期刊文献+
共找到85篇文章
< 1 2 5 >
每页显示 20 50 100
A Novel Framework to Construct S-Box Quantum Circuits Using System Modeling: Application to 4-Bit S-Boxes
1
作者 Yongjin Jeon Seungjun Baek Jongsung Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期545-561,共17页
Quantum computers accelerate many algorithms based on the superposition principle of quantum mechanics.The Grover algorithm provides significant performance to malicious users attacking symmetric key systems.Since the... Quantum computers accelerate many algorithms based on the superposition principle of quantum mechanics.The Grover algorithm provides significant performance to malicious users attacking symmetric key systems.Since the performance of attacks using quantum computers depends on the efficiency of the quantum circuit of the encryption algorithms,research research on the implementation of quantum circuits is essential.This paper presents a new framework to construct quantum circuits of substitution boxes(S-boxes)using system modeling.We model the quantum circuits of S-boxes using two layers:Toffoli and linear layers.We generate vector spaces based on the values of qubits used in the linear layers and apply them to find quantum circuits.The framework finds the circuit bymatching elements of vector spaces generated fromthe input and output of a given S-box,using the forward search or themeet-in-the-middle strategy.We developed a tool to apply this framework to 4-bit S-boxes.While the 4-bit S-box quantum circuit construction tool LIGHTER-R only finds circuits that can be implemented with four qubits,the proposed tool achieves the circuits with five qubits.The proposed tool can find quantum circuits of 4-bit odd permutations based on the controlled NOT,NOT,and Toffoli gates,whereas LIGHTER-R is unable to perform this task in the same environment.We expect this technique to become a critical step toward optimizing S-box quantum circuits. 展开更多
关键词 System modeling quantum circuit s-box circuit quantum computer
在线阅读 下载PDF
A High Efficiency Hardware Implementation of S-Boxes Based on Composite Field for Advanced Encryption Standard
2
作者 Yawen Wang Sini Bin +1 位作者 Shikai Zhu Xiaoting Hu 《Journal of Computer and Communications》 2024年第4期228-246,共19页
The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization... The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization implementation of the S-box is proposed based on the composite field inverse operation in this paper. This proposed S-box implementation is modeled using Verilog language and synthesized using Design Complier software under the premise of ensuring the correctness of the simulation result. The synthesis results show that, compared to several current S-box implementation schemes, the proposed implementation of the S-box significantly reduces the area overhead and critical path delay, then gets higher hardware efficiency. This provides strong support for realizing efficient and compact S-box ASIC designs. 展开更多
关键词 Advanced Encryption Standard (AES) s-box Tower Field Hardware Implementation Application Specific Integration Circuit (ASIC)
在线阅读 下载PDF
Optimizing AES S-Box Implementation:A SAT-Based Approach with Tower Field Representations
3
作者 Jingya Feng Ying Zhao +1 位作者 Tao Ye Wei Feng 《Computers, Materials & Continua》 2025年第4期1515-1531,共17页
The efficient implementation of the Advanced Encryption Standard(AES)is crucial for network data security.This paper presents novel hardware implementations of the AES S-box,a core component,using tower field represen... The efficient implementation of the Advanced Encryption Standard(AES)is crucial for network data security.This paper presents novel hardware implementations of the AES S-box,a core component,using tower field representations and Boolean Satisfiability(SAT)solvers.Our research makes several significant contri-butions to the field.Firstly,we have optimized the GF(24)inversion,achieving a remarkable 31.35%area reduction(15.33 GE)compared to the best known implementations.Secondly,we have enhanced multiplication implementa-tions for transformation matrices using a SAT-method based on local solutions.This approach has yielded notable improvements,such as a 22.22%reduction in area(42.00 GE)for the top transformation matrix in GF((24)2)-type S-box implementation.Furthermore,we have proposed new implementations of GF(((22)2)2)-type and GF((24)2)-type S-boxes,with the GF(((22)2)2)-type demonstrating superior performance.This implementation offers two variants:a small area variant that sets new area records,and a fast variant that establishes new benchmarks in Area-Execution-Time(AET)and energy consumption.Our approach significantly improves upon existing S-box implementations,offering advancements in area,speed,and energy consumption.These optimizations contribute to more efficient and secure AES implementations,potentially enhancing various cryptographic applications in the field of network security. 展开更多
关键词 AES s-box SAT optimization tower field hardware implementation area efficiency energy consumption
在线阅读 下载PDF
Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes 被引量:1
4
作者 Xuan-Ping Zhang Rui Guo +2 位作者 Heng-Wei Chen Zhong-Meng Zhao Jia-Yin Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期170-178,共9页
Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusi... Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusion. In this paper, we analyze the defects of this structure based on the example of an article and crack it using a simpler method. To address the defects of the asynchronous encryption structure, a novel encryption scheme is proposed, in which the structure of synchronous substitution and diffusion based on double S-boxes is utilized, so the processes of substitution and diffusion are combined together and the attackers cannot crack the cryptosystem by any of the processes. The simulation results and security analysis show that the proposed encryption scheme is safer and more efficient to expediently use in the real-time system. 展开更多
关键词 image encryption s-box CRACK synchronous substitution and diffusion
原文传递
Genetic Algorithm-Based Approaches for Optimizing S-Boxes
5
作者 YIN Xinchun YANG Jie XIE Li 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期131-134,共4页
Multi-objective genetic algorithm is much suitable for solving multi-objective optimization problems. By use of Genetic algorithm, the optimization of S-boxes is explored in this paper. Results of the experiments show... Multi-objective genetic algorithm is much suitable for solving multi-objective optimization problems. By use of Genetic algorithm, the optimization of S-boxes is explored in this paper. Results of the experiments show that, with heuristic mutation strategy, the algorithm has high searching efficiency and fast convergence speed. Meanwhile, we also have take the avalanche probability of S-boxes into account, besides nonlinearity and difference uniformity. Under this method, an effective genetic algorithm for 6×6 S-boxes is provided and a number of S-boxes with good cryptographic capability can be obtained. 展开更多
关键词 s-boxes NONLINEARITY difference uniformity avalanche probability variance genetic algorithm heuristic mutation strategy
在线阅读 下载PDF
High-Order Bit Independence Criterion Test for the S-boxes
6
作者 GAO Sheng MA Wenping ZHU Jiwei 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期447-451,共5页
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to meas... A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to measure the strength of an S-box against attacks that keep some of its input bits constant. Test results over the S-boxes of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are given and some possible applications of the HOBIC test are analyzed. Meanwhile, the source code for a basic version of the HOBIC test is also provided, the implement process of which shows that it is very fast and efficient for practical applications . 展开更多
关键词 CRYPTOGRAPHY Boolean functions s-boxes highorder bit independence criterion (HOBIC) security test
原文传递
Effective method for the design of S-Boxes satisfying the strict avalanche criterion(SAC)
7
作者 高胜 Ma Wenping +1 位作者 Zhuo Zepeng Li Xiaoping 《High Technology Letters》 EI CAS 2013年第1期88-91,共4页
The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fu... The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fulfilling the SAC until now.In this paper,to construct S-boxes satisfying the SAC directly,we generalize the concatenation techniques of Boolean functions to S-boxes.Using the idea of concatenating small variable S-boxes,we present a simple yet effective construction method of S-boxes satisfying the SAC.Finally,a simple example on how to construct SAC S-boxes with large input variables by small variables SAC S-boxes is given. 展开更多
关键词 CRYPTOGRAPHY Boolean functions Substitution boxes s-boxes strict avalanche criterion (SAC) CONCATENATION CONSTRUCTION
在线阅读 下载PDF
Design of strong S-boxes based on spatiotemporal chaotic system
8
作者 徐刚 赵耿 闵乐泉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2011年第6期107-112,共6页
A substitution box (S-box) plays an important role in cryptographic algorithms.The design of S-box using chaotic systems has attracted a great deal of attention in recent years.A new method for obtaining cryptographic... A substitution box (S-box) plays an important role in cryptographic algorithms.The design of S-box using chaotic systems has attracted a great deal of attention in recent years.A new method for obtaining cryptographically strong S-boxes based on spatiotemporal chaotic system is proposed in this paper.The discretized Baker map and affine transformation are used orderly by an algorithm to shuffle the table generated by the spatiotemporal chaotic system.The cryptographical properties of these S-boxes such as bijection,nonlinearity,strict avalanche,output bits independence and equiprobable input /output XOR distribution are analyzed.The results of numerical analysis show that the S-box designed by this method can against several attacks and all the criteria for designing good S-box can be satisfied approximately.More strong S-boxes can be obtained by this method with the change of the original conditions or control parameters of the spatiotemporal chaos system.Furthermore,our approach is suitable for practical application in designing cryptosystem. 展开更多
关键词 spatiotemporal chaotic system s-box CRYPTANALYSIS
在线阅读 下载PDF
A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes
9
作者 Sankhanil Dey Ranjan Ghosh 《Advances in Pure Mathematics》 2018年第3期272-306,共35页
4-bit linear relations play an important role in cryptanalysis of 4-bit crypto S-boxes. 4-bit finite differences have also been a major part of cryptanalysis of 4-bit S-boxes. Existence of all 4-bit linear relations h... 4-bit linear relations play an important role in cryptanalysis of 4-bit crypto S-boxes. 4-bit finite differences have also been a major part of cryptanalysis of 4-bit S-boxes. Existence of all 4-bit linear relations have been counted for all of 16 input and 16 output 4-bit bit patterns of 4-bit Crypto S-boxes said as S-boxes has been reported in Linear Cryptanalysis of 4-bit S-boxes. Count of existing finite differences from each element of output S-boxes to distant output S-boxes have been noted in Differential Cryptanalysis of S-boxes. In this paper a brief review of these two cryptanalytic methods for 4-bit S-boxes has been introduced in a very lucid and conceptual manner. Two new analysis techniques, one to search for the existing linear approximations among the input vectors (IPVs) and output Boolean functions (BFs) of a particular S-box has also been introduced in this paper. The search is limited to find the existing linear relations or approximations in the contrary to count the number of existent linear relations among all 16, 4-bit input and output bit patterns within all possible linear approximations. Another is to find number of balanced BFs in difference output S-boxes. Better the number of Balanced BFs, Better the security. 展开更多
关键词 Linear CRYPTANALYSIS Differential CRYPTANALYSIS SUBSTITUTION BOXES s-boxes Cryptography CRYPTANALYSIS
在线阅读 下载PDF
Dynamic inhomogeneous S-Boxes in AES: a novel countermeasure against power analysis attacks
10
作者 陈毅成 《High Technology Letters》 EI CAS 2008年第4期390-393,共4页
Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.Th... Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.The masking strategies in algorithm level view each S-Box as an independent moduleand mask them respectively,which are costly in size and power for non-linear characteristic of S-Boxes.The new method uses dynamic inhomogeneous S-Boxes instead of traditional homogeneous S-Boxes,andarranges the S-Boxes randomly.So the power and data path delay of substitution unit become unpre-dictable.The experimental results demonstrate that this scheme takes advantages of the circuit character-istics of various S-Box implementations to eliminate the correlation between crypto operation and power.Itneeds less extra circuits and suits resource constrained applications. 展开更多
关键词 advanced encryption standard (AES) substitution box s-box correlation power analysis
在线阅读 下载PDF
Rijndael S-box仿射运算研究 被引量:4
11
作者 刘景美 韦宝典 王新梅 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2005年第1期94-97,129,共5页
证明了有限域上q 多项式、n阶矩阵和线性函数间的等价关系;然后通过证明有限域上同一线性函数在严格不同基下对应不同矩阵,扩展出一种通用的方法快速确定有限域上线性函数和n阶矩阵间的线性关系;提出了有限域上q 多项式和n阶矩阵相互确... 证明了有限域上q 多项式、n阶矩阵和线性函数间的等价关系;然后通过证明有限域上同一线性函数在严格不同基下对应不同矩阵,扩展出一种通用的方法快速确定有限域上线性函数和n阶矩阵间的线性关系;提出了有限域上q 多项式和n阶矩阵相互确定的一种新方案,从本质上解释了RijndaelS box代数表达式的简洁性. 展开更多
关键词 AES RIJNDAEL s-box 有限域 q-多项式
在线阅读 下载PDF
实现AES算法中S-BOX和INV-S-BOX的高效方法 被引量:5
12
作者 韩少男 李晓江 《微电子学》 CAS CSCD 北大核心 2010年第1期103-107,共5页
介绍了AES中的S-BOX和INV-S-BOX的算法原理,分析目前广泛使用的实现S-BOX和INV-S-BOX的三种方法:直接查表法,扩展欧几里德算法和基于复合域GF((22)2)2)的算法。对直接查表法和基于复合域GF((22)2)2)的算法进行改进,提出了两种改进电路... 介绍了AES中的S-BOX和INV-S-BOX的算法原理,分析目前广泛使用的实现S-BOX和INV-S-BOX的三种方法:直接查表法,扩展欧几里德算法和基于复合域GF((22)2)2)的算法。对直接查表法和基于复合域GF((22)2)2)的算法进行改进,提出了两种改进电路结构。通过综合仿真,给出了按照上述方法实现的硬件电路的面积和关键路径上的时间延迟。结果表明,提出的两种新实现方法与传统实现方法相比,电路面积分别有28%和22%的优化。 展开更多
关键词 AES算法 s-box INV-s-box GALOIS FIELD 复合Galois FIELD 乘法逆运算
在线阅读 下载PDF
一种基于有限域求逆的S-Box实现算法 被引量:2
13
作者 潘宏亮 高德远 +1 位作者 张盛兵 曹良帅 《微电子学与计算机》 CSCD 北大核心 2006年第3期109-111,115,共4页
S-Box是AES密码算法硬件实现的关键,目前主要有两种实现方法:一种是基于查找表,一种是基于有限域求逆。文章首先经过数学变换将有限域GF(28)上的元素映射到有限域GF(24)2上,并把GF(24)2上的一个元素变换为GF(24)上的两个元素的线性运算... S-Box是AES密码算法硬件实现的关键,目前主要有两种实现方法:一种是基于查找表,一种是基于有限域求逆。文章首先经过数学变换将有限域GF(28)上的元素映射到有限域GF(24)2上,并把GF(24)2上的一个元素变换为GF(24)上的两个元素的线性运算。在此基础上,把GF(28)上的求逆问题转化为GF(24)上的求逆,从而提出了一种基于有限域求逆的低硬件开销的S-Box实现算法。该算法和查找表实现相比,面积减少了57%,适用于诸如智能卡、移动设备等对面积要求比较严格的场合。 展开更多
关键词 s-box 逆变换 有限域 查找表
在线阅读 下载PDF
AES的结构及其S-box分析 被引量:14
14
作者 王衍波 《解放军理工大学学报(自然科学版)》 EI 2002年第3期13-17,共5页
分析了 AES的加解密原理和密钥生成器的结构 ,S- box的分布特性。指出了 AES与其密钥生成器之间存在一种结构上的同步性 ,这种同步性可能成为 AES的弱点 ;AES的 S- box具有短周期 ,不具有良好的分布特性。这给 AES的密码分析提供了可能 ... 分析了 AES的加解密原理和密钥生成器的结构 ,S- box的分布特性。指出了 AES与其密钥生成器之间存在一种结构上的同步性 ,这种同步性可能成为 AES的弱点 ;AES的 S- box具有短周期 ,不具有良好的分布特性。这给 AES的密码分析提供了可能 ,也许会成为 AES的致命弱点。 展开更多
关键词 高级数据加密标准(AES) s-box 密钥生成器
在线阅读 下载PDF
一种基于离散混沌系统的S-Box候选算法设计 被引量:1
15
作者 丁文霞 王浩 《国防科技大学学报》 EI CAS CSCD 北大核心 2013年第1期83-88,共6页
S-Box是现行分组密码中唯一的非线性部件,主要提供了分组密码算法中必需的混淆作用,其密码强度决定了整个分组密码的安全强度。为进一步提高S-Box的强度,结合离散混沌系统的内在随机性、有界性、非周期性及对初始条件和参数极度敏感等特... S-Box是现行分组密码中唯一的非线性部件,主要提供了分组密码算法中必需的混淆作用,其密码强度决定了整个分组密码的安全强度。为进一步提高S-Box的强度,结合离散混沌系统的内在随机性、有界性、非周期性及对初始条件和参数极度敏感等特点,提出一种采用多混沌映射和交叉映射生成S-Box的生成算法。实验分析表明,该算法生成的样本密钥敏感性强,随机性好,既能较好地满足S-Box设计所要求的各项准则和特性,安全性高,同时又能降低计算复杂度,提高计算速度,且易于生成和扩展,因而是一种性能良好的S-Box候选算法。 展开更多
关键词 应用密码学 混沌 s-box 严格雪崩准则 输出比特间独立性
在线阅读 下载PDF
AES加密算法中S-BOX的算法与VLSI实现 被引量:1
16
作者 张志峰 林正浩 《计算机工程与应用》 CSCD 北大核心 2006年第19期67-68,共2页
基于GF(24)域映射的方法,采用定制方式完成了AES加密算法中关键部件S-Box的设计与实现。设计上基于中芯国际(SMIC)的0.18滋m1P6M设计工艺,经过电路设计与验证、电路仿真、版图设计与验证、版图后仿真得到最终物理版图实现。经过与基于... 基于GF(24)域映射的方法,采用定制方式完成了AES加密算法中关键部件S-Box的设计与实现。设计上基于中芯国际(SMIC)的0.18滋m1P6M设计工艺,经过电路设计与验证、电路仿真、版图设计与验证、版图后仿真得到最终物理版图实现。经过与基于自动综合和布局布线得到的设计的时延和面积的比较,证明该设计是有效的。 展开更多
关键词 AES s-box 定制
在线阅读 下载PDF
AES加密算法的S-box设计分析及其改进 被引量:2
17
作者 汪培芬 《淮海工学院学报(自然科学版)》 CAS 2014年第4期18-21,共4页
在AES密码设计中,S-box作为实现数据非线性置换的组件有重要地位,其安全性直接影响整个密码的安全性。分析了AES加密算法中S-box的设计原理及其循环迭代周期。指出S-box循环迭代周期都远远小于256的短周期,使AES存在着差分攻击的可能。... 在AES密码设计中,S-box作为实现数据非线性置换的组件有重要地位,其安全性直接影响整个密码的安全性。分析了AES加密算法中S-box的设计原理及其循环迭代周期。指出S-box循环迭代周期都远远小于256的短周期,使AES存在着差分攻击的可能。提出了改进方案,并得到新的S-box。改进的S-box循环迭代周期扩大到256整个空间,提高了算法的安全性。 展开更多
关键词 AES s-box 循环迭代周期
在线阅读 下载PDF
Medical Image Encryption Based on Fisher-Yates Scrambling and Filter Diffusion 被引量:1
18
作者 HUANG Jiacin GUO Yali +1 位作者 GAO Ruoyun LI Shanshan 《Journal of Shanghai Jiaotong university(Science)》 2025年第1期136-152,共17页
A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,whic... A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,which is used for the scrambling,substitution and diffusion processes.The three-dimensional Fisher-Yates scrambling,S-box substitution and diffusion are employed for the first round of encryption.The chaotic sequence is adopted for secondary encryption to scramble the ciphertext obtained in the first round.Then,three-dimensional filter is applied to diffusion for further useful information hiding.The key to the algorithm is generated by the combination of hash value of plaintext image and the input parameters.It improves resisting ability of plaintext attacks.The security analysis shows that the algorithm is effective and efficient.It can resist common attacks.In addition,the good diffusion effect shows that the scheme can solve the differential attacks encountered in the transmission of medical images and has positive implications for future research. 展开更多
关键词 medical image encryption Fisher-Yates scrambling three-dimensional filter diffusion bidirectional diffusion s-box substitution
原文传递
基于均匀化混沌系统的S-Box生成算法
19
作者 黄慧芳 《数据挖掘》 2018年第3期104-111,共8页
该文给出了一个新的二次多项式混沌系统,并基于系统的概率密度函数对其进行均匀化处理。基于均匀化后的混沌系统构造了新的S-Box生成算法。对生成的S-Box进行性能检测,包括双射特性,非线性度,差分概率(DP)和线性概率(LP)分析,结果表明... 该文给出了一个新的二次多项式混沌系统,并基于系统的概率密度函数对其进行均匀化处理。基于均匀化后的混沌系统构造了新的S-Box生成算法。对生成的S-Box进行性能检测,包括双射特性,非线性度,差分概率(DP)和线性概率(LP)分析,结果表明本文均匀化后混沌系统产生的S-Box具有较好的密码特性,适合用于加密系统。 展开更多
关键词 混沌系统 均匀化 s-box 差分概率 线性概率
在线阅读 下载PDF
用Dillon方法构造完全bent型S-Box
20
作者 王章雄 《成都信息工程学院学报》 2006年第3期454-456,共3页
bent函数是一类具有良好密码特性的编码组合函数,而S-box既可以对块密码的明文也可以在流密码中作为对密钥流的加密装置。将bent的优良性质带入S-box是一个很有意义的研究课题。以前用函数序列半群和置换群来构造bent型S-box。现通过陪... bent函数是一类具有良好密码特性的编码组合函数,而S-box既可以对块密码的明文也可以在流密码中作为对密钥流的加密装置。将bent的优良性质带入S-box是一个很有意义的研究课题。以前用函数序列半群和置换群来构造bent型S-box。现通过陪集方法得到bent函数组,又利用适当的指标函数来构造S-box,使得其中任意一个部分组的非零线性组合仍然是bent函数,从而保证S-box的输出端具有很高的密码强度。 展开更多
关键词 BENT函数 完全bent型s-box Walsh-Hadamard矩阵 平衡函数 陪集
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部