首页> 外文学位 >Design and analysis of dynamic key-driven crypto engines.
【24h】

Design and analysis of dynamic key-driven crypto engines.

机译:动态密钥驱动的加密引擎的设计和分析。

获取原文
获取原文并翻译 | 示例

摘要

This dissertation is about developing a secure e-mail system named “Secure E-mail Systems” or SEMS that allow users to encrypt e-mails. The application uses 128-bit key block encryption with the key that changes in every block. The encryption algorithm is designed to remain secure even when the keys that encrypt a few blocks are known. It provides message integrity check, timestamp, attachment encryption, authentication and acknowledgment, all with minimal overhead. An address book is implemented to store keys with a protocol that can update the key using normal encryption routine. It also provides stream encryption using 127-bit key stream ciphers when faster encryptions are required.; In this dissertation, an encryption technique is developed to reduce the number of plaintext-ciphertext pairs produced by the encryption using the same key. This is done by changing the key after an encryption of every message block and will create only one plaintext-ciphertext pair encrypted from the same key. It explains how to create a key generator function that does not compromise the security even when some certain additional information is available to the attacker.; This dissertation also introduces three authentication and acknowledgement protocols using secret key that do not require the notary to keep a record for each transaction and the content of the message is not revealed to the notary. The protocols limit the number of encryption operation of the notary to 14 regardless of the size of the message. A slight modification to the protocol used in the application reduces the probability of success in cheating to 1/(2.40 × 1037), regardless of the computation resources the cheater has.; The stream cipher used in the application is the modified Zeng-Rao stream ciphers and is proven to generate a period of (2m−1 ).(2n−1) − 2 m+n−4 mn, where m and n are the size of the LFSRs used in the stream ciphers. Key streams are found to have large linear complexity and the linear complexity profiles closely follow the line y = x/2. Sequences generated from this stream ciphers are tested with Golomb's Randomness Postulates and are found to have very good randomness statistics.
机译:本文是关于开发一种名为“安全电子邮件系统”或SEMS的安全电子邮件系统,该系统允许用户加密电子邮件。该应用程序使用128位密钥块加密,并在每个块中更改密钥。即使已知加密几个块的密钥,加密算法也可以保持安全性。它提供消息完整性检查,时间戳,附件加密,身份验证和确认,所有这些都以最小的开销实现。通讯簿实现为使用协议存储密钥,该协议可以使用常规加密例程更新密钥。当需要更快的加密时,它还使用127位密钥流密码提供流加密。本文提出了一种加密技术,以减少使用相同密钥加密产生的明文-密文对的数量。这是通过在对每个消息块进行加密之后更改密钥来完成的,并且将仅创建从同一密钥加密的一对明文-密文对。它说明了如何创建即使在攻击者可以获得某些特定附加信息时也不会损害安全性的密钥生成器功能。本文还介绍了三种使用密钥的身份验证和确认协议,它们不需要公证人为每笔交易保留记录,并且消息的内容不会泄露给公证人。协议将公证人的加密操作数限制为14,而与消息的大小无关。对该应用程序使用的协议稍加修改,就可以将欺诈成功的可能性降低到1 /(2.40×10 37 ),而与欺诈者所拥有的计算资源无关。该应用程序中使用的流密码是经过修改的Zeng-Rao流密码,并被证明可生成( 2 m −1 )的周期。( 2 < super> n −1 )- 2 m + n−4 m n ,其中m和n是流密码中使用的LFSR的大小。发现密钥流具有较大的线性复杂度,并且线性复杂度分布图紧随线y = x / 2。使用Golomb的随机性假设测试从该流密码生成的序列,并发现它们具有非常好的随机性统计信息。

著录项

  • 作者

    Premasathian, Nol.;

  • 作者单位

    University of Louisiana at Lafayette.;

  • 授予单位 University of Louisiana at Lafayette.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2002
  • 页码 93 p.
  • 总页数 93
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号