期刊文献+

迭代混沌映射的S盒构造方法 被引量:2

A method for generating S-box based on iterating chaotic maps
下载PDF
导出
摘要 置换盒又称为S盒,是分组密码中常采用的重要部件。首先对评价S盒性能的指标进行了分析,以非线性度、完全雪崩准则、输出比特间独立性、差分均匀性和双射作为主要的评价指标。然后利用混沌系统在相空间的高度非线性,提出了一种迭代混沌映射的S盒构造方法。仿真检测表明,利用该算法产生的S盒具有很好的密码学特性,为开发新的分组密码算法和动态S盒加密方法奠定了很好的基础。 Substitution box (S-box) is an important component in the block cipher. Firstly, the performance indices of S-box were summarized. Five properties, such as nonlinearity, SAC, BIC, differential uniformity and bijection, were employed as the main indices to evaluate S-boxes. By using the characteristic that the distribution of chaotic obit in the phase space is nonlinear, a method for constructing S-box based on iterating chaotic maps was proposed. Simulation tests show that a set of S-boxes with high cryptographic properties can be obtained by using the proposed method, which is very helpful for design block cipher and eneryption algorithms with dynamic S-boxes.
出处 《重庆邮电大学学报(自然科学版)》 北大核心 2010年第1期89-93,共5页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 国家自然科学基金项目(60703035) 重庆市科委自然科学基金项目(2008BB2193 2009BB2288)
关键词 S盒 混沌 密码学 信息安全 S-box chaos cryptography information security
  • 相关文献

参考文献11

  • 1邢冀鹏 邹雪城 郭旭.Ultra-low power S-Boxes architecture for AES.The Journal of China Universities of Posts and Telecommunications(中国邮电高校学报:英文版),2008,15(1):112-117.
  • 2JAKIMOSKI Goce, KOCAREV Ljupco. Chaos and cryptography: Block encryption ciphers based on chaotic maps [ J]. IEEE Trans Circuits and Systems-Ⅰ, 2001,48(2) : 163-169.
  • 3TANG Guo-ping, LIAO Xiao-feng , CHEN Yong. A novel method for designing S-boxes based on chaotic maps [ J ]. Chaos, Solitons and Fractals, 2005, 23: 413-419.
  • 4BRANSTAD D K, GAIT J , KATZKE S. Report on the Workshop on Cryptography in Support of Computer Security[ M ]. USA: NBSIR National Bureau of Standards, 1976: 77-121.
  • 5ADMS C M, TAVARES S E. The Structured Design of Cryptographically Good S-Boxes[ J]. Journal of Cryptology, 1990, 1(3) : 27-41.
  • 6HEYS H M, TAVARES S E. The Design of SubstitutionPermutation Networks Resistant to Differential and Linear Cryptaualysis [ C ] // Proceedings of the 2^nd Annual ACM Conference on Computer and Communications Security. New York: ACM Press, 1994:148-155.
  • 7刘晓晨,冯登国.满足若干密码学性质的S-盒的构造[J].软件学报,2000,11(10):1299-1302. 被引量:26
  • 8YI Xun, CHENG Shi-xin, YOU Xiao-hu. A Method for Obtaining Cryptographically Strong 8 × 8 S-boxes [ C ]// Proceedings of Global Telecommunications Conference 1997, Phoenix, AZ. USA :IEEE press, 1997 : 689-693.
  • 9WEBSTER A F, TAVARES S E. On the Design of S-Boxes [ C ]//In Proc. of CRYPTO 85. New York : Springer- Verlag, 1986:523-534.
  • 10ADAMAS C, TAVARES S. Good S-boxes Are Easy to Find[ J]. Lecture Notes in Computer Science 1989,435 ( 1 ) : 612-615.

二级参考文献2

  • 1冯登国,密码学导引,1999年
  • 2Liu Zhenhua,密码学进展.Chinacrypt’96,1996年,56页

共引文献25

同被引文献20

  • 1赵林森,刘景美,王翀.AES S盒的马尔可夫性质研究[J].电子科技,2007,20(8):1-3. 被引量:2
  • 2Schuster H G,Just W.Deterministic Chaos:An In-troduction,4th,Revised and Enlarged Edition[M].Federal Republic of Germany:WILEY-VCH VerlagGmbH&Co.KGaA,Weinheim,2005:2-10.
  • 3Matthews R.On the derivation of a“chaotic”encryp-tion algorithm[J].Cryptologia.1989,13(1):29-42.
  • 4Narendra K Pareek,Vinod Patidar,Krishan K Sud.Block cipher using 1Dand 2Dchaotic maps[J].Inter-national Journal of Information and CommunicationTechnology.2010,2(3):244-259.
  • 5Goce J,Ljupco K.Chaos and cryptography:block encryp-tion ciphers based on chaotic maps[J].IEEE TransactionsCircuits And System-I,2001,48(2):163-170.
  • 6王永,杜茂康,罗龙艳,等,一种基于迭代混沌映射的S盒设计方法[C] //第1届中国混沌研讨会论文集,2007:60-64.
  • 7Emmanuel Desurvire,Classical and Quantum InformationTheory:An Introduction for the Telecom Scientist[M].New York:Cambridge University Press,2009:69-80.
  • 8Institute of Electrical and Eclectronics Engineers.IEEEStandard for Binary Floating-Point Arithmetic[S/OL].(2001-08-06)[2011-10-10] ,http://www.cs.berkeley.edu/-wkahan/ieee754status/ieee754.pdf.
  • 9Liu F W, Koenig H. A survey of video encryption algorithms EJ]. Computers Seeurity,2010,29(1):3-15.
  • 10Tang L. Methods for encrypting and decrypting MPEG video da- ta effieientlyFC]//Proeeedings of the fourth ACM international on multimedia. 1996 : 219-229.

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部