Research and design of authenticated encryption algorithm based on AES round function

The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high...

Full description

Saved in:
Bibliographic Details
Main Authors: Guoqiang GAO, Zichen LI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2020-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020028
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529959425769472
author Guoqiang GAO
Zichen LI
author_facet Guoqiang GAO
Zichen LI
author_sort Guoqiang GAO
collection DOAJ
description The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.
format Article
id doaj-art-4fb05df11549459babd0f7ee32ae5285
institution Kabale University
issn 2096-109X
language English
publishDate 2020-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-4fb05df11549459babd0f7ee32ae52852025-01-15T03:14:04ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2020-04-01610611559558588Research and design of authenticated encryption algorithm based on AES round functionGuoqiang GAOZichen LIThe authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020028authenticated encryption algorithmAES algorithmMILP
spellingShingle Guoqiang GAO
Zichen LI
Research and design of authenticated encryption algorithm based on AES round function
网络与信息安全学报
authenticated encryption algorithm
AES algorithm
MILP
title Research and design of authenticated encryption algorithm based on AES round function
title_full Research and design of authenticated encryption algorithm based on AES round function
title_fullStr Research and design of authenticated encryption algorithm based on AES round function
title_full_unstemmed Research and design of authenticated encryption algorithm based on AES round function
title_short Research and design of authenticated encryption algorithm based on AES round function
title_sort research and design of authenticated encryption algorithm based on aes round function
topic authenticated encryption algorithm
AES algorithm
MILP
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020028
work_keys_str_mv AT guoqianggao researchanddesignofauthenticatedencryptionalgorithmbasedonaesroundfunction
AT zichenli researchanddesignofauthenticatedencryptionalgorithmbasedonaesroundfunction