跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.82) 您好!臺灣時間:2026/02/20 08:39
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:戴成儒
研究生(外文):Cheng-Ru Dai
論文名稱:一個採用循序邏輯機制、三維運算和動態置換盒的加密方式
論文名稱(外文):A Secure Data Encryption Method Employing a Sequential-Logic Style Mechanism, Three-Dimensional Operation and Dynamic Transition Box
指導教授:呂芳懌呂芳懌引用關係
指導教授(外文):Fang-Yie Leu
口試委員:羅濟群林熙禎陳金鈴楊朝棟
口試委員(外文):Chi-Chun LoShi-Jen LinChin-Lin ChenChao-Tung Yang
口試日期:2013-07-13
學位類別:碩士
校院名稱:東海大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:英文
論文頁數:49
中文關鍵詞:SeFEM循序邏輯式的機制三維運算動態置換盒動態回授金鑰
外文關鍵詞:SeFEMa sequential-logic style mechanismthree-dimensional operationdynamic transition box,dynamic feedback keys
相關次數:
  • 被引用被引用:0
  • 點閱點閱:809
  • 評分評分:
  • 下載下載:6
  • 收藏至我的研究室書目清單書目收藏:0
近幾年來,Advanced Encryption Standard (AES)和Data Encryption Standard (DES)已被廣泛應用於電子信息的保護。然而,由於平行計算和硬體速度的快速發展,這兩種演算法一直遭受到暴力攻擊的威脅,而要能有效抵禦這類型的威脅,基於此,我們的研究中提出了一個新的資料加密方法,稱為“安全的回授加密機制(簡稱SeFEM),它採用三個安全方案,包括一個循序邏輯式的加密/解密機制、三維運算和動態置換盒,其能提高密鑰的破解難度,並能有效的抵禦暴力攻擊和密碼分析攻擊,使得密文的安全等級有效的被提升。循序邏輯式的加/解密機制是一種反饋過程,其中每一回合的操作,皆會在內部生成三把動態回授金鑰提供給下一回合使用,而三維運算包括異或(⊕)、二進制加法(+2)和異同(⊙)的操作,不同運算子的使用能夠進一步提高計算的複雜度。動態置換盒會非線性的重新排列金鑰中每一個bit的位置,使SeFEM的破難度難度提升。分析結果顯示,SeFEM比DES和AES具有更高的安全等級、加密效率與更好的靈活性。
In recent years, the Advanced Encryption Standard (AES) and Data Encryption Standard (DES) have been commonly and widely used to protect important information carried in electronic documents. However, due to the quick development of parallel computing techniques and hardware speed, the two algorithms have so far faced the threats of Brute-Force attacks. To defend against this type of threats, in this study, we proposed a new data encryption approach, called the Secure Feedback Encryption Method (SeFEM for short), which employs three security schemes, including a sequential-logic style encryption/decryption mechanism, three-dimensional operation and dynamic transition box, to effectively enhance the security level of the delivered ciphertext, and increase the difficulty of cracking the encryption keys so as to well protect encrypted data from Brute-force and cryptanalysis attacks. The sequential-logic style encryption/decryption mechanism is a feedback process in which each of its calculation iteration/step generates three internally used dynamic feedback keys for the next iteration/step. The three-dimensional operation, including exclusive-or (⊕), binary addition (+2) and exclusive-and (⊙) operators, is utilized to further increase the computational complexity of the encryption process. The dynamic transition box nonlinearly rearranges the bits of a key for each operation, so as to increase the difficulty of cracking the SeFEM. The analytical results show that the SeFEM has a higher security level, encryption efficiency and usage flexibility than the DES and AES have.
中文摘要................................................................................................................i
Abstract..................................................................................................................ii
List of Contents.....................................................................................................iii
List of Figures….....................................................................................................v
List of Tables.........................................................................................................vi
1. Introduction .................................................................................................1
2. Background and Related Work....................................................................5
2.1 Data Encryption Standard (DES) ..........................................................5
2.2 Advanced Encryption Standard (AES) .................................................6
3. Feedback Encryption, Three Dimensional Operations and A Dynamic Transition Box..............................................................................................10
3.1 Dynamic Transition Box........................................................................10
3.2 Encryption..............................................................................................13
3.3 Decryption..............................................................................................16
3.4 Binary Adder.........................................................................................18
4. Security Analysis and Comparison..............................................................20
4.1 Encryption Complexity of the Dynamic Transition Box.....................20
4.2 Complexity of the Three Dimensional Operations...............................21
4.3 Cryptanalysis of Attacks.......................................................................24
4.3.1. Cryptanalysis on known plaintext and the corresponding
ciphertext attacks...............................................................24
4.3.2. Differential and linear attacks...................................................25
4.4 Flexibility.............................................................................................26
iv
4.5 Comparison………………….………………………………..……27
5. Performance Analysis....................................................................................29
5.1 Binary Adder Simulation.........................................................................29
5.2 System Simulation Results...................................................................30
6. Conclusions and Future Work.......................................................................32
References……………………………………….………………………………34
Appendix: System Implementation......................................................................37
[1] Y.L. Huang and F.Y. Leu, ―Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other,‖ Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 3, September 2011, pp. 96-107.
[2] S.M. Lee, D.S. Kim and J.S. Park, ―A Survey and Taxonomy of Lightweight Intrusion Detection Systems,‖ Journal of Internet Services and Information Security, vol. 2, issue 1/2, February 2012, pp. 119-131.
[3] S.K. Pandey and R. Barua, ―Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes,‖ Journal of Internet Services and Information Security, Vol. 1, No.2/3, August 2011, pp. 161-180.
[4] J. Katz and Y. Lindell, Introduction to Modern Cryptography, Chapman & Hall/CRC Press, 2008.
[5] C.H. Yang, Network Security: Theory and Practice, Xbook Marketing Co. Ltd., September, 2008.
[6] M. Bellare and P. Rogaway, Introduction to Modern Cryptography, chapter 3, May 11, 2005.
http://digidownload.libero.it/persiahp/crittografia/2005_Introduction_to_Modern_Cryptography.pdf
[7] J. Hunker and C.W. Probst, ―Insiders and Insider Threats—an Overview of Definitions and Mitigation Techniques,‖ Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 2, No. 1, March 2011, pp. 4–27.
[8] M. Dworkin, ―Recommendation for Block Cipher Modes of Operation Methods and Techniques,‖ National Institute of Standards and Technology Special Publcation. 800-38A 2001 Edition, December 2001.
[9] Types of Cryptographic Attacks. In Domain 5: Cryptography. Retrieved February 27, 2011, fromhttp://www.giac.org/resources/whitepaper/cryptography/57.php
[10] S. Klaus, Cryptography and Public Key Infrastructure on the Internet, John Wiley and Sons, 1st edition, June 2, 2003.
[11] A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, "Chapter 7: Block Ciphers". Handbook of Applied Cryptography. CRC Press. ISBN 0-8493-8523-7. October 1997.
[12] Y.F. Huang, F.Y. Leu, C.H. Chiu and I.L. Lin, "Improving Security Levels of IEEE802.16e Authentication by Invoking Diffie-Hellman PKDS," Journal of Universal Computer Science, Vol. 17, No.6, March 2011, pp. 891-911.
[13] A.P. Moore, D.M. Cappelli, T.C. Carony, E. Shaw, D. Spooner and R.F. Trzeciak, ―A Preliminary Model of Insider Theft of Intellectual Property,‖ Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 2, No. 1, March 2011, pp. 28–49.
[14] E. Barkan and E. Biham, "In How Many Ways Can You Write Rijndael?" in Proceedings of ASIACRYPT 2002, (Lecture Notes in Computer Science), edited by Y. Zheng, vol. 2501. Berlin, Germany: Springer-Verlag, Dec. 2002, pp. 160-175.
[15] J. Daemen and V. Rijmen, ―AES Proposal: Rijndael,‖ The First Advanced Encryption Standard Candidate Conference, NIST, September 1999.
[16] Federal Information Processing Standards Publication 197, ―Announcing the Advanced Encryption Standard (AES)‖ November 26, 2001.
[17] Y.L. Huang, F.Y. Leu, J.C. Liu, J.H. Yang, C.W. Yu, C.C. Chu, C.T. Yang, ―Building a block cipher mode of operation with feedback keys,‖ Industrial Electronics (ISIE), 2013 IEEE International Symposium on, May 2013, pp. 1-4.
[18] Y.L. Huang, F.Y. Leu, J.H. Yang, ―Building a block cipher mode of operation with two keys,‖ The Asian Conference on Availability, Reliability and Security (AsiaARES 2013), Mar. 2013, pp. 392-398.
[19]T. Eisenbarth, S. Kumar, L. Uhsadel, C. Paar and A. Poschmann, ―A Survey of Lightweight-Cryptography Implementations,‖ IEEE Design & Test of Computers, Dec. 2007, pp. 522-533.
[20] H.M. Heys, ―A tutorial on linear and differential cryptanalysis,‖ Technical Report CORR 2001-17, Centre for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, March 2001.
[21] Y.S. Yeh, C.Y. Lee, T.Y. Huang and C.H. Lin ―A Transpositional Advanced Encryption Standard (AES) Resists 3-Round Square Attack,‖ International Journal of Innovative Computing, Information and Control, vol. 5, no. 5, May 2009, pp. 1253-1264.
[22] L. Cui and Y. Cao "A New S-Box Structure Named Affine-Power-Affine,‖ International Journal of Innovative Computing, Information and Control, Vol. 3, No. 3, June 2007, pp. 751-759.
[23] H.Z. Yao, ―The Comparison of Efficiency and Security between AES and DES,‖ Journal of Zhongkai University of Agriculture and Technology, February 2006, pp. 44–48.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top