Aiming at the problem of plaintext recovery attack on 3des algorithm with different byte keys, a plaintext recovery method for 3des algorithm with different byte keys is proposed. In order to strengthen the anti-attac...
详细信息
Aiming at the problem of plaintext recovery attack on 3des algorithm with different byte keys, a plaintext recovery method for 3des algorithm with different byte keys is proposed. In order to strengthen the anti-attack ability of desalgorithm, 3des algorithm is used, which includes double-key 3des of and triple-double-key 3des. The 3des algorithm with different seed key length is used to recover the plaintext. The attack algorithm for the first 256-byte plaintext encrypted by 3des algorithm are given through the single byte deviation rule and double byte deviation rule. The results show that with the increase of the corresponding quantization order, the processing effect of the method is better than that of the chaos mapping method (4.2 dB), and with the increase of the quantization order, the advantage of the method is constantly improved;the attack result of the method on 256 plaintext is shown as the 114th byte to 127th byte from 3072 bytes, so that in practical application, the plaintext encrypted by 3des algorithm can be recovered better.
Voice over IP (VoIP) is the technology used to transport real-time voice over a packet-switched network. This study analyses the effects of encrypted VoIP streams on perceived Quality of Experience (QoE) from a user...
详细信息
Voice over IP (VoIP) is the technology used to transport real-time voice over a packet-switched network. This study analyses the effects of encrypted VoIP streams on perceived Quality of Experience (QoE) from a user's perspective. An in-depth analysis on how the transparent nature of encryption can influence the way users perceive the quality of a VoIP call have been investigated by using the E model. A series of experiments have been conducted using a representative sample of modern codecs currently employed for digitising voice, as well as three of the most commonly used iterative block ciphers for encryption (des, 3des, AES). It has been found that the Internet Protocol Security encryption of VoIP strongly relates to the payload sizes and choice of codecs and this relationship has different effects on the overall QoE as measured by the E model, in terms of the way that users perceive the quality of a VoIP call. The main result of this paper is that the default payload shipped with the codecs is not the optimal selection for an increased number of VoIP calls, when encryption is applied and a minimum level of QoE has to be maintained, per call.
Cipher card based on multi-thread 3des algorithm is designed. The kernel of hardware is EP1S20F672C7. PLX9054 is used as the bridge chip of data exchange between cipher card and host PC. The structure of hardware, the...
详细信息
Cipher card based on multi-thread 3des algorithm is designed. The kernel of hardware is EP1S20F672C7. PLX9054 is used as the bridge chip of data exchange between cipher card and host PC. The structure of hardware, the design of principle graph, the program of software and the IP kernel of cipher algorithm are introduced. designed IP kernel has higher flexibility, and can process 1-53 tasks at the same time.
暂无评论