期刊文献+
共找到2,522篇文章
< 1 2 127 >
每页显示 20 50 100
Differential-Linear Attacks on Ballet Block Cipher
1
作者 ZHOU Yu CHEN Si-Wei +2 位作者 XU Sheng-Yuan XIANG Ze-Jun ZENG Xiang-Yong 《密码学报(中英文)》 北大核心 2025年第2期469-488,共20页
Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective ... Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differential-linear(DL)cryptanalysis.Specifically,we present an automated search for the DL distinguishers of Ballet based on MILP/MIQCP.For the versions with block sizes of 128 and 256 bits,we obtain 16 and 22 rounds distinguishers with estimated correlations of 2^(-59.89)and 2^(-116.80),both of which are the publicly longest distinguishers.In addition,this study incorporates the complexity information of key-recovery attacks into the automated model,to search for the optimal key-recovery attack structures based on DL distinguishers.As a result,we mount the key-recovery attacks on 16-round Ballet-128/128,17-round Ballet-128/256,and 21-round Ballet-256/256.The data/time complexities for these attacks are 2^(108.36)/2^(120.36),2^(115.90)/2^(192),and 2^(227.62)/2^(240.67),respectively. 展开更多
关键词 Ballet block cipher differential-linear(DL)cryptanalysis MILP/MIQCP distinguisher key-recovery attacks
在线阅读 下载PDF
CS-CIPHER两个变体的线性密码分析 被引量:4
2
作者 吴文玲 卿斯汉 《电子学报》 EI CAS CSCD 北大核心 2002年第2期283-285,共3页
CS CIPHER是NESSIE公布的 17个候选算法之一 ,它的分组长度为 6 4 比特 .本文对CS CIPHER的两个变体进行了线性密码分析 .对第一个变体的攻击成功率约为 78 5 % ,数据复杂度为 2 52 ,处理复杂度为 2 3 2 .对第二个变体的攻击成功率约为... CS CIPHER是NESSIE公布的 17个候选算法之一 ,它的分组长度为 6 4 比特 .本文对CS CIPHER的两个变体进行了线性密码分析 .对第一个变体的攻击成功率约为 78 5 % ,数据复杂度为 2 52 ,处理复杂度为 2 3 2 .对第二个变体的攻击成功率约为 78 5 % ,数据复杂度为 2 52 ,处理复杂度为 2 112 . 展开更多
关键词 分组密码 线性密码分析 保密通信 CS-cipher
在线阅读 下载PDF
减轮Deoxys-BC和RAIN算法的积分攻击
3
作者 杜小妮 关雪莹 +1 位作者 余恬 梁丽芳 《通信学报》 北大核心 2026年第2期249-260,共12页
考虑调柄对可调分组密码算法的影响,将零相关线性分析与积分攻击结合,利用部分和技术,对Deoxys-BC和RAIN算法进行积分攻击。通过研究调柄的掩码传播规律,构造Deoxys-BC-256的176类5.5轮零相关线性区分器以及Deoxys-BC-384的176类6.5轮... 考虑调柄对可调分组密码算法的影响,将零相关线性分析与积分攻击结合,利用部分和技术,对Deoxys-BC和RAIN算法进行积分攻击。通过研究调柄的掩码传播规律,构造Deoxys-BC-256的176类5.5轮零相关线性区分器以及Deoxys-BC-384的176类6.5轮零相关线性区分器。基于零相关线性区分器与积分区分器的联系,结合等价密钥技术,分别实现Deoxys-BC算法两个版本的10轮和12轮积分攻击。另外,构造RAIN算法的48类6轮零相关线性区分器,并将其转换为6轮积分区分器。在不考虑白化密钥的情况下,对RAIN算法的两个版本进行10轮积分攻击。结果表明,与已有研究结果相比,所提攻击方案所需复杂度显著降低。 展开更多
关键词 可调分组密码 Deoxys-BC RAIN 积分攻击
在线阅读 下载PDF
基于深度学习的GIFT-128与ASCON算法神经差分区分器研究
4
作者 苏睿韬 任炯炯 陈少真 《计算机科学》 北大核心 2026年第3期453-458,共6页
差分分析是评估分组密码安全性的关键方法,通过追踪明文差分的传播以区分密码与随机置换。传统分析方法应对复杂算法时存在局限,而深度学习的特征提取优势为密码分析开辟了新路径。为实现分组密码的安全性评估,提出了一种融合传统差分... 差分分析是评估分组密码安全性的关键方法,通过追踪明文差分的传播以区分密码与随机置换。传统分析方法应对复杂算法时存在局限,而深度学习的特征提取优势为密码分析开辟了新路径。为实现分组密码的安全性评估,提出了一种融合传统差分分析与深度学习方法的神经差分区分器构造方法。在数据集构造方面,采用多密文对三元组输入格式,保留差分特征并捕捉跨密文对相关性。网络架构基于卷积神经网络并融合残差收缩网络,构建深度扩张结构及多尺度特征融合机制。在GIFT-128和ASCON-PERMUTATION算法上的实验表明:对于GIFT-128算法,其6轮、7轮区分器的准确率最高可达99.70%和95.47%,分别提升了9.30%和13.09%;在ASCON的4轮分析中,准确率最高达到53.54%。这证明了深度学习方法在密码安全性分析上的有效性。 展开更多
关键词 深度学习 差分分析 分组密码 神经区分器 GIFT-128 ASCON
在线阅读 下载PDF
改进的全轮HALFLOOP-48相关调柄攻击
5
作者 孙晓萌 张文英 苑兆忠 《电子与信息学报》 北大核心 2026年第3期1311-1321,共11页
HALFLOOP是一类基于调柄机制、结构类似AES的轻量级分组密码,用于保护第4代高频无线电系统中的自动链路消息。由于其行移位与列混合操作具有使差分快速扩散的特点,寻找具有实际可行性的长轮数、高概率的差分区分器,并实现对完整轮HALFLO... HALFLOOP是一类基于调柄机制、结构类似AES的轻量级分组密码,用于保护第4代高频无线电系统中的自动链路消息。由于其行移位与列混合操作具有使差分快速扩散的特点,寻找具有实际可行性的长轮数、高概率的差分区分器,并实现对完整轮HALFLOOP-48的有效攻击仍是亟待解决的关键问题。为此,该文提出一个新的截断差分三明治区分器框架,并基于布尔可满足性(SAT)方法实现自动化搜索最优差分区分器。该框架将密码分为3个子密码层,E_0和E_1使用字节级模型,E_m使用比特级模型。为突破大型S盒差分特征建模的瓶颈,该文提出基于仿射子空间的降维方法,将高维向量的差分特征分解为两个低维子向量,显著降低了SAT的约束规模。其次,为提高区分器概率,将E_0与E_1的依赖关系系统地分为3层,逐一计算每层概率并相乘,得到了概率高达2^(-43.2)的8轮HALFLOOP-48截断差分三明治区分器,且给出了满足该差分路径的明文对实例。最终,利用该实际差分路径,对完整轮数的HALFLOOP-48算法发起密钥恢复攻击。与已有结果相比,该文结果在时间复杂度上减少了2^(2)^(5.4),在内存复杂度上减少了2^(10)。结果说明HALFLOOP算法无法抵抗相关调柄下的三明治攻击。 展开更多
关键词 轻量级分组密码 相关调柄攻击 截断三明治区分器 布尔可满足性问题 密钥恢复攻击
在线阅读 下载PDF
再论Hash-ECB-Hash结构在线密码的构造
6
作者 刘刚 王鹏 +1 位作者 魏荣 叶顶锋 《信息安全学报》 2026年第1期227-242,共16页
在线密码是众多密码方案如认证加密方案等中使用的重要组件。考虑到运算性能和安全性,Hash-ECB-Hash结构为构造并行计算的且在选择密文攻击下安全的在线密码提供了潜在的可能性。本文我们从分析在线密码POE开始,POE是到目前为止已有文... 在线密码是众多密码方案如认证加密方案等中使用的重要组件。考虑到运算性能和安全性,Hash-ECB-Hash结构为构造并行计算的且在选择密文攻击下安全的在线密码提供了潜在的可能性。本文我们从分析在线密码POE开始,POE是到目前为止已有文献中唯一使用Hash-ECB-Hash结构的在线密码,然而,POE中哈希层使用的哈希函数的AXU抗碰撞性质不能像它声称的那样保证其安全性。Nandi给出了一种有效的区分攻击,仅需一次加密询问。为了防止对POE的攻击,其哈希层的分量函数在同一和不同加密询问的输出之间碰撞概率都应该是可忽略的。然后我们针对哈希层提出了在线泛哈希函数(OUHF)的概念来满足这种条件,包括OAU函数和OAXU函数,并且证明如果哈希层使用OAU函数且底层分组密码是在选择密文攻击下安全的,则Hash-ECB-Hash结构在选择密文攻击下也是安全的。我们给出了几种OAU函数的构造,包括CFB和CBC模式,还给出了两种新的构造,其一是基于有限域上乘法函数的构造MCFB,另一种是使用输入输出异或链接方式的构造XCH。之后,基于CCA安全的在线密码OC,通过添加Nonce、关联数据、认证码的生成等处理过程到在线密码中,我们构造了一个简单的在线认证加密方案OAE[OC]。然后我们对在线认证加密方案的安全性重新定义,并使用归约证明技术论证了其安全性,包括机密性和完整性。最后,我们总结了从在线密码到在线认证加密方案的一些设计理念。 展开更多
关键词 在线密码 POE Hash-ECB-Hash结构 在线泛哈希函数 在线认证加密方案
在线阅读 下载PDF
BeeCipher:一种32bit分组长度的轻量级密码算法 被引量:2
7
作者 罗宜元 林智伟 +1 位作者 陈炜家 徐禄丰 《上海电机学院学报》 2016年第1期38-42,49,共6页
设计了一个32bit分组长度、64bit密钥长度的分组密码BeeCipher。该算法基于国际数据加密算法(IDEA)和Lai-Massey结构,对IDEA算法的32bit版本的轮函数进行了改进,添加了正交置换,使得其具有可证明安全性;修改了密钥调度过程,使得目前已... 设计了一个32bit分组长度、64bit密钥长度的分组密码BeeCipher。该算法基于国际数据加密算法(IDEA)和Lai-Massey结构,对IDEA算法的32bit版本的轮函数进行了改进,添加了正交置换,使得其具有可证明安全性;修改了密钥调度过程,使得目前已有的对IDEA算法的攻击都对BeeCipher无效。BeeCipher的软件和硬件实现都很简单,其速度较目前已有的大多数32bit分组长度算法要快很多,是32bit分组长度轻量级分组密码中有力的候选算法。 展开更多
关键词 计算机安全 密码学 分组密码 轻量级
在线阅读 下载PDF
7轮SPRING128-128的截断差分攻击
8
作者 周文长 张潇 《密码学报(中英文)》 北大核心 2026年第1期97-108,共12页
SPRING分组密码是全国密码算法设计竞赛2020年公布的优胜分组密码算法.截断差分分析是基于差分分析的一种分析方法,其主要思想是研究输入的部分差分对输出差分的影响.本文利用SPRING分组密码SubRow变换和矩阵转置变换的性质构造出SPRING... SPRING分组密码是全国密码算法设计竞赛2020年公布的优胜分组密码算法.截断差分分析是基于差分分析的一种分析方法,其主要思想是研究输入的部分差分对输出差分的影响.本文利用SPRING分组密码SubRow变换和矩阵转置变换的性质构造出SPRING128-128的5轮截断差分特征,进而对7轮SPRING128-128进行了密钥恢复攻击,其数据复杂度为2^(79)选择明文,存储复杂度为2^(44)字节,时间复杂度为2^(122)7轮SPRING128-128加密.这是SPRING128-128目前最优的分析结果. 展开更多
关键词 差分分析 截断差分分析 分组密码 SPRING
在线阅读 下载PDF
Ballet128分组密码的不可能差分分析
9
作者 张潇 吕继强 《密码学报(中英文)》 北大核心 2026年第1期133-146,共14页
Ballet分组密码是全国密码算法设计竞赛优胜分组密码算法之一,它整体采用ARX结构,共有Ballet128-128、Ballet128-256和Ballet256-256三个版本.在Ballet128不可能差分研究方面,目前仅有设计者给出的7轮不可能差分特征.本文重新评估了Ball... Ballet分组密码是全国密码算法设计竞赛优胜分组密码算法之一,它整体采用ARX结构,共有Ballet128-128、Ballet128-256和Ballet256-256三个版本.在Ballet128不可能差分研究方面,目前仅有设计者给出的7轮不可能差分特征.本文重新评估了Ballet128算法的不可能差分安全性,利用Ballet128算法轮函数中密钥异或运算和数据移动位置的特性,给出8轮Ballet128的不可能差分特征,并构建了Ballet128的等价结构,利用等价结构给出了11轮Ballet128-128的不可能差分攻击和13轮Ballet128-256的不可能差分攻击.8轮是目前已知的Ballet128算法最长的不可能差分特征轮数. 展开更多
关键词 分组密码 Ballet算法 不可能差分分析 早中止技术
在线阅读 下载PDF
30轮LBC-IoT算法的线性分析
10
作者 李灵琛 陈佐甲 +1 位作者 韦永壮 叶涛 《通信学报》 北大核心 2026年第2期209-218,共10页
为了评估LBC-IoT算法抵抗线性分析的能力,基于MILP自动化搜索技术,同时采用直接搜索和迭代线性逼近循环构建两种方法求解轮数最长的线性逼近集合,并在扩展轮数尽可能长的情况下得到每一条线性逼近的初始密钥猜测基。进一步结合最小猜测... 为了评估LBC-IoT算法抵抗线性分析的能力,基于MILP自动化搜索技术,同时采用直接搜索和迭代线性逼近循环构建两种方法求解轮数最长的线性逼近集合,并在扩展轮数尽可能长的情况下得到每一条线性逼近的初始密钥猜测基。进一步结合最小猜测基技术对初始密钥猜测基进行压缩,以此筛选出最优线性逼近进行密钥恢复攻击。结果表明,LBC-IoT算法共有6条线性偏差为2^(-15)的23轮线性逼近,其中存在唯一一条最小猜测基仅为52 bit的最优线性逼近。基于该区分器向上和向下分别扩展3轮和4轮,首次对LBC-IoT算法发起了最长30轮的密钥恢复攻击。该攻击的数据、时间和存储复杂度分别为2^(30)个已知明文、2^(77.9)次30轮加密和2^(52)。相比已有结果,攻击轮数整体提升了4轮,导致LBC-IoT算法的安全冗余轮数不足7%,不建议用于实际的通信数据加密。 展开更多
关键词 轻量级分组密码 LBC-IoT算法 线性分析 最小猜测基
在线阅读 下载PDF
Study on cipher propertys of constant weight codes
11
作者 Lin Bogang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期458-461,共4页
Constant weight code is an important error-correcting control code in communications. Basic structure of constant weight codes for some arriving at Johnson bound, A(n, 2u, w), is presented. Some correlative property... Constant weight code is an important error-correcting control code in communications. Basic structure of constant weight codes for some arriving at Johnson bound, A(n, 2u, w), is presented. Some correlative propertys of the codes, the solution of arriving at Johnson bound, and the results on the couple constant code and some constant weight codes are discussed. The conclusion is verified through four examples. 展开更多
关键词 constant weight code Johnson bound couple relation boundary property combination cipher.
在线阅读 下载PDF
Cipher quasi-chaotic code for frequency hopping communications
12
作者 王宏霞 何晨 虞厥邦 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期248-256,共9页
The chaotic frequency hopping (FH) communication systems have been presented so far. The chaotic sequences possesses good randomness and sensitive dependence on initial conditions, which is quite advantageous to run t... The chaotic frequency hopping (FH) communication systems have been presented so far. The chaotic sequences possesses good randomness and sensitive dependence on initial conditions, which is quite advantageous to run the FH codes in code-division multiple access (CDMA) systems. But the finite precision of computation and the fact of the low-dimensional chaos predicted easily cause difficulty in chaotic application. In this paper, some disadvantages associated with the conventional FH codes and the chaotic code scrambled by m-sequences are reviewed briefly. In order to overcome these drawbacks to some extents, a new higher performance FH code called cipher quasi-chaotic (CQC) code is proposed, which is generated by combining the clock-controlled stream cipher technique and chaotic dynamics. Performance analysis applying in FH communication systems of this kind of code is given. The privacy of the CQC sequence is also analyzed. 展开更多
关键词 frequency hopping Hamming correlation CHAOS clock-controlled stream cipher.
在线阅读 下载PDF
可逆矩阵的性质及其在密码学中的应用
13
作者 刘俊耕 《计算机应用文摘》 2026年第6期172-174,共3页
可逆矩阵是一个非常重要的概念,因其独特的代数性质,在许多学科中具有广阔的应用前景。系统梳理了可逆矩阵的若干重要特性(如行列式非零性、逆矩阵的存在唯一性和满秩性等),并以希尔密码的加密、解密和密钥生成等为例,深入探讨可逆矩阵... 可逆矩阵是一个非常重要的概念,因其独特的代数性质,在许多学科中具有广阔的应用前景。系统梳理了可逆矩阵的若干重要特性(如行列式非零性、逆矩阵的存在唯一性和满秩性等),并以希尔密码的加密、解密和密钥生成等为例,深入探讨可逆矩阵在保障信息安全方面的关键作用,为相关学科的理论研究和实际应用奠定基础。 展开更多
关键词 可逆矩阵 密码学 希尔密码 信息安全
在线阅读 下载PDF
巧用Cipher命令指定修复代理人
14
作者 李翠平 《科技创新导报》 2008年第6期175-175,177,共2页
本文介绍了使用cipher命令,简单快速创建EFS的修复代理人的方法。其中修复代理人的指定涉及到了服务器中用户权限的升级问题,以及在服务器中关于组策略的具体使用。这些方法的使用保证了cipher命令产生的密钥能被顺利运用。
关键词 cipher 修复代理人 加密 解密
在线阅读 下载PDF
Differential Collision Attack on Reduced FOX Block Cipher 被引量:6
15
作者 Chen Jie Hu Yupu +1 位作者 Zhang Yueyu Dong Xiaoli 《China Communications》 SCIE CSCD 2012年第7期71-76,共6页
This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has... This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242.8 4-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round. 展开更多
关键词 CRYPTOGRAPHY block cipher FOX differential collision attack
在线阅读 下载PDF
Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers 被引量:5
16
作者 Kai Zhang Jie Guan Bin Hu 《China Communications》 SCIE CSCD 2018年第2期54-66,共13页
In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible... In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible differential cryptanalysis and zero-correlation linear cryptanalysis are among the most powerful attacks, and the key problems for these two attacks are discovering more and longer impossible differentials(IDs) and zero-correlation linear hulls(ZCLHs). However, finding new IDs and ZCLHs for ARX ciphers has been a manual work for a long time, which has been an obstacle in improving these two attacks. This paper proposes an automatic search method to improve the efficiency of finding new IDs and ZCLHs for ARX ciphers. In order to prove the efficiency of this new tool, we take HIGHT, LEA, SPECK three typical ARX algorithms as examples to explore their longer and new impossible differentials and zero-correlation linear hulls. To the best of our knowledge, this is the first application of automatic search method for ARX ciphers on finding new IDs and ZCLHs. For HIGHT, we find more 17 round IDs and multiple 17 round ZCLHs. This is the first discovery of 17 round ZCLHs for HIGHT. For LEA, we find extra four 10 round IDs and several 9 round ZCLHs. In the specification of LEA, the designers just identified three 10 round IDs and one 7round ZCLH. For SPECK, we find thousands of 6 round IDs and forty-four 6 round ZCLHs. Neither IDs nor ZCLHs of SPECK has been proposed before. The successful application of our new tool shows great potential in improving the impossible differential cryptanalysis and zero-correlation linear cryptanalysis on ARX ciphers.. 展开更多
关键词 automatic search tool impossibledifferential cryptanalysis zero-correlation lin-ear cryptanalysis ARX ciphers modes opera-tion
在线阅读 下载PDF
Improved Feistel-based ciphers for wireless sensor network security 被引量:3
17
作者 Tamara PAZYNYUK George S. OREKU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1111-1117,共7页
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accor... Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on. 展开更多
关键词 SECURITY cipher Wireless sensor network (WSN) Feistel scheme
在线阅读 下载PDF
Fault-Propagate Pattern Based DFA on PRESENT and PRINTcipher 被引量:2
18
作者 ZHAO Xinjie GUO Shize +2 位作者 WANG Tao ZHANG Fan SHI Zhijie 《Wuhan University Journal of Natural Sciences》 CAS 2012年第6期485-493,共9页
This article proposes an enhanced differential fault analysis(DFA) method named as fault-propagation pattern-based DFA(FPP-DFA).The main idea of FPP-DFA is using the FPP of the ciphertext difference to predict the... This article proposes an enhanced differential fault analysis(DFA) method named as fault-propagation pattern-based DFA(FPP-DFA).The main idea of FPP-DFA is using the FPP of the ciphertext difference to predict the fault location and the fault-propagation path.It shows that FPP-DFA is very effective on SPN structure block ciphers using bitwise permutation,which is applied to two block ciphers.The first is PRESENT with the substitution permutation sequence.With the fault model of injecting one nibble fault into the r-2nd round,on average 8 and 16 faults can reduce the key search space of PRESENT-80/128 to 214.7 and 221.1,respectively.The second is PRINTcipher with the permutation substitution sequence.For the first time,it shows that although the permutation of PRINTcipher is secret key dependent,FPP-DFA still works well on it.With the fault model of injecting one nibble fault into the r-2nd round,12 and 24 effective faults can reduce the key search space of PRINTcipher-48/96 to 213.7 and 222.8,respectively. 展开更多
关键词 fault-propagation pattern differential fault analysis bitwise permutation SPN block cipher PRESENT PRINTcipher
原文传递
A fast image encryption algorithm based on only blocks in cipher text 被引量:2
19
作者 王兴元 王倩 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第3期165-172,共8页
In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simul- taneously. The cipher-text image is divided into blocks and each block has k x k pixels, while the... In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simul- taneously. The cipher-text image is divided into blocks and each block has k x k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed ac- cording to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks. 展开更多
关键词 image encryption shuffle and diffuse simultaneously block cipher logistic map
原文传递
Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32 被引量:1
20
作者 张文英 刘枫 +1 位作者 刘宣 孟帅 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第2期147-152,共6页
We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same... We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same key length of 80 bits. On the basis of the bit-oriented faulty model and the differential analysis principle, we describe the attack that combines differential fault attack with the meet-in-the-middle (MITM) attack on the KATAN32. More precisely, inducing a fault at a bit, we can recover some linear differential fault equations on the key bits. During solving equations, without the help of computer, we need only algebraic deduction to obtain relations of some key bits. The complexity in this process is neglectable. The secret key of the full cipher can be recovered faster than exhaustive search for all three block sizes in the KATAN family. Our result describes that KATAN32 is vulnerable. 展开更多
关键词 KATAN32 DIFFERENTIAL FAULT analysis meet-in-the-middle (MITM) ATTACK BLOCK cipher LIGHTWEIGHT cipher
原文传递
上一页 1 2 127 下一页 到第
使用帮助 返回顶部