Font Size: a A A

Design And Research Of Authenticated Encryption Based On Chaos

Posted on:2016-06-04Degree:MasterType:Thesis
Country:ChinaCandidate:G WuFull Text:PDF
GTID:2308330461470346Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
.In recent years, with the holding of CAESAR competition, making the study of authenticated encryption scheme reached a new height. Since the authenticated encryption scheme has both the technology advantage of the confidentiality and authentication, which can be widely applied to the need for data encryption and integrity protection requirements for the implementation of the high efficiency environment. Currently used authenticated encryption scheme such as CCM and GCM, which has been increasingly unable to meet the current application requirements, especially as there is a lot of criticism of the CCM. In this paper, combined the design philosophy and security analysis of the CAESAR competition’s candidates with the chaotic system and cellular automata theory, the main work includes the following aspects:(1) Describe the Basic knowledge of authenticated encryption scheme and the chaos and cellular automata theory. Introduce the authenticated encryption scheme’s definition and general model and the classification of the traditional authenticated encryption scheme, and summarizes the basic design philosophy of candidate solutions of CAESAR competition. At the same time it lists several basic model of the Chaos Theory as well as the basic knowledge of n-dimensional nonlinear digital filter and cellular automata.(2) Combining the nonlinear digital filter which satisfy the Kelber conditions and SHA-3 function’s design philosophy, this paper proposed a Authenticated Encryption algorithm construction method based on Coupled nonlinear digital filter. This algorithm employing the Sponge constructure to iterate and using the Coupled nonlinear digital filter produce chaotic bitstream as subkey to encrypt the plaintext, at the same time, one of output of the nonlinear digital filter tap out for the message authentication tag calculation, thus it achieve the effects of encryption and authentication at the same time. The results shows that the algorithm is simple in structure, operation quickly and has high security, and the coupled filter structure has no complicated floating point arithmetic, so it convenient for the software and hardware implementation.(3) According to the knowledge of traditional SHA-3 hash functions, the Duplex structure and reversible cellular automata model. We designed a novel structure fast One-pass AE scheme. The underlying function uses a special kind of second-order one-dimensional memory reversible cellular automata. The proposed authenticated encryption scheme use the evolve rule of reversible cellular automata, which can encrypt the plaintext without calculate the authentication tag with one-pass mode. At decryption and verification phase, use the reverse operation of the cellular automata to get the plaintext, and recover the key to verify the Ciphertext’s integrity. The Theoretical analysis and experimental results shows that the scheme has a good confusion and diffusion properties, sensitive and can detect tampering with the ciphertext to ensure authentication properties of the scheme. And the scheme also has a simple design structure, high efficiency characteristics.Finally, the paper conducted a comprehensive summary of the work, and future research directions are suggested.
Keywords/Search Tags:authenticated encryption, chaotic system, Nonlinear autoregressive digital filter, reversible cellular automata, CAESAR competition
PDF Full Text Request
Related items