咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >New application methods for wo... 收藏

New application methods for word-oriented cryptographic primitives

New application methods for word-oriented cryptographic primitives

作     者:YANG Yang 1,2,ZENG Guang 1,2,JIN ChengHui 1 & QU YunYing 1 1 Zhengzhou Information Science and Technology Institute,Zhengzhou 450002,China 2 State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China 

作者机构:Zhengzhou Information Science and Technology Institute Zhengzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China 

出 版 物:《Science China(Information Sciences)》 (中国科学:信息科学(英文版))

年 卷 期:2012年第55卷第9期

页      面:2149-2160页

核心收录:

学科分类:11[军事学] 1105[军事学-军队指挥学] 0839[工学-网络空间安全] 08[工学] 110505[军事学-密码学] 110503[军事学-军事通信学] 

基  金:supported by National Natural Science Foundation of China (Grant No. 61003291) National High Technology Research and Development Program of China (Grant No. 2011AA010803) Foundation for the Author of National Excellent Doctoral Dissertation of China (Grant No. FANEDD-2007B74) 

主  题:stream cipher single cycle T-function linear complexity k-error linear complexity 

摘      要:Modern software oriented symmetric ciphers have become a key feature in utilizing word-oriented cryptographic *** the output sequence,in the order of its generation,of a word-oriented cryptographic primitive in the same way as traditional bit-oriented primitives,we can expose the intrinsic weakness of these primitives,especially for word-oriented linear feedback shift registers,T-functions,and so *** new methods for using word-oriented cryptographic primitives are presented in this paper,that is,the extracted state method and cascading extracted coordinate *** a T-function as an example,we research the different cryptographic properties of the output sequences of the original method and the two proposed methods,focusing mainly on period,linear complexity,and k-error linear *** conclusions show that the proposed methods could enhance at low cost the cryptographic properties of the output *** a result,since the new methods are simple and easy to implement,they could be used to design new word-oriented cryptographic primitives.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分