期刊文献+
共找到213篇文章
< 1 2 11 >
每页显示 20 50 100
An Improved Framework of Massive Superpoly Recovery in Cube Attacks Against NFSR-Based Stream Ciphers
1
作者 LIU Chen TIAN Tian QI Wen-Feng 《密码学报(中英文)》 CSCD 北大核心 2024年第5期1179-1198,共20页
A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently... A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers. 展开更多
关键词 NFSR-based stream ciphers cube attacks MILP Trivium
在线阅读 下载PDF
Quantum Circuit Implementation and Resource Evaluation of Ballet‑p/k Under Grover’s Attack
2
作者 HONG Rui-Peng ZHANG Lei +3 位作者 PANG Chen-Xu LI Guo-Yuan DING Ding WANG Jian-Xin 《密码学报(中英文)》 北大核心 2025年第5期1178-1194,共17页
The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for thre... The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for three versions of the Ballet family block ciphers.The Ballet‑p/k includes a modular-addition operation uncommon in lightweight block ciphers.Quantum ripple-carry adder is implemented for both“32+32”and“64+64”scale to support this operation.Subsequently,qubits,quantum gates count,and quantum circuit depth of three versions of Ballet algorithm are systematically evaluated under quantum computing model,and key recovery attack circuits are constructed based on Grover’s algorithm against each version.The comprehensive analysis shows:Ballet-128/128 fails to NIST Level 1 security,while when the resource accounting is restricted to the Clifford gates and T gates set for the Ballet-128/256 and Ballet-256/256 quantum circuits,the design attains Level 3. 展开更多
关键词 Grover’s algorithm quantum circuit Ballet family block ciphers quantum ripple-carry adder
在线阅读 下载PDF
Differential-Linear Attacks on Ballet Block Cipher
3
作者 ZHOU Yu CHEN Si-Wei +2 位作者 XU Sheng-Yuan XIANG Ze-Jun ZENG Xiang-Yong 《密码学报(中英文)》 北大核心 2025年第2期469-488,共20页
Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective ... Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differential-linear(DL)cryptanalysis.Specifically,we present an automated search for the DL distinguishers of Ballet based on MILP/MIQCP.For the versions with block sizes of 128 and 256 bits,we obtain 16 and 22 rounds distinguishers with estimated correlations of 2^(-59.89)and 2^(-116.80),both of which are the publicly longest distinguishers.In addition,this study incorporates the complexity information of key-recovery attacks into the automated model,to search for the optimal key-recovery attack structures based on DL distinguishers.As a result,we mount the key-recovery attacks on 16-round Ballet-128/128,17-round Ballet-128/256,and 21-round Ballet-256/256.The data/time complexities for these attacks are 2^(108.36)/2^(120.36),2^(115.90)/2^(192),and 2^(227.62)/2^(240.67),respectively. 展开更多
关键词 Ballet block cipher differential-linear(DL)cryptanalysis MILP/MIQCP distinguisher key-recovery attacks
在线阅读 下载PDF
Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers 被引量:5
4
作者 Kai Zhang Jie Guan Bin Hu 《China Communications》 SCIE CSCD 2018年第2期54-66,共13页
In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible... In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible differential cryptanalysis and zero-correlation linear cryptanalysis are among the most powerful attacks, and the key problems for these two attacks are discovering more and longer impossible differentials(IDs) and zero-correlation linear hulls(ZCLHs). However, finding new IDs and ZCLHs for ARX ciphers has been a manual work for a long time, which has been an obstacle in improving these two attacks. This paper proposes an automatic search method to improve the efficiency of finding new IDs and ZCLHs for ARX ciphers. In order to prove the efficiency of this new tool, we take HIGHT, LEA, SPECK three typical ARX algorithms as examples to explore their longer and new impossible differentials and zero-correlation linear hulls. To the best of our knowledge, this is the first application of automatic search method for ARX ciphers on finding new IDs and ZCLHs. For HIGHT, we find more 17 round IDs and multiple 17 round ZCLHs. This is the first discovery of 17 round ZCLHs for HIGHT. For LEA, we find extra four 10 round IDs and several 9 round ZCLHs. In the specification of LEA, the designers just identified three 10 round IDs and one 7round ZCLH. For SPECK, we find thousands of 6 round IDs and forty-four 6 round ZCLHs. Neither IDs nor ZCLHs of SPECK has been proposed before. The successful application of our new tool shows great potential in improving the impossible differential cryptanalysis and zero-correlation linear cryptanalysis on ARX ciphers.. 展开更多
关键词 automatic search tool impossibledifferential cryptanalysis zero-correlation lin-ear cryptanalysis ARX ciphers modes opera-tion
在线阅读 下载PDF
Improved Feistel-based ciphers for wireless sensor network security 被引量:3
5
作者 Tamara PAZYNYUK George S. OREKU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1111-1117,共7页
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accor... Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on. 展开更多
关键词 SECURITY CIPHER Wireless sensor network (WSN) Feistel scheme
在线阅读 下载PDF
New AES Dual Ciphers Based on Rotation of Columns
6
作者 YANG Min XIAO Benchang MENG Qingshu 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期93-97,共5页
Based on the different representations of the finite field GF(256), there are different Advanced Encryption Standard(AES) implementations, which is called dual ciphers. They have the same encryption process as AES, bu... Based on the different representations of the finite field GF(256), there are different Advanced Encryption Standard(AES) implementations, which is called dual ciphers. They have the same encryption process as AES, but with parameters modified. The research of dual ciphers initially aims to find more efficient AES implementations, and later it is found that they can be used to resist side-channel attacks and for white box ciphers. In this paper, based on the rotation of columns, we propose new AES dual ciphers, which use AES directly, but with the input matrices(plaintexts and keys) and output matrix rotated. The key expansion algorithm only needs some change on the computation sequence. Because of these features, there is almost no extra cost in implementing dual ciphers and it is easy for new dual ciphers to work with other side-channel protection methods to protect AES in more dimensions. 展开更多
关键词 AES DUAL CIPHER side channel security differential power analysis TEMPLATE ATTACK
原文传递
Further Analysis of Block Ciphers against Timing Attacks
7
作者 LI Wei GU Dawu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1629-1632,共4页
Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks an... Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks and studies the vulnerability of operations and modules on timing attacks. We present a method to transfer the security of the algorithm to that of secure operations by reduction. As a result, we hopefully tend to reconcile the provable security notions and modem cryptography with real-world implementations of block ciphers. 展开更多
关键词 timing attacks block ciphers REDUCTION
在线阅读 下载PDF
A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers
8
作者 Arkan Kh Shakr Sabonchi Bahriye Akay 《Computer Systems Science & Engineering》 SCIE EI 2021年第10期87-106,共20页
This paper presents state-of-art cryptanalysis studies on attacks of the substitution and transposition ciphers using various metaheuristic algorithms.Traditional cryptanalysis methods employ an exhaustive search,whic... This paper presents state-of-art cryptanalysis studies on attacks of the substitution and transposition ciphers using various metaheuristic algorithms.Traditional cryptanalysis methods employ an exhaustive search,which is computationally expensive.Therefore,metaheuristics have attracted the interest of researchers in the cryptanalysis field.Metaheuristic algorithms are known for improving the search for the optimum solution and include Genetic Algorithm,Simulated Annealing,Tabu Search,Particle Swarm Optimization,Differential Evolution,Ant Colony,the Artificial Bee Colony,Cuckoo Search,and Firefly algorithms.The most important part of these various applications is deciding the fitness function to guide the search.This review presents how these algorithms have been implemented for cryptanalysis purposes.The paper highlights the results and findings of the studies and determines the gaps in the literature. 展开更多
关键词 CRYPTANALYSIS metaheuristic algorithms substitution cipher transposition cipher
在线阅读 下载PDF
A New Black Box Analysis of Hash Functions Based on Block Ciphers
9
作者 达林 多磊 +1 位作者 Matt Henricksen 李超 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期664-669,共6页
For the 64 most basic ways to construct a hash function H:{0,1} → {0,1}n from a block cipher E:{0,1}n × {0,1}n → {0,1}n, Black et al.provided a formal and quantitative treatment of the 64 constructions, and pro... For the 64 most basic ways to construct a hash function H:{0,1} → {0,1}n from a block cipher E:{0,1}n × {0,1}n → {0,1}n, Black et al.provided a formal and quantitative treatment of the 64 constructions, and proved that 20 schemes are collision resistant.This paper improves the upper and lower bounds and make contrast with a hash constructed from a random oracle.These 20 schemes have only one kind of collision resistance upper and lower bounds.In addition, we present new advantages for finding second preimages. 展开更多
关键词 hash functions block cipher Merkel Damagard construction black box model
原文传递
STUDY ON STREAM CIPHERS USING GENERATING FUNCTIONS
10
作者 武传坤 《Journal of Electronics(China)》 1993年第1期34-40,共7页
Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functi... Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functions.Their minimal polynomials,periods,as wellas generating functions are given.As to finitely generated sequences,the change of their linearcomplexity profiles as well as the relationship between the two generated sequences usder thecase in which the degree of connected polynomials are fixed,are discussed. 展开更多
关键词 STREAM CIPHER GENERATING Function Complementery SEQUENCE Partial SUM SEQUENCE INVERSE Order SEQUENCE Finitely Generated SEQUENCE B-M Algorithm
在线阅读 下载PDF
Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding
11
作者 Anton Alekseychulk Sergey Gryshakov 《Journal of Mathematics and System Science》 2015年第12期516-522,共7页
We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We inves... We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers. 展开更多
关键词 Symmetric cryptography randomized stream cipher random coding computational security chosen-plaintext-chosen-initialization-vector attack.
在线阅读 下载PDF
Physical Layer Encryption of OFDM-PON Based on Quantum Noise Stream Cipher with Polar Code 被引量:2
12
作者 Xu Yinbo Gao Mingyi +3 位作者 Zhu Huaqing Chen Bowen Xiang Lian Shen Gangxiang 《China Communications》 SCIE CSCD 2024年第3期174-188,共15页
Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast e... Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast exposes the physical layer vulnerable to the threat of illegal eavesdropping. Quantum noise stream cipher(QNSC) is a classic physical layer encryption method and well compatible with the OFDM-PON. Meanwhile, it is indispensable to exploit forward error correction(FEC) to control errors in data transmission. However, when QNSC and FEC are jointly coded, the redundant information becomes heavier and thus the code rate of the transmitted signal will be largely reduced. In this work, we propose a physical layer encryption scheme based on polar-code-assisted QNSC. In order to improve the code rate and security of the transmitted signal, we exploit chaotic sequences to yield the redundant bits and utilize the redundant information of the polar code to generate the higher-order encrypted signal in the QNSC scheme with the operation of the interleaver.We experimentally demonstrate the encrypted 16/64-QAM, 16/256-QAM, 16/1024-QAM, 16/4096-QAM QNSC signals transmitted over 30-km standard single mode fiber. For the transmitted 16/4096-QAM QNSC signal, compared with the conventional QNSC method, the proposed method increases the code rate from 0.1 to 0.32 with enhanced security. 展开更多
关键词 physical layer encryption polar code quantum noise stream cipher
在线阅读 下载PDF
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices 被引量:1
13
作者 Sunil Kumar Dilip Kumar +3 位作者 Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You 《Computers, Materials & Continua》 SCIE EI 2024年第1期31-63,共33页
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ... The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio. 展开更多
关键词 IOT a sensor device LIGHTWEIGHT CRYPTOGRAPHY block cipher smart card security and privacy
在线阅读 下载PDF
Two-dimensional-lag complex logistic map with complex parameters and its encryption application
14
作者 张芳芳 武金波 +3 位作者 寇磊 马凤英 吴黎明 张雪 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期324-335,共12页
With the rapid development of internet technology,security protection of information has become more and more prominent,especially information encryption.Considering the great advantages of chaotic encryption,we propo... With the rapid development of internet technology,security protection of information has become more and more prominent,especially information encryption.Considering the great advantages of chaotic encryption,we propose a 2D-lag complex logistic map with complex parameters(2D-LCLMCP)and corresponding encryption schemes.Firstly,we present the model of the 2D-LCLMCP and analyze its chaotic properties and system stability through fixed points,Lyapunov exponent,bifurcation diagram,phase diagram,etc.Secondly,a block cipher algorithm based on the 2D-LCLMCP is proposed,the plaintext data is preprocessed using a pseudorandom sequence generated by the 2D-LCLMCP.Based on the generalized Feistel cipher structure,a round function F is constructed using dynamic S-box and DNA encoding rules as the core of the block cipher algorithm.The generalized Feistel cipher structure consists of two F functions,four XOR operations,and one permutation operation per round.The symmetric dynamic round keys that change with the plaintext are generated by the 2D-LCLMCP.Finally,experimental simulation and performance analysis tests are conducted.The results show that the block cipher algorithm has low complexit,good diffusion and a large key space.When the block length is 64 bits,only six rounds of encryption are required to provide sufficient security and robustness against cryptographic attacks. 展开更多
关键词 logistic map block ciphers chaotic system ENCRYPTION
原文传递
Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure:A Practice of Cryptography Approach
15
作者 Mingxing Zhou Peng Xiao +3 位作者 Qixu Wang Shuhua Ruan Xingshu Chen Menglong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期957-979,共23页
Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integra... Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss. 展开更多
关键词 6G multi-cloud trusted Infrastructure remote attestation commercial cipher
在线阅读 下载PDF
A New Double Layer Multi-Secret Sharing Scheme
16
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
在线阅读 下载PDF
Enable Excel-Based Basic Cybersecurity Features for End Users by Using Python-Excel Integration
17
作者 Mohamed Breik Osama Magdy +2 位作者 Essam Amin Tarek Aly Mervat Gheith 《Journal of Software Engineering and Applications》 2024年第6期522-529,共8页
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int... In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden. 展开更多
关键词 Python End-User Approach EXCEL Excel Add-In CYBERSECURITY URL Check API Virustotal API Encryption Decryption Vigenère Cipher Python-Excel Integration
在线阅读 下载PDF
Euclid算法及扩展在密码学中的研究和应用 被引量:3
18
作者 陈良臣 芦东昕 李春葆 《计算机技术与发展》 2006年第11期156-159,184,共5页
信息安全是网络时代的焦点,密码技术是信息安全的核心,而算法是密码学的精髓。文中研究了基于因数分解的Euclid算法和扩展Euclid算法,包括算法的基本原理、算法流程及编程实现。分析了Euclid算法的算法复杂性,介绍了Eu-clid算法在RSA和A... 信息安全是网络时代的焦点,密码技术是信息安全的核心,而算法是密码学的精髓。文中研究了基于因数分解的Euclid算法和扩展Euclid算法,包括算法的基本原理、算法流程及编程实现。分析了Euclid算法的算法复杂性,介绍了Eu-clid算法在RSA和Affine Cipher密码系统中的应用,最后指出了该算法存在的缺陷和算法需要改进的方向。 展开更多
关键词 Euclid算法 加密算法 RSA AFFINE CIPHER
在线阅读 下载PDF
General Method of Combining Grover and Simon for Attacking Block Ciphers
19
作者 Fu Xiangqun Bao Wansu +1 位作者 Shi Jianhong Li Tan 《China Communications》 SCIE 2024年第6期237-245,共9页
The compatibility of different quantum algorithms should be considered when these algorithms are combined.In this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions o... The compatibility of different quantum algorithms should be considered when these algorithms are combined.In this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions or assumptions.First,we give two preconditions of applying Grover’s algorithm,which ensure that the success probability of finding the marked element is close to 1.Then,based on these two preconditions,it is found out that the success probability of the quantum algorithm for FXconstruction is far less than 1.Furthermore,we give the design method of the Oracle function,and then present the general method of combining Grover and Simon algorithm for attacking block ciphers,with success probability close to 1. 展开更多
关键词 block ciphers post-quantum crypto quantum algorithms
在线阅读 下载PDF
关于加密数据的填充方式的研究 被引量:1
20
作者 樊志英 《现代电子技术》 2014年第22期20-23,共4页
针对不同平台环境下加解密的互通问题,结合Java平台下密码扩展服务Sun JCE提供的加密类函数Cipher,对加密算法中使用到的明文填充方式进行阐述。详细介绍加密时明文数据的常用填充规则,并比较数据填充前后的区别,深入分析Sun JCE支持的... 针对不同平台环境下加解密的互通问题,结合Java平台下密码扩展服务Sun JCE提供的加密类函数Cipher,对加密算法中使用到的明文填充方式进行阐述。详细介绍加密时明文数据的常用填充规则,并比较数据填充前后的区别,深入分析Sun JCE支持的填充方式与常用填充规则的对应性,并对RSA算法的加解密互通进行了测试。加密数据填充方式的研究,为Java平台与其他平台之间加解密参数的约定提供了依据。双方只有遵循相同的填充和去填充规则,才能实现有效的解密。 展开更多
关键词 SunJCE CIPHER 加密模式 填充
在线阅读 下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部