Font Size: a A A

Block Cipher Algorithm Design Based On The SHA-3

Posted on:2015-09-13Degree:MasterType:Thesis
Country:ChinaCandidate:C ZhangFull Text:PDF
GTID:2298330431964227Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Modern ideas of designing a cryptographic algorithm tend to learn from each otherand integrate various cryptographic algorithms. The Hash algorithm SHA-3which isselected by the NIST is the latest research findings, the three-dimensional idea ofSHA-3will be applied to our design and analysiz of a block cipher. We believe that thisinnovative exploration will not only to provide a particularly good thought, but alsopromote the research work in the field of information security.This article have studied the SHA-3algorithm deeply, also researched the designcriteria and performance analysis of the block cipher at the same time. Combined withthe C language and other auxiliary tools, we mainly have completed the following tasks:First, the test has studied the major cryptographic properties of SHA-3roundfunction’s nonlinear transformation, including nonlinearity, differential uniformity,algebraic degree, and find the algebraic expression of its inverse transform.Second, after the study of the SHA-3algorithm’s round function which works onthree-dimensional space, we improved part of its module and re-designed a base moduleacted on the three-dimensional space, which is suitable for the block cipher.The last, it presents a new block cipher-named CUBE, which acts on the state ofthree-dimensional space. And we also have implemented the CUBE cipher,provided itsdifferential analysis and linear analysis, proved that the CUBE can resist the exhaustivesearch attack.
Keywords/Search Tags:SHA-3, the Block CipherAlgorithm, Design, the CUBEAlgorithm
PDF Full Text Request
Related items