CN103607276A - 新型基于随机函数的抗已知明文密文对攻击的分组加密方法 - Google Patents
新型基于随机函数的抗已知明文密文对攻击的分组加密方法 Download PDFInfo
- Publication number
- CN103607276A CN103607276A CN201310645437.6A CN201310645437A CN103607276A CN 103607276 A CN103607276 A CN 103607276A CN 201310645437 A CN201310645437 A CN 201310645437A CN 103607276 A CN103607276 A CN 103607276A
- Authority
- CN
- China
- Prior art keywords
- function
- grouping
- random
- plaintext
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000004364 calculation method Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 claims description 4
- 238000004458 analytical method Methods 0.000 abstract description 7
- 229910002056 binary alloy Inorganic materials 0.000 description 10
- 238000006073 displacement reaction Methods 0.000 description 8
- 230000010354 integration Effects 0.000 description 4
- 230000007480 spreading Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 206010049669 Dyscalculia Diseases 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000006227 byproduct Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000035772 mutation Effects 0.000 description 1
- 230000000452 restraining effect Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
Description
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310645437.6A CN103607276B (zh) | 2013-12-05 | 2013-12-05 | 基于随机函数的抗已知明文密文对攻击的分组加密方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310645437.6A CN103607276B (zh) | 2013-12-05 | 2013-12-05 | 基于随机函数的抗已知明文密文对攻击的分组加密方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103607276A true CN103607276A (zh) | 2014-02-26 |
CN103607276B CN103607276B (zh) | 2017-06-30 |
Family
ID=50125477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310645437.6A Active CN103607276B (zh) | 2013-12-05 | 2013-12-05 | 基于随机函数的抗已知明文密文对攻击的分组加密方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103607276B (zh) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105356999A (zh) * | 2015-12-08 | 2016-02-24 | 成都信息工程大学 | 一种(2,2)门限秘密共享的份额尺寸减小方法 |
CN109450617A (zh) * | 2018-12-06 | 2019-03-08 | 成都卫士通信息产业股份有限公司 | 加解密方法及装置、电子设备、计算机可读存储介质 |
CN110401627A (zh) * | 2019-01-31 | 2019-11-01 | 中国科学院软件研究所 | 一种适用于分组密码算法感染防护的抗差分故障攻击安全性评估方法和系统 |
CN111695129A (zh) * | 2020-06-17 | 2020-09-22 | 成都鹰翔天际科技有限公司 | 一种能够对抗线性攻击和差分攻击的对称加密方法 |
CN112805769A (zh) * | 2018-10-04 | 2021-05-14 | 日本电信电话株式会社 | 秘密s型函数计算系统、秘密逻辑回归计算系统、秘密s型函数计算装置、秘密逻辑回归计算装置、秘密s型函数计算方法、秘密逻辑回归计算方法、程序 |
CN113242119A (zh) * | 2021-05-25 | 2021-08-10 | 山西师范大学 | 一种对抗已知明文密文攻击的通讯数据分组加密法 |
CN114465804A (zh) * | 2022-02-16 | 2022-05-10 | 贵州福润德文化产业发展有限公司 | 一种可对抗重放攻击的指令加密、解密方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1459314A2 (en) * | 2001-12-05 | 2004-09-22 | Koninklijke Philips Electronics N.V. | Method and apparatus for verifying the integrity of system data |
CN101527627A (zh) * | 2008-03-06 | 2009-09-09 | 邵斌彬 | 一种改进的Ri jndael算法 |
CN102571330A (zh) * | 2012-02-01 | 2012-07-11 | 王勇 | 一种基于随机函数的分组加密算法的构造方法 |
-
2013
- 2013-12-05 CN CN201310645437.6A patent/CN103607276B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1459314A2 (en) * | 2001-12-05 | 2004-09-22 | Koninklijke Philips Electronics N.V. | Method and apparatus for verifying the integrity of system data |
CN101527627A (zh) * | 2008-03-06 | 2009-09-09 | 邵斌彬 | 一种改进的Ri jndael算法 |
CN102571330A (zh) * | 2012-02-01 | 2012-07-11 | 王勇 | 一种基于随机函数的分组加密算法的构造方法 |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105356999A (zh) * | 2015-12-08 | 2016-02-24 | 成都信息工程大学 | 一种(2,2)门限秘密共享的份额尺寸减小方法 |
CN105356999B (zh) * | 2015-12-08 | 2018-03-09 | 成都信息工程大学 | 一种(2,2)门限秘密共享的份额尺寸减小方法 |
CN112805769A (zh) * | 2018-10-04 | 2021-05-14 | 日本电信电话株式会社 | 秘密s型函数计算系统、秘密逻辑回归计算系统、秘密s型函数计算装置、秘密逻辑回归计算装置、秘密s型函数计算方法、秘密逻辑回归计算方法、程序 |
CN112805769B (zh) * | 2018-10-04 | 2023-11-07 | 日本电信电话株式会社 | 秘密s型函数计算系统、装置、方法及记录介质 |
CN109450617A (zh) * | 2018-12-06 | 2019-03-08 | 成都卫士通信息产业股份有限公司 | 加解密方法及装置、电子设备、计算机可读存储介质 |
CN110401627A (zh) * | 2019-01-31 | 2019-11-01 | 中国科学院软件研究所 | 一种适用于分组密码算法感染防护的抗差分故障攻击安全性评估方法和系统 |
CN111695129A (zh) * | 2020-06-17 | 2020-09-22 | 成都鹰翔天际科技有限公司 | 一种能够对抗线性攻击和差分攻击的对称加密方法 |
CN111695129B (zh) * | 2020-06-17 | 2023-09-08 | 成都鹰翔天际科技有限公司 | 一种能够对抗线性攻击和差分攻击的对称加密方法 |
CN113242119A (zh) * | 2021-05-25 | 2021-08-10 | 山西师范大学 | 一种对抗已知明文密文攻击的通讯数据分组加密法 |
CN114465804A (zh) * | 2022-02-16 | 2022-05-10 | 贵州福润德文化产业发展有限公司 | 一种可对抗重放攻击的指令加密、解密方法 |
CN114465804B (zh) * | 2022-02-16 | 2024-03-26 | 贵州福润德文化产业发展有限公司 | 一种可对抗重放攻击的指令加密、解密方法 |
Also Published As
Publication number | Publication date |
---|---|
CN103607276B (zh) | 2017-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | Development of modified AES algorithm for data security | |
Saha et al. | RK‐AES: An Improved Version of AES Using a New Key Generation Process with Random Keys | |
CN103607276A (zh) | 新型基于随机函数的抗已知明文密文对攻击的分组加密方法 | |
CN102546157B (zh) | 一种抵抗能量分析的随机混合加密系统及其实现方法 | |
TWI688250B (zh) | 資料加解密的方法及裝置 | |
Koko et al. | Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication | |
Upadhyay et al. | An efficient key management and multi-layered security framework for SCADA systems | |
CN103516513A (zh) | 基于随机函数的抗已知明文密文对攻击的分组加密方法 | |
Agrawal et al. | Elliptic curve cryptography with hill cipher generation for secure text cryptosystem | |
Li et al. | Research and Realization based on hybrid encryption algorithm of improved AES and ECC | |
Noura et al. | ERSS-RLNC: Efficient and robust secure scheme for random linear network coding | |
Pradeep et al. | Random key and key dependent s-box generation for aes cipher to overcome known attacks | |
JunLi et al. | Email encryption system based on hybrid AES and ECC | |
Ara et al. | Dynamic key dependent S-Box for symmetric encryption for IoT devices | |
Li et al. | Differential fault analysis on Camellia | |
EP2377265A1 (en) | System and method for countering side-channel attacks against encryption based on cyclic groups | |
JP2004246350A (ja) | 暗号化装置および復号化装置、並びにこれらを備えた暗号システム、暗号化方法および復号化方法 | |
Deore et al. | Hybrid encryption for database security | |
CN104837131B (zh) | 一种基于批处理指数运算乘积的批Cramer-Shoup密码方法 | |
Jangra et al. | Expositioning of cryptography techniques in IoT domain | |
Hemamalini et al. | A Survey on Elementary, Symmetric and Asymmetric Key Cryptographic Techniques | |
Hwang et al. | PFC-CTR, PFC-OCB: Efficient stream cipher modes of authencryption | |
Bali | Comparative study of private and public key cryptography algorithms: A survey | |
Kumar et al. | A comparative analysis of encryption algorithms for better utilization | |
Kumar et al. | Chaotic dynamical systems based image encryption model |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20140226 Assignee: Guilin Feisheng Information Technology Co.,Ltd. Assignor: GUILIN University OF ELECTRONIC TECHNOLOGY Contract record no.: X2022450000198 Denomination of invention: A block encryption method based on random function against known plaintext ciphertext pair attacks Granted publication date: 20170630 License type: Common License Record date: 20221125 Application publication date: 20140226 Assignee: Guilin Yinuo Yijin Information Technology Co.,Ltd. Assignor: GUILIN University OF ELECTRONIC TECHNOLOGY Contract record no.: X2022450000204 Denomination of invention: A block encryption method based on random function against known plaintext ciphertext pair attacks Granted publication date: 20170630 License type: Common License Record date: 20221125 Application publication date: 20140226 Assignee: Guilin Biqi Information Technology Co.,Ltd. Assignor: GUILIN University OF ELECTRONIC TECHNOLOGY Contract record no.: X2022450000196 Denomination of invention: A block encryption method based on random function against known plaintext ciphertext pair attacks Granted publication date: 20170630 License type: Common License Record date: 20221125 Application publication date: 20140226 Assignee: Guilin Youman Network Technology Co.,Ltd. Assignor: GUILIN University OF ELECTRONIC TECHNOLOGY Contract record no.: X2022450000203 Denomination of invention: A block encryption method based on random function against known plaintext ciphertext pair attacks Granted publication date: 20170630 License type: Common License Record date: 20221125 |
|
OL01 | Intention to license declared |