• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用元启发式差分密码分析以减少轮数来破解数据加密标准

Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis.

作者信息

Dworak Kamil, Boryczka Urszula

机构信息

Faculty of Science and Technology, University of Silesia in Katowice, Będzińska 39, 41-200 Sosnowiec, Poland.

出版信息

Entropy (Basel). 2021 Dec 18;23(12):1697. doi: 10.3390/e23121697.

DOI:10.3390/e23121697
PMID:34946003
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8700701/
Abstract

This article presents the author's own metaheuristic cryptanalytic attack based on the use of differential cryptanalysis (DC) methods and memetic algorithms (MA) that improve the local search process through simulated annealing (SA). The suggested attack will be verified on a set of ciphertexts generated with the well-known DES (data encryption standard) reduced to six rounds. The aim of the attack is to guess the last encryption subkey, for each of the two characteristics Ω. Knowing the last subkey, it is possible to recreate the complete encryption key and thus decrypt the cryptogram. The suggested approach makes it possible to automatically reject solutions (keys) that represent the worst fitness function, owing to which we are able to significantly reduce the attack search space. The memetic algorithm (MASA) created in such a way will be compared with other metaheuristic techniques suggested in literature, in particular, with the genetic algorithm (NGA) and the classical differential cryptanalysis attack, in terms of consumption of memory and time needed to guess the key. The article also investigated the entropy of MASA and NGA attacks.

摘要

本文介绍了作者基于差分密码分析(DC)方法和通过模拟退火(SA)改进局部搜索过程的文化算法(MA)所提出的元启发式密码分析攻击。所建议的攻击将在使用简化为六轮的著名数据加密标准(DES)生成的一组密文上进行验证。攻击的目的是针对两个特征Ω中的每一个猜测最后一个加密子密钥。知道最后一个子密钥后,就有可能重建完整的加密密钥,从而解密密文。所建议的方法能够自动拒绝代表最差适应度函数的解决方案(密钥),因此我们能够显著减少攻击的搜索空间。以这种方式创建的文化算法(MASA)将在内存消耗和猜测密钥所需的时间方面与文献中提出的其他元启发式技术进行比较,特别是与遗传算法(NGA)和经典差分密码分析攻击进行比较。本文还研究了MASA和NGA攻击的熵。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/55aaac59543a/entropy-23-01697-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/59a30fc31ced/entropy-23-01697-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/c39677807a1c/entropy-23-01697-g0A2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/420a9f721643/entropy-23-01697-g0A3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/37fcd8842aff/entropy-23-01697-g0A4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/63ff8e5d1dcf/entropy-23-01697-g0A5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/684e1f07589b/entropy-23-01697-g0A6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/62848756baf3/entropy-23-01697-g0A7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/6f6c4cc7aef8/entropy-23-01697-g0A8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/c4acfc762f06/entropy-23-01697-g0A9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/31ba3898dc31/entropy-23-01697-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/e2866204473e/entropy-23-01697-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/58a6bf0057c8/entropy-23-01697-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/283f09ea81cb/entropy-23-01697-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/d1900b37c5b3/entropy-23-01697-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/15374a68090d/entropy-23-01697-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/277846608445/entropy-23-01697-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/fde1c0ddffcd/entropy-23-01697-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/13d6a6d672e9/entropy-23-01697-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/6b4b01672abf/entropy-23-01697-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/fef72c2df8bb/entropy-23-01697-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/55aaac59543a/entropy-23-01697-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/59a30fc31ced/entropy-23-01697-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/c39677807a1c/entropy-23-01697-g0A2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/420a9f721643/entropy-23-01697-g0A3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/37fcd8842aff/entropy-23-01697-g0A4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/63ff8e5d1dcf/entropy-23-01697-g0A5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/684e1f07589b/entropy-23-01697-g0A6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/62848756baf3/entropy-23-01697-g0A7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/6f6c4cc7aef8/entropy-23-01697-g0A8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/c4acfc762f06/entropy-23-01697-g0A9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/31ba3898dc31/entropy-23-01697-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/e2866204473e/entropy-23-01697-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/58a6bf0057c8/entropy-23-01697-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/283f09ea81cb/entropy-23-01697-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/d1900b37c5b3/entropy-23-01697-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/15374a68090d/entropy-23-01697-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/277846608445/entropy-23-01697-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/fde1c0ddffcd/entropy-23-01697-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/13d6a6d672e9/entropy-23-01697-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/6b4b01672abf/entropy-23-01697-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/fef72c2df8bb/entropy-23-01697-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4bb3/8700701/55aaac59543a/entropy-23-01697-g012.jpg

相似文献

1
Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis.使用元启发式差分密码分析以减少轮数来破解数据加密标准
Entropy (Basel). 2021 Dec 18;23(12):1697. doi: 10.3390/e23121697.
2
On the resistance of new lightweight block ciphers against differential cryptanalysis.论新型轻量级分组密码对差分密码分析的抗性
Heliyon. 2023 Apr 6;9(4):e15257. doi: 10.1016/j.heliyon.2023.e15257. eCollection 2023 Apr.
3
Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited.基于深度学习的轻量级分组密码密码分析再探讨
Entropy (Basel). 2023 Jun 28;25(7):986. doi: 10.3390/e25070986.
4
Optimization of a Simulated Annealing Algorithm for S-Boxes Generating.S-Box 生成模拟退火算法的优化。
Sensors (Basel). 2022 Aug 14;22(16):6073. doi: 10.3390/s22166073.
5
Differential cryptanalysis of a medical image cryptosystem with multiple rounds.具有多轮的医学图像密码系统的差分密码分析
Comput Biol Med. 2015 Oct 1;65:69-75. doi: 10.1016/j.compbiomed.2015.07.024. Epub 2015 Aug 8.
6
On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers.关于遗传算法中涉及的适应度函数及分组密码的密码分析
Entropy (Basel). 2023 Jan 31;25(2):261. doi: 10.3390/e25020261.
7
Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA.利用实验性攻击和差分故障分析在专用集成电路中实现的破解Trivium流密码
Sensors (Basel). 2020 Dec 3;20(23):6909. doi: 10.3390/s20236909.
8
Cryptanalysis of a New Chaotic Image Encryption Technique Based on Multiple Discrete Dynamical Maps.基于多重离散动力映射的新型混沌图像加密技术的密码分析
Entropy (Basel). 2021 Nov 26;23(12):1581. doi: 10.3390/e23121581.
9
Multicompare tests of the performance of different metaheuristics in EEG dipole source localization.脑电图偶极子源定位中不同元启发式算法性能的多比较测试。
ScientificWorldJournal. 2014 Mar 16;2014:524367. doi: 10.1155/2014/524367. eCollection 2014.
10
MAGMA: a multiagent architecture for metaheuristics.
IEEE Trans Syst Man Cybern B Cybern. 2004 Apr;34(2):925-41. doi: 10.1109/tsmcb.2003.818432.

引用本文的文献

1
A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy.一种使用优化混沌映射和约瑟夫环排列策略的高熵图像加密方案。
Sci Rep. 2025 Aug 11;15(1):29439. doi: 10.1038/s41598-025-14784-5.