# 臺灣博碩士論文加值系統

(54.224.133.198) 您好！臺灣時間：2022/01/27 14:16

:::

### 詳目顯示

:

• 被引用:0
• 點閱:505
• 評分:
• 下載:51
• 書目收藏:0
 DES和 Triple DES即將因為新標準的提出而過時，本文依照新一代加密演算法之規格提出新的加密法，我們修改DES提出新的演算法使其加密金匙和加密資料區塊長度符合現代標準，這個演算法主要是使用較多的替代盒以達成較長的加密金匙和加密資料區塊，並且將我們的演算法針對差分攻擊法和線性攻擊法做調整使其對於此兩種攻擊法有抵抗力。本文分析所提出之加密法，其安全性有一定的保證。並且我們也發現DES之原始設計對於線性攻擊法有所缺陷，我們提出之演算法則可避免此一問題。 差分攻擊法藉由特定的明文與密文組合來分析加密金匙，一般衡量一加密系統對於差分攻擊法的抵抗強度以估計在許多明文密文組合中能夠找到有用組合的機率來衡量，本文亦提出一個嘗試，使用演化式計算以更快找到所需的明文密文組合。 新一代標準加密法AES由Rijndael獲勝，本文也對於此加密法提出修改，藉由安插隨機位元進入被加密資料區塊以增強其強度。
 DES and Triple DES will be out of date due to the new standards. In this thesis, a new encryption algorithm is proposed according to the new requirements of key and block sizes. Based on DES, we modify the algorithm to enhance the sizes. The modification is to use more S-boxes in a round function. We also tune our algorithm to resist differential and linear attacks. Based on our cryptanalyses, the security of the algorithm shows some promises. The weakness of DES toward linear cryptanalysis is also shown in this thesis, which is avoided in our algorithm. Differential attack makes use of specific plaintext pairs to analyze the key. The strength of an encryption system toward differential relies on a lower expected number of right pairs among huge number of plaintext pairs. In this thesis, we proposed an evolutionary computation model to try to find the right pair effectively. The new standard AES winner is Rijndael. We also modify Rijndael to improve its security by adding some random bits into the plaintext.
 Chapter 1 Introduction 1 Chapter 2 Background 5 2.1 AES 6 2.2 NESSIE 11 2.3 DES 15 2.4 Differential Cryptanalysis of DES 19 2.5 Linear Cryptanalysis of DES 25 Chapter 3 Variants of DES 31 3.1 Properties of a Boolean Function 32 3.2 Coupling Rows and Construction of S-boxes 40 3.3 Proposed Extended DES 48 3.3.1 Algorithm of Our Scheme 49 3.3.2 Permutations in Our Scheme 50 3.3.3 Differential Cryptanalysis of Our Scheme 56 3.3.4 P-box and Linear Cryptanalysis 62 3.4 XDES 64 3.4.1 Algorithm of XDES 65 3.4.2 S-box Design Criteria and Differential Cryptanalysis 67 3.4.3 P-box Design Criteria and Linear Cryptanalysis 75 3.4.4 Weak Keys of XDES 82 3.5 Comparison of DES Variants and Other Ciphers 83 Chapter 4 Employ Genetic Algorithm in Differential Cryptanalysis 90 4.1 Differential Cryptanalysis and Genetic Algorithm 90 4.1.1 Differential Cryptanalysis of Seven Round DES 91 4.1.2 Genetic Algorithms 93 4.2 Evolution Model 94 4.3 Simulation Result 96 Chapter 5 Random Rijndael 100 5.1 Rijndael with Random Bits 100 5.2 Strength of Rijndael 103 Chapter 6 Conclusions 105 Bibliography 107
 [1] E. Biham. A Fast New DES Implementation in Software. In Proceedings of the 4th Fast Software Encryption workshop, pages 260-272, 1997.[2] E. Biham. On Matsui's Linear Cryptanalysis. In Proceedings of EUROCRYPT, pages 341-355, 1994.[3] E. Biham and N. Keller. Cryptanalysis of Reduced Variants of Rijndael. Submitted paper of the Third AES Candidate Conference, 2000, available at [38].[4] E. Biham, and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York: Springer-verlag, 1993.[5] R.Chang. A New Method of Building DES S-boxes. Master Thesis of Department of Computer & Information Science of National Chao-Tung University, 1999.[6] D. Coppersmith. The Data Encryption Standard (DES) and Its Strength against Attacks. IBM journal of Research and Development, 38(3):243-250, 1994.[7] J. H. Cheon, S. Chee, and C. Park. S-boxes with Controllable Nonlinearity. In Proceedings of Eurocrypt, pages 286-294, 1999.[8] J. Daemon, V. Rijnmen. AES proposal. See http://www.esat.kuleuven.ac.be/~rijmen/rijndael/[9] J. H. Evertse. Linear Structure in Block Ciphers. In Proceedings of Eurocrypt, pages 249-266, 1987.[10] D. B. Fogel. Evolutionary Computation. IEEE press, 1995.[11] N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, and D. Whiting. Improved Cryptanalysis of Rijndael. In Proceedings of the Seventh Fast Software Encryption Workshop, pages 213-230, 2000.[12] N. Ferguson. Twofish Technical Report #5 Impossible Differentials in Twofish. AES Round 2 public comment, 1999, available at [38].[13] N. Ferguson. Twofish Technical Report #6 A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish. AES Round 2 public comment, 2000, available at [38].[14] H. Gilbert and M. Minier. A collision attack on 7 rounds of Rijndael. In Proceedings of the Third AES Candidate Conference, pages 230-241, 2000.[15] H. Gilbert and H. Handschuh and A. Joux and S. Vaudenay. A Statistical Attack on RC6. In Proceedings of the Seventh Fast Software Encryption Workshop, pages 64-74, 2000.[16] T. M. Hsieh, Y. S. Yeh, Y. C. Hsieh and C. C. Wang. A Homophonic DES. Information processing letters, 66(6):317-320, 1998.[17] I. Harvey. The Effects of Multiple Algorithms in the Advanced Encryption Standard. In Proceedings of the Seventh Third AES Candidate Conference, pages 269-278, 2000.[18] D. Johnson. AES and Future Resiliency: More Thoughts And Questions. In Proceedings of the Third AES Candidate Conference, pages 257-268, 2000.[19] J. Kelsey, T. Kohno and B. Schneier. Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. In Proceedings of the Seventh Fast Software Encryption Workshop, pages 75-93, 2000.[20] J. Kelsey and B. Schneier. MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. In Proceedings of the Third AES Candidate Conference, pages 169-185, 2000.[21] K. Kim, S. Lee, S. Park and D. Lee. Securing DES S-boxes against Three Robust Cryptanalysis. In Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pages 145-157, 1995.[22] K. Kim, S. Lee, S. Park and D. Lee. How to Strengthen DES against Two Robust Attack. In Proceedings of the 1995 Korea-Japan Join Workshop on Information Security and Cryptography, pages 173-182, 1995.[23] L. Knudsen and W. Meier. Correlations in RC6 with a Reduced Number of Rounds. In Proceedings of the Seventh Fast Software Encryption Workshop, pages 94-108, 2000.[24] L. R. Knudsen. Iterative Characteristics of DES and S2-DES. In Proceedings of CRYPTO, pages 497-511, 1991.[25] T. Kohno, J. Kelsey and B. Schneier. Preliminary Cryptanalysis of Reduced-Round Serpent. In Proceedings of the Third AES Candidate Conference, pages 195-214, 2000.[26] S. Lee, S. H. Sung and K. Kim. An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis. In Proceedings of Japan-Korea Join Workshop on Information Security and Cryptology (JW-ISC’95), pages 183-190, 1995.[27] S. Lucks. Attacking Seven Rounds of Rijndael Under 192-bit and 256-bit Keys. In Proceedings of the Third AES Candidate Conference, pages 215-229, 2000.[28] M. Matsui. Linear Cryptanalysis Method for DES Cipher. In Proceedings of EUROCRYPT, pages 386-397, 1993.[29] W. Meier and O. Staffelbach. Nonlinearity Criteria For Cryptographic Functions. In Proceedings of Eurocrypt, pages 549-562, 1989.[30] W. Millan, L. Burnett, G. Carter, E. Dawson and A. Clark. Evolutionary Heuristics for Finding Cryptographically Strong S-boxes. In Proceedings of the Second International conference On Information and Communication Security, pages 263-274, 1999.[31] National Bureau of Standards, NBS FIPS PUB 46. Data Encryption standard. National Bureau of Standards, U.S. Department of Commerce, 1977.[32] J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, and E. Roback. Report on the Development of the Advanced Encryption Standard (AES). Journal of Research of the National Institute of Standards and Technology, 106(3):511-577, 2001.[33] F. Sano, M. koike, S. mawamura and M Shiba. Performance Evalution of AES Finalists on the High-End Smart Card. In Proceedings of the Third AES Candidate Conference, pages 82-93, 2000.[34] B. Schneier, Applied Cryptography Second Edition: protocols, algorithms and source code in C, John Wiley & Sons, 1996.[35] J. Seberry and X. M. Zhang. Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. In Proceedings of ASIACRYPT, pages 145-155, 1992.[36] A. F. Webster and S. E. Tavares. On the Design Of S-boxes. In Proceedings of CRYPTO, pages 523-534, 1985[37] X. M. Zhang, Y. Zheng and H. Imai. Relating Differential Distribution Tables to Other Properties of Substitution Boxes. Designs Codes and Cryptography, 19(1):45-63, 2000.[38] http://csrc.nist.gov/encryption/aes/index2.html[39] https://www.cosic.esat.kuleuven.ac.be/nessie/
 電子全文
 國圖紙本論文
 推文當script無法執行時可按︰推文 網路書籤當script無法執行時可按︰網路書籤 推薦當script無法執行時可按︰推薦 評分當script無法執行時可按︰評分 引用網址當script無法執行時可按︰引用網址 轉寄當script無法執行時可按︰轉寄

 1 密碼學的發展與應用 2 建構於生物虹膜碼之資料加密系統 3 一個使用區塊密碼和PRNG的真正隨機亂數加密方法 4 病患控管病歷之金鑰管理研究 5 建築「隱風格」之類型研究-以密碼學加密模式為例 6 交易在電腦系統之安全處理 7 OntheDesignandCryptanalysisofEfficientRSAVariants 8 Twofish加解密演算法之製作與智產元件設計 9 醫療費用連線申報電子簽章雛型系統之研究與實現 10 資訊隱藏於影像之研究 11 交錯區塊DES及單向函數 12 一個應用於變速度資料傳輸之頻道管理器 13 未來智慧型網路新安全遠端程式呼叫之設計

 1 27. 孫秀蕙（2000），「網路時代的企業公關----格魯尼模式的理論性重構」，廣告學研究，第十五期，頁1-24。 2 51. 管郁君、黃敏祐（2000），「企業特質與網際網路應用狀況之關聯」，管理學報，第17卷第1期，頁119-147。 3 50. 楊忠川、廖秋燕、陳桂香、詹詠萍、彭彥綺、曾瓊玉（2000），「台灣2000大企業網際網路公關應用現況調查」，中華管理評論，第3卷第2期，頁39-49。 4 41. 陳枝蘭（1999），「網路在公關上的應用」，動腦，第280期，頁62-64。 5 32. 黃懿慧（1999），「西方公共關係理論學派之探討－90年代理論典範的競爭與辯論」，廣告學研究，第12期，頁1-37。 6 25. 孫秀蕙（1997），「網際網路與公共關係：理論與實務運用模式的思考」，廣告學研究，第9期，頁159-181。 7 14. 吳宜蓁（1998），「企業議題管理業務初探－以公共事務部門為觀點的個案研究」，廣告學研究，第10期，頁91-120。 8 13. 吳宜蓁（1993），「遊戲理論－一個新的公共關係研究典範簡介」，傳播文化，第1期，頁203-220。

 1 手持式裝置在無線傳輸環境中的委任式身份認證安全機制 2 以本益比法為指標之交易策略在臺灣股票市場之實證研究 3 使用ElGamal加密機制的通行碼驗證與金鑰交換協定 4 一個基於傅立葉轉換及小波轉換之紋理分析的研究 5 定期船運之空櫃調度—以越太平洋航線為例 6 以利潤最大化為目標之貨櫃船隊定線模式 7 利用公車GPS定位資料推估路段行車速率之研究 8 國道客運業服務品質、顧客滿意度與移轉障礙對消費者行為意向之影響 9 以系統安全管理方法檢核我國軌道運輸之安全─以台鐵站務系統為例 10 台鐵司機員工作壓力與影響因素之研究 11 高解析方法之巨觀車流模式數值解 12 捷運車站乘客動線人流模式與干擾量度之研究 13 考慮公平性之後艙組員派遣模式---以座艙長為例 14 台灣地區海洋貨櫃運輸商品運量預測方法之研究 15 投資組合管理：資產最佳配置、保本與套利之模型規劃

 簡易查詢 | 進階查詢 | 熱門排行 | 我的研究室