在分组密码的设计中,提高分组密码的抗差分攻击性能是一个重要的课题。
An important problem in the design of the block cipher is to improve the performance of the resisting differential cryptanalysis.
实验结果表明,改进后的算法对差分攻击的抵抗能力有所提高,雪崩效应更趋合理。
Experimental results show that the improved algorithm has stronger ability to resist differential attack, and the avalanche effect of.
研究结果表明,E2不仅具有十分优异的抗差分攻击和抗线性攻击的性能,而且实现也十分方便。
The research results indicate that E2 not only has excellent performance against differential attack and linear attack, but also can be implemented very flexibly.
理论分析和仿真实验表明,本文提出的算法具有较高的安全性能,特别是在统计攻击、差分攻击和选择明文攻击能力方面具有很好的抗攻击性能。
Theoretical analysis and simulated experiment show that, the scheme has excellent performances against attacks, in particular statistical attack, differential attack and chosen plain image attack.
为进一步提高密码芯片的安全性,密码芯片必须防止简单能量分析和差分能量分析的攻击。
To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack.
SPN结构是一种流行的分组密码总体结构;差分和线性分析是攻击分组密码的最强有力的方法。
SPN is a popular overall structure of block cipher, and the differential cryptanalysis and linear cryptanalysis are the most powerful approaches to attack most symmetric block ciphers.
基于组合函数的差分特性,提出了一种新型的再同步攻击方法。
We propose a new resynchronization attack based on the difference performances of combinational functions.
使用高阶差分状态序列,增强了系统因果强度,加强了抵抗身份欺骗和差分分析攻击的能力。
By using the high order differential state sequence, the casuality of the system and the capability of resistance to identity deception and differential attacks is enhanced.
介绍了目前针对AES的有效的一种攻击方法:差分容错攻击,并给出了完整的攻击实例来加以说明。
An efficient attack method against AES is presented with a detail example, which is called Differential Fault Analysis.
给出了差分序列的若干性质,对差分分析方法在序列密码中的应用作了一些探讨,并给出了攻击实例。
In this paper, we point out some properties of the differential sequence, discuss the applications of differential cryptanalysis in sequence cipher attack and provide an attack sample.
差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,对目前的信息安全系统构成了严峻挑战。
Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.
差分功率分析(DPA)方法可有效地对加密的集成电路芯片进行攻击解密,它绕过了加解密算法繁琐的数学分析,从而获取密码和信息。
The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.
描述了一种对AES- 128的差分错误分析原理,给出了攻击的算法,分析了算法成功的概率。
The principle of a kind of differential fault analysis on AES-128 is described. The attacking algorithm is given. The probability of accomplishing the algorithm is analyzed.
建立了卫星网络加密算法差分故障攻击模型,并对模型的合理性及攻击实现过程进行了阐述。
Build up a differential fault attack model to cipher in satellite network and analyze rationality of the model and the attack process.
建立了卫星网络加密算法差分故障攻击模型,并对模型的合理性及攻击实现过程进行了阐述。
Build up a differential fault attack model to cipher in satellite network and analyze rationality of the model and the attack process.
应用推荐