- 1、本文档共61页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
分组密码中Feistel结构算法的安全性分析-密码学专业论文
Ab
Abstract
6Ab
6
Abstract
万方数据
万方数据
万方数据
万方数据
Abstract
Block Cipher is widely used in data encryption of message communication. It is the fundamental algorithm and theory of cryptography, and also the rationale and component of designing other ciphers. The discussion on security of block cipher mainly contains differential cryptanalysis, linear cryptanalysis and exhaustive attack. As new ciphers appear constantly, the design and analysis on a class of Feistel cipher developes towards diversified directions, to which the analysis of security has great practical significance.
The main works of this paper are as follows: Firstly, we summarize the basis theory of block cipher designing and analysis methods we have known, and mainly introduce Feistel structure. Secondly, based on the research and recognition of the preceding knowledge, this paper introduces a new chosen text attack, the impossible differential-linear attack, on iterated cryptosystem. The attack is a general approach, which can be implemented by constructing a distinguisher catenating the impossible differential and the linear approximation together. It can be applied to the Feistel structure effectively. Then, we introduce CLEFIA, a representative cipher of Feistel families, and present a 11-round attack on it with differential-linear cryptanalysis. The
data complexity is
2116.52 , and we recover 96-bit keys in total. After that, the paper
focuses on analyzing CLEFIA-128 with impossible differential-linear attack we proposed. The attack is efficient for 16-round CLEFIA with whitening keys. At first we construct a 13-round impossible differential-linear distinguisher. Based on the distinguisher, we present an effective attack on CLEFIA-128 with data complexity of
2122.73 , recovering 96-bit subkeys in total. It is the best result at present. At last, some
other results during the research are introduced, including another 13-round impossible differential-linear distinguisher, another 16-round attack
您可能关注的文档
- 分布式能源及独立微网容量配置与运行优化研究-控制工程专业论文.docx
- 分布式能源规划在生态城市建设中生态特性研究-项目管理专业论文.docx
- 分布式能源管理系统的研究与应用-管理系统工程专业论文.docx
- 分布式自动列车监控系统中央子系统的设计与研究-计算机应用技术专业论文.docx
- 分布式自动化测试框架的研究和实现-计算机技术专业论文.docx
- 分布式航天后勤管理信息系统开发及应用-企业信息系统专业论文.docx
- 分布式蓄电池管理系统的研究-电气工程专业论文.docx
- 分布式虚拟化计算平台高可靠任务拆分系统的设计与实现-计算机系统结构专业论文.docx
- 分布式虚拟现实系统中的地形数据组织与基于地形的曲线绘制-计算机应用技术专业论文.docx
- 分布式视频压缩感知中帧分类和重构质量研究-信号与信息处理专业论文.docx
- 分组密码扩散层的改进研究-信号与信息处理专业论文.docx
- 分组密码电路的差分功耗分析新技术研究-计算机系统结构专业论文.docx
- 分组密码区分器的设计及应用研究-信息与通信工程专业论文.docx
- 分组密码的Boomerang分析方法分析-计算机软件与理论专业论文.docx
- 分组密码的Boomerang分析方法研究-计算机软件与理论专业论文.docx
- 分组密码的设计分析及其关键技术的应用应用数学专业论文.docx
- 分组密码的差分故障分析-信息安全专业论文.docx
- 分组密码算法的分析与设计-信息安全专业论文.docx
- 分组教学在中职英语词汇教学中的应用研究-教学(英语)专业论文.docx
- 分组教学在中职英语词汇教学中的应用研究教学(英语)专业论文.docx
文档评论(0)