Chinese Journal of Network and Information Security ›› 2020, Vol. 6 ›› Issue (2): 106-115.doi: 10.11959/j.issn.2096-109x.2020028

• Papers • Previous Articles     Next Articles

Research and design of authenticated encryption algorithm based on AES round function

Guoqiang GAO,Zichen LI()   

  1. Research Center for digital copyright protection technology,Beijing Institute of Graphic Communication,Beijing 102600,China
  • Revised:2020-02-03 Online:2020-04-15 Published:2020-04-23
  • Supported by:
    The National Natural Science Foundation of China(61370188);The Beijing City Board of Education Science and Technology Key Project(KZ201510015015);The Beijing City Board of Education Science and Technology Key Project(KZ201710015010);Project of Beijing Municipal College Improvement Plan(PXM2017_014223_000063);BIGC Project(Ec201803);BIGC Project(Ed201802);BIGC Project(Ea201806)

Abstract:

The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.

Key words: authenticated encryption algorithm, AES algorithm, MILP

CLC Number: 

No Suggested Reading articles found!