期刊文献+

一个混沌分组密码算法的分析 被引量:2

Cryptanalysis of chaotic block cipher
在线阅读 下载PDF
导出
摘要 研究了一个基于混沌设计的分组密码算法的安全性,发现该算法所产生的混沌序列具有前几个值对混沌初态和参数的低位比特变化不够敏感的性质,在选择明文攻击条件下,提出了攻击加密算法等效密钥的分割攻击方法。分组密码算法的密钥长度为106bit,分割攻击方法的计算复杂性约为260,存储复杂性约为250,成功率为0.9284。 This paper investigated the security of a chaotic block cipher. Found that the firstly several chaotic states generated by this cipher were not sensitive to the initial state and parameter. Under the chosen plaintexts condition, proposed a divide-and-conquer attack on the equivalent key. The length of key is 106 bit, and the computing and memory complexity of the attack are about 2 60 and 2 50 respectively. The success rate is 0.928 4.
作者 张涛
出处 《计算机应用研究》 CSCD 北大核心 2010年第6期2294-2296,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2007AA0825)
关键词 混沌密码 分组密码 密码分析 分割攻击 等效密钥 chaotic cipher block cipher cryptanalysis divide-and-conquer attack equivalent key
  • 相关文献

参考文献14

  • 1KLEIN E,MISLOVATY R,KANTER I,et al.Public-channel cryptography using chaos synchronization[J].Physical Review E,2005,72(1):016214.
  • 2罗启彬,张健.一种新的混沌伪随机序列生成方式[J].电子与信息学报,2006,28(7):1262-1265. 被引量:34
  • 3XIANG Tao,LIAO Xiao-feng,TANG Guo-ping,et al.A novel block cryptosystem based on iterating a chaotic map[J].Physics Letters A,2006:349:109-115.
  • 4TENNY R,TSIMRING L S.Additive mixing modulation for public key encryption based on distributed dynamics[J].IEEE Trans on Circuits and Systems,2005,52(3):672-679.
  • 5YEN Jui-cheng,GUO Jiu-nin.A new chaotic key-based design for image encryption and decryption[C] //Proc IEEE International Symposium Circuits and Systems.2000:49-52.
  • 6纪震,李慧慧,肖薇薇,张基宏.基于混沌序列的数字水印信号研究[J].电子学报,2004,32(7):1131-1134. 被引量:31
  • 7SHORT K M.Signal extraction from chaotic communications[J].Int J Bifurcation and Chaos,1997,7(7):1579-1597.
  • 8LI Shu-jun,CHEN Guan-rong,ALVAREZ G,et al.Return-map cryptanalysis revisited[EB/OL].http://arxiv.org/nlin.CD/0501018.
  • 9WANG Xin-gang,ZHAN Meng,LAI C H,et al.Error function attack of chaos synchronization based encryption schemes[EB/OL].http://arxiv.org/nlin.CD/0305015.
  • 10李树钧,牟轩沁,纪震,张基宏.一类混沌流密码的分析[J].电子与信息学报,2003,25(4):473-478. 被引量:36

二级参考文献29

  • 1金晨辉,高海英.对两个基于混沌的序列密码算法的分析[J].电子学报,2004,32(7):1066-1070. 被引量:28
  • 2孙枫,秦红磊,徐耀群,郝燕玲.基于混沌的分组密码置换网络的设计[J].中国工程科学,2000,2(9):47-49. 被引量:7
  • 3周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97. 被引量:99
  • 4Hong Zhou,Xie-Ting Ling,Jun Yu,Secure communication via one-dimensional chaotic inverse systems[J].In Proc.IEEE Int.Symposim Circuits and Systems 97,1997,2:9-12.
  • 5Hong Zhou,Xie-Ting Lin.Problems with the chaotic inverse system encryption approach.IEEE Trans.CAS-Ⅰ,1997,44(3):268-271.
  • 6I J Cox,J Kilian,T Shamoon.Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing,1997,6(12):1673-1687.
  • 7Xia-mu Niu,Sheng-he Sun.Adaptive gray-level digital watermark[A].In ICSP'2000[C].Beijing,2000.1293-1298.
  • 8Cao Hanqiang.A watermarking method based on fractal self-similarity[A].In ICSP'2000[C].Beijing,2000.99-103.
  • 9H Bateni,C D Mcgillem.A chaotic direct-sequence spread-spectrum communication system[J].IEEE Trans on Communication,1994,42:1524-1527.
  • 10G M Bernstein,M A Lieberman.Secure random number generation using chaotic circuit[J].IEEE Trans on CAS,1990,37(9):1157-1164.

共引文献133

同被引文献15

  • 1袁宁,宣蕾.超混沌序列密码受参数变化影响的实验研究[J].计算机研究与发展,2008,45(z1):351-356. 被引量:4
  • 2金晨辉,高海英.对两个基于混沌的序列密码算法的分析[J].电子学报,2004,32(7):1066-1070. 被引量:28
  • 3YANG TAO,YANG LINBAO,YANG CHUNMEI. Breaking chaotic switching using generalized synchronization: examples[J]. IEEE Transactions on Circuits Systems,1998,45(10):1062-1067.
  • 4HENON M.A two dimentional mapping with a strange attractor[J]. Communications in Mathematical Physics,1976,50(1):69-77.
  • 5YONG R,ANOOP G, ALEX A. Automatically extracting highlights for TV-baseball programs[C] // Proceedings of ACM Multimedia. New York: ACM,2000:105-115.
  • 6WANG XIAOYUN, YU HONGBO. How to break MD5 and other Hash functions[C] // Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 3494. Berlin: Springer-Verlag,2005:19-35.
  • 7Xiang T,Liao X F,Tang G P,et al.A novel block cryptosystem based on iterating a chaotic map[J].Physics Letters A,2006(349):109-115.
  • 8Wang King-yuan,Yu Cang hai.Cryptanalysis and improvement on a cryptosystem based on a chaotic map[J].Computers and Mathematics with Applications,2009(57):476-482.
  • 9胡端平,唐超.一致矩阵的特征性质[J].武汉工程大学学报,2009,31(5):93-94. 被引量:2
  • 10杨建华.数列组的广义线性相关性[J].武汉工程大学学报,2009,31(12):79-81. 被引量:5

引证文献2

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部