滿足嚴(yán)格雪崩準(zhǔn)則的高非線性彈性函數(shù)構(gòu)造
[Abstract]:Since Shannon1949 put forward the concept of perfect security and proved the security of one-off cryptographic book (One-time Pad:OTP), how to solve the problem of how to improve the operation of security has become a concern of scholars at home and abroad. Stream cipher is a practical and feasible cryptosystem which combines the security and maneuverability of security. Because stream cipher has a series of advantages, such as simple implementation, easy hardware design and fast encryption and decryption, it has unique advantages in some special application scenarios, especially in some communication systems of special or confidential organizations. In practical applications, the implementation of stream cipher is usually from a short seed secret key through a specific algorithm to obtain a pseudorandom key stream of good random properties, so pseudorandom sequence generation algorithm is the core component of stream cipher. The Boolean function is a part of the classical key sequence nonlinear composition generator, its logical structure directly determines the security of the generation algorithm. In order to ensure the security of encryption in some specific application scenarios, some metrics of Boolean functions need to be carefully designed to resist some attacks in the corresponding scenarios. This paper introduces some mainstream attacks against stream ciphers and how to measure the ability of a Boolean function to resist these attacks, such as the best resistance to the nonlinear degree of affine approximation attack (BAA) or linear attack. To resist the elasticity of subjugation attack and related attack, the strict avalanche criterion (SAC) against differential attack, the diffusion criterion (PC) and the algebraic immunity of resisting algebraic attack, etc. Therefore, in order to resist some specific attacks, it is an important subject in cryptography to construct Boolean functions that satisfy some cryptographic characteristics. Boolean functions with high nonlinearity and satisfying elastic and strict avalanche criteria (SAC) are one of them. These parameters are essential in stream cipher and block cipher design, especially in the design of symmetric key algorithms. In this paper, some classical design methods are introduced to construct Boolean functions which satisfy the above indexes, such as generalized Maiorana-McFarland construction and Dobbertin construction, and the indexes of the functions obtained by these methods are analyzed. In this paper, an effective method for constructing high nonlinear elastic functions is presented, which is extended to satisfy the strict avalanche criterion. The method can construct n (even number) variables satisfying SAC and the degree of nonlinearity is 1 22 2 n? A Boolean function, which has not been obtained before. Then some improvements are made to improve the degree of nonlinearity in some cases.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN918.2
【共引文獻(xiàn)】
相關(guān)期刊論文 前5條
1 張振民;史瑞;劉金濤;;密碼學(xué)安全性指標(biāo)的分析與應(yīng)用[J];測(cè)試技術(shù)學(xué)報(bào);2014年06期
2 屈龍江;付紹靜;李超;;密碼函數(shù)安全性指標(biāo)的研究進(jìn)展[J];密碼學(xué)報(bào);2014年06期
3 楊小龍;胡紅鋼;;Bent函數(shù)構(gòu)造方法研究[J];密碼學(xué)報(bào);2015年05期
4 高瑩;梅佳;;兩類基于完全非線性函數(shù)的線性碼[J];系統(tǒng)科學(xué)與數(shù)學(xué);2014年02期
5 鄭秀林;張聰;郭星;史瑞;;Keccak算法非線性變換x的分析[J];北京電子科技學(xué)院學(xué)報(bào);2013年04期
相關(guān)碩士學(xué)位論文 前6條
1 高凌;彈性布爾函數(shù)的構(gòu)造[D];國(guó)防科學(xué)技術(shù)大學(xué);2011年
2 郭星;典型密碼模塊的研究與應(yīng)用[D];西安電子科技大學(xué);2014年
3 李恒;猜測(cè)決定攻擊在流密碼分析中的應(yīng)用[D];國(guó)防科學(xué)技術(shù)大學(xué);2012年
4 葉露晨;低相關(guān)序列集的分析與構(gòu)造[D];國(guó)防科學(xué)技術(shù)大學(xué);2012年
5 張聰;基于SHA-3的分組密碼算法設(shè)計(jì)[D];西安電子科技大學(xué);2014年
6 王彥平;偶特征域上的兩類低差分置換多項(xiàng)式[D];湖北大學(xué);2014年
,本文編號(hào):2150130
本文鏈接:http://sikaile.net/kejilunwen/wltx/2150130.html