• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于水下声学和骑士巡游链中的自然随机性的分组密码代换盒生成。

Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.

机构信息

Department of Computer Science, Quaid-i-Azam University, Islamabad, Pakistan.

Department of Software Engineering, Foundation University Islamabad, Islamabad, Pakistan.

出版信息

Comput Intell Neurosci. 2022 May 20;2022:8338508. doi: 10.1155/2022/8338508. eCollection 2022.

DOI:10.1155/2022/8338508
PMID:35634082
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9142301/
Abstract

The protection of confidential information is a global issue, and block encryption algorithms are the most reliable option for securing data. The famous information theorist, Claude Shannon, has given two desirable characteristics that should exist in a strong cipher which are substitution and permutation in their fundamental research on "Communication Theory of Secrecy Systems." block ciphers strictly follow the substitution and permutation principle in an iterative manner to generate a ciphertext. The actual strength of the block ciphers against several attacks is entirely based on its substitution characteristic, which is gained by using the substitution box (S-box). In the current literature, algebraic structure-based and chaos-based techniques are highly used for the construction of S-boxes because both these techniques have favourable features for S-box construction but also various attacks of these techniques have been identified including SAT solver, linear and differential attacks, Gröbner-based attacks, XSL attacks, interpolation attacks, XL-based attacks, finite precision effect, chaotic systems degradation, predictability, weak randomness, chaotic discontinuity, and limited control parameters. The main objective of this research is to design a novel technique for the dynamic generation of S-boxes that are safe against the cryptanalysis techniques of algebraic structure-based and chaos-based approaches. True randomness has been universally recognized as the ideal method for cipher primitives design because true random numbers are unpredictable, irreversible, and unreproducible. The biggest challenge we faced during this research was how can we generate the true random numbers and how can true random numbers utilized for strengthening the S-box construction technique. The basic concept of the proposed technique is the extraction of true random bits from underwater acoustic waves and to design a novel technique for the dynamic generation of S-boxes using the chain of knight's tour. Rather than algebraic structure- and chaos-based techniques, our proposed technique depends on inevitable high-quality randomness which exists in underwater acoustics waves. The proposed method satisfies all standard evaluation tests of S-boxes construction and true random numbers generation. Two million bits have been analyzed using the NIST randomness test suite, and the results show that underwater sound waves are an impeccable entropy source for true randomness. Additionally, our dynamically generated S-boxes have better or equal strength, over the latest published S-boxes (2020 to 2021). According to our knowledge first time, this type of research has been conducted, in which natural randomness of underwater acoustic waves has been used for the construction of block cipher's substitution box.

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/475576baefe0/CIN2022-8338508.alg.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/1d134d0b77c2/CIN2022-8338508.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/f36a7684b62d/CIN2022-8338508.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/0e8b24137201/CIN2022-8338508.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/99f247158083/CIN2022-8338508.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/710e0c7c153e/CIN2022-8338508.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/475576baefe0/CIN2022-8338508.alg.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/1d134d0b77c2/CIN2022-8338508.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/f36a7684b62d/CIN2022-8338508.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/0e8b24137201/CIN2022-8338508.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/99f247158083/CIN2022-8338508.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/710e0c7c153e/CIN2022-8338508.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8963/9142301/475576baefe0/CIN2022-8338508.alg.001.jpg
摘要

保密信息的保护是一个全球性的问题,而分组加密算法是保护数据最可靠的选择。著名的信息理论家克劳德·香农(Claude Shannon)在其关于“保密系统通信理论”的基础研究中给出了两个理想的密码应该具备的特性:替代和置换。分组密码以迭代的方式严格遵循替代和置换原则,以生成密文。分组密码在抵御各种攻击时的实际强度完全取决于其替代特性,这是通过使用替代盒(S-box)获得的。在当前的文献中,基于代数结构和混沌的技术被广泛用于 S-box 的构建,因为这两种技术都具有构建 S-box 的有利特征,但也发现了针对这些技术的各种攻击,包括 SAT 求解器、线性和差分攻击、基于 Grobner 的攻击、XSL 攻击、插值攻击、基于 XL 的攻击、有限精度效应、混沌系统降级、可预测性、弱随机性、混沌不连续性和有限控制参数。本研究的主要目的是设计一种新的技术,用于动态生成针对基于代数结构和混沌的密码分析技术安全的 S-box。真随机性已被普遍认为是密码原语设计的理想方法,因为真随机数是不可预测的、不可逆的和不可复制的。我们在研究过程中面临的最大挑战是如何生成真随机数,以及如何利用真随机数来加强 S-box 构建技术。所提出技术的基本概念是从水下声波中提取真随机位,并使用骑士巡游链设计一种新的动态生成 S-box 的技术。与基于代数结构和混沌的技术不同,我们提出的技术依赖于水下声波中存在的不可避免的高质量随机性。所提出的方法满足 S-box 构建和真随机数生成的所有标准评估测试。使用 NIST 随机性测试套件对两百万位进行了分析,结果表明水下声音是一种完美的真随机数熵源。此外,我们动态生成的 S-box 的强度优于或等于最新发布的 S-box(2020 年至 2021 年)。据我们所知,这是第一次进行这种类型的研究,其中利用水下声波的自然随机性来构建分组密码的替代盒。

相似文献

1
Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.基于水下声学和骑士巡游链中的自然随机性的分组密码代换盒生成。
Comput Intell Neurosci. 2022 May 20;2022:8338508. doi: 10.1155/2022/8338508. eCollection 2022.
2
Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption's Substitution Box.人类对密码学的心理障碍:来自精神分裂症患者 EEG 的真随机数生成器及其在分组加密的替代盒中的应用。
Comput Intell Neurosci. 2022 Jun 21;2022:2532497. doi: 10.1155/2022/2532497. eCollection 2022.
3
Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging.基于医学成像中不可避免的随机噪声的密码替换盒构建的多级信息融合
Sci Rep. 2021 Jul 12;11(1):14282. doi: 10.1038/s41598-021-93344-z.
4
A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map.一种使用分段线性混沌映射设计强双射替换盒(S盒)的新型系统字节替换方法。
PeerJ Comput Sci. 2022 May 11;8:e940. doi: 10.7717/peerj-cs.940. eCollection 2022.
5
Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction.基于关键词摘要提取的动态轮次混沌分组密码
Entropy (Basel). 2018 Sep 11;20(9):693. doi: 10.3390/e20090693.
6
A strong construction of S-box using Mandelbrot set an image encryption scheme.一种使用曼德勃罗集的强大S盒构建图像加密方案。
PeerJ Comput Sci. 2022 Sep 9;8:e892. doi: 10.7717/peerj-cs.892. eCollection 2022.
7
A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation.一种使用三次分数变换构建高效替代盒的新方法。
Entropy (Basel). 2019 Mar 5;21(3):245. doi: 10.3390/e21030245.
8
Optimization of a Simulated Annealing Algorithm for S-Boxes Generating.S-Box 生成模拟退火算法的优化。
Sensors (Basel). 2022 Aug 14;22(16):6073. doi: 10.3390/s22166073.
9
A secure key dependent dynamic substitution method for symmetric cryptosystems.一种用于对称密码系统的基于密钥的安全动态替换方法。
PeerJ Comput Sci. 2021 Jul 19;7:e587. doi: 10.7717/peerj-cs.587. eCollection 2021.
10
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption.基于新型 S-盒的 CAST 分组密码算法的图像加密增强。
Sensors (Basel). 2022 Nov 5;22(21):8527. doi: 10.3390/s22218527.

本文引用的文献

1
Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging.基于医学成像中不可避免的随机噪声的密码替换盒构建的多级信息融合
Sci Rep. 2021 Jul 12;11(1):14282. doi: 10.1038/s41598-021-93344-z.
2
Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications.具有诱导混沌动力学和密码学应用的量子启发级联离散时间量子行走
Sci Rep. 2020 Feb 6;10(1):1930. doi: 10.1038/s41598-020-58636-w.
3
Extracting random numbers from quantum tunnelling through a single diode.
通过单个二极管从量子隧穿中提取随机数。
Sci Rep. 2017 Dec 19;7(1):17879. doi: 10.1038/s41598-017-18161-9.
4
Thermodynamics of random number generation.随机数生成的热力学。
Phys Rev E. 2017 Jun;95(6-1):062139. doi: 10.1103/PhysRevE.95.062139. Epub 2017 Jun 30.
5
Dynamic Parameter-Control Chaotic System.动态参数控制混沌系统。
IEEE Trans Cybern. 2016 Dec;46(12):3330-3341. doi: 10.1109/TCYB.2015.2504180. Epub 2015 Dec 17.
6
Random numbers certified by Bell's theorem.经贝尔定理认证的随机数。
Nature. 2010 Apr 15;464(7291):1021-4. doi: 10.1038/nature09008.
7
Increases in deep ocean ambient noise in the Northeast Pacific west of San Nicolas Island, California.加利福尼亚州圣尼古拉斯岛以西东北太平洋深海环境噪声增加。
J Acoust Soc Am. 2006 Aug;120(2):711-8. doi: 10.1121/1.2216565.
8
Sperm whale clicks: directionality and source level revisited.抹香鲸的滴答声:重新审视方向性和源级
J Acoust Soc Am. 2000 Jan;107(1):638-48. doi: 10.1121/1.428329.
9
Sounds, source levels, and associated behavior of humpback whales, southeast Alaska.阿拉斯加东南部座头鲸的声音、声源水平及相关行为
J Acoust Soc Am. 1986 Sep;80(3):735-40. doi: 10.1121/1.393947.