电子与信息学报
電子與信息學報
전자여신식학보
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
2013年
3期
235-241
,共7页
袁科%贾春福*%吕述望%黄贻望%高社成
袁科%賈春福*%呂述望%黃貽望%高社成
원과%가춘복*%려술망%황이망%고사성
云计算%光学密码%数学密码%密码反馈一组一密模式%一组一密
雲計算%光學密碼%數學密碼%密碼反饋一組一密模式%一組一密
운계산%광학밀마%수학밀마%밀마반궤일조일밀모식%일조일밀
Cloud computing%Optical cryptography%Mathematical cryptography%Cipher FeedBack one Block one Key (CFB-BK) mode%One block one key
为满足云计算对高安全、高效率密码方案的需求,该文提出一种安全增强密码工作模式——密码反馈“一组一密”(Cipher FeedBack one Block one Key, CFB-BK)模式,并基于数学密码和光学密码组合实现:光学密码对数据分组进行“一组一密”加解密,数学密码利用光学密码密文生成供光学密码下一组数据加解密使用的密钥.安全性分析表明,攻击者在密码学技术范围内,只能采用穷举密钥攻击方式,攻击复杂度高;效率分析表明,比基于数学密码实现的模式效率更高.
為滿足雲計算對高安全、高效率密碼方案的需求,該文提齣一種安全增彊密碼工作模式——密碼反饋“一組一密”(Cipher FeedBack one Block one Key, CFB-BK)模式,併基于數學密碼和光學密碼組閤實現:光學密碼對數據分組進行“一組一密”加解密,數學密碼利用光學密碼密文生成供光學密碼下一組數據加解密使用的密鑰.安全性分析錶明,攻擊者在密碼學技術範圍內,隻能採用窮舉密鑰攻擊方式,攻擊複雜度高;效率分析錶明,比基于數學密碼實現的模式效率更高.
위만족운계산대고안전、고효솔밀마방안적수구,해문제출일충안전증강밀마공작모식——밀마반궤“일조일밀”(Cipher FeedBack one Block one Key, CFB-BK)모식,병기우수학밀마화광학밀마조합실현:광학밀마대수거분조진행“일조일밀”가해밀,수학밀마이용광학밀마밀문생성공광학밀마하일조수거가해밀사용적밀약.안전성분석표명,공격자재밀마학기술범위내,지능채용궁거밀약공격방식,공격복잡도고;효솔분석표명,비기우수학밀마실현적모식효솔경고.
For meeting the high security and high efficiency of cryptography schemes in Cloud Computing, a security enhanced cryptographic mode of operation named Cipher FeedBack one Block one Key (CFB-BK) is proposed, and this mode is implemented based on the combination of mathematical cryptography and optical cryptography. Optical cryptography module encrypts (or decrypts) data blocks in a“one block one key”way. Moreover, it provides its ciphertext as a feedback to the mathematical cryptography module, which uses it to generate keys for the next block encryption (or decryption) of the optical cryptography module. Security analysis shows that the only possible attack in the area of cryptography for the proposed scheme is exhaustive attack, indicating that no adversary could get a significant advantage against the scheme without spending a huge amount of recourses and time. Efficiency analysis shows that the scheme implementing CFB-BK mode works much faster than the existing modes implemented based on mathematical cryptography.