Secret-key Crytography

本文概览了对称密钥加密的发展历程,从完美保密概念的提出到经典算法如DES的设计原则,再到现代标准AES的介绍。探讨了加密算法的安全性评估、攻击方式及对策,列举了多种对称加密算法的特点。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

Secret-key Crytography

The scientific development phase of cryptography begins with the presentation of symmetric keys.Secret-key Crytography starts with Shannon’s paper——《Communication theory of secrey systems》(1949).In this paper, Shannon proposed the concept of perfect secrecy.

Let’s talk about perfect secrecy first. Perfect secrecy means that the level of knowing ciphertext and not knowing the ciphertext adversary has not changed.That is, the adversary cannot determine the content of the plaintext uniquely through the ciphertext. In a system with perfect secrecy the number of keys is at least equal to the number of massage.

So how do you evaluate the quality of a cryptographic algorithm? Shannon proposed
the concept of Unicity distance.

N0=log2E/d(N0 is the minimum length required to uniquely determine the key by ciphertext.)(d is the redundancy of the plaintext language)

Ps:Let me spend some time to expain what are redundancy and rates.d=R-r (bits).R is
the absolute rate (The minimum number of bytes used to represent characters) and r is the true rate (Average length that must be).For an alphabet of size A,R=log2A. For natural language,R is about 4.7 bits,r is about 1~1.5 bits,and d is about 3.2 bits.

There is a classic perfect secrecy——One-time-pad(Vernam cipher).It guarantees the key sequence is a truly random sequence. For every character of plaintext, it randomly generates a key. Let’s calculate the size of its N0.For One-time-pad,E=26k(E is the total amount of keys).So log2E is about 4.7k.And N0 is about 1.27k. This means that to obtain 1.27 times of ciphertext in order to uniquely determine the key sequence, this is obviously impossible for ciphertext attacks.

Although One-time-pad guarantees extremely high security, it has low encryption efficiency and high cost, which is not convenient in practical use. The actual encryption algorithm only needs to ensure pracitical or computational security.

In the 20th century, the United States established DES as the data encryption
standard, and subsequently established AES as the current data encryption
standard. Let’s take a look at DES first. Although it is no longer safe, its design has great enlightenment value for future generations.

DES
is a block cipher. The classic block password is Playfair cipher(1850). I won’t go into details here, let’s mainly look at DES. Before that, we need to know the design principles for modern block ciphers.

1.Safety principle: We mainly use diffusion and confusion to design.

2.Implement principle: We should consider whether the hardware can implement this algorithm and whether the algorithm is efficient enough.

3.The method of encryption and decryption is similar. This is mainly to ensure efficiency. We should try to find appropriate involution function.

Below I formally talk about the structure of DES. DES uses Feistel structure. The parameters in Feistel structure are:block size、key size、number of rounds、subkey generation algorithm and round function f.DES uses XOR. XOR makes encryption and decryption a reverse process.
在这里插入图片描述

Fi(Li-1,Ri-1)=(Li-1 XOR f(ki,Ri-1),Rj-1)

FiFi(Li-1,Ri-1)=Fi(Li-1 XOR f(ki,Ri-1),Rj-1)=(Li-1 XOR f(ki,Ri-1) XOR f(ki,Ri-1),Ri-1)=(Li-1,Ri-1)

Encryption process:DES=(IP-1)F16TF15T``````TF1(IP)

Decryption process:DES= (IP-1)F1TF2T``````TF16(IP)

As for the S-Boxs of DES, the input 6-bit output 4 bits, according to the first bit and the last bit of the table, which row is decided to be output, the middle 4 bits determine which column to output.

The number of rounds of DES is 16 rounds. After 8 rounds of DES, every person in
the plaintext will be affected. However, 8 rounds did not provide sufficient complexity, so 16 rounds were chosen.

Speaking of this, I have to mention the weakness of DES. DES has the following
weaknesses:

1.complement property:
u’=u+1( mod 2 )

DESz(x)=DESz’(x’)

This causes the number of keys to be reduced by half.

2.Not every key is a good key:

There are some weak keys and semi-weak keys

3.Exhaustive attack:

DES has 256(about 1011)keys. If it takes 1e-6 seconds to verify a key, it only takes 1e11 seconds to decipher. In 1999.1, it can be deciphered in 22 hours and 15 minutes. About cost,in 1997,it required 20,000,000 dollars. In 1987,it only require 200,000
dollars.And in 1993,it only required 100,000 dollars(1.5 days).If we have 1,000,000 dollars,it will only need 3.5 hours.Now we can decipher DES faster. So it is not safe anymore.

So we thought about increasing the key length and multiple methods. But this does not improve its security in essence. The security of the algorithm lies in itself. We can attack the double DES by means of a man-in-the-middle attack. It only needs to inquire
257 times not 2112 times. But Triple DES(eg:EDE) still has some security, and now it has application value.

Here is also a common attack method - differential attack. Differential attacks are a choice of plaintext attacks that look different through XOR. Its complexity is related to the number of rounds. The differential attack for 16 rounds of DES is more complex than the enumeration attack, and the differential attack is suitable for DES with fewer attack rounds. This is one of the reasons why DES designers use 16 rounds. It can be
seen that the design of DES is very precise, and it can be inspired by studying DES.

In addition to DES there are many symmetric key algorithms, some of which are
listed here.

FEAL: High speed software encryption algorithm

LOK191: It can be deciphered by the presence of weak keys, related plaintext attacks, and selective plaintext attacks.

Blowflsh: Secure when the key length is greater than 64 bits. The attack complexity increases when the number of rounds is large. Can be attacked by enumeration attack.

IDEA:block size——64 bits;key size——128 bits; More than 8 rounds of safety.

TEA——Tiny Encryption Algorithm:block size——64 bits;key size——128 bits;number of rounds——64. The key is equivalence. Used in Microsoft’s X-box, it can be used for hashing.

And the current US data encryption standard AES(Advanced Encryption Standard)——Rjindael. Designed by Joan Daemen and Vincent Rijmen of Belgium, Rijindael is based on the Square algorithm and its design strategy is Wide Trail Strategy. The Wide Trail Strategy is proposed for differential analysis and linear analysis.Its greatest advantage is that it can give the probability of the optimal differential feature of the algorithm and the bound of the deviation of the best linear approximation. The details about AES won’t be expanded here.

This article is only a summary of Secret-key Crytography, and there are many points
worth exploring.

JFM7VX690T型SRAM型现场可编程门阵列技术手册主要介绍的是上海复旦微电子集团股份有限公司(简称复旦微电子)生产的高性能FPGA产品JFM7VX690T。该产品属于JFM7系列,具有现场可编程特性,集成了功能强大且可以灵活配置组合的可编程资源,适用于实现多种功能,如输入输出接口、通用数字逻辑、存储器、数字信号处理和时钟管理等。JFM7VX690T型FPGA适用于复杂、高速的数字逻辑电路,广泛应用于通讯、信息处理、工业控制、数据中心、仪表测量、医疗仪器、人工智能、自动驾驶等领域。 产品特点包括: 1. 可配置逻辑资源(CLB),使用LUT6结构。 2. 包含CLB模块,可用于实现常规数字逻辑和分布式RAM。 3. 含有I/O、BlockRAM、DSP、MMCM、GTH等可编程模块。 4. 提供不同的封装规格和工作温度范围的产品,便于满足不同的使用环境。 JFM7VX690T产品系列中,有多种型号可供选择。例如: - JFM7VX690T80采用FCBGA1927封装,尺寸为45x45mm,使用锡银焊球,工作温度范围为-40°C到+100°C。 - JFM7VX690T80-AS同样采用FCBGA1927封装,但工作温度范围更广,为-55°C到+125°C,同样使用锡银焊球。 - JFM7VX690T80-N采用FCBGA1927封装和铅锡焊球,工作温度范围与JFM7VX690T80-AS相同。 - JFM7VX690T36的封装规格为FCBGA1761,尺寸为42.5x42.5mm,使用锡银焊球,工作温度范围为-40°C到+100°C。 - JFM7VX690T36-AS使用锡银焊球,工作温度范围为-55°C到+125°C。 - JFM7VX690T36-N使用铅锡焊球,工作温度范围与JFM7VX690T36-AS相同。 技术手册中还包含了一系列详细的技术参数,包括极限参数、推荐工作条件、电特性参数、ESD等级、MSL等级、重量等。在产品参数章节中,还特别强调了封装类型,包括外形图和尺寸、引出端定义等。引出端定义是指对FPGA芯片上的各个引脚的功能和接线规则进行说明,这对于FPGA的正确应用和电路设计至关重要。 应用指南章节涉及了FPGA在不同应用场景下的推荐使用方法。其中差异说明部分可能涉及产品之间的性能差异;关键性能对比可能包括功耗与速度对比、上电浪涌电流测试情况说明、GTH Channel Loss性能差异说明、GTH电源性能差异说明等。此外,手册可能还提供了其他推荐应用方案,例如不使用的BANK接法推荐、CCLK信号PCB布线推荐、JTAG级联PCB布线推荐、系统工作的复位方案推荐等,这些内容对于提高系统性能和稳定性有着重要作用。 焊接及注意事项章节则针对产品的焊接过程提供了指导,强调焊接过程中的注意事项,以确保产品在组装过程中的稳定性和可靠性。手册还明确指出,未经复旦微电子的许可,不得翻印或者复制全部或部分本资料的内容,且不承担采购方选择与使用本文描述的产品和服务的责任。 上海复旦微电子集团股份有限公司拥有相关的商标和知识产权。该公司在中国发布的技术手册,版权为上海复旦微电子集团股份有限公司所有,未经许可不得进行复制或传播。 技术手册提供了上海复旦微电子集团股份有限公司销售及服务网点的信息,方便用户在需要时能够联系到相应的服务机构,获取最新信息和必要的支持。同时,用户可以访问复旦微电子的官方网站(***以获取更多产品信息和公司动态。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值