معرفی روش جدید رمزنگاری مبتنی بر تولید متن رمز شده متغیر

سال انتشار: 1398
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 399

فایل این مقاله در 18 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_TJEE-49-2_014

تاریخ نمایه سازی: 20 آذر 1398

چکیده مقاله:

Through the passage of time, computer technology has been considered as a pivotal element in human life. Because of this point, it is more evident that information security gained a prominent position. Cryptography is utilized to secure information in a way that information became impenetrable under attack. In this paper, a new method of encryption is introduced according to the theoretical channel coding method and modular calculations. In this method, with the help of science of numerical theory and modular calculations, a method is used to generate dynamic permutation boxes and dynamic subsituation boxes. Then, with the help of information theory and coding, random errors are added to the text. Generated random errors should be detected and corrected at decryption time using decoding methods. The production of an independent cryptographic method with the pattern of intentional error use, along with the use of a shortcut key (256 bits), has the advantage of this method over the pattern-matching methods.This method can perform an encryption algorithm in which the performance of algorithm for a fixed text and a fixed encryption key, produce a differentiated encrypted text, with Hamming distance nearly 50%, in comparison to the previous performances.   

کلیدواژه ها:

نویسندگان

M. Zobeiri

Faculty of Electrical and Computer Engineering, Shahid Beheshti University, Tehran, Iran

B. Mazloom-Nezhad Maybodi

Faculty of Electrical and Computer Engineering, Shahid Beheshti University, Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • شهرام جمالی، عرفان آقایی کیاسرایی، بهبود حمله مکعبی کانال جانبی ... [مقاله ژورنالی]
  • پرهام دری، علی قیاسیان و حسین سعیدی طراحی و پیاده ... [مقاله ژورنالی]
  • C. Shannon, Communication theory of secrecy system, Bell System Technology ...
  • K. M. Martin and D. R. Stinson, Error decodable secret ...
  • W. Meier and O. Staffelbach, Fast correlations attacks on certain ...
  • M. Zobeiri and B. Mazloom-Nezhad Maybodi, Introducing dynamic P-Box and ...
  • T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, ...
  • M. Grangetto, E. Magli and G. Olmo, Multimedia selective encryption ...
  • C. Monico, J. Rosenthal and A. Shokrollahi, Using low density ...
  • M. Baldi, F. Chiaraluce, R. Garello and F. Mininni, Quasi-cyclic ...
  • M. Baldi and F. Chiaraluce, Cryptanalysis of a new instance ...
  • M. Matsui, Linear cryptanalysis method for DES cipher, Advances in ...
  • Biham and Shamir, Differential cryptanalysis of DES-like cryptosystems, Technical Report ...
  • C. H. Kim, Differential fault analysis of AES: toward Reducing ...
  • J. Kim, S. Hong and J. Lim, Impossible differential cryptanalysis ...
  • K. Sakiyama, Y. Li, M. Iwamoto and K. Ohta, Information-theoretic ...
  • D. Coppersmith, The data encryption standard (DES) and its strength ...
  • P. Xu and H. Jin, Public-key encryption with fuzzy keyword ...
  • M. Esmaeili and T. A. Gulliver, A secure code based ...
  • T. N. R. Rao, Joint encryption and error correction schemes, ...
  • T. R. N. Rao and K. H. Nam, Private-key Algebraic-code ...
  • R. Struik, J. Tilburg, The Rao–Nam scheme is insecure against ...
  • H. M. Sun, S. P. Shieh, ‘On private-key cryptosystems based ...
  • A. I. Barbero and Ytrehus, Modifications of the Rao–Nam cryptosystem, ...
  • A. I. Barbero, J. G. Tena, A Rao–Nam like cryptosystem ...
  • A. Sobhi Afshar, T. Eghlidos and M. R. Aref, Efficient ...
  • R. Hooshmand, T. Eghlidos and M. R. Aref, Improving the ...
  • M. Esmaeili, M. Dakhilalian and T. A. Gulliver, New secure ...
  • M. Esmaeili and T. A. Gulliver Joint channel coding-cryptography based ...
  • R. Hooshmand, M. R. Aref and T. Eghlidos, Secret key ...
  • L. Q. Liu Z, J. Dai and A. M. Sun ...
  • K. Challita and H. Farhat, Combining steganography and cryptography: new ...
  • نمایش کامل مراجع