期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
NEW CONCEPT FOR DETERMINING THE ORDERS OF SAC AND PC
1
作者 weibaodian LiuDongsu +1 位作者 MaWenping WangXinmei 《Journal of Electronics(China)》 2004年第3期191-197,共7页
The autocorrelation of a Boolean function possesses the capability to reflect such characteristics as linear structure, Strict Avalanche Criterion(SAC) and Propagation Criterion(PC)of degree k. But it can do nothing i... The autocorrelation of a Boolean function possesses the capability to reflect such characteristics as linear structure, Strict Avalanche Criterion(SAC) and Propagation Criterion(PC)of degree k. But it can do nothing in determining the order of SAC or PC. A calculating table for the autocorrelation is constructed in this paper so as to show what is beyond the autocorrelation and how the three cryptographic characteristics are exhibited. A deeper study on the calculating table in a similar way has helped us to develop a new concept, named as the general autocorrelation, to address efficiently the problem how to determine the orders of SAC and PC. The application on the Advanced Encryption Standard(AES) shows the SAC and PC characteristics of Boolean functions of AES S-box. 展开更多
关键词 AUTOCORRELATION General autocorrelation Boolean function Linear structure Strict Avalanche Criterion(SAC) Propagation Criterion(PC) Advanced encryption standard
下载PDF
ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL
2
作者 weibaodian LiuDongsu WangXinmei 《Journal of Electronics(China)》 2004年第4期314-321,共8页
The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, wh... The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks. 展开更多
关键词 Rijndael algorithm Balance ACTIVITY Equivalent round transformation Birthday paradox
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部