浏览全部资源
扫码关注微信
军械工程学院 信息工程系,河北 石家庄 050003
[ "吴杨(1985-),男,四川成都人,军械工程学院博士生,主要研究方向为网络协议识别、网络安全技术、模式识别等。" ]
[ "王韬(1964-),男,河北石家庄人,军械工程学院教授、博士生导师,主要研究方向为网络协议识别、网络安全技术、密码安全技术等。" ]
[ "邢萌(1990-),女,河南濮阳人,军械工程学院硕士生,主要研究方向为网络数据分析。" ]
[ "李进东(1990-),男,新疆石河子人,军械工程学院硕士生,主要研究方向为网络数据分析。" ]
网络出版日期:2015-04,
纸质出版日期:2015-04-25
移动端阅览
吴杨, 王韬, 邢萌, 等. 基于密文随机性度量值分布特征的分组密码算法识别方案[J]. 通信学报, 2015,36(4):147-155.
Yang WU, Tao WANG, Meng XING, et al. Block ciphers identification scheme based on the distribution character of randomness test values of ciphertext[J]. Journal on communications, 2015, 36(4): 147-155.
吴杨, 王韬, 邢萌, 等. 基于密文随机性度量值分布特征的分组密码算法识别方案[J]. 通信学报, 2015,36(4):147-155. DOI: 10.11959/j.issn.1000-436x.2015107.
Yang WU, Tao WANG, Meng XING, et al. Block ciphers identification scheme based on the distribution character of randomness test values of ciphertext[J]. Journal on communications, 2015, 36(4): 147-155. DOI: 10.11959/j.issn.1000-436x.2015107.
在研究现有加密算法识别方案局限性的基础上,提出了基于密文随机性度量值分布特征的分组密码算法识别方案。首先,基于码元频数检测、块内频数检测及游程检测对AES、Camellia、DES、3DES及SMS4密文的随机性度量值取值个数进行了统计分析,采用k-means算法对其进行了初始聚类划分。其次,针对相同聚类中的分组密码算法识别问题,基于降低特征向量间相似度的原则,求解了码元频数检测、块内频数检测及游程检测对应的密文随机性度量值特征向量维数。最后,对AES、Camellia、DES、3DES及SMS4算法的实验结果表明,提出方案在已知密文条件下,实现了对以上典型分组密码算法的识别,相关成果可为进一步探索基于密文随机性度量值分布特征的加密算法识别提供参考。
By researching deficiency of current encryption algorithms identification schemes,a block ciphers identification scheme is proposed based on the distribution character of randomness test values for ciphertext.Firstly,the numbers of randomness test values for AES,Camellia,DES,3DES,SMS4 are respectively calculated based on the frequency test,frequency test in block,run test and originally clustered by the k-means algorithm.Secondly,in order to identify the block ciphers in each clustering,the dimensions of eigenvectors to the frequency test,frequency test in block,run test are calculated on the principle of reducing the comparability between eigenvectors.Eventually,the experimental results of AES,Camellia,DES,3DES,SMS4 demonstrate that the proposed scheme effectively identified the above representative block ciphers,and the correlative research can promote the further encryption algorithms identification research.
SPILLMAN R , JANSSEN M , NELSON B , et al . Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers [J ] . Cryptologia , 1993 , 17 ( 1 ): 31 - 44 .
RAMZAN Z . On Using Neural Networks to Break Cryptosystems [R ] . Laboratory of Computer Science,Massachusetts Institute of Technology,Cambridge,MA 02139 , 1998 .
DILEEP A D , SEKHAR C C . Identification of block ciphers using support vector machines [A ] . Proceeding of the 2006 International Joint Conference on Neural Networks [C ] . Vancouver,Canada , 2006 . 2696 - 2701 .
MELTEM S T,ÇAĞDAŞ Ç , NURDAN B S , et al . New distinguishers based on random mappings against stream ciphers [A ] . Proceeding of the 5th International Conference Lexington [C ] . KY,USA , 2008 . 30 - 41 .
陈华 , 冯登国 , 范丽敏 . 一种关于分组密码的新的统计检测方法 [J ] . 计算机学报 , 2009 , 32 ( 4 ): 595 - 601 .
CHEN H , FENG D G , FAN L M . A new statistical test on block ciphers [J ] . Chinese Journal of Computers , 2009 , 32 ( 4 ): 595 - 601 .
LIU T M , JIANG L H , HE H Q , et al . Researching on cryptographic algorithm recognition based on static characteristic-code [A ] . Proceeding of the Future Generation Information Technology Conference [C ] . Jeju Island,Korea , 2009 . 140 - 147 .
MANJULA R , ANTITHA R . Identification of encryption algorithm using decision tree [A ] . Proceeding of the First International Conference on Computer Science and Information Technology [C ] . Bangalore,India , 2011 . 237 - 246 .
GRÖBERT F , WILLEMS C , HOLZ T . Automated identification of cryptographic primitives in binary programs [A ] . Proceeding of the 14th International Symposium [C ] . Menlo Park,CA,USA , 2011 . 41 - 60 .
谷利泽 , 郑世慧 , 杨义先 . 现代密码学教程 [M ] . 北京 : 北京邮电大学出版社 , 2009 .
GU L Z , ZHENG S H , YANG Y X . Tutorial of the Modern Cryptography [M ] . Beijing : Beijing University of Posts and Telecommunications PressPress , 2009 .
RIVAIN M . Differential fault analysis on DES middle rounds [A ] . Proceeding of the 11th International Workshop Lausanne [C ] . Switzerland , 2009 . 457 - 469 .
SAHA D , MUKHOPADHYAY D , ROY C D . A diagonal fault attack on the advanced encryption standard [EB/OL ] . http://eprint.iacr.org/2009/58 http://eprint.iacr.org/2009/58 , 2009 .
赵新杰 , 王韬 , 郭世泽 . 一种针对Camellia的改进差分故障分析 [J ] . 计算机学报 , 2011 , 34 ( 4 ): 613 - 627 .
ZHAO X J , WANG T , GUO S Z . An improved differential fault analysis on camellia [J ] . Chinese Journal of Computers , 2011 , 34 ( 4 ): 613 - 627 .
赵新杰 , 王韬 , 郑媛媛 . 针对SMS4密码算法的Cache计时攻击 [J ] . 通信学报 , 2010 , 31 ( 6 ): 89 - 98 .
ZHAO X J , WANG T , ZHENG Y Y . Cache timing attack on SMS4 [J ] . Journal on Communications , 2010 , 31 ( 6 ): 89 - 98 .
胡磊 , 王鹏等 . 应用密码学手册 [M ] . 北京 : 电子工业出版社 , 2005 .
HU L , WANG P , et al . Handbook of Applied Cryptography [M ] . Beijing : Publishing House of Electronics IndustryPress , 2005 .
RUKHIN A , SOTO J , NECHVATAL J . A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications [R ] . SP 800-22 , 2001 .
FILIOL E . A new statistical testing for symmetric ciphers and hash functions [A ] . Proceeding of Information and Communications Security:4th International Conference [C ] . Singapore , 2002 . 342 - 353 .
胡俭勇 , 苏锦海 . 一种随机性实时检测方案 [J ] . 计算机工程 , 2009 , 35 ( 9 ): 136 - 138 .
HU J Y , SU J H . Scheme for real time test of randomness [J ] . Computer Engineering , 2009 , 35 ( 9 ): 136 - 138 .
FIPS PUB 140-2-2001 Security Requirements for Cryptographic Modules [S ] . Washington,USA:National Institute of Standards and Technology , 2001 .
Special Publication 800-22 Revision 1a [S ] . Washington,USA:National Institute of Standards and Technology , 2010 .
0
浏览量
1849
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构