大工至善|大学至真分享 http://blog.sciencenet.cn/u/lcj2212916

博文

[转载]【信息技术】【2009.05】【含源码】高级加密标准(AES)的实现

已有 1699 次阅读 2019-3-22 17:10 |系统分类:科研笔记|文章来源:转载


本文为印度Rourkela国家技术研究所作者:Aseem Jagadev)的学士论文62

 

2000102国家标准技术研究所(NIST)宣布Rijndael为新的高级加密标准(AES)。AES的前身是数据加密标准(DES)由于其易受暴力攻击因此被认为是不安全的。DES1977年制定的标准一直沿用到1990年代中期然而20世纪90年代中期很明显,DES56位密钥已经不足以阻止现代计算机发起的攻击这些计算机比DES标准化时可用的处理器强大数千倍AES是一种128位的对称分组密码

 

本论文包括先进加密技术的一步一步的完整实现使用AES128位数据进行加密和解密并对其进行改进以提高可靠性和安全性加密过程包括各种经典技术的组合如替换重排和转换编码技术等加密和解密模块包括为所有迭代过程生成密钥的密钥扩展模块改进方案包括在攻击迭代回合中增加算术运算和路由转置密码密钥扩展模块被扩展到迭代处理次数的两倍以增强其对未授权攻击的免疫力

 

On October, 2, 2000, The National Institute of Standards and Technology (NIST) announced Rijndael as the new Advanced Encryption Standard (AES).The Predecessor to the AES was Data Encryption Standard (DES) which was considered to be insecure because of its vulnerability to brute force attacks. DES was a standard from 1977 and stayed until the mid 1990's. However, by the mid 1990s, it was clear that the DES's 56-bit key was no longer big enough to prevent attacks mounted on contemporary computers, which were thousands of times more powerful than those available when the DES was standardized. The AES is a 128 bit Symmetric block Cipher. This thesis includes the complete step by step implementation of Advanced Encryption Technique, i.e. encrypting and decrypting 128 bit data using the AES and it's modification for enhanced reliability and security. The encryption process consists of the combination of various classical techniques such as substitution, rearrangement and transformation encoding techniques. The encryption and decryption modules include the Key Expansion module which generates Key for all iterations. The modifications include the addition of an arithmetic operation and a route transposition cipher in the attacks iterative rounds. The Key expansion module is extended to double the number of iterative processing rounds in order to increase its immunity against unauthorized attacks.

 

 

摘要

密码学导论

高级加密标准简介

4 AES算法描述

5 AES具体操作

6 Rijndael密钥方案

密钥扩展

密钥方案的实现

9 AES加密的实现

10 AES解密

11 AES改进方案

12 研究结果

13 结论

14 参考文献 



下载英文原文地址:

http://page2.dfpan.com/fs/fl5c5jf2f2a1e2b9169/


更多精彩文章请关注微信号:qrcode_for_gh_60b944f6c215_258.jpg



https://blog.sciencenet.cn/blog-69686-1169053.html

上一篇:[转载]【新书推荐】【2018.09】燃气轮机:内流系统建模
下一篇:[转载]【读书2】【2014】基于MATLAB的雷达信号处理基础(第二版)——相干散射(3)
收藏 IP: 60.169.68.*| 热度|

0

该博文允许注册用户评论 请点击登录 评论 (0 个评论)

数据加载中...
扫一扫,分享此博文

Archiver|手机版|科学网 ( 京ICP备07017567号-12 )

GMT+8, 2024-4-20 05:45

Powered by ScienceNet.cn

Copyright © 2007- 中国科学报社

返回顶部