Dissertation > Excellent graduate degree dissertation topics show

Research on Attacks about LEX Algorithm

Author: LiXin
Tutor: TanXiaoQing
School: Jinan University
Course: Applied Mathematics
Keywords: Stream cipher AES algorithm LEX algorithm Differential fault analysis Differential related-cipher attack Alide attack
CLC: TN918.1
Type: Master's thesis
Year: 2013
Downloads: 4
Quote: 0
Read: Download Dissertation


The stream cipher with a wide range of applications in wireless mobile communication hasattracted huge attention in cryptography researching once again. However, design and analysis ofstream cipher is put into the test. Europe launched formally a research project of the ECRYPTprogram in2004. eSTREAM is a project of ECRYPY in order to promote development of streamcipher. The goal of this project is to establish a new and widespread adoption stream cipherstandard by calling for the design and analysis of stream cipher algorithms throughout the wholeworld publicly.eSTREAM Project has already been finished, but the received thirty five streamcipher algorithms may be used for reference.Differential fault attack combined integrating difference analysis is a cryptographic attackto aim at hardware implement structure for cryptographic algorithm. Sliding attack is one ofattack methods, which is proposed for iterative cipher algorithm. The basic ideas of sliding attackis using the weakness that cryptographic algorithms use the same round function (or some roundfunction is cycle) to obtain partial information of the key.Based on the summarizing the eSTREAM program, we analyze and research the designidea and principle,various attacks (Differential fault analysis, Differential related-cipher attack,Alide attack) for the LEX algorithm that is candidate cipher algorithm into the third phase in thispaper. Because every round encryption of AES uses the same key in LEX algorithm, it leads tobe attacked by slide attack easily. In this paper, we improve the key selection of LEX algorithmby using AES key extension algorithm. The improved LEX algorithm can resist slide attackeffectively.

Related Dissertations

  1. The AES Algorithm and Its Implementation in DSP,TN918.1
  2. ASIC Design and Applications of Stream Cipher Based on Chaos,O415.5
  3. High Throughput XTS-AES encryption algorithm for hardware implementation,TP309.7
  4. FPGA-based USB data encryption and decryption system,TP309.7
  5. Scalable video coding H.264/SVC layered encryption scheme,TN919.81
  6. Research of Secure Processor Architecture Based on Stream Cipher,TP309
  7. Research of Implementation Technology for Cryptography Algorithm Based on GPU,TP393.08
  8. Study on Safety Mechanism of Soldier Administrator System,TP309
  9. Research on Differential Power Analysis Attack on Two Kinds of Stream Ciphers,TN918.4
  10. Chaotic Network File System password,TN918.2
  11. Fault Attacks of Stream Ciphers,TN918.1
  12. Study and Inplement of Chaotic Stream Ciphers Based on Perturbation,TP309.7
  13. Research on Several Cryptographic Properties of Primitive σ-LFSR,TN918.1
  14. Research on Technology of Reconfigurable Parallel Feedback Shift Register Targeted at Stream Cipher,TN918.2
  15. Differential Fault Analysis of Block Ciphers,TN918.1
  16. The Research on Theoretical Design andAnalysis Method of Chaotic Cryptography,TN918.1
  17. The Study of Stream Cipher Based on the Petri Net,TN918.1
  18. Study on the Linear Complexity and K-error Linear Complexity of Binary Sequences with Period 2~n,TN918
  19. Multiple Clock-Controlled Generator and Analysis,TN918.1
  20. The Research of Network Security Based on Composite Encryption Techniques,TP393.08
  21. Research and Design of a New-Style AIS,U675.7

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile