(3.236.231.14) 您好!臺灣時間:2021/04/15 07:00
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:游志偉
研究生(外文):Yu Chih Wei
論文名稱:一個整合回授與鏈結的加密方法
論文名稱(外文):An Integration of Feedback and Link Encryption Method
指導教授:呂芳懌
指導教授(外文):Fang-Yie Leu
口試委員:楊伏夷陳金鈴黃育仁劉榮春
口試委員(外文):Fuw-Yi YangChin-Lin ChenYu-Len HuangJung-Chun Liu
口試日期:2014-07-17
學位類別:碩士
校院名稱:東海大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:英文
論文頁數:51
中文關鍵詞:IFLE選擇明文攻擊區塊密文演算法模式動態置換盒動態回授金鑰
外文關鍵詞:IFLEchosen-plaintext attackblock cipher modes of operationdynamic transition boxdynamic feedback keys
相關次數:
  • 被引用被引用:0
  • 點閱點閱:214
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:5
  • 收藏至我的研究室書目清單書目收藏:0
在密碼學中,許多由National Institute of Standards and Technology (NIST)所提出之Block Cipher Modes of Operation (BCMO)已被廣泛地用在明文之區塊加密,但今天若干對BCMOs的攻擊方式已被發現了。換言之,BCMOs已不再是安全的加解密模式了。因此在這篇論文中,我們提出一個植基於回授之安全方式,稱為整合內部回授與外部鏈結加密方法和區塊密文運作的模式(Integration of Feedback and Link Encryption (簡稱IFLE) 模式)。該模式引入了隨機亂數金鑰IV,每次加密時,系統金鑰與IV共同產生了動態系統加密金鑰。再以之與二維運算對明文進行初次加密及以動態子換位盒進行二次加密,其次,以內部回授方式,將產生之結果當作下個明文區塊加密之動態系統加密金鑰。如此,同一個明文區塊會因為前一個明文區塊的不同而產生不同的密文區塊。之後,使用外部金鑰鍵結機制,安全有效地區隔了輸出密文與區塊密文。這是一個以循序動態金鑰對後續明文區塊加密,而增進加密系統破解複雜度與安全性之系統,經我們分析,IFLE是一個高安全性的區塊密文運作模式。
In the cryptography, some Block Cipher Modes of Operation (BCMO) proposed by the National Institute of Standards and Technology (NIST) have been widely used to cipher plaintext blocks. But today, different types of attacks on these BCMOs have been found, meaning the BCMOs have their own security problems. To solve the problem, in this thesis, we propose a novel feedback based security scheme, named the Integration of Feedback and Link Encryption Method (IFLE for short), which employs an internal feedback and an external linking approach to encrypt a plaintext block into a ciphertext block. Generally, in the IFLE, the block-cipher-encryption unit (BCE unit for short) introduces a random number key IV to generate four dynamic encryption keys, which cooperates with a two-dimensional operation we define to first encrypt a plaintext block into a ciphertext block. The ciphertext block is then secondly encrypted by using a dynamic child-transition box. This is the internal feedback mechanism, with which the same plaintext block with different previous plaintext blocks will generate different ciphertext blocks. By using a key chaining mechanism external to the BCE unit, the IFLE effectively and safely isolates the output ciphertext block and the output block of the BCE unit. The IFLE uses sequential dynamic keys to encrypt subsequent plaintext blocks. This truly increases the decryption complexity and security level of the proposed system. According to our analysis, the IFLE is a block cipher scheme with a very high safety.
誌謝 i
中文摘要 ii
Abstract iii
List of Contents iv
List of Figures vi
List of Tables viii
Chapter 1 Introduction 1
Chapter 2 Background and Related Work 3
2.1 Data Encryption Standard (DES) 3
2.2 Advanced Encryption Standard (AES) 5
2.3 Block cipher modes of operation 8
2.3.1 Electronic CodeBook (ECB) 8
2.3.2 Cipher Block Chaining (CBC) 9
2.3.3 Propagating Cipher Block Chaining (PCBC) 10
2.3.4 Cipher feedback (CFB) 11
2.3.5 Output Feedback (OFB) 13
2.3.6 Counter (CTR) 15
Chapter 3 Integration of Feedback and Link Encryption 16
3.1 Binary Adder 16
3.2 Transition Box 20
3.3 Integration of Feedback and Link Encryption (IFLE) 22
3.3.1 Encryption 22
3.3.2 Decryption 25
Chapter 4 Security Analyses 27
4.1 Security of the ECB 27
4.2 Security of the CBC 27
4.3 Security of the CFB 28
4.4 Security of the PCBC 28
4.5 Security of the OFB 28
4.5.1 An attack on IV that can be chosen 28
4.5.2 Attack on IV that cannot be chosen 28
4.6 Security of the CTR 29
4.6.1 Attack on cr able to be chosen 29
4.6.2 Attack on cr unable to be chosen 29
4.7 Security of the IFLE features 30
4.7.1 Dynamic System Keys 31
4.7.2 Security of Two-Dimensional Operation 31
4.7.3 Security of Dynamic Child Transition Box 33
4.7.4 Security of Internal Feedback Mechanism and External Link 33
4.7.5 Analyses of security mechanisms 34
Chapter 5 Performance Analysis 37
5.1 Binary Adder Performance Analysis 37
5.2 System Simulation 37
Chapter 6 Conclusions and Future Work 39
References 40

[1]W. Stallings, Cryptography and Network Security: Principles and Practice, Fifth Edition, Publisher: Prentice Hall, January 2010.
[2]National Institute of Standards and Technology, NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation Methods and Techniques, December 2001.
[3]National Institute of Standards and Technology, NIST Special Publication 800-57, Recommendation for Key Management Part 1: General (Revision 3), July 2012.
[4]H. Hudde, “Building Stream Ciphers from Block Ciphers and their Security,” Seminararbeit Ruhr-Universität Bochum, February, 2009. http://imperia.rz.rub.de:9085/imperia/md/content/seminare/itsws08_09/hudde.pdf
[5]M.Bellare and P. Rogaway, Introduction to Modern Cryptography, chapter 3, May 11, 2005. http://digidownload.libero.it/persiahp/crittografia/2005_Introduction_to_Modern_Cryptography.pdf
[6]Y.F. Huang, F.Y. Leu, C.H. Chiu and I.L. Lin, “Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS,” Journal of Universal Computer Science, vol. 17, no.6, March 2011, pp. 891-911.
[7]Y.L. Huang, F.Y. Leu, J.C. Liu, J.H. Yang, C.W. Yu, C.C. Chu, C.T. Yang, “Building a block cipher mode of operation with feedback keys,” IEEE International Symposium on Industrial Electronics, May 2013, pp. 1-4.
[8]Y.L. Huang, F.Y. Leu, J.H. Yang, “Building a block cipher mode of operation with two keys,” The Asian Conference on Availability, Reliability and Security, March 2013, pp. 392-398.
[9]Y.L. Huang and F.Y. Leu, “Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 3, September 2011, pp. 96-107.
[10]Y.L. Huang, F.Y. Leu, C.R. Dai, “A secure data encryption method by employing a feedback encryption mechanism and three-dimensional operation,” International Workshop on Security and Cognitive Informatics for Homeland Defense, August 2012, pp.578-592.
[11]K.C. Wei, Y.L. Huang, F.Y. Leu, “A secure communication over wireless environments by using a data connection core,” International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2012, pp.570-575.
[12]FIPS Publication 46-3, Data Encryption Standard (DES), U.S. DoC/NIST, October 25 1999.
[13]FIPS Publication 197, Advanced Encryption Standard (AES), U.S. DoC/NIST, November 26, 2001.
[14]C.H. Yang, Network Security: Theory and Practice, Xbook Marketing Co. Ltd., September 2008.
[15]N. Kumar, "Investigations in Brute Force Attack on Cellular Security Based on DES and AES," IJCEM International Journal of Computational Engineering & Management, vol. 14, October 2011.
[16]D. Wang, D. Lin, and W. Wu, “Related-Mode Attacks on CTR Encryption Mode,” International Journal of Network Security, vol.4, no.3, May 2007, PP.282–287.
[17]Wiki, Data Encryption Standard. http://en.wikipedia.org/wiki/Data_Encryption_Standard
[18]Wiki, Advanced Encryption Standard. http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
[19]Y.S. Yeh, C.Y. Lee, T.Y. Hung and C.H. Lin "A Transpositional Advanced Encryption Standards (AES) Resists 3-Round Square Attack", International Journal of Innovative Computing, Information and Control, vol. 3, no.3, June 2007, pp. 751-759.
[20]Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2001.
[21]Thomas Chardin and Rapha¨el Marinier, "An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm," International Journal of Network Security, vol.9, no.2, September 2009, pp.173–179.
[22]H.M. Heys, "A tutorial on linear and differential cryptanalysis", Technical Report CORR 2001-17, Centre for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, March 2001.
[23]H. Lipmaa, P. Rogaway, and D. Wagner, “Comments to NIST concerning AES Modes of Oper-ations: CTR-Mode Encryption”, 2000. http://csrc.nist.gov/

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔