Font Size: a A A

The Theory In Design And Analysis Of A Block Cipher And The Key Technology Application

Posted on:2012-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:Z J YangFull Text:PDF
GTID:2178330335480169Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
As the wide application of electronic networks in the computer and communication, a lot of sensitive information needs transmission in the open network.To solve this problem, the effective method is to use a block cipher technology.The paper introduces systematically a block cipher: the theory in design and analysis of a block cipher, analysis method, the working mode and the technology in detection and evaluation.It is based on the basic structure of the block cipher, and referenced to Feistel structure "theory of the characteristics of decrypted similar". In order to constructed quotient domain, the center algorithm is generated from primitive polynomials. Yet, the operation function in S box which it is based on the quotient domain about plaintext and key construct a block cipher in finally.The block cipher is protected its safety by algebra computing complexity that grows exponentially.The cipher is adopted with CTR mode and can be computed in parallel.Through constructed random number generator and stream cipher and hash function in authentication technology and key management from a block cipher,it is discusses the f important applications of the block cipher.In process of constructing a block cipher, the design scheme of the algebraic structure of the operation characteristics:(1) the new definition operation in function: ratio and the product as a remnant based module operations generated the intermediate results, yet,this can conceal expressly operation characteristic and add complexity analysis;(2) according to operation generates a times as maximum number of primitive polynomial, it search the corresponding complete primitive polynomial;(3) chosen a fixed polynomials, it is naturally formed quotient domain structure computation. under the action of the ideal nature polynomial.(4) based on quotient domain computing structure adopted parallel processing structure, this will do not affect security premise and improve encryption speed.
Keywords/Search Tags:The theory in design and analysis of a block cipher, Feistel structure, CTR model, the important applications technology in the key
PDF Full Text Request
Related items