Research and design of authenticated encryption algorithm based on AES round function
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2020-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020028 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529959425769472 |
---|---|
author | Guoqiang GAO Zichen LI |
author_facet | Guoqiang GAO Zichen LI |
author_sort | Guoqiang GAO |
collection | DOAJ |
description | The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM. |
format | Article |
id | doaj-art-4fb05df11549459babd0f7ee32ae5285 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2020-04-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-4fb05df11549459babd0f7ee32ae52852025-01-15T03:14:04ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2020-04-01610611559558588Research and design of authenticated encryption algorithm based on AES round functionGuoqiang GAOZichen LIThe authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020028authenticated encryption algorithmAES algorithmMILP |
spellingShingle | Guoqiang GAO Zichen LI Research and design of authenticated encryption algorithm based on AES round function 网络与信息安全学报 authenticated encryption algorithm AES algorithm MILP |
title | Research and design of authenticated encryption algorithm based on AES round function |
title_full | Research and design of authenticated encryption algorithm based on AES round function |
title_fullStr | Research and design of authenticated encryption algorithm based on AES round function |
title_full_unstemmed | Research and design of authenticated encryption algorithm based on AES round function |
title_short | Research and design of authenticated encryption algorithm based on AES round function |
title_sort | research and design of authenticated encryption algorithm based on aes round function |
topic | authenticated encryption algorithm AES algorithm MILP |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020028 |
work_keys_str_mv | AT guoqianggao researchanddesignofauthenticatedencryptionalgorithmbasedonaesroundfunction AT zichenli researchanddesignofauthenticatedencryptionalgorithmbasedonaesroundfunction |