Dissertation > Excellent graduate degree dissertation topics show

The Research on Key Technology of AES and Short-Block Encryption Technology

Author: CuiJie
Tutor: LiuLianHao
School: Central South University
Course: Computer System Architecture
Keywords: AES Square Attack Rijndael Algebraic Attack Short-block Encryption
CLC: TP309.7
Type: Master's thesis
Year: 2007
Downloads: 241
Quote: 2
Read: Download Dissertation


Rijndael is finalized as Advanced Encryption Standard (AES) in 2000, and it has become the international standard in commerce field. There are more and more people attaching importance to the cryptanalysis and application study of AES. Pre-payment code meter is urgently needed for market in the view of shortcomings of electricity sale by IC card way. Short-block encryption is the key technique in that meter. The short-block encryption technology can achieve that the ciphertext contains the maximal information, this is other encryption algorithm cannot live up to. Some applications in country economy such as pre-payment code meter need cipher to meet the request, the cipher of purchase information is fixed size (12bit, 16bit, etc) decimal number, and it is transmitted and inputted by user. It is easy to convert data during different carry system, but the converted ciphertext can’t contain the maximal information. So it is urgently necessary to study the key problems of short-block encryption technology in pre-payment code meter industry, so it is significant to develop country economy.In this thesis, the design principle and algebraic characteristics of AES are introduced in detail, status quo of cryptography and study is outlined firstly, the algebraic expression of S-box and InvS-box, the algebraic characteristics of boolean substitution and the characteristics of affine transformation are presented. And an improved S-box is constructed, the improved S-box has better characteristics in 10 algebraic characteristics, such as periods of affine transformed pair, periods of iterative-output, items of algebraic expression of S-box and InvS-box, balanceness, strict avalanche criterion, non-linear degree, resistance against the XSL attack etc.And then integral cryptanalysis and algebraic attack of AES are studied. Aim at that AES has the characteristics of square cipher structure, square-4 attack, square-5 attack and square-6 attack are studied, and the square-6 attack is applied to square-7. Based on square attack, 7-round related-key attacking Rijndael-128/192 and 9-round related-key attacking Rijndael-128/256 are studied, and the complexity of these attacks are analysed in detail. Multivariate quadratic (MQ) equations in GF(2) and GF(2~8) are studied, the XSL attack to the MQ equations is analysed, the BES attack is disproved and the other MQ expression of AES in GF(2~8) is presented.Finally the short-block encryption algorithm based on AES is introduced, and the S-box’s improved method of short-block encryption algorithm is presented, the new S-box is applied to the short-block encryption simulation system and the security of system enhance obviously.

Related Dissertations

  1. The AES Algorithm and Its Implementation in DSP,TN918.1
  2. Study on the Determination and Migration of Hazardous Chemicals in Polyethylene Plastic Food Packaging Materials,TS206.4
  3. Remote FPGA system design and implementation of security upgrades,TP309
  4. FPGA-based USB data encryption and decryption system,TP309.7
  5. Research on a File Encryption and Decryption,TP309.7
  6. Chinese medicine additives on AES/6501 system performance,TQ461
  7. The Research of Rijndael Algorithm for Document Encryption,TP309.7
  8. Research and Implementation of IEEE 802.15.4 CCM-AES Coprocessor,TN929.5
  9. Design and Implementation of the system based on the the two encryption algorithm encryption and decryption,TP309.7
  10. Element Determination and Infrared Spectrum Analysis of Propolis Collected from Different Areas of China,S896.6
  11. The Research of Network Security Based on Composite Encryption Techniques,TP393.08
  12. The Research and Realization on the File-controlling Security Technique of Sending Outside from Enterprise,TP311.52
  13. Based on GPGPU efficient the AES digital color image encryption technology research and Implementation,TP309.7
  14. The integrity detection program outsourced storage environments,TP309.7
  15. Based . Net technology Guizhou Province buying and selling goods wholesale and retail management conception and design of information systems,TP311.52
  16. Design of Passive Keyless Entry System and Research of the Key Technologies,TP273.5
  17. Side channel key technology research,TP393.08
  18. The Design and Implementation of FC in the storage area network encryption card,TP309.7
  19. Research on a Normal File Encryption and Decryption,TP309.7
  20. Research and Implementation of Software Dongle Based on USB,TP309.7
  21. High Throughput XTS-AES encryption algorithm for hardware implementation,TP309.7

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net  Mobile