%0 Journal Article %T <i>GF</i>(2<sup>8</sup>)上高矩阵为密钥矩阵的Hill加密衍生算法<br>Hill Encryption Derivative Algorithm in Finite Field <i>GF</i>(2<sup>8</sup>) with High-Matrix as Key Matrix %A 刘海峰 %A 卢开毅 %A 梁星亮< %A br> %A LIU Hai-feng %A LU Kai-yi %A LIANG Xing-liang %J 西南大学学报(自然科学版) %D 2018 %R 10.13718/j.cnki.xdzk.2018.11.007 %X 针对传统的Hill加密算法仅是利用有限域<i>GF</i>(<i>p</i>)上可逆的数字方阵作为密钥矩阵与明文向量做模<i>P</i>乘法进行加密运算,提出了一种新的在有限域<i>GF</i>(2<sup>8</sup>)上以多项式高矩阵作为密钥矩阵的Hill加密衍生算法.在Hill加密衍生算法中,明文向量为明文字符对应的多项式构成的多项式向量,随机选取密钥矩阵的一列作为加密时的平移增量,在<i>GF</i>(2<sup>8</sup>)上进行密钥矩阵与明文向量的模8次不可约多项式<i>p</i>(<i>x</i>)的乘法和加法,然后获得元素为多项式的密文向量,从而实现明文信息加密.由于在不知道有限域的8次不可约多项式、密钥矩阵以及随机抽取的平移向量的情况下由密文破解得到明文的难度更大,从而提高了有限域<i>GF</i>(2<sup>8</sup>)上Hill加密衍生算法的抗攻击能力.<br>In traditional Hill encryption algorithm, the modulo P multiplication of the invertible matrix and plaintext vector in finite field <i>GF</i>(<i>P</i>) are used to calculate ciphertext vector. This paper proposes a new Hill encryption derivative algorithm in finite field <i>GF</i>(2<sup>8</sup>), which takes polynomial high-matrix as the key matrix. In this new Hill encryption derivative algorithm, plaintext vector is composed of the polynomial derived from the corresponding plaintext, a column of key matrix is selected as translation increment randomly modulo eighth degree irreducible polynomial <i>p</i>(<i>x</i>) multiplication of the polynomial high-matrix and plaintext vector in finite field <i>GF</i>(2<sup>8</sup>) is done. Then modulo eighth degree irreducible polynomial <i>p</i>(<i>x</i>) addition of the product and translation increment in finite field <i>GF</i>(2<sup>8</sup>) is carried out, thus the polynomial ciphertext vector is obtained, and the purpose of encrypting the plaintext messages is achieved. Because it is more difficult to get plaintext from ciphertext under the condition that eighth degree irreducible polynomial, key matrix and random selected translation vector are unknown, the new Hill encryption derivative algorithm in finite field <i>GF</i>(2<sup>8</sup>) improves the capability for anti-attack %K 有限域< %K i> %K GF< %K /i> %K (2< %K sup> %K 8< %K /sup> %K ) %K Hill加密 %K 多项式高矩阵 %K 不可约多项式< %K br> %K finite field < %K i> %K GF< %K /i> %K (2< %K sup> %K 8< %K /sup> %K ) %K Hill encryption %K polynomial high-matrix %K irreducible polynomial %U http://xbgjxt.swu.edu.cn/jsuns/html/jsuns/2018/11/20181107.htm