Font Size: a A A

The Performance Analysis Of Attack Methods About The Advanced Encryption Standard

Posted on:2015-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:S P ChenFull Text:PDF
GTID:2268330431463943Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Rijndael algorithm became advanced encryption standard of America for its superior safety,execution of simplicity and the flexibility of its performance. In this paper, the security of thealgorithm is studied on the basis of Rijndael algorithm.The paper introduces the research status and recommends the application field of the AESalgorithm from the background of the AES algorithm. And then takes the brief analysis of thesecurity according to analyze its design structure.As an advanced encryption standard, AES algorithm has irreplaceable advantages to comparewith the other encryption algorithms. The paper introduces its design principle detailed from twoaspects of encryption and decryption. From the result of coding simulation, finds that using themethod of look-up table has higher efficient than using the traditional method in the process ofbytesub and inverse bytesub.Along with the further study of the AES algorithm by relevant experts and scholars, someattack methods for AES algorithm has been put forward. The paper introduces four frequently-usedattack algorithms, including interpolation attack, linear redundancy attack, integral attack and squareattack about low round of AES. The paper introduces the four attack methods from attack principle,round of attack and attack complexity respectively. And then introduces research results of the otherattack methods.In the fourth chapter, the paper introduces Lagrange interpolation principle and Lagrangeinterpolation process on the basis of Lagrange interpolation attack.The paper put forward two improved algorithms of Lagrange interpolation attack in the fifthchapter and does the work of theoretical analysis about the two improved algorithms’complexity.At last, the paper makes a summary with the research contents and points out the subsequentimproved direction.
Keywords/Search Tags:AES algorithm, integral attack, square attack, linear redundancy attack, Lagrange interpolation attack
PDF Full Text Request
Related items