您的位置: 专家智库 > >

国家自然科学基金(ZR2012FM004)

作品数:4 被引量:8H指数:1
发文基金:国家自然科学基金更多>>
相关领域:电子电信自动化与计算机技术化学工程更多>>

文献类型

  • 3篇中文期刊文章

领域

  • 2篇电子电信
  • 1篇自动化与计算...

主题

  • 2篇LIGHTW...
  • 1篇OPTIMA...
  • 1篇AI
  • 1篇BLOCK
  • 1篇CONSTR...
  • 1篇DESIGN
  • 1篇DIFFER...
  • 1篇EFFICI...
  • 1篇EIGHT
  • 1篇FAULT
  • 1篇CIPHER
  • 1篇BALANC...
  • 1篇ATTACK
  • 1篇CRYPTO...
  • 1篇FORTRE...

传媒

  • 1篇The Jo...
  • 1篇Journa...
  • 1篇Wuhan ...

年份

  • 2篇2014
  • 1篇2013
4 条 记 录,以下是 1-3
排序方式:
Eight-sided fortress: a lightweight block cipher被引量:6
2014年
In this paper, we present a new lightweight block cipher named eight-sided fortress(ESF), which is suitable for resource-constrained environments such as sensor networks and low-cost radio rrequency identification(RFID) tags. Meanwhile, we present the specification, design rationale and evaluation results in terms of the hardware implementation. For realizing both efficiency and security in embedded systems, similar to the other lightweight block ciphers, ESF is 64 bits block length and key size is 80 bits. It is inspired from existing block cipher, PRESENT and LBlock. The encryption algorithm of ESF is based on variant Feistel structure with SPN round function, used Feistel network as an overall structure with the purpose of minimizing computational resources.
LIU XuanZHANG Wen-yingLIU Xiang-zhongLIU Feng
关键词:LIGHTWEIGHTEFFICIENCY
Construction of Balanced Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity被引量:1
2014年
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents one main result to find balanced rotation symmetric Boolean functions with maximum algebraic immunity. Through swapping the values of two orbits of rotation class of the majority function, a class of 4k+l variable Boolean functions with maximum algebraic immu- nity is constructed. The function f(x) we construct always has terms of degree n-2 independence of what ever n is. And the nonlinearity off(x) is relatively good for large n.
ZHANG Wenying
Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32被引量:1
2013年
We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same key length of 80 bits. On the basis of the bit-oriented faulty model and the differential analysis principle, we describe the attack that combines differential fault attack with the meet-in-the-middle (MITM) attack on the KATAN32. More precisely, inducing a fault at a bit, we can recover some linear differential fault equations on the key bits. During solving equations, without the help of computer, we need only algebraic deduction to obtain relations of some key bits. The complexity in this process is neglectable. The secret key of the full cipher can be recovered faster than exhaustive search for all three block sizes in the KATAN family. Our result describes that KATAN32 is vulnerable.
张文英刘枫刘宣孟帅
关键词:DIFFERENTIALFAULTATTACKBLOCKCIPHERLIGHTWEIGHTCIPHER
共1页<1>
聚类工具0