
- Home
高级 检索
Chinese
English



1.国防科技大学计算机学院,湖南 长沙 410073
2.湖南安方信息技术有限公司,湖南 长沙 410221
3.长沙理工大学计算机学院,湖南 长沙 410015
4.国防科技大学理学院,湖南 长沙 410073
5.湖南省农村信用社联合社,湖南 长沙 410013
Received:21 January 2026,
Revised:2026-03-20,
Accepted:20 March 2026,
Published:20 April 2026
移动端阅览
王小峰,叶军,刘文正等.FR-FPE:有限基保留格式加密算法[J].通信学报,2026,47(04):54-66.
Wang Xiaofeng,Ye Jun,Liu Wenzheng,et al.FR-FPE: finite radix oriented format-preserving encryption algorithm[J].Journal on Communications,2026,47(04):54-66.
王小峰,叶军,刘文正等.FR-FPE:有限基保留格式加密算法[J].通信学报,2026,47(04):54-66. DOI: 10.11959/j.issn.1000-436x.2026080.
Wang Xiaofeng,Ye Jun,Liu Wenzheng,et al.FR-FPE: finite radix oriented format-preserving encryption algorithm[J].Journal on Communications,2026,47(04):54-66. DOI: 10.11959/j.issn.1000-436x.2026080.
针对现有保留格式加密算法难以应对滑动关联及线性密码分析攻击且效率不高的问题,提出了有限基保留格式加密FR-FPE算法。通过设计基于CBC模式的参数向量加密机制和结构化调整参数全关联加密模型,有效抵御滑动关联及线性密码分析攻击。通过设计轻量化确定性加密结构,支持对不超过192 bit的明文和96 bit的调整参数进行加密,在保证算法与NIST FF1相同安全强度的同时,分组加密的调用次数比FF1减少45%(9次)。基于Game-Hopping博弈模型,给出了FR-FPE算法强伪随机置换(SPRP)安全性证明,并量化分析了算法抵御滑动关联及线性密码分析攻击的能力。实验结果表明,针对radix=36的数字字母混合数据集,FR-FPE的每秒加密次数比FF1平均高26.55%,加密数据吞吐率平均高21.25%。
Existing format-preserving encryption algorithms were vulnerable to slide attack and linear cryptanalysis attack
and had low efficiency. A finite radix oriented format-preserving encryption (FR-FPE) algorithm was proposed. It designed a CBC mode based on initial vector encryption mechanism and a fully associated encryption model with structured tweak parameters
which could effectively defend against slide attack and linear cryptanalysis attack. A lightweight and deterministic encryption structure was designed to support plaintexts up to 192 bit and tweak parameters up to 96 bit. While ensuring the same security strength as NIST FF1
the number of block encryption calls was reduced by 45% (9 times) compared with FF1. Based on the Game-Hopping game model
the security proof of strong pseudorandom permutation (SPRP) for the FR-FPE algorithm was given
and the ability of the algorithm to resist sliding attacks and linear cryptanalytic attacks was quantitatively analyzed. Experimental results show that for a mixed alphanumeric dataset with radix=36
FR-FPE achieves an average increase of 26.55% in encryption times per second and 21.25% in encrypted data throughput compared to FF1.
National Bureau of Standards . FIPS PUB 74, guidelines for implementing and using the DES data encryption standard [S ] . 1981 .
Black J , Rogaway P . Ciphers with arbitrary finite domains [C ] // Topics in Cryptology-CT-RSA 2002 . Berlin : Springer , 2002 : 114 - 130 .
Dworkin M . NIST SP 800-38G, recommendation for block cipher modes of operation: methods for format-preserving encryption [S ] . 2013 .
ANSI X9.124-1-2023 . Symmetric key cryptography for the financial services industry format preserving encryption - Part 1: definitions and mode [S ] . 2023 .
Lee J K , Koo B , Roh D , et al . Format-preserving encryption algorithms using families of tweakable blockciphers [C ] // Information Security and Cryptology - ICISC 2014 . Berlin : Springer , 2015 : 132 - 159 .
Jang W , Lee S Y . Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment [J ] . International Journal of Distributed Sensor Networks , 2020 , 16 ( 3 ): 155014772091477 .
Kim D , Kim H , Jang K , et al . Deep-learning-based neural distinguisher for format-preserving encryption schemes FF1 and FF3 [J ] . Electronics , 2024 , 13 ( 7 ): 1196 .
Majeed M A , Sulaiman R , Shukur Z . New text steganography technique based on part-of-speech tagging and format-preserving encryption [J ] . KSII Transactions on Internet and Information Systems , 2024 , 18 : 170 - 191 .
Vidhya S . Enhancing cloud security for structured data: an AES-GCM based format-preserving encryption approach [C ] // Artificial Intelligence Based Smart and Secured Applications . Berlin : Springer , 2025 : 196 - 205 .
Amon O , Dunkelman O , Keller N , et al . Three third generation attacks on the format preserving encryption scheme FF3 [C ] // Advances in Cryptology - EUROCRYPT 2021 . Berlin : Springer , 2021 : 127 - 154 .
Beyne T . Linear cryptanalysis of FF3-1 and FEA [C ] // Advances in Cryptology - CRYPTO 2021 . Berlin : Springer , 2021 : 41 - 69 .
Spies T . Format preserving encryption [R ] . 2008 .
Bellare M , Rogaway P , Spies T . The FFX mode of operation for format-preserving encryption [R ] . Unpublished NIST Proposal , 2010 .
Liskov M , Rivest R L , Wagner D . Tweakable block ciphers [C ] // Advances in Cryptology - CRYPTO 2002 . Berlin : Springer , 2002 : 31 - 46 .
李经纬 , 贾春福 , 刘哲理 , 等 . 基于k-分割Feistel网络的FPE方案 [J ] . 通信学报 , 2012 , 33 ( 4 ): 62 - 68 .
Li J W , Jia C F , Liu Z L , et al . FPE scheme based on k-splits Feistel network [J ] . Journal on Communications , 2012 , 33 ( 4 ): 62 - 68 .
Bellare M , Hoang V T , Tessaro S . Message-recovery attacks on feistel-based format preserving encryption [C ] // Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security . New York : ACM Press , 2016 : 444 - 455 .
Durak F B , Vaudenay S . Breaking the FF3 format-preserving encryption standard over small domains [C ] // Advances in Cryptology-CRYPTO 2017 . Berlin : Springer , 2017 : 679 - 707 .
刘哲理 , 贾春福 , 李经纬 . 保留格式加密技术研究 [J ] . 软件学报 , 2012 , 23 ( 1 ): 152 - 170 .
Liu Z L , Jia C F , Li J W . Research on the format-preserving encryption techniques [J ] . Journal of Software , 2012 , 23 ( 1 ): 152 - 170 .
Bellare M , Ristenpart T , Rogaway P , et al . Format-preserving encryption [C ] // Selected Areas in Cryptography . Berlin : Springer , 2009 : 295 - 312 .
Hoang V T , Miller D , Trieu N . Attacks only get better: how to break FF3 on large domains [C ] // Advances in Cryptology - EUROCRYPT 2019 . Berlin : Springer , 2019 : 85 - 116 .
Hoang V T , Tessaro S , Trieu N . The curse of small domains: new attacks on format-preserving encryption [C ] // Advances in Cryptology-CRYPTO 2018 . Berlin : Springer , 2018 : 221 - 251 .
Biryukov A , Wagner D . Slide attacks [C ] // Fast Software Encryption: 6th International Workshop , FSE’ 99 . Berlin : Springer , 1999: 245 - 259 .
Patarin J . Security of random feistel schemes with 5 or more rounds [C ] // Advances in Cryptology-CRYPTO 2004 . Berlin : Springer , 2004 : 106 - 122 .
Matsui M . Linear cryptanalysis method for DES cipher [C ] // Advances in Cryptology - EUROCRYPT’93 . Berlin : Springer , 1994 : 386 - 397 .
0
Views
16
下载量
0
CSCD
Publicity Resources
Related Articles
Related Author
Related Institution
京公网安备11010602201714号