[1]时阳阳,黄玉划,陈帮春. 一种基于Feistel结构和WTS的分组密码[J].计算机技术与发展,2014,24(08):126-130.
 SHI Yang-yang,HUANG Yu-hua,CHEN Bang-chun. A Block Cipher Based on Feistel Structure and WTS[J].,2014,24(08):126-130.
点击复制

 一种基于Feistel结构和WTS的分组密码()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年08期
页码:
126-130
栏目:
安全与防范
出版日期:
2014-08-10

文章信息/Info

Title:
 A Block Cipher Based on Feistel Structure and WTS
文章编号:
1673-629X(2014)08-0126-05
作者:
 时阳阳黄玉划陈帮春
 南京航空航天大学 计算机科学与技术学院
Author(s):
 SHI Yang-yangHUANG Yu-huaCHEN Bang-chun
关键词:
 AESFeistel结构WTS策略依赖性测试不可能差分分析
Keywords:
 AES Feistel structureWTS strategiesdependence testimpossible differential analysis
分类号:
TN918.1
文献标志码:
A
摘要:
 AES为新的数据加密标准,通过研究分组密码算法加密的整体结构和AES加密算法,文中设计了一种基于Feistel结构和WTS策略的分组密码算法FWTS。 FWTS采用Feistel结构,轮函数借鉴AES的WTS策略,分组长度为256 bits,密钥长度为128 bits,192 bits,256 bits。通过依赖性测试表明,FWTS算法4轮充分满足雪崩效应、严格雪崩准则和完备性。通过不可能差分分析,FWTS算法的6轮不可能差分所需的时间复杂度要大于AES算法的6轮不可能差分的时间复杂度。FWTS算法的安全性不低于AES算法。通过效率测试表明FWTS的加密效率要高于AES。
Abstract:
 AES is the advanced data encryption standard. A block cipher based on Feistel structure and WTS strategies named FWTS is designed by studying the overall structure of the block cipher and AES algorithm. FWTS algorithm adopts Feistel structure and its round function refers to WTS strategies of AES encryption. The block size of FWTS is 256 bits,the key size is 128 bits,192 bits,256 bits. De-pendence test shows that FWTS algorithm fully satisfies the avalanche effect with 4-round. Impossible differential analysis with 6-round presents that FWTS algorithm has a higher time complexity than AES. The security of FWTS algorithm is not lower than AES. The effi-ciency test shows that FWTS algorithm has a higher efficiency compared with AES.

相似文献/References:

[1]郑东 王友仁 张砦.AES中字节代换和列混合的硬件可逆设计[J].计算机技术与发展,2009,(07):191.
 ZHENG Dong,WANG You-ren,ZHANG Zhai.Reversible Hardware Designs of ByteSub and MixColunm in AES[J].,2009,(08):191.
[2]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(08):1.
[3]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(08):5.
[4]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(08):13.
[5]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(08):21.
[6]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(08):25.
[7]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(08):29.
[8]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(08):34.
[9]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(08):38.
[10]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(08):43.

更新日期/Last Update: 2015-03-26