›› 2012, Vol. 42 ›› Issue (05): 1257-1261.

• 论文 • 上一篇    下一篇

变长编码字符型数据的保留格式加密

李敏, 贾春福, 李经纬, 刘哲理, 董宗庆   

  1. 南开大学 信息技术科学学院,天津 300071
  • 收稿日期:2011-07-16 出版日期:2012-09-01 发布日期:2012-09-01
  • 通讯作者: 刘哲理(1978-),男,博士.研究方向:密码学,智能卡操作系统.E-mail:liuzheli1978@163.com E-mail:liuzheli1978@163.com
  • 基金资助:
    国家自然科学基金项目(60973141);高等学校博士学科点专项科研基金项目(20100031110030);网络安全与密码技术福建省高校重点实验室开放课题(2011004);中央高校基本科研业务费专项资金项目.

Format-preserving encryption for variable-length encoding character data

LI Min, JIA Chun-fu, LI Jing-wei, LIU Zhe-li, DONG Zong-qing   

  1. College of Information Technical Science, Nankai University, Tianjin 300071, China
  • Received:2011-07-16 Online:2012-09-01 Published:2012-09-01

摘要: 提出了两种变长编码字符型数据的保留格式加密方案。方案1基于Feistel网络构建合适的分组密码,并结合cycle-walking确保密文输出在合理范围内,适用于明文较短且需要隐藏字符个数的保留格式加密;方案2将明文消息空间划分为若干子集,在子集上进行定长编码字符型数据的加密,具有较高效率,适用于任意明文长度的保留格式加密。

关键词: 计算机系统结构, 保留格式加密, 变长编码, 字符型数据, Feistel网络, cycle-walking

Abstract: Two Format-Preserving Encryption (FPE) schemes suitable for variable-length encoding character data were proposed. Scheme I constructs the block cipher based on Feistel network, and combines cycle-walking to ensure that the ciphertext is in legitimate range. This scheme can be applied in FPE on short plaintext, and meets the needs of hiding the count of characters. Scheme II splits the plaintext into several sub-character sets, and then it executes the FPE of fixed-length encoding character data on each sub-set. Scheme II is more efficient and applicable to FPE on plaintext of any length.

Key words: computer systems organization, format-preserving encryption, variable-length encoding, character data, Feistel network, cycle-walking

中图分类号: 

  • TP393.08
[1] National Bureau of Standards. FIPS PUB 74. Guidelines for Implementing and Using the NBS Data Encryption Standard[S]. 1981.
[2] Spies T. Format preserving encryption[Z]. Unpublished White Paper. http://www.voltage.com, 2008.
[3] Black J, Rogaway P. Ciphers with arbitrary finite domains//Topics in Cryptology-CT-RSA'02, Springer, 2002:114-130.
[4] Spies T. Feistel finite set encryption mode. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ffsem/ffsem-spec.pdf,2008.
[5] Bellare M, Ristenpart T, Rogaway P, et al. Format-preserving encryption//Selected Areas in Cryptography (SAC 2009). Berlin:Springer, 2009.
[6] Bellare M, Rogaway P, Spies T. The FFX mode of operation for format-preserving encryption. http://www.csrc.nist.gov/groups/ST/toolkit/BCM/ documents/proposedmodes/ffx/ffx-spec.pdf,2011.
[7] Brier E, Peyrin T, Stern J. BPS: a format-preserving encryption proposal. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/bps/bps-spec.pdf,2010.
[8] 刘哲理,贾春福,李经纬. 保留格式加密模型研究[J]. 通信学报, 2011,32(6): 184-190. Liu Zhe-li, Jia Chun-fu, Li Jing-wei. Research on the format-preserving encryption modes[J]. Journal on Communications, 2011,32(6) :184-190.
[9] Radhakrishnan R, Kharrazi M, Memon N. Data masking: A new approach for steganography[J]. The Journal of VLSI Signal Processing, 2005,41(3):293-303.
[10] Stütz T, Uhl A. Efficient format-compliant encryption of regular languages: block-based cycle-walking//11th IFIP TC 6/TC 11 International Conference. Springer, 2010:81-92.
[11] Liu Zhe-li, Jia Chun-fu, Li Jing-wei, et al. Format-preserving encryption for datetime//Proceedings of the 2th International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010). Xiamen China, 2010:201-205.
[12] Luby M,Rackoff C.How to construct pseudorandom permutations and pseudorandom functions[J].SIAM Journal on Computing,1988,17(2):373-386.
[13] Patarin J. Security of random Feistel schemes with 5 or more rounds//Cryptology-CRYPTO'04. Berlin:Springer, 2004: 135-158.
[14] Ulf Mattsson. Format controlling encryption using datatype preserving encryption. http://eprint.iacr.org/2009/257,2009.
[15] Morris B, Rogaway P, Stegers T. How to encipher messages on a small domain//Advances in Cryptology-CRYPTO'09, 2009.
[1] 余宜诚, 胡亮, 迟令, 初剑峰. 一种改进的适用于多服务器架构的匿名认证协议[J]. 吉林大学学报(工学版), 2018, 48(5): 1586-1592.
[2] 董坚峰, 张玉峰, 戴志强. 改进的基于狄利克雷混合模型的推荐算法[J]. 吉林大学学报(工学版), 2018, 48(2): 596-604.
[3] 赵博, 秦贵和, 赵永哲, 杨文迪. 基于半陷门单向函数的公钥密码[J]. 吉林大学学报(工学版), 2018, 48(1): 259-267.
[4] 刘磊, 刘利娟, 吴新维, 张鹏. 基于ECPMR的编译器测试方法[J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267.
[5] 董立岩, 王越群, 贺嘉楠, 孙铭会, 李永丽. 基于时间衰减的协同过滤推荐算法[J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272.
[6] 于斌斌, 武欣雨, 初剑峰, 胡亮. 基于群密钥协商的无线传感器网络签名协议[J]. 吉林大学学报(工学版), 2017, 47(3): 924-929.
[7] 邓昌义, 郭锐锋, 张忆文, 王鸿亮. 基于平衡因子的动态偶发任务低功耗调度算法[J]. 吉林大学学报(工学版), 2017, 47(2): 591-600.
[8] 魏晓辉, 刘智亮, 庄园, 李洪亮, 李翔. 支持大规模流数据在线处理的自适应检查点机制[J]. 吉林大学学报(工学版), 2017, 47(1): 199-207.
[9] 郝娉婷, 胡亮, 姜婧妍, 车喜龙. 基于多管理节点的乐观锁协议[J]. 吉林大学学报(工学版), 2017, 47(1): 227-234.
[10] 魏晓辉, 李翔, 李洪亮, 李聪, 庄园, 于洪梅. 支持大规模流数据处理的弹性在线MapReduce模型及拓扑协议[J]. 吉林大学学报(工学版), 2016, 46(4): 1222-1231.
[11] 车翔玖, 梁森. 一种基于大顶堆的SPIHT改进算法[J]. 吉林大学学报(工学版), 2016, 46(3): 865-869.
[12] 董悦丽, 郭权, 孙斌, 康玲. 药物分子对接动态任务迁移优化[J]. 吉林大学学报(工学版), 2015, 45(4): 1253-1259.
[13] 匡哲君,师唯佳,胡亮. 基于无线传感器网络的角色成员关系剩余能量新算法[J]. 吉林大学学报(工学版), 2015, 45(2): 600-605.
[14] 张忆文,郭锐锋. 实时系统混合任务低功耗调度算法[J]. 吉林大学学报(工学版), 2015, 45(1): 261-266.
[15] 张忆文1, 2, 郭锐锋1. 制的容错节能调度算法[J]. 吉林大学学报(工学版), 2014, 44(4): 1112-1117.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!