- 1、本文档共61页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
分组密码中Feistel结构算法的安全性分析-密码学专业论文
Ab
Abstract
6Ab
6
Abstract
万方数据
万方数据
万方数据
万方数据
Abstract
Block Cipher is widely used in data encryption of message communication. It is the fundamental algorithm and theory of cryptography, and also the rationale and component of designing other ciphers. The discussion on security of block cipher mainly contains differential cryptanalysis, linear cryptanalysis and exhaustive attack. As new ciphers appear constantly, the design and analysis on a class of Feistel cipher developes towards diversified directions, to which the analysis of security has great practical significance.
The main works of this paper are as follows: Firstly, we summarize the basis theory of block cipher designing and analysis methods we have known, and mainly introduce Feistel structure. Secondly, based on the research and recognition of the preceding knowledge, this paper introduces a new chosen text attack, the impossible differential-linear attack, on iterated cryptosystem. The attack is a general approach, which can be implemented by constructing a distinguisher catenating the impossible differential and the linear approximation together. It can be applied to the Feistel structure effectively. Then, we introduce CLEFIA, a representative cipher of Feistel families, and present a 11-round attack on it with differential-linear cryptanalysis. The
data complexity is
2116.52 , and we recover 96-bit keys in total. After that, the paper
focuses on analyzing CLEFIA-128 with impossible differential-linear attack we proposed. The attack is efficient for 16-round CLEFIA with whitening keys. At first we construct a 13-round impossible differential-linear distinguisher. Based on the distinguisher, we present an effective attack on CLEFIA-128 with data complexity of
2122.73 , recovering 96-bit subkeys in total. It is the best result at present. At last, some
other results during the research are introduced, including another 13-round impossible differential-linear distinguisher, another 16-round attack
您可能关注的文档
- 分布式能源及独立微网容量配置与运行优化研究-控制工程专业论文.docx
- 分布式能源规划在生态城市建设中生态特性研究-项目管理专业论文.docx
- 分布式能源管理系统的研究与应用-管理系统工程专业论文.docx
- 分布式自动列车监控系统中央子系统的设计与研究-计算机应用技术专业论文.docx
- 分布式自动化测试框架的研究和实现-计算机技术专业论文.docx
- 分布式航天后勤管理信息系统开发及应用-企业信息系统专业论文.docx
- 分布式蓄电池管理系统的研究-电气工程专业论文.docx
- 分布式虚拟化计算平台高可靠任务拆分系统的设计与实现-计算机系统结构专业论文.docx
- 分布式虚拟现实系统中的地形数据组织与基于地形的曲线绘制-计算机应用技术专业论文.docx
- 分布式视频压缩感知中帧分类和重构质量研究-信号与信息处理专业论文.docx
- 某县纪委监委开展“校园餐”突出问题专项整治工作汇报22.docx
- 中小学校园食品安全与膳食经费管理专项整治工作自查报告66.docx
- 某县委常委、宣传部部长年度民主生活会“四个带头”个人对照检查发言材料.docx
- XX县委领导班子年度述职述廉报告3.docx
- 某县纪委关于校园餐问题整治工作落实情况的报告.docx
- 中小学校园食品安全与膳食经费管理专项整治工作自查报告22.docx
- 某县税务局党委领导班子年度民主生活会“四个带头”对照检查材料.docx
- 某县委书记在县委常委班子年度民主生活会专题学习会上的讲话.docx
- 某县纪委校园餐问题整治工作落实情况的报告.docx
- 某区委副书记、区长年度民主生活会对照检查材料.docx
文档评论(0)