首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
DES加密算法的密钥扩展   总被引:1,自引:0,他引:1  
周建钦  何凌云 《科技通报》2011,27(2):263-267
介绍了DES加密算法及其安全性,指出目前存在的几种主要的攻击方法.提出了一种利用密钥生成非线性的置换表的方法,大大增加了密钥长度.在不改变原有算法主体结构的基础上,增强了算法的安全性尤其是抗穷密钥搜索攻击和抗差分密码分析能力.  相似文献   

2.
研究了ARIA在不可能差分分析下的安全性.通过对算法扩散层的分析,给出了ARIA中间状态在加密过程的差分传递性质.在此基础上证明了6轮ARIA不存在使得输入输出差分重量小于10的不可能差分路径,同时证明了在输入输出差分重量为10的情况下6轮ARIA只存在2类形式的不可能差分路径.利用构造出的这2类不可能差分路径,从理论上证明了6轮ARIA不可能差分攻击的最优结果为:2120个选择明文和294.5次6轮加密.  相似文献   

3.
基于LBlock算法的轮函数结构,给出16轮和17轮的LBlock分组密码算法的中间相遇攻击方法.攻击16轮LBlock算法所需的数据量约为232,计算量约为244.5次16轮加密;攻击17轮LBlock算法所需的数据量约为232,计算量约为255.5次17轮加密.攻击结果表明,17轮的轮LBlock算法对中间相遇攻击是不免疫的.  相似文献   

4.
王锦龙 《科技通报》2021,37(6):48-50
自生长密钥,是指随着使用过程,密钥的长度不断生长,对明文进行加密的密钥不断变化.通过多螺旋运算,通讯双方各自独立按需持续生成密钥,在双方约定的整个生命周期中,每一个数据包加密的密钥都是新生成的,每轮密钥包括2568=18,446,744,073,709,551,616个密钥切片,每个密钥切片为16字节,基于密钥生成逻辑的概率计算,出现重复密钥轮大概需要25616=3.4028236692093846346337460743177e+38轮,按此计算,基于本算法,有效密钥的长度将达到16 * 2568* 25616=1.0043e+59(地球的原子数量大约为1.0e+50),通过源头暴力破解需要进行25648=2384=3.9402e+115次尝试才能够找到.  相似文献   

5.
对NTT公司近两年先后推出的分组密码算法E2和Camellia的特点及设计技巧进行了详细讨论.首先,指出Camellia的FL和FL-1函数的特点,利用此可以对Camellia进行中间相遇攻击;其次讨论E2和Camellia变形的安全性.结果显示如果采用一个S盒,则截断差分密码分析对10轮的Camellia*构成威胁;而设计者称10轮Camellia对截断差分密码分析是免疫的,这说明采用4个不同的S盒对Camellia的安全性起到很重要的作用.另一结果显示截断差分密码分析对12轮E2*构成威胁,这反映了扩散层P选取不但要求它的分支数,而且应尽力减少它的循环差分特征.  相似文献   

6.
提出了一种基于移位寄存器状态变化的分组加密算法(称之为 荡秋千"密码算法),并详细给出了算法的加解密流程和必要的参数设置方法.通过对密钥雪崩效应和明文雪崩效应的基本分析,说明了该算法具有良好的抵抗密钥相关攻击、线性攻击和差分攻击的性能.除了具有安全、快速、易于实现等特点外,该算法最突出的特点是算法逻辑结构简洁、严谨,有效地实施了混合与扩散  相似文献   

7.
分析Loiss算法在抵御猜测确定攻击方面的安全性,并给出一个猜测确定攻击的方法.该攻击方法避免对Loiss算法中BOMM结构的寄存器进行直接猜测从而降低了攻击复杂度.最终攻击的时间复杂度为O(2247),数据复杂度为O(252).  相似文献   

8.
AACS是一种内容散布和数字版权管理的标准,通过吊销设备密钥来吊销非法的设备,并且采用子集差分树技术对数量庞大的设备密钥进行管理.根据子集差分树原理,每个设备需要存储大量的设备密钥.在被吊销设备的分布是随机和均匀的这一合理假设条件下,对AACS的设备密钥存储方案进行了改进.改进后,每个设备存储的密钥数量减少,并且合法设备被划分的子集个数仅仅稍微增加.  相似文献   

9.
CCSDS图像数据压缩(IDC)标准和分组密码算法SMS4通过将数据压缩与安全分别最优化,使编译码总体性能达到最佳.该算法计算复杂度高,难以保障图像数据在资源受限网络中有效和安全传输.本文使用SMS4分组密钥对图像直流系数进行随机算术编码;对交流系数采用序列加密编码,提出一种基于CCSDS IDC的联合信源与安全编译码算法.仿真实验表明,该算法降低了计算复杂度,同时提供了良好的安全性能.  相似文献   

10.
改进的求和生成器的密码分析   总被引:3,自引:0,他引:3  
利用分别征服攻击、Chepyzhov提出的快速相关攻击以及代数攻击等3种算法对改进的求和生成器进行了密码分析,并分别给出了攻击算法的计算复杂度和所需要的密钥流的长度  相似文献   

11.
The focus of this paper is on the detection and estimation of parameter faults in nonlinear systems with nonlinear fault distribution functions. The novelty of this contribution is that it handles the nonlinear fault distribution function; since such a fault distribution function depends not only on the inputs and outputs of the system but also on unmeasured states, it causes additional complexity in fault estimation. The proposed detection and estimation tool is based on the adaptive observer technique. Under the Lipschitz condition, a fault detection observer and adaptive diagnosis observer are proposed. Then, relaxation of the Lipschitz requirement is proposed and the necessary modification to the diagnostic tool is presented. Finally, the example of a one-wheel model with lumped friction is presented to illustrate the applicability of the proposed diagnosis method.  相似文献   

12.
针对飞机温控系统的故障复杂性,提出了一种基于功能的以模糊Petri网为推理算法的故障诊断方法。首先根据系统分析,推导出子系统和系统功能参数,建立了描述功能层次关系的功能模型,提高了故障诊断的直观性和有效性;然后利用模糊Petri网的快速和并行推理能力,建立了反映功能模型的故障诊断模型,定位故障功能组件,提高了诊断的快速性和精确性;最后通过实例验证了该方法的有效性。  相似文献   

13.
A stepwise fault analysis procedure for the class of digital circuits known as Linear Sequential Circuits (LSC) is presented where the LSC is defined over a finite field. The development of a spectral theory for this class of systems provides a mechanism for exploiting the LSC's memory. This, in general, allows fewer test inputs than would be required for fault analysis of a memoryless circuit of similar complexity.  相似文献   

14.
The complexity of modern chemical and petrochemical plants is becoming increasingly problematic in the recent years. At the same time, the demands to ensure safety and reliability of process operations rise. Early detection of abnormal event in complex real systems decrease maintenance cost and lead to guarantee the safety of human operators and environment. In the present work, a fault detection (FD) method which exploits the advantages of black-box modeling and statistical measure for fault detection in real chemical process as a distillation column is proposed. This technique is developed by applying the Nonlinear Auto-Regressive Moving Average with eXogenous input (NARMAX) model and Bhattacharyya distance (BD). In order to determine the NARMAX model, a real data set recorded during normal operations is used. Then, the BD is used to quantify on-line the dissimilarity between the current and reference probability distributions of the residual obtained from the NARMAX model for fault detection purposes. The ability of the proposed FD approach is demonstrated using real fault of separation unit. The obtained results indicate that the developed technique produces favorable performance compared to the conventional Cumulative Sum (CUSUM) test.  相似文献   

15.
In this paper, a different internal fault modeling and an identification algorithm are presented. There has been an increasing concern about turn-to-turn faults in transformers because of the high costs of unexpected outages. It is not always possible to analyze the transformer behavior under such faults at rated conditions, since the tests are highly destructive. To develop transformer internal fault detection technique, a transformer model to simulate internal faults is required. This paper describes a novel technique and methodology for modeling and identifying transformer internal faults by using transmission line method (TLM) and fuzzy reasoning technique based on dynamic principal component analysis (PCA), respectively. The transformer has been modeled considering non-linearities as hysteresis and saturation. Transformer internal fault currents are successfully discriminated from the rated currents. The degree and priority of transformer internal faults are obtained by the proposed method. It is suited for implementation on computers because of no computation complexity. Hence, the proposed algorithm can be used effectively in real-time fault identification problems.  相似文献   

16.
Fault detection and diagnosis is crucial in recent industry sector to ensure safety and reliability, and improve the overall equipment efficiency. Moreover, fault detection and diagnosis based on k-nearest neighbor rule (FDD-kNN) has been effectively applied in industrial processes with characteristics such as multi-mode, non-linearity, and non-Gaussian distributed data. The main challenge associated with FDD-kNN is the on-line computational complexity and storage space that are needed for searching neighbors. To deal with these issues, this paper proposes a monitoring approach where the Fuzzy C-Means clustering technique is used to decrease the overall on-line computations and required storage by measuring the neighbors of the clusters’ centres rather than the raw data. After building the monitoring model off-line based on the data clusters’ centres, the faults are detected by comparing the average squared Euclidean distance between the on-line data sample and the clusters’ centres with a predefined threshold. Then, the detected faults can be diagnosed by calculating the contribution of each variable in the fault detection index. Furthermore, for easily analysing the fault diagnosis results, the relative contribution for each sample data vector is considered. A numerical example and the Tennessee Eastman chemical process are used to demonstrate the performance of the proposed FCM-kNN for fault detection and diagnosis.  相似文献   

17.
This paper focuses on the observer-based fault-tolerant control problem for the discrete-time nonlinear systems with the perturbation and the fault signals. First, the nonlinear term with perturbation is put into the local nonlinear part so that the nonlinear system with perturbation can be described as an interval type-1 (IT1) T-S fuzzy system. Then, based on the unknown input observer technology, the IT1 T-S fuzzy fault estimation (FE) observer scheme is presented to obtain the real-time FE information and decouple the local nonlinear part from the estimation error system, where the design complexity and the computational burden are reduced simultaneously. Second, based on the real-time FE information, an FE-based interval type-2 (IT2) T-S fuzzy fault-tolerant control scheme is presented to achieve the compensation for the influence of the fault signal and the stabilization for the system. Different from the traditional methods, a mixed design scheme, which is based on the IT1 T-S fuzzy fault estimation observer method and the IT2 T-S fuzzy fault-tolerant controller method, is proposed in this paper. This strategy can not only reduce the computational burden, but also obtain a less conservative result. Finally, the effectiveness of the mixed design approach is illustrated by an example.  相似文献   

18.
寄存器传输级(RTL)测试产生及时延测试是当今集成电路(IC)测试技术中亟待解决的问题和研究的热点.首先从IC逻辑测试的测试产生和IC时延测试方法这两个方面系统地综述了测试产生和时延测试领域迄今为止的主要研究成果.在RTL行为描述的测试产生方面,提出了新的RTL行为模型的描述方法:行为阶段聚类描述,并提出了基于聚类的测试产生技术.将这些技术集成到RTL级ATPG系统ATCLUB中,在提高测试产生效率及缩短测试长度方面效果显著.在IC时延测试方面,提出了一种新的可变双观测点的时延测试方法。基于该方法提出了新的时延故障诊断方法,实现和完善了可变双观测点的时延测试系统DTwDO.DTwDO提供了从时延测试到故障诊断等一系列测试工具,有效减少了测试通路数,提高了故障覆盖率,并有很高的故障定位成功率.  相似文献   

19.
寄存器传输级(RTL)测试产生及时延测试是当今集成电路(IC)测试技术中亟待解决的问题和研究的热点.首先从IC逻辑测试的测试产生和IC时延测试方法这两个方面系统地综述了测试产生和时延测试领域迄今为止的主要研究成果.在RTL行为描述的测试产生方面,提出了新的RTL行为模型的描述方法行为阶段聚类描述,并提出了基于聚类的测试产生技术.将这些技术集成到RTL级ATPG系统ATCLUB中,在提高测试产生效率及缩短测试长度方面效果显著.在IC时延测试方面,提出了一种新的可变双观测点的时延测试方法.基于该方法提出了新的时延故障诊断方法,实现和完善了可变双观测点的时延测试系统DTwDO.DTwDO提供了从时延测试到故障诊断等一系列测试工具,有效减少了测试通路数,提高了故障覆盖率,并有很高的故障定位成功率.  相似文献   

20.
This paper investigates a class of nonlinear systems with actuator fault. In particular, fuzzy logic systems have been used to approximate the unknown nonlinear functions, backstepping procedure is adopted to design controller for the system with mismatched condition, command filter is utilized to eliminate the explosion of complexity of the backstepping and also to compensate the output of a filter subjected to the derivative of the virtual control. The stability of the closed-loop system and the convergence of the tracking error are proved via Lyapunov Theorem. In addition, two numerical simulation examples are illustrated the effectiveness of the proposed approach.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号