1. Trang chủ
  2. » Công Nghệ Thông Tin

thuật toán mã hóa và ứng dụng phần 11

18 13 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Nội dung

WORD Sbox[ ] = { 0x09d0c479, 0x7dff9be3, 0x85d0582e, 0x0f1f25e5, 0xae5f6bf4, 0xf14902e2, 0x83631f83, 0x4f846450, 0x28f4e826, 0x526687c5, 0x80f6e831, 0xb68556ae, 0xae136749, 0x78a784dc, 0x46cae1d6, 0xc190c6e3, 0xa4ccae59, 0xeafc8ca8, 0x6167d9a8, 0xababa014, 0x8f376cd5, 0x854b3e95, 0xfae527e5, 0x3c4f1d71, 0x5ded0ab8, 0x243cb3e4, 0xfc5d6166, 0x8e531e74, 0x95e8eb8d, 0x1090acef, 0xe5393514, 0x7bcf3729, 0x3afd7d3e, 0xcf3b870f, 0x59a744c1, 0x040a7a10, 0xc33e92b5, 0x386b2c4a, 0x41811896, 0x68fea01b, 0xd7c9cd7a, 0xf003fb3c, 0xa64fc9c6, S-box của thuật toán MARS 0x84aa6c39, 0xc96da1d4, 0x1ca16a62, 0xc695c1fb, 0xff23de8a, 0x8bf53eb6, 0x76afe784, 0x210a5f18, 0xd340a664, 0x32a11d1d, 0x56fb9b53, 0x294a7721, 0x93365104, 0x04046793, 0x5a223942, 0x6eb88816...

Phụ lục A Phụ lục A WORD Sbox[ ] = { 0x09d0c479, 0x7dff9be3, 0x85d0582e, 0x0f1f25e5, 0xae5f6bf4, 0xf14902e2, 0x83631f83, 0x4f846450, 0x28f4e826, 0x526687c5, 0x80f6e831, 0xb68556ae, 0xae136749, 0x78a784dc, 0x46cae1d6, 0xc190c6e3, 0xa4ccae59, 0xeafc8ca8, 0x6167d9a8, 0xababa014, 0x8f376cd5, 0x854b3e95, 0xfae527e5, 0x3c4f1d71, 0x5ded0ab8, 0x243cb3e4, 0xfc5d6166, 0x8e531e74, 0x95e8eb8d, 0x1090acef, 0xe5393514, 0x7bcf3729, 0x3afd7d3e, 0xcf3b870f, 0x59a744c1, 0x040a7a10, 0xc33e92b5, 0x386b2c4a, 0x41811896, 0x68fea01b, 0xd7c9cd7a, 0xf003fb3c, 0xa64fc9c6, 272 S-box thuật toán MARS 0x28c8ffe0, 0xd4268361, 0x2a4b5705, 0x5160372f, 0x0d72ee46, 0x3e981e42, 0x25970205, 0x5c64c3f6, 0x3a60a81c, 0x7eddd12b, 0xab6f04ad, 0xd2250b0d, 0xe82aae86, 0xb69ba84b, 0x2fe28134, 0x07dfb846, 0x3798670d, 0xdb1129d6, 0xd1f45763, 0xb6ccd201, 0x092c237e, 0x05bb9b43, 0x36a1c330, 0x30a2e809, 0x75ce09c8, 0x2b062b97, 0xe35f9288, 0x75fe3578, 0x6699486b, 0xe0670dd8, 0x3af345f0, 0x8bf1d1e0, 0xd2f29e01, 0xb414935c, 0x1d2936a7, 0x6cd81807, 0xd1e0e03d, 0x52e8dd58, 0xe337ef7e, 0xa150a6e5, 0xa619cd9e, 0x4ab7a50b, 0xf6957d49, 0x84aa6c39, 0xc96da1d4, 0x1ca16a62, 0xc695c1fb, 0xff23de8a, 0x8bf53eb6, 0x76afe784, 0x210a5f18, 0xd340a664, 0x32a11d1d, 0x56fb9b53, 0x294a7721, 0x93365104, 0x04046793, 0x5a223942, 0x6eb88816, 0xcbfa9493, 0xb0449e20, 0x4daa96c3, 0x38d6279f, 0xbfc56593, 0x7dcd5dcd, 0x3412e1ae, 0x68e5f551, 0x9654f93e, 0x0f3b8d9e, 0xc079550d, 0x2f6d829a, 0x901d7d9b, 0xdab2e692, 0x6241fc4d, 0x14aac070, 0x29a9d1f6, 0x664465ed, 0xdc580aa6, 0x8a98be4c, 0xb322517e, 0x58656dfb, 0xd39fb119, 0x55258962, 0xbcf09576, 0x1484126a, 0x38b06a75, 0x9dad7287, 0x7974cc93, 0xc3bd279d, 0x4d7ff1e4, 0xb1cf8e83, 0x7f4bf8ac, 0x3a7931d4, 0xc6986a26, 0x7ea820c4, 0x9c9ef086, 0x8b2e095c, 0xe21fb253, 0x99404a66, 0x23db5c1e, 0x1863cd5b, 0x2d0dcc4a, 0x4f481d45, 0x0f5407fb, 0x3bec5958, 0x02682215, 0x32889d2c, 0xa02e926c, 0xf257f462, 0x9c61ba44, 0x698c0cca, 0x00e050df, 0x0591aee8, 0xf60b21ae, 0xfd6d6e31, 0xcd6d4365, 0x460da3a3, 0x1587ed55, 0xefb10c53, 0x024acac7, 0xcf574ca8, 0xaccea063, 0x2092bd13, 0x50820371, 0xc97f0df6, 0xeb6ff41b, 0x2672c073, 0x487ba9b1, 0xdd805fcd, S-box thuật toán MARS 0x63d094cf, 0xce9f8e99, 0x7b21be33, 0x5915ea51, 0xb0a495f8, 0xfa90c1f8, 0x4ca5fec0, 0xb203231a, 0x16a45272, 0x07128dc0, 0xd838e7ce, 0xb984737d, 0xa215cdce, 0x21b93f93, 0x2b38fd54, 0xdfea32aa, 0xab3ab685, 0x8d421fc0, 0x7dead57b, 0x1a9a5f08, 0xb6fd9676, 0x6b57e354, 0x2c2fc7df, 0xe1797a8b, 0x73f9a978, 0xe8a5b6c8, 0x684f259a, 0xd17b978b, 0x8e6a0829, 0x8894b022, 0x117c83fe, 0xf4562420, 0xc3601d3b, 0x611dfee3, 0x23becb64, 0x7796943c, 0xda44e9ed, 0x690624f8, 0xfa929a1a, 0x010e65c4, 0x158d7d03, 0x21916a7b, 0x8cea17d1, 0x0f9b9d3c, 0xcd67eb2f, 0x419cf1ad, 0x160bead7, 0xf51c999e, 0xbffcd770, 0x397f41bd, 0x99f861b7, 0x614deed0, 0x33f824b4, 0x8630e964, 0x04297514, 0x532459a0, 0x0d44db62, 0x1bc41d00, 0x13ba4891, 0x8359838b, 0xf5176781, 0x431de1da, 0x659473e3, 0x3346a90b, 0x9b0ed10c, 0x8d7ba426, 0xfcd651b9, 0x337b3027, 0xad913cf7, 0xe389ccc6, 0xa4a8d57b, 0x73398d32, 0x848d0704, 0x943ba848, 0x6d9b58ef, 0x8695bc14, 0x2f511c27, 0x4e12b414, 0x55792e2a, 0x6c00ab46, 0x257c3207, 0xa075f3a3, 0xfacabf3d, 0x2c854c12, 0x1cb0bafd, 0x6d969a17, 0x86a3d963, 0x287a8255, 0x77b56b86, 0xcd8c62bc, 0xd6aa295b, 0xe2eb6dc2, 0x2b83c045, 0x5d494656, 0x1aa4d343, 0xc7c275cc, 0x4e94d131, 0xc9980a88, 0xb5778eea, 0xc4965372, 0x5b3fbbd6, 0x2d639306, 0x8e5f4872, 0xafc8d52d, 0x3a2e8c0f, 0xc4f8b949, 0x6bd1aa31, 0x187dfdde, 0xab394825, 0x623f7863, 0x6b56443e, 0x88f1a1e9, 0x4cf5178a, 0x25605182, 0xb7c8eb14, 0x7e16688d, 0x30738df1, 0x5b5d193b, 0x0f59573e, 0x98df93c2, 0xa6370152, 0x0a700dd4, 0xe35b3447, 0xddfbcc3c, 0xc2bca766, 0x46f5d857, 0xefac9c28, 0xfdd58482, 0x088f8ead, 0xc09730cd, 0x35935fa3, 0x7b0dbdc6, 0x6742979b, 0xf907b5a0, 0xbba8366f, 0x951622f9, 0xa3d63433, 0xfe33384a, 0x97338b02, 0x3723f18a, 0x35f8a74b, 0xb8495294, 0x378453a7, 0x92cc1f98, 0x1d74fd5f, 0x5941792d, 0x3ff6d550, 0x7da26a48, 0x2eb13149, 0xf966c7d9, 0x06316131, 0xea83837e, 0xa6d6acb3, 0xf579dd52, 0xe94aeb76, 0x9ad3048f, 0xf3346c59, 0xc6de01f8, 0x54c1f029, 0x551a7cca, 0xe11fc6c3, 0x9e5fd030, 0x58872a69, 0x0824a734, 0xc8a8309b, 0xe9df2b03, 0x720a1dc3, 0x863b5ea3, 0xa73d36bf, 0x933ac568, 0x006662b6, 0x3a2fec10, 0xceda25ce, 0xb3c35047, 0x3b14d84f, 0x07adf158, 0xf7679969, 0x2f057d9f, 0x810f23bb, 0x74ac7d05, 0xd0042bd3, 0x096edc33, 0xa6c5e650, 0x358a68fd, 0xc000738e, 0x06c9f246, 0xcb5b3089, 0x1e4e6c9e, 273 Phụ lục A 0x000399bd, 0xca815ab3, 0x108f8fa4, 0xab2701d4, 0xf8b2c3af, 0x2baebff4, 0x01e87da6, 0x9d3b71fd, 0x183c198e, 0x923750af, 0x81b66760, 0xad43507b, 0x054356dc, 0x35830311, 0x63e1d6b8, 0x72698d7d, 0xdcd9433e, 0xa5a96dcc, 0x4e208804, 0x8b7ad4bf, 0x1e62891c, 0xf644f389, 0x42157abe, 0x953194e7, 0xbf447469, 0xde425f73, 0x49dc9a63, 0x0c18588d, 0x3c5cfcaa, 0x4b37802b, 0x692f2f08, 0xedb93ecf, 0x1e760f16, 0x3ab871bd, 0xabb96061, 0xebc977b6, 0x159cf22a, 0xab561187, }; 274 0x67466880, 0x5a6395e7, 0x10223eda, 0x0262d415, 0xdaf7ef70, 0x70f687cf, 0x6ce91e6a, 0x060e41c6, 0x63eeb240, 0xf9e14236, 0xbb2926c1, 0x718d496a, 0xde7ced35, 0xc96efca2, 0xc80f9778, 0x5e368c31, 0x896f1552, 0x0bef8b46, 0x9a756607, 0xc6403f35, 0x643d2107, 0x0778404e, 0xa2253e2e, 0x77eb92ed, 0xf26d9483, 0xb4e59f43, 0x98c39d98, 0xa421c1ba, 0x7d239ca4, 0x7428ab54, 0x134e578e, 0x2b27248e, 0xb1136601, 0xcfa4d76f, 0x5370f85d, 0x0b98b40f, 0xc298d6e2, 0x14eea0f0, 0xb4174831, 0x302a67c5, 0x92b8b48b, 0xaf224a30, 0xcc97d3b7, 0x386c9156, 0xbb7bcc84, 0xd7590f15, 0x2ddbf49a, 0x7838162b, 0x48a0ce0d, 0x9df057af, 0xd51a138b, 0x686f86ec, 0x79c491fd, 0xf7d95e2e, 0x4bc4ca7a, 0xa169fda7, 0x038e87c8, 0x1848e36d, 0xbf04d6f8, 0x7b78adb8, 0x7bf3f4ae, 0xb3816930, 0xee6faed5, 0x7dbe2d4e, 0x1301c9a2, 0x7aa3865c, 0x0297d9dd, 0xaeee0347, 0x36d9e0bf, 0x170eb1ef, 0x864e1b9b, 0xe31bd782, 0xffb07e37, 0x3a4d0fe6, 0x2b78ef6a, 0xdf0d4164, 0xacf423b2, 0x8bdb446b, 0x7f38d0ee, 0xb3d88aba, 0xe9614b6c, 0xce092ee5, 0xc7922c20, 0x4e03bb47, 0x6d5cba54, 0x59726c72, 0xa6c0496d, 0x44b1bde6, 0x62088cc9, 0x8e77cb68, 0x1b4c67f2, 0xa1d3493f, 0xa6d1baf4, 0x74df40b7, 0x20211e44, 0x80bdb038, 0x21092c8c, 0xa2c52d53, 0x80f594f9, 0xda8d9336, 0x71371235, 0x2d37b185, 0x389b1bbf, 0x71e08558, 0xd7dc2830, 0x4b3fbb85, 0xae8b5fcf, 0x7dc57fd6, 0xd7ea7319, 0x0dbeb469, 0xda30d0fb, 0xdf4fc26b, 0x61a94ac0, 0x19af70ee Các hoán vị sử dụng thuật toán Serpent Phụ lục B Các hoán vị sử dụng thuật toán Serpent Hoán vị (Initial Permutation – IP) 12 16 20 24 28 32 36 40 44 48 52 56 60 64 68 72 76 80 84 88 92 96 100 104 108 112 116 120 124 13 17 21 25 29 33 37 41 45 49 53 57 61 65 69 73 77 81 85 89 93 97 101 105 109 113 117 121 125 10 14 18 22 26 30 34 38 42 46 50 54 58 62 66 70 74 78 82 86 90 94 98 102 106 110 114 118 122 126 11 15 19 23 27 31 35 39 43 47 51 55 59 63 67 71 75 79 83 87 91 95 99 103 107 111 115 119 123 127 32 96 33 97 34 98 35 99 36 100 37 101 38 102 39 103 40 104 41 105 42 106 43 107 44 108 45 109 46 110 47 111 48 112 49 113 50 114 51 115 52 116 53 117 54 118 55 119 56 120 57 121 58 122 59 123 60 124 61 125 62 126 63 127 Hoán vị cuối (Final Permutation – FP) 64 65 66 67 68 69 70 71 72 73 10 74 11 75 12 76 13 77 14 78 15 79 16 80 17 81 18 82 19 83 20 84 21 85 22 86 23 87 24 88 25 89 26 90 27 91 28 92 29 93 30 94 31 95 275 Phụ lục C Phụ lục C S-box sử dụng thuật toán Serpent S-box sử dụng thuật toán Serpent S0 S1 S2 S3 S4 S5 S6 S7 15 15 12 15 15 13 12 11 14 13 10 15 13 11 14 10 2 11 14 12 10 15 13 14 10 13 12 11 13 14 10 11 12 8 13 14 12 10 11 10 15 13 11 14 12 12 10 11 14 15 S-box nghịch đảo sử dụng thuật toán Serpent InvS0 InvS1 InvS2 InvS3 InvS4 InvS5 InvS6 InvS7 276 10 11 13 12 14 15 11 14 15 12 11 14 10 10 13 15 13 15 10 14 15 13 15 14 12 11 13 12 13 12 11 14 14 11 14 10 12 11 13 8 15 12 12 10 10 15 13 10 11 S-box thuật toán Rijndael Phụ lục D S-box thuật toán Rijndael Bảng D.1 Bảng thay S-box cho giá trị {xy} dạng thập lục phân y a b c d e f 63 7c 77 7b f2 6b 6f c5 30 01 67 2b fe d7 ab 76 ca 82 c9 7d fa 59 47 f0 ad d4 a2 af 9c a4 72 c0 b7 fd 93 26 36 3f f7 cc 34 a5 e5 f1 71 d8 31 15 04 c7 23 c3 18 96 05 9a 07 12 80 e2 eb 27 b2 75 09 83 2c 1a 1b 6e 5a a0 52 3b d6 b3 29 e3 2f 84 53 d1 00 ed 20 fc b1 5b 6a cb be 39 4a 4c 58 cf d0 ef aa fb 43 4d 33 85 45 f9 02 7f 50 3c 9f a8 x 51 a3 40 8f 92 9d 38 f5 bc b6 da 21 10 ff f3 d2 cd 0c 13 ec 5f 97 44 17 c4 a7 7e 3d 64 5d 19 73 60 81 4f dc 22 2a 90 88 46 ee b8 14 de 5e 0b db a e0 32 3a 0a 49 06 24 5c c2 d3 ac 62 91 95 e4 79 b e7 c8 37 6d 8d d5 4e a9 6c 56 f4 ea 65 7a ae 08 c ba 78 25 2e 1c a6 b4 c6 e8 dd 74 1f 4b bd 8b 8a d 70 3e B5 66 48 03 f6 0e 61 35 57 b9 86 c1 1d 9e e e1 f8 98 11 69 d9 8e 94 9b 1e 87 e9 ce 55 28 Df f 8c a1 89 0d Bf e6 42 68 41 99 2d 0f b0 54 bb 16 277 Phụ lục D Bảng D.2 Bảng thay nghịch đảo cho giá trị {xy} dạng thập lục phân y x 278 a b c d e f 52 09 6a d5 30 36 a5 38 bf 40 a3 9e 81 f3 d7 fb 7c e3 39 82 9b 2f ff 87 34 8e 43 44 c4 de e9 cb 54 7b 94 32 a6 c2 23 3d ee 4c 95 0b 42 fa c3 4e 08 2e a1 66 28 d9 24 b2 76 5b a2 49 6d 8b d1 25 72 f8 f6 64 86 68 98 16 d4 a4 5c cc 5d 65 b6 92 6c 70 48 50 fd ed b9 da 5e 15 46 57 a7 8d 9d 84 90 d8 ab 00 8c bc d3 0a f7 e4 58 05 b8 b3 45 06 d0 2c 1e 8f ca 3f 0f 02 c1 af bd 03 01 13 8a 6b 3a 91 11 41 4f 67 dc ea 97 f2 cf ce f0 b4 e6 73 96 ac 74 22 e7 ad 35 85 e2 f9 37 e8 1c 75 df 6e a 47 f1 1a 71 1d 29 c5 89 6f b7 62 0e aa 18 be 1b b fc 56 3e 4b c6 d2 79 20 9a db c0 fe 78 cd 5a f4 c 1f dd a8 33 88 07 c7 31 b1 12 10 59 27 80 ec 5f d 60 51 7f a9 19 b5 4a 0d 2d e5 7a 9f 93 c9 9c ef e a0 e0 3b 4d ae 2a f5 b0 c8 eb bb 3c 83 53 99 61 f 17 2b 04 7e ba 77 d6 26 e1 69 14 63 55 21 0c 7d Hằng số giá trị khởi tạo SHA Phụ lục E E.1 E.1.1 Hằng số giá trị khởi tạo SHA Hằng số sử dụng SHA Hằng số SHA-1 SHA-1 sử dụng dãy 80 từ 32 bit số K0, K1, , K79 ⎧5a82799 ⎪6ed9eba1 ⎪ Kt = ⎨ ⎪8f1bbcdc ⎪⎩ca62c1d6 E.1.2 ≤ t ≤ 19 20 ≤ t ≤ 39 40 ≤ t ≤ 59 60 ≤ t ≤ 79 Hằng số SHA-224 SHA-256 {256} SHA-224 SHA-256 sử dụng dãy 64 từ 32 bit số K 0{256},K1{256}, ,K 63 Những từ biểu diễn 32 bit phần phân số bậc ba 64 số nguyên tố Các số bao gồm (theo thứ tự từ trái sang phải) 428a2f98 3956c25b d807aa98 72be5d74 e49b69c1 2de92c6f 27b70a85 650a7354 a2bfe8a1 d192e819 19a4c116 391c0cb3 748f82ee 90befffa 71374491 59f111f1 12835b01 80deb1fe efbe4786 4a7484aa 2e1b2138 766a0abb a81a664b d6990624 18376c08 4ed8aa4a 78a5636f a4506ceb b5c0fbcf 923f82a4 243185be 9bdc06a7 0fc19dc6 5cb0a9dc 4d2c6dfc 81c2c62e c24b8b70 f4083585 2748774c 5b9cca4f 84c87814 bef9a3f7 e9b5dba5 ab1c5ed5 550c7dc3 c19bf174 240ca1cc 76f988da 53380d13 92722c85 c76c51a3 106aa070 34b0bcb5 682e6ff3 8cc70208 c67178f2 279 Phụ lục E E.1.3 Hằng số SHA-384 SHA-512 SHA-384 SHA-512 sử dụng dãy 80 từ 64 bit số {512} Những từ biểu diễn 64 bit phần phân số K 0{512},K1{512}, ,K 79 bậc ba 80 số nguyên tố Các số bao gồm (theo thứ tự từ trái sang phải) 280 428a2f98d728ae22 7137449123ef65cd b5c0fbcfec4d3b2f e9b5dba58189dbbc 3956c25bf348b538 59f111f1b605d019 923f82a4af194f9b ab1c5ed5da6d8118 d807aa98a3030242 12835b0145706fbe 243185be4ee4b28c 550c7dc3d5ffb4e2 72be5d74f27b896f 80deb1fe3b1696b1 9bdc06a725c71235 c19bf174cf692694 e49b69c19ef14ad2 efbe4786384f25e3 0fc19dc68b8cd5b5 240ca1cc77ac9c65 2de92c6f592b0275 4a7484aa6ea6e483 5cb0a9dcbd41fbd4 76f988da831153b5 983e5152ee66dfab a831c66d2db43210 b00327c898fb213f bf597fc7beef0ee4 c6e00bf33da88fc2 d5a79147930aa725 06ca6351e003826f 142929670a0e6e70 27b70a8546d22ffc 2e1b21385c26c926 4d2c6dfc5ac42aed 53380d139d95b3df 650a73548baf63de 766a0abb3c77b2a8 81c2c92e47edaee6 92722c851482353b a2bfe8a14cf10364 a81a664bbc423001 c24b8b70d0f89791 c76c51a30654be30 d192e819d6ef5218 d69906245565a910 Hằng số giá trị khởi tạo SHA E.2 f40e35855771202a 106aa07032bbd1b8 19a4c116b8d2d0c8 1e376c085141ab53 2748774cdf8eeb99 34b0bcb5e19b48a8 391c0cb3c5c95a63 4ed8aa4ae3418acb 5b9cca4f7763e373 682e6ff3d6b2b8a3 748f82ee5defb2fc 78a5636f43172f60 84c87814a1f0ab72 8cc702081a6439ec 90befffa23631e28 a4506cebde82bde9 bef9a3f7b2c67915 c67178f2e372532b ca273eceea26619c d186b8c721c0c207 eada7dd6cde0eb1e f57d4f7fee6ed178 06f067aa72176fba 0a637dc5a2c898a6 113f9804bef90dae 1b710b35131c471b 28db77f523047d84 32caab7b40c72493 3c9ebe0a15c9bebc 431d67c49c100d4c 4cc5d4becb3e42b6 597f299cfc657e2a 5fcb6fab3ad6faec 6c44198c4a475817 Giá trị khởi tạo SHA SHA – 1: H0(0) = 67452301 H1(0) = efcdab89 H 2(0) = 98badcfe H3(0) = 10325476 H4(0) = c3d2e1f0 281 Phụ lục E SHA – 224: H 0(0) = c1059ed8 H 1(0) = 367cd507 H 2(0) = 3070dd17 H 3(0) = f70e5939 H 4(0) = ffc00b31 H 5(0) = 68581511 H 6(0) = 64f98fa7 H 7(0) = befa4fa4 SHA – 256: H 0(0) = 6a09e667 H 1(0) = bb67ae85 H 2(0) = 3c6ef372 H 3(0) = a54ff53a H 4(0) = 510e527f H 5(0) = 9b05688c H 6(0) = 1f83d9ab H 7(0) = 5be0cd19 SHA-384: H (00 ) = cbbb9d5dc1 059ed8 H (0 ) = 629a292a36 7cd507 H (0 ) = 9159015a30 70dd17 H (0 ) = 152fecd8f7 0e5939 H (0 ) = 67332667ff c00b31 H (0 ) = 8eb44a8768 581511 H (0 ) = db0c2e0d64 f98fa7 H (0 ) = 47b5481dbe fa4fa4 282 Hằng số giá trị khởi tạo SHA SHA – 512: H (0 ) = 6a09e667f3 bcc908 H (0 ) = bb67ae8584 faa73b H (0 ) = 3c6ef372fe 94f82b H (0 ) = a54ff53a5f 1d36f1 H (0 ) = 510e527fad e682d1 H (0 ) = 9b05688c2b 3e6c1f H (0 ) = 1f83d9abfb 41bd6b H (0 ) = 5be0cd1913 7e2179 283 Tài liệu tham khảo Tài liệu tham khảo [1] Ross Anderson, Eli Biham, Lars Knudsen (1999), Serpent: A Proposal for the Advanced Encryption Standard [2] Mohan Atreya, Ben Hammond, Stephen Paine, Paul Starrett, Stephen Wu (2002), Digital Signatures, RSA [3] E Biham, A Shamir (1991), Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, Vol 4, No 1, pp 3-72 [4] E Biham (1993), New types of cryptanalytic attacks using related keys, Advances in Cryptology, Proceedings Eurocrypt'93, LNCS 765, T Helleseth, Ed., Springer-Verlag, pp 398-409 [5] Carolynn Burwick, Don Coppersmith, Edward D'Avignon, Rosario Gennaro, Shai Halevi, Charanjit Jutla, Stephen M.Matyas Jr., Luke O'Connor, Mohammad Peyravian, David Safford, Nevenko Zunic (1999), MARS – a candidate cipher for AES, IBM Corporation [6] Bram Cohen (2001), AES-Hash [7] Nicolas Courtois, Josef Pieprzyk(2002), Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, ASIACRYPT 2002, pp267–287 [8] J Daemen, V Rijmen (1999), AES Proposal: Rijndael, AES Algorithm Submission 284 Tài liệu tham khảo [9] J Daemen, L.R Knudsen, V Rijmen (1997), The block cipher Square, Fast Software Encryption, LNCS 1267, E Biham, Ed., Springer-Verlag, tr 149-165 [10] J Daemen (1995), Cipher and hash function design strategies based on linear and differential cryptanalysis, Doctoral Dissertation, K.U.Leuven [11] Dương Anh Đức, Trần Minh Triết, Lương Hán Cơ (2001), The 256/384/512-bit version of the Rijndael Block Cipher, Tạp chí Tin học Điều khiển, Việt Nam, tập 17, số 4, tr 45-56 [12] Duong Anh Duc, Tran Minh Triet, Luong Han Co (2002), The extended Rijndael-like Block Ciphers, International Conference on Information Technology: Coding and Computing – 2002, The Orleans, Las Vegas, Nevada, USA, pp 183-188 [13] Duong Anh Duc, Tran Minh Triet, Luong Han Co (2002), The Advanced Encryption Standard And Its Application in the examination security in Vietnam, International Conference on Information Technology: Coding and Computing – 2002, The Orleans, Las Vegas, Nevada, USA, pp 171-176 [14] Duong Anh Duc, Tran Minh Triet, Luong Han Co (2001), The extended versions of the Advanced Encryption Standard, Workshop on Applied Cryptology: Coding Theory and Data Integrity, Singapore [15] Duong Anh Duc, Tran Minh Triet, Luong Han Co (2001), Applying the Advanced Encryption Standard and its variants in Secured Electronic-Mail System In Vietnam, Workshop on Applied Cryptology: Coding Theory and Data Integrity, Singapore 285 Tài liệu tham khảo [16] Duong Anh Duc, Tran Minh Triet, Luong Han Co (2001), The extended version of the Rijndael Block Cipher, Journal of Institute of Mathematics and Computer Sciences), India, Vol 12, No 2, pp 201-218 [17] Duong Anh Duc, Hoang Van Kiem, Tran Minh Triet, Luong Han Co (2002), The Advanced Encryption Standard and Its Applications in the Examination Security Process in Vietnam, International Conference on Computational Mathematics and Modelling CMM 2002, Thailand [18] Dương Anh Đức, Trần Minh Triết, Đặng Tuân, Hồ Ngọc Lâm (2002), Watermarking - Tổng quan ứng dụng hệ thống quản lý bảo vệ sản phẩm trí tuệ, kỷ yếu Hội nghị khoa học (lần 3) trường Đại học Khoa Học Tự Nhiên, Đại học Quốc gia Thành phố Hồ Chí Minh, tr 130-140 [19] Dương Anh Đức, Nguyễn Thanh Sơn, Trần Minh Triết (2004), Bảo mật liệu với kỹ thuật AES-DCT watermarking, tạp chí Khoa học Cơng nghệ ĐHQG, số 4-5, tập 7, tr 77-82 [20] Dương Anh Đức, Trần Minh Triết, Lương Hán Cơ (2001), Ứng dụng chuẩn mã hóa AES phiên mở rộng vào Hệ thống Thư điện tử an toàn Việt Nam, Hội nghị khoa học kỷ niệm 25 năm Viện Công Nghệ Thông Tin, Hà Nội, Việt Nam, tr 46-53 [21] H Feistel (1973), Cryptography and computer privacy, Scientific American, Vol 228, No 5, pp 15-23 [22] H Feistel, W.A Notz, J.L Smith (1975), Some cryptographic techniques for machine to machine data communications, Proceedings of the IEEE, Vol 63, No 11, pp 1545-1554 [23] 286 FIPS (2001), Announcing the Advanced Encryption Standard (AES) Tài liệu tham khảo [24] FIPS (2004), Announcing the Secure Hash Standard [25] FIPS (1993), Data Encryption Standard (DES) [26] FIPS (2000), Announcing the Digital Signature Standard (DSS) [27] IEEE-P1363 (1999), Standard Specifications for Public Key Cryptography [28] T Jakobsen, L.R Knudsen (1997), The interpolation attack on block ciphers, Fast Software Encryption, LNCS 1267, E Biham, Ed., SpringerVerlag, pp 28-40 [29] Liam Keliher (2003), Linear Cryptanalysis of Substitution-Permutation Networks, PhD Thesis, Queen's University, Kingston, Ontario, Canada [30] J Kelsey, B Schneier, D Wagner (1996), Key-schedule cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES, Advances in Cryptology, pp 237-252 [31] J Kelsey, B Schneier, D Wagner, Chris Hall (1998), Cryptanalytic attacks on pseudorandom number generators, Fast Software Encryption, LNCS 1372, S Vaudenay, Ed., Springer-Verlag, pp 168-188 [32] M Matsui (1994), Linear cryptanalysis method for DES cipher, Advances in Cryptology, Proceedings Eurocrypt'93, LNCS 765, T Helleseth, Ed., Springer-Verlag, tr 386-397 [33] Alfred Menezes (2000), Comparing the Security of ECC and RSA, University of Waterloo [34] NIST (1999), Recommended elliptic curves for federal government use 287 Tài liệu tham khảo [35] Henna Pietilainen (2000), Elliptic curve cryptography on smart card, Helsinki University of Technology [36] Bart Preneel (2004), The Davies-Mayer Hash Function, K.U Leuven [37] Eric Rescorla (2001), SSL&TLS Designing and Building Secure Systems [38] Ronald L.Rivest, M.J.B Robshaw, R Sidney, Y L Yin (1998), The RC6 Block Cipher: A simple fast secure AES proposal [39] RSA Data Security Inc (1997), "RSA Laboratories FAQ on Cryptography," "RSA Laboratories Technical Reports," "RSA Laboratories Security Bulletins," "CrytoBytes Newsletter" [40] Bruce Schneier (1995), Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, John Wiley & Sons, Inc [41] C.E Shannon (1949), Communication theory of secrecy systems, Bell System Technical Journal, Vol 28, no 4, pp 656-715 [42] Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson (1998), Twofish: A 128-Bit Block Cipher [43] Richard E Smith (1997), Internet Cryptography, Addison-Wesley [44] W Stallings (2003), Cryptography and Network Security: Principles and Practice, Third Edition, Prentice Hall [45] Douglas R Stison (1995), Cryptography – Theory and Practice, CRC Press [46] Tara M Swaminatha, Charles R Elden (2003), Wireless Security and Privacy: Best Practices and Design Techniques, Addison Wesley 288 Tài liệu tham khảo [47] Tran Minh Triet, Duong Anh Duc (2004), Applying the Robust Psychoacoustic Audio Watermarking Technique in Internet Digital Traditional Music Museum in Vietnam, ICCST 2004, 38th IEEE International Carnahan Conference on Security Technology, USA [48] Trần Minh Triết (2004), Nghiên cứu số vấn đề bảo vệ thông tin ứng dụng, Luận văn Thạc sĩ Tin học, Đại học Khoa học Tự nhiên, Đại học Quốc gia thành phố Hồ Chí Minh [49] Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu (2004), Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, International Association for Cryptologic Research [50] Bo-Yin Yang, Jiun-Ming Chen (2004), Theoretical Analysis of XL over Small Fields, ACISP 2004, Lecture Notes in Computer Science vol 3108, pp.277-288 289 ... 103 107 111 115 119 123 127 32 96 33 97 34 98 35 99 36 100 37 101 38 102 39 103 40 104 41 105 42 106 43 107 44 108 45 109 46 110 47 111 48 112 49 113 50 114 51 115 52 116 53 117 54 118 55 119 56... sử dụng thuật toán Serpent S0 S1 S2 S3 S4 S5 S6 S7 15 15 12 15 15 13 12 11 14 13 10 15 13 11 14 10 2 11 14 12 10 15 13 14 10 13 12 11 13 14 10 11 12 8 13 14 12 10 11 10 15 13 11 14 12 12 10 11. .. sử dụng thuật toán Serpent InvS0 InvS1 InvS2 InvS3 InvS4 InvS5 InvS6 InvS7 276 10 11 13 12 14 15 11 14 15 12 11 14 10 10 13 15 13 15 10 14 15 13 15 14 12 11 13 12 13 12 11 14 14 11 14 10 12 11

Ngày đăng: 10/05/2021, 23:19

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN