Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding
Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding
摘要
We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers.
参考文献13
-
1M.J. Mihaljevic, H. Imai, A stream ciphering approach based on wiretap channel coding, 8th Central European Conference of Cryptography 2008, Graz, Austria, July 2-4, E-Proc. (3 p.), 2008.
-
2M.J. Mihaljevic, H. Imai, An approach for stream cipher design based on joint computing over random and secret data, Computing, 2009, Vol. 85, N2 1-2, pp. 153-168.
-
3M.1. Mihaljevic, H. Imai, An information-theoretic and computational complexity security analysis of a randomized stream cipher model, 4th Western European Workshop on Research in Cryptology, WeWoRC 2011, Weimar, Germany, July 20-22, Conf. Record, 2011, pp. 21-25.
-
4M.J. Mihaljevic, H. Imai, Employment of homophonic coding for improvement of certain encryption approaches based on the LPN problem, Symmetric Key Encryption Workshop, SKEW 2011, Copenhagen, Denmark, Feb. 16-17, E-Proc. (17 p.), 2011.
-
5M.I. Mihaljevic, F. Oggier, H. Imai, Homophonic coding design for communication systems employing the encoding-encryption paradigm, arXiv: 10 12.5895v 1[cs.CR], 29 Dec, 2010.
-
6E.R. Berlekamp, R.I. McElice, H. van Tilborg, On the inherent intractability of certain coding problems, IEEE Trans. on Inform. Theory, 1978, Vol. 24, No.3, pp. 384-386.
-
7AN. Alekseychuk, S.V. Gryshakov, On the computational security of randomized stream ciphers proposed by Mihaljevic and Imai, Zakhist Inform .. 2014, No.4, pp. 328-334.
-
8AN. Alekseychuk, Analytical estimates of theoretical security of randomized block ciphers against differential cryptanalysis, Zakhist Inform., 2007, No.3, pp. 80-88 (in Russian).
-
9AN. Alekseychuk, Sufficient conditions for randomized block cipher-systems to be secure against commutative diagram cryptanalysis, Data Recording, Storage and Processing, 2007, Vol. 9, No.2, pp. 61-68, (in Russian).
-
10ECRYPT II: Final hash function status report, http://www.ecrypt.eu.orgidocuments/D.SYM.ll. 31 Jan., 2013.
-
1李根柱.一种新型指纹锁电路设计[J].电脑与信息技术,2014,22(2):54-57. 被引量:6
-
2张俊兰,张波,刘翼.Visual Foxpro6.0密码设计方法[J].电脑学习,2004(5):57-58.
-
3车紫辉,荆霜雁.MD5加密算法在VFP中的应用[J].保定师范专科学校学报,2006,19(4):33-34. 被引量:2
-
4王旺.数字指纹技术研究进展[J].中国新技术新产品,2015(12):12-12.
-
5张鑫,习俊通.基于随机编码结构光的双目立体三维测量系统[J].机电一体化,2013,19(3):61-65. 被引量:3
-
6苏海涛,杨世元,何继长.基于质量信息的数字编码方法及实现技术[J].电脑与信息技术,2003,11(2):5-8. 被引量:1
-
7密码设计与管理技巧[J].新电脑,2012(7):141-149.
-
8黎孟雄.数据库应用系统高保密性密码设计[J].连云港师范高等专科学校学报,2001,18(1):52-54.
-
9Long Min Peng Fei Qiu Shuisheng Chen Yanfeng.Implementation of a new chaotic encryption system and synchronization[J].Journal of Systems Engineering and Electronics,2006,17(1):43-47. 被引量:7
-
10于修文,葛万成.Turbo码译码性能的研究[J].通信技术,2008,41(7):12-15. 被引量:8