欢迎登录材料期刊网

材料期刊网

高级检索

提出一种基于混沌细胞自动机的分组密码算法,采用固定边界条件下反向加密正向解密的Feistel迭代方式,计算机模拟的实验结果证明:该算法在固定密钥的密文差错扩散率和固定明文的密文差错扩散率接近50%,可有效对抗差分攻击、穷举明文和穷举密钥攻击.

This paper presents a block cipher algorithm based on the chain-rules CA,which is by means of iterating cellular automata backward-to-encryption and forward-to-decryption at a fixed boundary. The results show the error propagation of ciphertext with an unchanged key and ciphertext with an unchanged plaintext is close to 50%. This cryptosystem can resist known-plaintext attack and known- ciphertext attack.

参考文献

[1] Kanso Ali A.An efficient cryptosystem Delta for stream cipher applications[J].Computers & Electrical Engineering,2009,35(1):126-140.
[2] Sung Jaechul,Hong Deukjo,Hong Seokhie.Cryptanalysis of an involutional block cipher using cellular automata[J].Information Processing Lett.,2007,104(5):183-185.
[3] Fúster-Sabater A,Caballero-Gil P.Linear solutions for cryptographic nonlinear sequence generators[J].Phys.Lett.A,2007,369(5-6):432-437.
[4] Martín del Rey A,Pereira Mateus J,Rodríguez Sánchez G.A secret sharing scheme based on cellular automata[J].Appl.Mathematics and Computation,2005,170(2):1356-1364.
[5] Seredynski Franciszek,Bouvry Pascal,Zomaya Albert Y.Cellular automata computations and secret key cryptography[J].Parallel Computing,2004,30(5-6):753-766.
[6] Wolfram S.Cryptography with cellular automata[C]//Proceedings of Crypto'85,Lecture Notes in Computer Science,Berlin,Germany:Springer-Verlag,1985:429-432.
[7] Langton C G.Computation at the edge of chaos:Phase transitions and emergent computation[J].Physica,1990,42:12-37.
[8] Wuensche A,Lesser M J.The Global Dynamics of Cellular Automata;An Atlas of Basin of Attraction Fields of One-dimensional Cellular Automata[M].California,USA:Addison-Wesley,Publishing Company,1992.
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%