CN107395347A - 对称密码系统代数次数评估新方法 - Google Patents
对称密码系统代数次数评估新方法 Download PDFInfo
- Publication number
- CN107395347A CN107395347A CN201710659243.XA CN201710659243A CN107395347A CN 107395347 A CN107395347 A CN 107395347A CN 201710659243 A CN201710659243 A CN 201710659243A CN 107395347 A CN107395347 A CN 107395347A
- Authority
- CN
- China
- Prior art keywords
- monomial
- variable
- module
- function
- array
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000011156 evaluation Methods 0.000 title claims abstract description 13
- 238000004458 analytical method Methods 0.000 claims abstract description 18
- 238000001514 detection method Methods 0.000 claims description 49
- 238000000034 method Methods 0.000 claims description 38
- 238000006073 displacement reaction Methods 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 claims 1
- 238000011084 recovery Methods 0.000 abstract 1
- 230000010354 integration Effects 0.000 description 6
- 238000012360 testing method Methods 0.000 description 5
- 238000013461 design Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 239000004744 fabric Substances 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Complex Calculations (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
保留单项式数目 | 含IV1·IV2 | 含k1·k2 | 含全部变量 |
所有单项式 | 5 | 6 | 8 |
保留10项 | 5 | 6 | 8 |
保留5项 | 5 | 6 | 8 |
保留4项 | 5 | 6 | 8 |
保留3项 | 5 | 6 | 8 |
保留2项 | 5 | 6 | 9 |
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710659243.XA CN107395347B (zh) | 2017-08-04 | 2017-08-04 | 对称密码系统代数次数评估方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710659243.XA CN107395347B (zh) | 2017-08-04 | 2017-08-04 | 对称密码系统代数次数评估方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107395347A true CN107395347A (zh) | 2017-11-24 |
CN107395347B CN107395347B (zh) | 2021-06-15 |
Family
ID=60344740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710659243.XA Active CN107395347B (zh) | 2017-08-04 | 2017-08-04 | 对称密码系统代数次数评估方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107395347B (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110417732A (zh) * | 2019-06-20 | 2019-11-05 | 中国人民解放军战略支援部队信息工程大学 | 用于对称密码设计的布尔函数代数次数获取方法及装置 |
CN113343175A (zh) * | 2021-05-31 | 2021-09-03 | 中国电子科技集团公司第三十研究所 | 一种自动化搜索spn型轻量级分组密码活跃s盒的快速方法 |
CN114514569A (zh) * | 2019-10-10 | 2022-05-17 | 日本电信电话株式会社 | 秘密多重迭代计算装置、方法以及程序 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103634101A (zh) * | 2013-12-03 | 2014-03-12 | 中国电子器材总公司 | 加密处理方法及设备 |
US20140129604A1 (en) * | 2012-11-07 | 2014-05-08 | Inside Secure | Cryptographic method comprising a modular exponentiation operation |
CN104052595A (zh) * | 2014-05-23 | 2014-09-17 | 戴葵 | 密码算法定制方法 |
CN106788979A (zh) * | 2016-12-30 | 2017-05-31 | 桂林电子科技大学 | 密码s盒评估新方法 |
-
2017
- 2017-08-04 CN CN201710659243.XA patent/CN107395347B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140129604A1 (en) * | 2012-11-07 | 2014-05-08 | Inside Secure | Cryptographic method comprising a modular exponentiation operation |
CN103634101A (zh) * | 2013-12-03 | 2014-03-12 | 中国电子器材总公司 | 加密处理方法及设备 |
CN104052595A (zh) * | 2014-05-23 | 2014-09-17 | 戴葵 | 密码算法定制方法 |
CN106788979A (zh) * | 2016-12-30 | 2017-05-31 | 桂林电子科技大学 | 密码s盒评估新方法 |
Non-Patent Citations (1)
Title |
---|
莫钊,韦永壮: "《简化轮LBlock的密钥中比特检测及分析》", 《计算机工程》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110417732A (zh) * | 2019-06-20 | 2019-11-05 | 中国人民解放军战略支援部队信息工程大学 | 用于对称密码设计的布尔函数代数次数获取方法及装置 |
CN110417732B (zh) * | 2019-06-20 | 2021-07-06 | 中国人民解放军战略支援部队信息工程大学 | 用于对称密码设计的布尔函数代数次数获取方法及装置 |
CN114514569A (zh) * | 2019-10-10 | 2022-05-17 | 日本电信电话株式会社 | 秘密多重迭代计算装置、方法以及程序 |
CN114514569B (zh) * | 2019-10-10 | 2024-03-01 | 日本电信电话株式会社 | 秘密多重迭代计算装置、方法以及记录介质 |
CN113343175A (zh) * | 2021-05-31 | 2021-09-03 | 中国电子科技集团公司第三十研究所 | 一种自动化搜索spn型轻量级分组密码活跃s盒的快速方法 |
CN113343175B (zh) * | 2021-05-31 | 2022-05-27 | 中国电子科技集团公司第三十研究所 | 一种自动化搜索spn型轻量级分组密码活跃s盒的快速方法 |
Also Published As
Publication number | Publication date |
---|---|
CN107395347B (zh) | 2021-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qayyum et al. | Chaos-based confusion and diffusion of image pixels using dynamic substitution | |
Zhou et al. | Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation | |
Fornasini et al. | Observability, reconstructibility and state observers of Boolean control networks | |
Fouda et al. | A fast chaotic block cipher for image encryption | |
Li et al. | Conditional cube attack on round-reduced ASCON | |
Zeng et al. | More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks | |
Barbosa | A coevolutionary genetic algorithm for constrained optimization | |
CN103167213A (zh) | 基于Cat映射与超混沌Lorenz系统的数字图像加密方法 | |
CN107395347A (zh) | 对称密码系统代数次数评估新方法 | |
Hu et al. | Quantum image encryption scheme based on 2d s ine 2-l ogistic chaotic map | |
CN106656459A (zh) | 一种针对sm3‑hmac的侧信道能量分析方法和装置 | |
Liu et al. | Chaos-based color image encryption using one-time keys and Choquet fuzzy integral | |
Zhou et al. | Deep binarized convolutional neural network inferences over encrypted data | |
Song et al. | A bitwise design and implementation for privacy-preserving data mining: from atomic operations to advanced algorithms | |
Das et al. | Generating cryptographically suitable non-linear maximum length cellular automata | |
Alwan et al. | FCNN Model for Diagnosis and Analysis of Symmetric Key Cryptosystem | |
Bao et al. | More insight on deep learning-aided cryptanalysis | |
Liu et al. | Hiding multiple solutions in a hard 3-SAT formula | |
Fateri et al. | A new method for image encryption via standard rules of CA and logistic map function | |
CN106301756B (zh) | 用于sm2签名的大数模幂求逆功耗检测方法及其系统 | |
Ye | Chaotic image encryption algorithm using multi-generalized logistic maps | |
Wang et al. | Federated cf: Privacy-preserving collaborative filtering cross multiple datasets | |
Jalalinour et al. | Noisy-Defense Variational Auto-Encoder (ND-VAE): An Adversarial Defense Framework to Eliminate Adversarial Attacks | |
Ghafoori et al. | PNB based differential cryptanalysis of Salsa20 and Chacha | |
Liu et al. | A BP neural network‐oriented henon hyperchaotic system for image encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20171124 Assignee: Guangxi Sujian Technology Co.,Ltd. Assignor: GUILIN University OF ELECTRONIC TECHNOLOGY Contract record no.: X2023980046272 Denomination of invention: A Method for Evaluating the Algebraic Degree of Symmetric Cryptosystems Granted publication date: 20210615 License type: Common License Record date: 20231108 Application publication date: 20171124 Assignee: Guangxi Guilin Yunchen Technology Co.,Ltd. Assignor: GUILIN University OF ELECTRONIC TECHNOLOGY Contract record no.: X2023980045796 Denomination of invention: A Method for Evaluating the Algebraic Degree of Symmetric Cryptosystems Granted publication date: 20210615 License type: Common License Record date: 20231108 |
|
EE01 | Entry into force of recordation of patent licensing contract |