期刊文献+
共找到693篇文章
< 1 2 35 >
每页显示 20 50 100
Physical Layer Encryption of OFDM-PON Based on Quantum Noise Stream Cipher with Polar Code 被引量:2
1
作者 Xu Yinbo Gao Mingyi +3 位作者 Zhu Huaqing Chen Bowen Xiang Lian Shen Gangxiang 《China Communications》 SCIE CSCD 2024年第3期174-188,共15页
Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast e... Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast exposes the physical layer vulnerable to the threat of illegal eavesdropping. Quantum noise stream cipher(QNSC) is a classic physical layer encryption method and well compatible with the OFDM-PON. Meanwhile, it is indispensable to exploit forward error correction(FEC) to control errors in data transmission. However, when QNSC and FEC are jointly coded, the redundant information becomes heavier and thus the code rate of the transmitted signal will be largely reduced. In this work, we propose a physical layer encryption scheme based on polar-code-assisted QNSC. In order to improve the code rate and security of the transmitted signal, we exploit chaotic sequences to yield the redundant bits and utilize the redundant information of the polar code to generate the higher-order encrypted signal in the QNSC scheme with the operation of the interleaver.We experimentally demonstrate the encrypted 16/64-QAM, 16/256-QAM, 16/1024-QAM, 16/4096-QAM QNSC signals transmitted over 30-km standard single mode fiber. For the transmitted 16/4096-QAM QNSC signal, compared with the conventional QNSC method, the proposed method increases the code rate from 0.1 to 0.32 with enhanced security. 展开更多
关键词 physical layer encryption polar code quantum noise stream cipher
在线阅读 下载PDF
A novel chaotic stream cipher and its application to palmprint template protection 被引量:3
2
作者 李恒建 张家树 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第4期102-111,共10页
Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a cou... Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher. 展开更多
关键词 chaotic stream cipher coupled nonlinear dynamic filter biometric protection cancelable competitive code
原文传递
New State Recovery Attacks on the Grain v1 Stream Cipher 被引量:1
3
作者 Lin Ding Chenhui Jin +4 位作者 Jie Guan Shaowu Zhang Junzhi Li Hong Wang Wei Zhao 《China Communications》 SCIE CSCD 2016年第11期180-188,共9页
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key... The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key setting has been found yet. In this paper,new state recovery attacks on Grain v1 utilizing the weak normality order of the employed keystream output function in the cipher are proposed. These attacks have remarkable advantages in the offline time,online time and memory complexities,which are all better than exhaustive key search. The success probability of each new attack is 0.632. The proposed attack primarily depends on the order of weak normality of the employed keystream output function. This shows that the weak normality order should be carefully considered when designing the keystream output functions of Grain-like stream ciphers. 展开更多
关键词 CRYPTANALYSIS grain v1 stream cipher weak normality order
在线阅读 下载PDF
Theoretical design for a class of chaotic stream cipher based on nonlinear coupled feedback
4
作者 HuGuojie WangLin FengZhengjin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第1期155-159,共5页
A class of chaotic map called piecewise-quadratic-equation map to design feedback stream cipher is proposed. Such map can generate chaotic signals that have uniform distribution function, δ-like autocorrelation funct... A class of chaotic map called piecewise-quadratic-equation map to design feedback stream cipher is proposed. Such map can generate chaotic signals that have uniform distribution function, δ-like autocorrelation function. Compared with the piecewise-linear map, this map provides enhanced security in that they can maintain the original perfect statistical properties, as well as overcome the defect of piecewise-linearity and expand the key space. This paper presents a scheme to improve the local complexity of the chaotic stream cipher based on the piecewise-quadratic-equationmap. Both the theoretic analysis and the results of simulation show that this scheme improves the microstructure of the phase-space graph on condition that the good properties of the original scheme are remained. 展开更多
关键词 CHAOS stream cipher nonlinear-coupled feedback phase-space graph.
在线阅读 下载PDF
STUDY ON STREAM CIPHERS USING GENERATING FUNCTIONS
5
作者 武传坤 《Journal of Electronics(China)》 1993年第1期34-40,共7页
Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functi... Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functions.Their minimal polynomials,periods,as wellas generating functions are given.As to finitely generated sequences,the change of their linearcomplexity profiles as well as the relationship between the two generated sequences usder thecase in which the degree of connected polynomials are fixed,are discussed. 展开更多
关键词 stream cipher GENERATING Function Complementery SEQUENCE Partial SUM SEQUENCE INVERSE Order SEQUENCE Finitely Generated SEQUENCE B-M Algorithm
在线阅读 下载PDF
Enhanced Parallelized DNA-Coded Stream Cipher Based on Multiplayer Prisoners’Dilemma
6
作者 Khaled M.Suwais 《Computers, Materials & Continua》 SCIE EI 2023年第5期2685-2704,共20页
Data encryption is essential in securing exchanged data between connected parties.Encryption is the process of transforming readable text into scrambled,unreadable text using secure keys.Stream ciphers are one type of... Data encryption is essential in securing exchanged data between connected parties.Encryption is the process of transforming readable text into scrambled,unreadable text using secure keys.Stream ciphers are one type of an encryption algorithm that relies on only one key for decryption and as well as encryption.Many existing encryption algorithms are developed based on either a mathematical foundation or on other biological,social or physical behaviours.One technique is to utilise the behavioural aspects of game theory in a stream cipher.In this paper,we introduce an enhanced Deoxyribonucleic acid(DNA)-coded stream cipher based on an iterated n-player prisoner’s dilemma paradigm.Our main goal is to contribute to adding more layers of randomness to the behaviour of the keystream generation process;these layers are inspired by the behaviour of multiple players playing a prisoner’s dilemma game.We implement parallelism to compensate for the additional processing time that may result fromadding these extra layers of randomness.The results show that our enhanced design passes the statistical tests and achieves an encryption throughput of about 1,877 Mbit/s,which makes it a feasible secure stream cipher. 展开更多
关键词 ENCRYPTION game theory DNA cryptography stream cipher parallel computing
在线阅读 下载PDF
CeTrivium:A Stream Cipher Based on Cellular Automata for Securing Real-Time Multimedia Transmission
7
作者 Osama S.Younes Abdulmohsen Alharbi +3 位作者 Ali Yasseen Faisal Alshareef Faisal Albalawi Umar A.Albalawi 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2895-2920,共26页
Due to their significant correlation and redundancy,conventional block cipher cryptosystems are not efficient in encryptingmultimedia data.Streamciphers based onCellularAutomata(CA)can provide amore effective solution... Due to their significant correlation and redundancy,conventional block cipher cryptosystems are not efficient in encryptingmultimedia data.Streamciphers based onCellularAutomata(CA)can provide amore effective solution.The CA have recently gained recognition as a robust cryptographic primitive,being used as pseudorandom number generators in hash functions,block ciphers and stream ciphers.CA have the ability to perform parallel transformations,resulting in high throughput performance.Additionally,they exhibit a natural tendency to resist fault attacks.Few stream cipher schemes based on CA have been proposed in the literature.Though,their encryption/decryption throughput is relatively low,which makes them unsuitable formultimedia communication.Trivium and Grain are efficient stream ciphers that were selected as finalists in the eSTREAM project,but they have proven to be vulnerable to differential fault attacks.This work introduces a novel and scalable stream cipher named CeTrivium,whose design is based on CA.CeTrivium is a 5-neighborhood CA-based streamcipher inspired by the designs of Trivium and Grain.It is constructed using three building blocks:the Trivium(Tr)block,the Nonlinear-CA(NCA)block,and the Nonlinear Mixing(NM)block.The NCA block is a 64-bit nonlinear hybrid 5-neighborhood CA,while the Tr block has the same structure as the Trivium stream cipher.The NM block is a nonlinear,balanced,and reversible Boolean function that mixes the outputs of the Tr and NCA blocks to produce a keystream.Cryptanalysis of CeTrivium has indicated that it can resist various attacks,including correlation,algebraic,fault,cube,Meier and Staffelbach,and side channel attacks.Moreover,the scheme is evaluated using histogramand spectrogramanalysis,aswell as several differentmeasurements,including the correlation coefficient,number of samples change rate,signal-to-noise ratio,entropy,and peak signal-to-noise ratio.The performance of CeTrivium is evaluated and compared with other state-of-the-art techniques.CeTrivium outperforms them in terms of encryption throughput while maintaining high security.CeTrivium has high encryption and decryption speeds,is scalable,and resists various attacks,making it suitable for multimedia communication. 展开更多
关键词 stream ciphers cellular automata securing real-time streaming CRYPTOGRAPHY CeTrivium
在线阅读 下载PDF
An Improved Framework of Massive Superpoly Recovery in Cube Attacks Against NFSR-Based Stream Ciphers
8
作者 LIU Chen TIAN Tian QI Wen-Feng 《密码学报(中英文)》 CSCD 北大核心 2024年第5期1179-1198,共20页
A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently... A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers. 展开更多
关键词 NFSR-based stream ciphers cube attacks MILP Trivium
在线阅读 下载PDF
The Nonlinear Filter Boolean Function of LILI-128 Stream Cipher Generator Is Successfully Broken Based on the Complexity of Nonlinear 0 1 Symbol Sequence
9
作者 Xiangao Huang Chao Wang +1 位作者 Wei Huang Junxian Li 《Circuits and Systems》 2013年第2期165-168,共4页
The nonlinear filter Boolean function of LILI-128 stream cipher generator is studied in this paper. First we measure the complexity of the stream ciphers sequence of LILI-128 stream cipher generator and obtain the sho... The nonlinear filter Boolean function of LILI-128 stream cipher generator is studied in this paper. First we measure the complexity of the stream ciphers sequence of LILI-128 stream cipher generator and obtain the shortest bit stream sequence reconstructed Boolean function of nonlinear filter in LILI-128 stream cipher generator. Then the least nonlinear Boolean function of generating stream cipher sequence is reconstructed by clusterig, nonlinear predictive and nonlinear synchronization from shortest bit stream sequence. We have verified the correctness of our reconstruction result by simulating the block diagram of Lili-128 keystream generator using our getting Boolean function and implement designers’ reference module of Lili-128 stream cipher public online, and two methods produce the same synchronous keystream sequence under same initial state, so that our research work proves that the nonlinear Boolean function of LILI-128 stream cipher generator is successfully broken. 展开更多
关键词 LILI-128 stream cipher CLOCK Control BOOLEAN Function COMPLEXITY ATTACK
在线阅读 下载PDF
Research on Stream Cipher Model Based on Chaos Theory
10
作者 Sun Wenjie 《International Journal of Technology Management》 2013年第2期91-93,共3页
Chaos is a similar and random process which is very sensitive to initial value in deterministic system. It is a performance of nonlinear dynamical system with built-in randomness. Combined with the advantages and disa... Chaos is a similar and random process which is very sensitive to initial value in deterministic system. It is a performance of nonlinear dynamical system with built-in randomness. Combined with the advantages and disadvantages of the present chaos encryption model, the paper proposes a chaotic stream cipher model based on chaos theory, which not only overcomes finite precision effect, but also improves the randomness of chaotic system and output sequence. The Sequence cycle theory generated by the algorithm can reach more than 10600 at least, which completely satisfies the actual application requirements of stream cipher system. 展开更多
关键词 chaos theory stream cipher ALGORITHM
在线阅读 下载PDF
Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding
11
作者 Anton Alekseychulk Sergey Gryshakov 《Journal of Mathematics and System Science》 2015年第12期516-522,共7页
We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We inves... We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers. 展开更多
关键词 Symmetric cryptography randomized stream cipher random coding computational security chosen-plaintext-chosen-initialization-vector attack.
在线阅读 下载PDF
A VLIW Architecture Stream Cryptographic Processor for Information Security 被引量:4
12
作者 Longmei Nan Xuan Yang +4 位作者 Xiaoyang Zeng Wei Li Yiran Du Zibin Dai Lin Chen 《China Communications》 SCIE CSCD 2019年第6期185-199,共15页
As an important branch of information security algorithms,the efficient and flexible implementation of stream ciphers is vital.Existing implementation methods,such as FPGA,GPP and ASIC,provide a good support,but they ... As an important branch of information security algorithms,the efficient and flexible implementation of stream ciphers is vital.Existing implementation methods,such as FPGA,GPP and ASIC,provide a good support,but they could not achieve a better tradeoff between high speed processing and high flexibility.ASIC has fast processing speed,but its flexibility is poor,GPP has high flexibility,but the processing speed is slow,FPGA has high flexibility and processing speed,but the resource utilization is very low.This paper studies a stream cryptographic processor which can efficiently and flexibly implement a variety of stream cipher algorithms.By analyzing the structure model,processing characteristics and storage characteristics of stream ciphers,a reconfigurable stream cryptographic processor with special instructions based on VLIW is presented,which has separate/cluster storage structure and is oriented to stream cipher operations.The proposed instruction structure can effectively support stream cipher processing with multiple data bit widths,parallelism among stream cipher processing with different data bit widths,and parallelism among branch control and stream cipher processing with high instruction level parallelism;the designed separate/clustered special bit registers and general register heaps,key register heaps can satisfy cryptographic requirements.So the proposed processor not only flexibly accomplishes the combination of multiple basic stream cipher operations to finish stream cipher algorithms.It has been implemented with 0.18μm CMOS technology,the test results show that the frequency can reach 200 MHz,and power consumption is 310 mw.Ten kinds of stream ciphers were realized in the processor.The key stream generation throughput of Grain-80,W7,MICKEY,ACHTERBAHN and Shrink algorithm is 100 Mbps,66.67 Mbps,66.67 Mbps,50 Mbps and 800 Mbps,respectively.The test result shows that the processor presented can achieve good tradeoff between high performance and flexibility of stream ciphers. 展开更多
关键词 stream cipher VLIW architecture PROCESSOR RECONFIGURABLE application-specific instruction-set
在线阅读 下载PDF
Algebraic Attack on Filter-Combiner Model Keystream Generators
13
作者 WUZhi-ping YEDing-feng MAWei-ju 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期259-262,共4页
Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new cr... Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new criterion for designing Filter-Combiner model was alsoproposed: the total length I. of Linear Finite State Machines used in the model should be largeenough and the degree d of Filter-Combiner function should be approximate [L/2]. 展开更多
关键词 algebraic attack Filter-Combiner model stream cipher 'XL' algorithm function composition
在线阅读 下载PDF
Cipher quasi-chaotic code for frequency hopping communications
14
作者 王宏霞 何晨 虞厥邦 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期248-256,共9页
The chaotic frequency hopping (FH) communication systems have been presented so far. The chaotic sequences possesses good randomness and sensitive dependence on initial conditions, which is quite advantageous to run t... The chaotic frequency hopping (FH) communication systems have been presented so far. The chaotic sequences possesses good randomness and sensitive dependence on initial conditions, which is quite advantageous to run the FH codes in code-division multiple access (CDMA) systems. But the finite precision of computation and the fact of the low-dimensional chaos predicted easily cause difficulty in chaotic application. In this paper, some disadvantages associated with the conventional FH codes and the chaotic code scrambled by m-sequences are reviewed briefly. In order to overcome these drawbacks to some extents, a new higher performance FH code called cipher quasi-chaotic (CQC) code is proposed, which is generated by combining the clock-controlled stream cipher technique and chaotic dynamics. Performance analysis applying in FH communication systems of this kind of code is given. The privacy of the CQC sequence is also analyzed. 展开更多
关键词 frequency hopping Hamming correlation CHAOS clock-controlled stream cipher.
在线阅读 下载PDF
同态加密PIR中查询请求带宽优化的通用构造与实例
15
作者 田海博 李奕彤 杜育松 《信息网络安全》 北大核心 2025年第7期1092-1102,共11页
同态加密PIR利用同态加密技术使用户能够在不泄露检索内容的前提下从数据库中检索数据,一直备受学术界关注。针对服务器高吞吐量的同态加密PIR中查询请求带宽较大的问题,文章在随机同态流密码的框架下,设计了基于Regev同态加密的随机同... 同态加密PIR利用同态加密技术使用户能够在不泄露检索内容的前提下从数据库中检索数据,一直备受学术界关注。针对服务器高吞吐量的同态加密PIR中查询请求带宽较大的问题,文章在随机同态流密码的框架下,设计了基于Regev同态加密的随机同态流密码算法,提出了查询请求带宽更优的同态加密PIR通用构造方法,实现了基于SimplePIR协议的PIR实例,分析了该实例的正确性和安全性,测试了该实例在不同数据库大小时的实际查询请求带宽。测试结果表明,查询规模为64 MB的数据库时,该实例的查询请求带宽下降约36.6%。 展开更多
关键词 隐私信息检索 随机同态流密码 Regev同态加密
在线阅读 下载PDF
我国商用密码算法国际标准化研究
16
作者 张振峰 胡可欣 《信息技术与标准化》 2025年第9期24-27,37,共5页
在全球数字经济快速发展的背景下,商用密码算法的国际标准化是保障数据安全、提升产业竞争力的关键路径。系统梳理了我国5类商用密码算法国际标准和自主匿名实体鉴别机制国际标准提案的编制背景、商用密码算法国际标准推进历程、匿名实... 在全球数字经济快速发展的背景下,商用密码算法的国际标准化是保障数据安全、提升产业竞争力的关键路径。系统梳理了我国5类商用密码算法国际标准和自主匿名实体鉴别机制国际标准提案的编制背景、商用密码算法国际标准推进历程、匿名实体鉴别机制国际标准提案进展,通过对比国际上同类密码算法标准和匿名实体鉴别机制的技术特点,阐述了商用密码算法国际标准化的经验与思考,旨在推进我国密码产业的发展。 展开更多
关键词 数字签名算法 密码杂凑算法 分组密码算法 序列密码算法 标识密码算法 匿名实体鉴别
在线阅读 下载PDF
基于改进分段Logistic映射的PRNG算法
17
作者 华漫 李锦长 李燕玲 《计算机与现代化》 2025年第3期113-118,126,共7页
分段Logistic映射的提出改善了经典Logistic映射的一些缺点,由于其复杂性高、安全性好等特点为混沌流密码设计领域提供了一种新的研究课题。为了改善分段Logistic混沌映射存在混沌序列均匀分布特性较差、密钥空间过小等安全隐患,提出一... 分段Logistic映射的提出改善了经典Logistic映射的一些缺点,由于其复杂性高、安全性好等特点为混沌流密码设计领域提供了一种新的研究课题。为了改善分段Logistic混沌映射存在混沌序列均匀分布特性较差、密钥空间过小等安全隐患,提出一种基于初始值和控制参数反馈调整的分段Logistic映射改进方法。该方法通过引入动态系统参数映射函数使输出的状态值分布的概率密度更均匀。基于优化后的分段Logistic混沌映射重新设计PRNG算法和分析比特级数字图像加密实验。实验结果表明本文算法产生的序列混沌特性更显著,分布更均匀,且具有更好的随机性,在流密码算法设计中具有广泛的应用前景。 展开更多
关键词 混沌系统 流密码 分段Logistic映射 图像加密 PRNG
在线阅读 下载PDF
ZUC-128的量子电路实现 被引量:1
18
作者 刘嘉宏 谭晓青 黄睿 《密码学报(中英文)》 北大核心 2025年第3期513-526,共14页
近来,对称密码算法的量子实现受到了广泛的关注.ZUC流密码算法是我国自主研发的对称密码算法,于2011年9月被3GPP采纳为新一代宽带无线移动通信系统的国际标准.本文主要研究ZUC-128算法的高效量子电路实现,设计了更高效的S1盒量子电路和... 近来,对称密码算法的量子实现受到了广泛的关注.ZUC流密码算法是我国自主研发的对称密码算法,于2011年9月被3GPP采纳为新一代宽带无线移动通信系统的国际标准.本文主要研究ZUC-128算法的高效量子电路实现,设计了更高效的S1盒量子电路和线性变换L2的量子电路,使用流水线结构进一步优化了已有的ZUC-128算法量子电路.本文提出的ZUC-128量子电路需要753个量子比特、10399 Toffoli门、279532个CNOT门、28150个X门,Toffoli深度为45282,比已有方案节省6371个Toffoli门、68585个CNOT门. 展开更多
关键词 ZUC算法 流密码 S盒 量子电路 塔域分解
在线阅读 下载PDF
基于MILP的轻量级序列密码算法线性分析
19
作者 帅燕 胡汉平 《信息网络安全》 北大核心 2025年第2期260-269,共10页
文章针对一种基于时变互耦合双混沌系统的轻量级序列密码算法的安全性进行评估,轻量级序列密码算法的安全性对保障物联网和移动通信等资源受限环境的数据安全至关重要。文章选取了混合整数线性规划方法作为分析工具,构建算法的数学模型... 文章针对一种基于时变互耦合双混沌系统的轻量级序列密码算法的安全性进行评估,轻量级序列密码算法的安全性对保障物联网和移动通信等资源受限环境的数据安全至关重要。文章选取了混合整数线性规划方法作为分析工具,构建算法的数学模型,并通过对模型的优化求解,得出算法在不同运行模式下的最大线性相关系数,范围在2^(-54)~2^(-26)之间。实验结果表明,该算法在相关性方面存在一定的脆弱性,攻击者通过穷举110位初始密钥来破解算法,复杂度远低于其128bit初始密钥的穷举复杂度。文章不仅提供了对该算法安全性的定量评估,而且验证了在密码学中进行相关性分析的重要性以及混合整数线性规划技术在密码算法安全性评估方面的有效性。文章对于推动轻量级密码算法的安全性分析和设计具有一定的理论和实践意义,为资源受限环境下的数据安全提供了有力的理论支持。 展开更多
关键词 混沌序列密码算法 线性分析 混合整数线性规划
在线阅读 下载PDF
认证加密算法TinyJAMBU的单密钥比特泄露检测方法
20
作者 朱程辉 叶涛 韦永壮 《桂林电子科技大学学报》 2025年第1期105-110,共6页
针对认证加密算法TinyJAMBU的密钥泄露检测问题,基于可分性质的混合整数线性规划(MILP)构建了立方分析模型,并提出一种缩减轮TinyJAMBU的单密钥比特泄露检测方法。该方法运用不等式方程组刻画了密码算法中基本操作的可分性质模型,并由M... 针对认证加密算法TinyJAMBU的密钥泄露检测问题,基于可分性质的混合整数线性规划(MILP)构建了立方分析模型,并提出一种缩减轮TinyJAMBU的单密钥比特泄露检测方法。该方法运用不等式方程组刻画了密码算法中基本操作的可分性质模型,并由MILP工具求解及检测密钥泄露情况。测试结果表明:在立方变元取自随机数的第0位至第63位间,仍能快速检测出缩减TinyJAMBU 345加密轮内的单密钥泄露情况;所需的时间复杂度为2^(9)加密运算次数;数据复杂度为2^(9)选择数据量。与已有攻击方法相比较,该方法在适用性及实现复杂度方面均有明显优势。 展开更多
关键词 流密码 立方攻击 TinyJAMBU算法 可分性质 MILP模型
在线阅读 下载PDF
上一页 1 2 35 下一页 到第
使用帮助 返回顶部