 KB to 5 MB”, and also to calculate the time duration that each algorithm takes to encrypt or to decrypt the particular size of each text file. There are many types of encryption algorithm, which can be used to encrypt the computerized information in different Organizations, whose all algorithms can encrypt and decrypt any size of text file, but the time duration of each Algorithm during the encryption or decryption process of specific file size is not fixed. Some of the algorithms are suitable for encryption of specific ranges of the file size, or some of algorithms are functional while encryption small size of files, and others algorithms are functional for encryption of big size of text files, based on the time duration disparity among symmetric algorithms during encryption of text files. In this study five symmetrical algorithms are merged in one program using classes and concept of inheritance in the form that if encryption is needed, the program will select the file and it checks the size of the text file. After this process the program automatically will select the suitable encryption algorithm to encrypt the specific text file according to the range of the file size. Knowing that the file size before or after encryption will not change or is stable, in this case of the decryption algorithm will apply the same process of encryption while decrypting files, the program of encryption and decryption code will write using visual Studio 2013. The result will be analyzed with R program (R software), the cipher text will appear in the format of UTF8 which means Unicode Transformation Format, “8” Means “8” bits to represent a character, the size format that will apply in the program will be in format of KB (kilo Byte). 展开更多
关键词 CRYPTOGRAPHY encryption DECRYPTION Time DURATION AES des 3des RIJNDAEL RC2
暂未订购
Key Recovery Against 3DES in CPU Smart Card Based on Improved Correlation Power Analysis 被引量:3
18
作者 Yanting Ren Liji Wu +4 位作者 Hexin Li Xiangyu Li Xiangmin Zhang An Wang Hongyi Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第2期210-220,共11页
The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the ... The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces. 展开更多
关键词 Triple Data encryption Standard (3des CPU smart cards power analysis key recovery side-channeanalysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部