信息网络安全 ›› 2018, Vol. 18 ›› Issue (7): 69-78.doi: 10.3969/j.issn.1671-1122.2018.07.009

• • 上一篇    下一篇

一种基于双明文的数据对称加密算法

向永谦1(), 宋智琪2, 王天宇3   

  1. 1. 62101部队信息中心,湖北武汉430010
    2. 武汉大学国家网络安全学院,湖北武汉 430072
    3.中国海洋大学信息
  • 收稿日期:2018-03-15 出版日期:2018-07-15 发布日期:2020-05-11
  • 作者简介:

    作者简介:向永谦(1962—)男,湖北,高级工程师,硕士,主要研究方向为网络安全;宋智琪(1995—),女,四川,硕士研究生,主要研究方向为密码学;王天宇(1996—),女,山东,本科,主要研究方向为白盒密码学。

  • 基金资助:
    国家重点研发计划[2017YFB0503700,2016YFB0501801];国家自然科学基金[61170026];国家标准研究计划[2016BZYJ-WG7-001]

A Data Symmetric Encryption Algorithm Based on Double Plaintext

Yongqian XIANG1(), Zhiqi SONG2, Tianyu WANG3   

  1. 1. Information Centre, 62101 Military, Wuhan Hubei 430010, China
    2. School of Cyber Science and Engineering, Wuhan University, Wuhan Hubei 430072, China
    3.College of Information Science and Engineering, Ocean University of China, Qingdao Shandong 266100, China
  • Received:2018-03-15 Online:2018-07-15 Published:2020-05-11

摘要:

传统对称密钥密码体制的安全完全依赖于密钥的保密,常用的对称密码算法DES、3DES、IDEA、AES 等都是采用对一组明文加密得到一组密文的方法,信息利用方式枯燥,信息传递量有待增加,且对于特定的使用环境,无法在不使用分支判断的条件下提供不同的信息。为此,文章介绍了一种基于双明文的数据对称加密算法及其工作原理,并给出了核心算法的功能和描述,对核心算法的安全考虑逐一说明;文章还总结了其与目前常见对称算法的不同,并结合应用场景进行解释,以展示其应用前景;最后对该算法的优势进行总结,并分析其可能存在的问题和改进方向。该算法可以成倍增加信息传递量,并能选择性提供明文,这在阻止攻击者穷举密钥方面具有创新性,且算法简单,运行速度快,加密高效。同时引入hash算法,既能够保证数据的完整性,又能提供防篡改与检验机制,在安全性上得到保证,具有良好的技术优势。

关键词: 对称密码, 分组密码, 双明文加密, 穷举攻击, 防篡改

Abstract:

The security of traditional symmetric cryptosystem lies entirely in the secrecy of encryption keys. DES, 3DES, IDEA and AES, which are symmetric algorithms commonly adopted, all make their ways from one single set of plaintexts to one single set of ciphertexts. Owing to the simplex mode of information utilization, the amount of information transmitted is far from perfection. Also, they are unable to provide separate information when faced with the situation where the demand of branch conditions is not well met. In the view of the foregoing perspectives, this paper introduces double plaintext and gives a brief introduction of its encryption method and operational principle. And the encryption algorithm is divided into several sub-algorithms with each of them described carefully in terms of function and safety considerations. The paper also summarizes similarities and differences between familiar symmetric encryption algorithms and the one this paper presents. Meanwhile a few application scenarios are demonstrated to help form an understanding of the prospect of the algorithm. In the last part, this paper analyzes the strength and weakness this algorithm can bring and gives a future study direction. This encryption algorithm helps to multiply the amount of information being transmitted, and to bring in a method of writing back plaintext alternatively with high efficiency. And it innovates in preventing intruders from brute-force attack. Additionally, hash arithmetic is also introduced to ensure data integrity, resist tamper and complete inspection. So this method is well advanced technically.

Key words: symmetric cryptography, block cryptography, double plaintext, brute-force attack, tamper resistance

中图分类号: