According to kerckhoffs " assumption , a cryptosystem should be designed to withstand cryptanalysis even if an attacker knows its details , except the information on keys used 根据kerchhoff对密码体制的一般假定,即使攻击者知道其设计细节,密码体制也应能防止攻击者的密码分析,除非攻击者知道密钥。
Some initial cryptanalysis and detailed statistical tests of scf are given , the results show that scf can resist some known cryptanalytic attacks and has excellent statistical properties 并且对scf作了一些初步的密码分析和详细的统计测试,结果表明: scf密码足够抵抗一些已知的密码分析、具有很好的统计性能。
The importance of analysis of this variant is : using cryptanalysis of the variant for reference , attacks on the original cipher may be found when knowing some of the design details of cac 对cac的变形进行分析的意义在于:知道cac的具体设计细节后,借鉴对该变形的分析,有可能对cac密码系统本身的安全性造成威胁。
The traditional encryption algorithm ' s security intensity is scarcity , its key " length is too short to resist the attack of the differential cryptanalysis and linear analysis , and exist considerable serious safe trouble 传统的des等加密算法安全强度不足,主要表现在密钥长度过短、不能抵御差分分析和线性分析攻击,因而存在相当大的安全隐患。
Statistical analysis on simulation data shows that , this cellular automata based one - way hash function can successfully resist varieties of cryptanalysis attacks , and also it is scalable , high computationally efficient and easy to be implemented with hardware 对实验数据的统计分析表明,该算法可抵御各类攻击,同时本算法还具有可扩展性、计算效率高和易于芯片实现等特点。
First a quasi - like sequence is constructed by using entropy analysis , and then a fast correlation attack is taken to recover the origin sequence . the detail steps of the attack is given . the cryptanalysis shows that in theory the attack is practical 2 、利用熵分析构造了一个拟合序列后采用快速相关攻击方法对广义自缩序列进行了分析,给出了实现的具体步骤,指出了该方法在理论上的可行性。
Finally , the two aspects of the practical application of the quantum technology is introduced in this paper . one is application in the cryptanalysis , the other is some practical applications of quantum theory in information technology such as communication , security and etc 最后,本文介绍了量子密码技术实际应用的两个方面,一个是密码攻击方面的应用,另一个则是讨论了量子理论在通信、安全等信息技术方面的一些实际应用。
As far as kasumi algorithm is concerned , we get the maximum probability of differential and linear through computing the s7 box and s9 box ' s differential and linear probability . thus , we prove it is secure against differential and linear cryptanalysis 在kasumi算法的分析中,首先计算出s7盒与s9盒的最大差分概率和最大的线性概率,最后计算出整个算法的最大差分概率和最大线性概率,进而证明了该算法是抗差分分析和线性分析的。
4 . security of a class of block ciphers based on chaotic maps against differential and linear cryptanalysis is studied . the results show that this kind of cipher structure is not good compared with some famous cipher structure such as cast - 256 cipher structure and common feistel structure 对一类基于混沌函数的分组密码结构gfs4 ( gfs8 )的安全性做了评估,分析结果表明:从抵抗差分密码分析和线性密码分析的安全性与所需要的执行代价相比,这类密码结构不如cast - 256型密码结构和普通的feistel型密码结构。
Adopting this model and properly selecting some nonlinear and linear modules which has good cryptographic properties , a concrete block cipher can thus be constructed , which is provably secure against differential and linear cryptanalysis , and also has self - inverse structure for encryption and decryption 采用该模型,只需适当选取密码特性好的非线性模块和线性模块,就可以构造出具有很好地抵抗差分密码分析和线性密码分析的能力、加解密相似的分组密码算法; 3