• • 上一篇    下一篇

新型数学难题及其在分组密码中的应用研究

王勇   

  • 出版日期:2014-11-15
  • 基金资助:
    国家自然科学基金[61462019];广西自然科学基金[2014GXNSFAA118363];广西可信软件重点实验室研究课题(KX201316)

Study on New Mathematical Difficult Problem and Application in Block Cipher

WANG Yong   

  • Online:2014-11-15
  • About author:广西可信软件重点实验室,广西桂林 541004; 桂林电子科技大学计算机科学与工程学院,广西桂林 541004

摘要: 密码算法一般基于数学难题来保证安全性。目前已有的数学难题可以归结为求解一个或者一系列未知数。不同于已有的数学难题,文章提出一类新的数学难题,它求解的对象不是未知数,而是未知函数,这类难题并没有可行的求解方法。文章克服现实障碍,考虑穷举攻击的安全性,利用未知函数求解难题和未知数求解难题相结合的方法提出了构造分组密码的方案。加密和解密的函数为未知函数,未知函数由密钥确定,而密码分析者不知道密钥,所以无法确定密码函数。由于密码函数未知,所以大多数的密码分析方法需要的前提条件未知,从而无法进行分析。在文中方案下形成了一种新的单向性,关于密码函数的单向性,加密和解密者很容易确定加解密的函数,而密码分析者不能确定。文中方案针对现有的密码分析具有很好的安全性,文章还对可能的攻击方法进行了设想,提出了几种攻击思路,并且针对这些攻击对未知函数的各种具体形式的设计提出了一些原则性建议,以避免密码分析者通过各种线索确定函数的具体形式,或者经过转化将未知函数统一为一个已知函数。

Abstract: Cryptographic algorithm is generally based on mathematical difficult problems in order to insure security. At present, the existing mathematical problem can be reduced to solving one or a series of unknown number. Different from the existing mathematical difficult problem, this paper presents a new class of mathematical difficult problem which is to solve unknown function, but not unknown number. There is no feasible method to solve the problem. In this paper, the obstacles are overcome and the security under exhaustive attack is considered, and a block cipher scheme is proposed based on the combination of solving unknown number and unknown function. The function of encryption and decryption are unknown. In the scheme, the unknown function is decided by the key and the codebreaker does not know the key, and hence cannot confirm the cipher function. As the encryption and decryption function is unknown, so precondition of most cryptanalysis method is unknown, and hence the analysis is infeasible. Under the scheme a new one-wayness about the cipher function is formed. The men to encrypt and decrypt can easily determine the cipher function, but the cryptanalyst cannot determine. The scheme has perfect security for the existing cryptanalysis. The conceivable attack methods are imagined, several attack thoughts are given, and the optimization of the cryptosystem for these attacks is given. Aiming at the conceivable attacks, some principled suggestions are given to avoid the concrete form is determined by cryptanalysis using various clues or the unknown function is unified into a known function.