计算机科学 ›› 2023, Vol. 50 ›› Issue (11): 333-339.doi: 10.11896/jsjkx.220900026
赵耿1,2, 高世蕊1, 马英杰1, 董有恒2
ZHAO Geng1,2, GAO Shirui1, MA Yingjie1, DONG Youheng2
摘要: S盒是多数分组密码算法的基本非线性模块,可以满足分组密码算法的混淆、扩散要求。为了提高混沌S盒的安全性,文中利用抗退化混沌系统生成S盒元素,基于初等元胞自动机生成S盒检索表的方式来生成S盒。抗退化混沌系统可以避免发生Skew Tent系统进入不动点的情况,消除低精度下系统进入短周期的现象。因为初等元胞自动机的迭代规则为二元域上的运算,且满足时空上的离散性,所以,将初等元胞自动机运用到混沌分组密码中时,不用考虑动力学退化的问题。当初等元胞自动机的迭代规则为全局混沌规则时,只要元胞个数足够,就可以保证输出的伪随机性。利用初等元胞自动机生成S盒的检索表,在保证S盒设计的混淆原则的同时还可以简化S盒的生成步骤。最后对所设计的S盒进行安全性分析对比,实验结果表明,所提方法生成的S盒具有良好的安全性,满足分组密码的混淆、扩散原则,可用于混沌分组密码算法设计中。
中图分类号:
[1]LI L,ZHANG H G.Serpent—a candidate for Advanced Encryption Standard AES[J].Information Security and Communications Privacy,2000(1):68-72. [2]HE Y.Attack on reduced-round CRYPTION cipher[D].Jinan:Shandong University,2006. [3]KNUDSEN L.A Key-schedule Weakness in SAFER K-64[J].Lecture Notes in Computer Science,1995,963(1):274-286. [4]HU Y P,XIAO G Z,ZHANG Y Q.Modification of SAFER+[J].Journal of Xidian University,2000(6):730-735. [5]SU X D,CUI J S,ZHANG H G.One of the candidates of advanced encryption standard AES——Rijndael[J].Information Security and Communications,2000(1):62-67,78. [6]MASTUI M.New Block Encryption Algorithm MISTY[C]//FSE 97.Berlin:Springer Verlag,1997:54-68. [7]ZHU D,TONG X J,ZHANG M,et al.A New S-Box Generation Method and Advanced Design Based on Combined Chaotic System[J].Symmetry,2020,12(12):2087-2087. [8]NEUMANN J,BURKS A W.Theory of self-reproducing au-tomata[M].Urbana:University of Illinois Press,1966. [9]LANGTON C G.Self-reproduction in cellular automata[J].Physica D:Nonlinear Phenomena,1984,10(1/2):135-144. [10]JOSHI P,MUKHOPADHYAY D,ROYCHOWDHURY D.Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata[J].Cryptology and Information Security Series,2005,2005:396-396. [11]DONG Y H,ZHAO G,MA Y J.Two-dimensional pseudo-random coupled map lattices system based on partitioned elementary cellular automata and its dynamic properties[J].Journal on Communications,2022,43(1):71-82. [12]NASKAR P K,BHATTACHARYYA S,NANDY D,et al.Arobust image encryption scheme using chaotic tent map and cellular automata[J].Nonlinear Dynamics,2020,100(3):2877-2898. [13]刘桂芬,赵文强.加法噪声驱动的随机Lorenz系统吸引子及其上半连续性[J].重庆工商大学学报(自然科学版),2022,39(1):78-84. [14]CAO L C,LUO Y L,QIU S H,et al.A perturbation method to the tent map based on Lyapunov exponent and its application[J].Chinese Physics B,2015,24(10):82-89. [15]WOLFRAM S.Cellular automata as models of complexity[J].Nature,1984,311(5985):419-424. [16]LI W,PACKARD N.The structure of the elementary cellular automata rule space[J].Complex Systems,2000,4(3):281-297. [17]JAKIMOSKI G,KOCAREV L.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Transactions on Circuits and Systems I Regular Papers,2001,48(2):163-169. [18]HAN Y Y,HE Y R,LIU P H,et al.A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System[J].Journal of Computer Research and Development,2020,57(10):2147-2157. [19]ZHAO G,ZHANG S M,MA Y J,et al.Design and analysis of dynamic S-box based on anti-degradation chaotic system[J].Journal of Computer Applications, 2022.42(10):3069-3073. [20]ÖZKAYNAK F.An Analysis and Generation Toolbox for Chaotic Substitution Boxes:A Case Study Based on Chaotic Labyrinth Rene Thomas System[J].Iranian Journal of Science and Technology,Transactions of Electrical Engineering,2020,44(1):89-98. [21]YAN W H,DING Q.A Novel S-Box Dynamic Design Based on Nonlinear-Transform of 1D Chaotic Maps[J].Electronics,2021,10(11):1313. [22]ADAMS C,TAVARES S.The structured design of crypto-graphically good s-boxes[J].Journal of Cryptology,1990,3(1):27-41. [23]BIHAM E,SHAMIR A.Differential Cryptanalysis of DES-like Cryptosystems[J].Journal of Cryptology,1991,4(1):63-72. [24]HALE J K,VERDYNLUNEL S M.Introduction to Functional Differential Equations[M].New York:Springer-Verlag,1993. [25]WEBSTER A F,TAVARES S E.On the Design of S-Boxes[J].Lecture Notes in Computer Science,1986,218(1):523-534. [26]SONY L Y,GONG X Q,HE X F,et al.Multi-stage malicious click detection on large scale Web advertising data[C]//Proceedings of Very Large Data Bases.New York:ACM,2013:67-72. [27]LIU Q,FANG J Q,ZHAO G,et al.Research on Chaotic Encryption System based on FPGA technology[J].Acta Physica Sinica,2012,61(13):78-83. |
|