1.国防科技大学计算机学院,湖南 长沙 410073
2.湖南安方信息技术有限公司,湖南 长沙 410221
3.长沙理工大学计算机学院,湖南 长沙 410015
4.国防科技大学理学院,湖南 长沙 410073
5.湖南省农村信用社联合社,湖南 长沙 410013
[ "王小峰(1982- ),男,江苏南通人,博士,国防科技大学研究员,主要研究方向为密码学、网络信任安全、智能数据安全。" ]
[ "叶军(1985- ),男,湖南长沙人,湖南安方信息技术有限公司高级工程师,主要研究方向为无线网络安全和数据安全。" ]
[ "刘文正(1991- ),男,湖南浏阳人,博士,长沙理工大学副教授、硕士生导师,主要研究方向为人工智能和大数据安全。" ]
[ "孙兵(1981- ),男,江苏如皋人,博士,国防科技大学教授、博士生导师,主要研究方向为对称密码算法设计、密码安全分析。" ]
[ "吴华晖(1979- ),男,湖南邵阳人,湖南省农村信用社联合社工程师,主要研究方向为金融数字化转型、数据治理体系建设、数据安全应用。" ]
[ "郭佳朴(1993- ),男,河南许昌人,国防科技大学工程师,主要研究方向为网络安全、公钥密码和网络身份认证。" ]
收稿:2026-01-21,
修回:2026-03-20,
录用:2026-03-20,
纸质出版:2026-04-20
移动端阅览
王小峰,叶军,刘文正等.FR-FPE:有限基保留格式加密算法[J].通信学报,2026,47(04):54-66.
Wang Xiaofeng,Ye Jun,Liu Wenzheng,et al.FR-FPE: finite radix oriented format-preserving encryption algorithm[J].Journal on Communications,2026,47(04):54-66.
王小峰,叶军,刘文正等.FR-FPE:有限基保留格式加密算法[J].通信学报,2026,47(04):54-66. DOI: 10.11959/j.issn.1000-436x.2026080.
Wang Xiaofeng,Ye Jun,Liu Wenzheng,et al.FR-FPE: finite radix oriented format-preserving encryption algorithm[J].Journal on Communications,2026,47(04):54-66. DOI: 10.11959/j.issn.1000-436x.2026080.
针对现有保留格式加密算法难以应对滑动关联及线性密码分析攻击且效率不高的问题,提出了有限基保留格式加密FR-FPE算法。通过设计基于CBC模式的参数向量加密机制和结构化调整参数全关联加密模型,有效抵御滑动关联及线性密码分析攻击。通过设计轻量化确定性加密结构,支持对不超过192 bit的明文和96 bit的调整参数进行加密,在保证算法与NIST FF1相同安全强度的同时,分组加密的调用次数比FF1减少45%(9次)。基于Game-Hopping博弈模型,给出了FR-FPE算法强伪随机置换(SPRP)安全性证明,并量化分析了算法抵御滑动关联及线性密码分析攻击的能力。实验结果表明,针对radix=36的数字字母混合数据集,FR-FPE的每秒加密次数比FF1平均高26.55%,加密数据吞吐率平均高21.25%。
Existing format-preserving encryption algorithms were vulnerable to slide attack and linear cryptanalysis attack
and had low efficiency. A finite radix oriented format-preserving encryption (FR-FPE) algorithm was proposed. It designed a CBC mode based on initial vector encryption mechanism and a fully associated encryption model with structured tweak parameters
which could effectively defend against slide attack and linear cryptanalysis attack. A lightweight and deterministic encryption structure was designed to support plaintexts up to 192 bit and tweak parameters up to 96 bit. While ensuring the same security strength as NIST FF1
the number of block encryption calls was reduced by 45% (9 times) compared with FF1. Based on the Game-Hopping game model
the security proof of strong pseudorandom permutation (SPRP) for the FR-FPE algorithm was given
and the ability of the algorithm to resist sliding attacks and linear cryptanalytic attacks was quantitatively analyzed. Experimental results show that for a mixed alphanumeric dataset with radix=36
FR-FPE achieves an average increase of 26.55% in encryption times per second and 21.25% in encrypted data throughput compared to FF1.
National Bureau of Standards . FIPS PUB 74, guidelines for implementing and using the DES data encryption standard [S ] . 1981 .
Black J , Rogaway P . Ciphers with arbitrary finite domains [C ] // Topics in Cryptology-CT-RSA 2002 . Berlin : Springer , 2002 : 114 - 130 .
Dworkin M . NIST SP 800-38G, recommendation for block cipher modes of operation: methods for format-preserving encryption [S ] . 2013 .
ANSI X9.124-1-2023 . Symmetric key cryptography for the financial services industry format preserving encryption - Part 1: definitions and mode [S ] . 2023 .
Lee J K , Koo B , Roh D , et al . Format-preserving encryption algorithms using families of tweakable blockciphers [C ] // Information Security and Cryptology - ICISC 2014 . Berlin : Springer , 2015 : 132 - 159 .
Jang W , Lee S Y . Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment [J ] . International Journal of Distributed Sensor Networks , 2020 , 16 ( 3 ): 155014772091477 .
Kim D , Kim H , Jang K , et al . Deep-learning-based neural distinguisher for format-preserving encryption schemes FF1 and FF3 [J ] . Electronics , 2024 , 13 ( 7 ): 1196 .
Majeed M A , Sulaiman R , Shukur Z . New text steganography technique based on part-of-speech tagging and format-preserving encryption [J ] . KSII Transactions on Internet and Information Systems , 2024 , 18 : 170 - 191 .
Vidhya S . Enhancing cloud security for structured data: an AES-GCM based format-preserving encryption approach [C ] // Artificial Intelligence Based Smart and Secured Applications . Berlin : Springer , 2025 : 196 - 205 .
Amon O , Dunkelman O , Keller N , et al . Three third generation attacks on the format preserving encryption scheme FF3 [C ] // Advances in Cryptology - EUROCRYPT 2021 . Berlin : Springer , 2021 : 127 - 154 .
Beyne T . Linear cryptanalysis of FF3-1 and FEA [C ] // Advances in Cryptology - CRYPTO 2021 . Berlin : Springer , 2021 : 41 - 69 .
Spies T . Format preserving encryption [R ] . 2008 .
Bellare M , Rogaway P , Spies T . The FFX mode of operation for format-preserving encryption [R ] . Unpublished NIST Proposal , 2010 .
Liskov M , Rivest R L , Wagner D . Tweakable block ciphers [C ] // Advances in Cryptology - CRYPTO 2002 . Berlin : Springer , 2002 : 31 - 46 .
李经纬 , 贾春福 , 刘哲理 , 等 . 基于k-分割Feistel网络的FPE方案 [J ] . 通信学报 , 2012 , 33 ( 4 ): 62 - 68 .
Li J W , Jia C F , Liu Z L , et al . FPE scheme based on k-splits Feistel network [J ] . Journal on Communications , 2012 , 33 ( 4 ): 62 - 68 .
Bellare M , Hoang V T , Tessaro S . Message-recovery attacks on feistel-based format preserving encryption [C ] // Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security . New York : ACM Press , 2016 : 444 - 455 .
Durak F B , Vaudenay S . Breaking the FF3 format-preserving encryption standard over small domains [C ] // Advances in Cryptology-CRYPTO 2017 . Berlin : Springer , 2017 : 679 - 707 .
刘哲理 , 贾春福 , 李经纬 . 保留格式加密技术研究 [J ] . 软件学报 , 2012 , 23 ( 1 ): 152 - 170 .
Liu Z L , Jia C F , Li J W . Research on the format-preserving encryption techniques [J ] . Journal of Software , 2012 , 23 ( 1 ): 152 - 170 .
Bellare M , Ristenpart T , Rogaway P , et al . Format-preserving encryption [C ] // Selected Areas in Cryptography . Berlin : Springer , 2009 : 295 - 312 .
Hoang V T , Miller D , Trieu N . Attacks only get better: how to break FF3 on large domains [C ] // Advances in Cryptology - EUROCRYPT 2019 . Berlin : Springer , 2019 : 85 - 116 .
Hoang V T , Tessaro S , Trieu N . The curse of small domains: new attacks on format-preserving encryption [C ] // Advances in Cryptology-CRYPTO 2018 . Berlin : Springer , 2018 : 221 - 251 .
Biryukov A , Wagner D . Slide attacks [C ] // Fast Software Encryption: 6th International Workshop , FSE’ 99 . Berlin : Springer , 1999: 245 - 259 .
Patarin J . Security of random feistel schemes with 5 or more rounds [C ] // Advances in Cryptology-CRYPTO 2004 . Berlin : Springer , 2004 : 106 - 122 .
Matsui M . Linear cryptanalysis method for DES cipher [C ] // Advances in Cryptology - EUROCRYPT’93 . Berlin : Springer , 1994 : 386 - 397 .
0
浏览量
16
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构
京公网安备11010602201714号