网络与信息安全学报 ›› 2020, Vol. 6 ›› Issue (2): 106-115.doi: 10.11959/j.issn.2096-109x.2020028

• 学术论文 • 上一篇    下一篇

基于AES轮函数认证加密算法研究与设计

高国强,李子臣()   

  1. 北京印刷学院数字版权保护技术研究中心,北京 102600
  • 修回日期:2020-02-03 出版日期:2020-04-15 发布日期:2020-04-23
  • 作者简介:高国强(1995- ),男,内蒙古兴安盟人,北京印刷学院硕士生,主要研究方向为认证加密算法分析与设计。|李子臣(1962- ),男,河南温县人,博士,北京印刷学院教授、博士生导师,主要研究方向为公钥密码、数字签名、后量子密码。
  • 基金资助:
    国家自然科学基金资助项目(61370188);北京市教委科研计划一般基金资助项目(KM201610015002);北京市教委科研计划一般基金资助项目(KM201510015009);北京市教委科研计划重点基金资助项目(KZ201510015015);北京市教委科研计划重点基金资助项目(KZ201710015010);科技创新服务能力建设-科研水平提高定额基金资助项目(PXM2017_014223_000063);北京印刷学院校级基金资助项目(Ec201803);北京印刷学院校级基金资助项目(Ed201802);北京印刷学院校级基金资助项目(Ea201806)

Research and design of authenticated encryption algorithm based on AES round function

Guoqiang GAO,Zichen LI()   

  1. Research Center for digital copyright protection technology,Beijing Institute of Graphic Communication,Beijing 102600,China
  • Revised:2020-02-03 Online:2020-04-15 Published:2020-04-23
  • Supported by:
    The National Natural Science Foundation of China(61370188);The Beijing City Board of Education Science and Technology Key Project(KZ201510015015);The Beijing City Board of Education Science and Technology Key Project(KZ201710015010);Project of Beijing Municipal College Improvement Plan(PXM2017_014223_000063);BIGC Project(Ec201803);BIGC Project(Ed201802);BIGC Project(Ea201806)

摘要:

认证加密算法同时保证信息的机密性和完整性,在信息安全领域具有广泛的应用前景。利用混合整数线性规划方法,搜索高效且最小活跃S盒较多的迭代结构,基于AES轮函数和广义Feistel结构设计底层的轮函数,实现了一个基于 AES 轮函数的认证加密算法。该认证加密算法具有抵抗碰撞攻击、差分攻击、线性攻击等攻击的能力,且效率是原有认证加密算法AES-GCM的两倍。

关键词: 认证加密算法, AES算法, 混合整数线性规划

Abstract:

The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.

Key words: authenticated encryption algorithm, AES algorithm, MILP

中图分类号: 

No Suggested Reading articles found!