Dissertation > Excellent graduate degree dissertation topics show
DES linear cryptanalysis
Author: JingYunGe
Tutor: FengDeMin
School: Shaanxi Normal University
Course: Applied Computer Technology
Keywords: Block Cipher linear cryptanalysis key probability
CLC: TN918.2
Type: Master's thesis
Year: 2007
Downloads: 399
Quote: 1
Read: Download Dissertation
Abstract
American 20th century data encryption standard DES is so far usesbroadly, discusses one of most block cipher algorithms. In past severaldozens years, DES (Date Encryption Standard) the material encryptionstandard is continuously acting the strong character in the materialsecurity aspect, Widely is applied in aspects and so on trade, military,secret signaling and status authentication. Current attacked DES the mainmethod to have the linear cryptanalysis and the difference cryptanalysismethod and so on, this article has studied systematically to the DES linearcryptanalysis method. Inspects DES security intensity Through linearcryptanalysis method.This paper dissect DES algorithm realization process, Elaborated theDES S box characteristic, as well as sub-key production process; then thedissect linearity method of attack, and gave an example to simulate thelinear attack process, Has broken a code the part key ; has carried on thecomparison to the linear attack three different algorithms, has completedthe simulation process which the DES key attacked; Uses the central limittheorem, the normal distribution establishment statistics experimentalmodel in this foundation, and attacked the successful probability and thelinear attack complexity to the linearity has carried on the theoreticalanalysis.This simulation process provide not only one for studying in theory,but also application for cryptanalysis in practice, only then thoroughlydo a thorough research and the discussion to the linear attack law, canenable the block cipher which the future will design to resist the linearattack method attack.
|
Related Dissertations
- Research on Effectiveness Evaluation Methods of Weapon Systems,TJ06
- Research on Dam-Break Probability Analysis Method for Dangerous Reservoir,TV697
- Key Technologies of Dam-break Life Loss Risk Assessment Research,TV122.4
- Research on Transparent Security of JPEG Image,TP391.41
- Research on Iris Based Cryptography,TP309.7
- Research on Navigation System Related Technology for Moving Objects under Dynamic Environment,TP301.6
- Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
- Yunnan Province, human capital, the network structure of critical efficiency factor,F249.27
- Stochastic Optimal Dispatch of Power System Considering Uncertain Line Failures under Extreme Weather Disaster,TM73
- Construction of G Bank Yunnan Branch Office of Performance Management System,F272.92
- Study on the Mechanism of Night Temperature to Grain Filling of Inferior in Rice,S511
- Study on Tea Beverage Quality Security,TS275.2
- The Comparison and the Consideration about the Difference in Curriculum Standards Content in Statistics and Probability between China & England,G633.6
- Research of Sensitive Information Protection Techniques for Automated Trust Negotiation,TP309
- Research on the Design and Implementation of Border Access Platform in Public Security Network,TP393.09
- The Application of HACCP System Principle in Chili Health Food Production,TS218
- Study of Evaluation System on Security Management of HS Company,F426.21
- Region-based wireless sensor network key management scheme for research,TP212.9
- Identification of Epitope Fragments and Critical Amino Acid for Allergen TBb in Tartary Buckwheat,R284.1
- DR Stinson \,TN918.1
- Increments with generalized negative dependency and the asymptotic behavior of random,O211.5
CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Password, machine
© 2012 www.DissertationTopic.Net Mobile
|