{"title":"基于FPGA的通用密钥加密动态重构","authors":"Teruyoshi Yamaguchi, T. Hashiyama, S. Okuma","doi":"10.1109/FPT.2002.1188715","DOIUrl":null,"url":null,"abstract":"This paper introduces a new encryption method for a block cipher. To keep the ciphertext safe, traditional methods usually use secret keys in simple fixed logic operations. To break the cipher, cryptanalysis has been developed. They use stochastic characteristics such as differential and linear relationships between the input and output data. Encryption algorithms must be secure against these analyses. The proposed method uses the secret key to modify substitution tables called S-Boxes in the encryption algorithm. They are reconfigured on demand using FPGA. Our method is hard enough to prevent the encrypted data from analyzing the secret key using statistical cryptanalysis.","PeriodicalId":355740,"journal":{"name":"2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings.","volume":"188 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Dynamic reconfiguration for the common key encryption using FPGA\",\"authors\":\"Teruyoshi Yamaguchi, T. Hashiyama, S. Okuma\",\"doi\":\"10.1109/FPT.2002.1188715\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper introduces a new encryption method for a block cipher. To keep the ciphertext safe, traditional methods usually use secret keys in simple fixed logic operations. To break the cipher, cryptanalysis has been developed. They use stochastic characteristics such as differential and linear relationships between the input and output data. Encryption algorithms must be secure against these analyses. The proposed method uses the secret key to modify substitution tables called S-Boxes in the encryption algorithm. They are reconfigured on demand using FPGA. Our method is hard enough to prevent the encrypted data from analyzing the secret key using statistical cryptanalysis.\",\"PeriodicalId\":355740,\"journal\":{\"name\":\"2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings.\",\"volume\":\"188 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FPT.2002.1188715\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FPT.2002.1188715","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic reconfiguration for the common key encryption using FPGA
This paper introduces a new encryption method for a block cipher. To keep the ciphertext safe, traditional methods usually use secret keys in simple fixed logic operations. To break the cipher, cryptanalysis has been developed. They use stochastic characteristics such as differential and linear relationships between the input and output data. Encryption algorithms must be secure against these analyses. The proposed method uses the secret key to modify substitution tables called S-Boxes in the encryption algorithm. They are reconfigured on demand using FPGA. Our method is hard enough to prevent the encrypted data from analyzing the secret key using statistical cryptanalysis.