您的位置: 专家智库 > >

国家自然科学基金(ZR2012FM004)

作品数:4 被引量:7H指数:1
发文基金:国家自然科学基金更多>>
相关领域:电子电信自动化与计算机技术化学工程更多>>

文献类型

  • 3篇中文期刊文章

领域

  • 2篇电子电信
  • 1篇自动化与计算...

主题

  • 1篇代数
  • 1篇代数学
  • 1篇数学
  • 1篇网络
  • 1篇密码
  • 1篇密钥长度
  • 1篇分组密码
  • 1篇OPTIMA...
  • 1篇TN
  • 1篇AI
  • 1篇BLOCK
  • 1篇CONSTR...
  • 1篇DIFFER...
  • 1篇EIGHT
  • 1篇FAULT
  • 1篇FEISTE...
  • 1篇FEISTE...
  • 1篇CIPHER
  • 1篇BALANC...
  • 1篇ATTACK

传媒

  • 1篇The Jo...
  • 1篇Journa...
  • 1篇Wuhan ...

年份

  • 2篇2014
  • 1篇2013
4 条 记 录,以下是 1-3
排序方式:
Eight-sided fortress: a lightweight block cipher被引量:5
2014年
In this paper, we present a new lightweight block cipher named eight-sided fortress(ESF), which is suitable for resource-constrained environments such as sensor networks and low-cost radio rrequency identification(RFID) tags. Meanwhile, we present the specification, design rationale and evaluation results in terms of the hardware implementation. For realizing both efficiency and security in embedded systems, similar to the other lightweight block ciphers, ESF is 64 bits block length and key size is 80 bits. It is inspired from existing block cipher, PRESENT and LBlock. The encryption algorithm of ESF is based on variant Feistel structure with SPN round function, used Feistel network as an overall structure with the purpose of minimizing computational resources.
LIU XuanZHANG Wen-yingLIU Xiang-zhongLIU Feng
关键词:分组密码FEISTEL结构FEISTEL网络密钥长度
Construction of Balanced Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity被引量:1
2014年
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents one main result to find balanced rotation symmetric Boolean functions with maximum algebraic immunity. Through swapping the values of two orbits of rotation class of the majority function, a class of 4k+1 variable Boolean functions with maximum algebraic immunity is constructed. The function f(x) we construct always has terms of degree n-2 independence of what ever n is. And the nonlinearity of f(x) is relatively good for large n.
ZHANG Wenying
Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32被引量:1
2013年
We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same key length of 80 bits. On the basis of the bit-oriented faulty model and the differential analysis principle, we describe the attack that combines differential fault attack with the meet-in-the-middle (MITM) attack on the KATAN32. More precisely, inducing a fault at a bit, we can recover some linear differential fault equations on the key bits. During solving equations, without the help of computer, we need only algebraic deduction to obtain relations of some key bits. The complexity in this process is neglectable. The secret key of the full cipher can be recovered faster than exhaustive search for all three block sizes in the KATAN family. Our result describes that KATAN32 is vulnerable.
张文英刘枫刘宣孟帅
关键词:DIFFERENTIALFAULTATTACKBLOCKCIPHERLIGHTWEIGHTCIPHER
共1页<1>
聚类工具0