对称密码算法S盒安全性分析
作者:
基金项目:

广东省教育部产学研结合项目(2011B090400507);广东省科技计划高新技术产业化项目(2012B010100048);广东省科技计划项目(2011B020313022);广州市科技计划项目(11C42190700)


Security analysis of S-boxes in symmetric ciphers
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • | | |
  • 文章评论
    摘要:

    S盒是大多数对称密码算法中唯一的非线性结构,其密码学特性直接决定了密码算法的好坏.该文对美国高级加密标准AES算法、韩国对称加密标准SEED算法、欧洲对称加密标准Camellia算法和中国商用密码标准SMS4算法的S盒密码学性质进行了深入的探讨,研究各种算法中S盒的代数性质和布尔函数性质,分析各种算法抵抗差分密码分析和线性密码分析等攻击的能力.通过对比S盒的优缺点,揭示了各种算法的安全性.

    Abstract:

    S-boxes bring the only nonlinearity to symmetric ciphers and strengthen their cryptographic security.A detailed analysis of the cryptographic properties of S-boxes in several symmetric ciphers,such as AES,SEED,Camellia and SMS4,is made in this paper.The algebraic properties and the Boolean functions of S-boxes are well investigated.Then the attack capability resisting to differential cryptanalysis and linear cryptanalysis are provided.At last,the security of AES,SEED,Camellia and SMS4 is revealed by comparing the advantages and disadvantages of the S-boxes used in these symmetric ciphers.

    参考文献
    [1] Daemen J,Rijmen V.AES proposal:Rijndael version 2.[EB/OL].[2012-07-15]http://www.east.kuleuven.ac.be/~rijmen/rijndael,1999
    [2] Lee H J,Lee S J,Yoon J H,et al.The SEED encryption algorithm[S].Request for Comments:4009,Network Working Group,2005
    [3] European IST.NESSIE project.[EB/OL].[2012-07-15]https://www.cosic.esat.kuleuven.be/nessie/,1999
    [4] Aoki K,Ichikawa T,Kanda M,et al.Camellia:A 128 bit block cipher suitable for multiple platforms.[EB/OL].[2012-07-15]http://info.isl.ntt.co.jp/camellia,2000
    [5] 国家密码管理办公室.无线局域网产品使用的SMS4密码算法.[EB/OL].[2012-07-15]http://www.oscca.gov.cn/News/200810/News-1104.htm,2006 National Password Management Office.SMS4 cipher algorithm used by WLAN products.[EB/OL].[2012-07-15]http://www.oscca.gov.cn/News/200810/News-1104.htm,2006
    [6] Li J,Gan L,Du F F.Research on encryption algorithm conforming to AES in WLAN[J].Advanced Materials Research,2012,532/533(1):1517-1521
    [7] 刘佳,韦宝典,戴宪华.基于消息恢复型Rabin-PSS的无线局域网认证方案[J].南京信息工程大学学报:自然科学版,2009,1(3):223-228 LIU Jia,WEI Baodian,DAI Xianhua.WLAN authentication scheme based on message-recovery Rabin-PSS[J].Journal of Nanjing University of Information Science & Technology:Natural Science Edition,2009,1(3):223-228
    [8] Lu Y,O'Neill M P,McCanny J V.Differential power analysis resistance of Camellia and counter measure strategy on FPGAs[C]//Proceedings of International Conference on Field-Programmable Technology,2009:183-189
    [9] Kitsos P,Skodras A N.An FPGA implementation and performance evaluation of the seed block cipher[C]//Proceedings of 17th International Conference on Digital Signal Processing (DSP),2011:1-5
    [10] Jakobsen T,Knudsen L R.The interpolation attack on block ciphers[C]//Proceedings of Fast Software Encryption:4th International Workshop,1997:28-40
    [11] Biham E,Shamir A.Differential cryptanalysis of DES-like cryptosystems[C]//Proceedings of Advances in Cryptology-EUROCRYPT,1991:2-21
    [12] Nyberg K.Differentially uniform mappings for cryptography[C]//Proceedings of Advances in Cryptology-EU-ROCRYPT,1994:55-64
    [13] Matsui M.Linear cryptanalysis method for DES cipher[C]//Proceedings of Advances in Cryptology-EUROCRYPT,1994:386-397
    [14] 温巧燕,钮心忻,杨义先.现代密码学中的布尔函数[M].北京:科学出版社,2000 WEN Qiaoyan,NIU Xinxin,YANG Yixian.Boolean function of modern cryptography[M].Beijing:Science Press,2000
    [15] Filiol E.A new statistical testing for symmetric ciphers and hash functions[J].Information and Communications Security,2002,2513(1):342-353
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

刘佳.对称密码算法S盒安全性分析[J].南京信息工程大学学报(自然科学版),2013,5(4):352-357
LIU Jia. Security analysis of S-boxes in symmetric ciphers[J]. Journal of Nanjing University of Information Science & Technology, 2013,5(4):352-357

复制
分享
文章指标
  • 点击次数:1007
  • 下载次数: 4253
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2012-07-15

地址:江苏省南京市宁六路219号    邮编:210044

联系电话:025-58731025    E-mail:nxdxb@nuist.edu.cn

南京信息工程大学学报 ® 2025 版权所有  技术支持:北京勤云科技发展有限公司