[1]叶峰,袁家斌.置换密钥矩阵加密算法的改进[J].东南大学学报(自然科学版),2008,38(1):11-15.[doi:10.3969/j.issn.1001-0505.2008.01.003]
 Ye Feng,Yuan Jiabin.Enhancement of replacing key matrix encryption algorithm[J].Journal of Southeast University (Natural Science Edition),2008,38(1):11-15.[doi:10.3969/j.issn.1001-0505.2008.01.003]
点击复制

置换密钥矩阵加密算法的改进()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
38
期数:
2008年第1期
页码:
11-15
栏目:
计算机科学与工程
出版日期:
2008-01-20

文章信息/Info

Title:
Enhancement of replacing key matrix encryption algorithm
作者:
叶峰 袁家斌
南京航空航天大学信息科学与技术学院, 南京 210016
Author(s):
Ye Feng Yuan Jiabin
College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016,China
关键词:
加密算法 置换密钥矩阵 密钥进化算法 特征因子子矩阵
Keywords:
encryption algorithm replacing key matrix key evolution algorithm characterization factor matrix
分类号:
TP309.7
DOI:
10.3969/j.issn.1001-0505.2008.01.003
摘要:
提出了对分组加密算法(RKM)的改进,主要包括密钥进化算法、特征因子子矩阵和密钥的分发与更新算法.密钥进化算法是特征因子子矩阵生成算法和密钥分发与更新算法的基本组件,由一个16字节的单字节数组(称为进化指针)和一个密钥矩阵计算一个新的密钥矩阵.特征因子子矩阵是把128 bit矩阵特征因子作为进化指针代入密钥进化算法计算而得.在引入特征因子子矩阵的基础上对算法流程进行了改进,使算法的加、解密完全对称.在不降低算法安全性的基础上减少了4轮异或运算,从而降低了运算量.在密钥进化算法的基础上设计了密钥的分发与更新算法,使算法无需每次传输密钥矩阵就能共享.
Abstract:
The enhancement of the novel encryption algorithm replacing key matrix(RKM)is presented. The enhancement comprises: key evolution algorithm, characterization factor matrix, and the key distribution and update algorithm. Key evolution algorithm, which is the basic module of the characterization factor matrix-calculating algorithm and the key distribution and update algorithm, calculates a new key matrix from a 16-byte array(so-called “evolution pointer”)and an old key matrix. Based on the characterization factor matrix, which is calculated from the 128 bit key matrix characterization factor, the enhancement of the encryption process is made. The encryption and the decryption process of the new algorithm is absolutely the same. The new algorithm omits 4 rounds XOR operations without harming the security of the algorithm. Using the key distribution and update algorithm, there is no need to transfer the key matrix every time.

参考文献/References:

[1] Schneier B.Description of a new variable-length key,64-bit block cipher(Blowfish)[C] // Fast Software Encryption,Cambridge Security Workshop Proceedings.Berlin:Springer-Verlag,1994:191-204.
[2] Schneier B.The blowfish encryption algorithm [J]. Dr Dobb’s Journal,1994,19(4):38-40.
[3] Rivest R L.The RC5 encryption algorithm [J]. Dr Dobb’s Journal,1995,20(1):146-148.
[4] Daemen J,Rijmen V.高级加密标准(AES)算法——Rijndael的设计 [M].谷大武,徐胜波,译.北京:清华大学出版社,2003:31-52.
[5] 吴文玲,马恒太,冯登国,等.AC分组密码[J].通信学报,2002,23(5):130-134.
  Wu Wenling,Ma Hengtai,Feng Dengguo,et al.The AC block cipher [J].Journal of China Institute of Communications,2002,23(5):130-134.(in Chinese)
[6] 袁家斌,叶峰.一种全新的基于置换密钥矩阵加密算法[J].南京航空航天大学学报,2005,37(6):754-759.
  Yuan Jiabin,Ye Feng.A novel encryption algorithm of replace key matrix [J].Journal of Nanjing University of Aeronautics & Astronautics,2005,37(6):754-759.(in Chinese)
[7] Stinson D.密码学原理与实践 [M].冯登国,译.北京:电子工业出版社,2003:78.
[8] Balenson D.Automated distribution of cryptographic keys using the financial institution key management standard [J].IEEE Communications Magazine,1985,23(9):41-46.
[9] Li Celia,Yang Cungang,Cheung Richard.Key management for role hierarchy in distributed systems [J].Journal of Network and Computer Applications,2007,30(3):920-936.
[10] Hassen H Ragab,Bouabdallah A,Bettahar H,et al.Key management for content access control in a hierarchy [J]. Computer Networks,2007,51(11):3197-3219.
[11] Schneier B.应用密码学——协议、算法与C源程序 [M].吴世忠,祝世雄,张文政,等译.北京:机械工业出版社,2000:248.

备注/Memo

备注/Memo:
作者简介: 叶峰(1974—),男,博士生,yefeng_nuaa@hotmail.com.
引文格式: 叶峰,袁家斌.置换密钥矩阵加密算法的改进[J].东南大学学报:自然科学版,2008,38(1):11-15.
更新日期/Last Update: 2008-01-20