Encryption method of block cipher

An encryption method and block cipher technology, applied in the field of information security encryption, can solve the problems of insufficient application security, slow algorithm speed, and failure to find a balance, etc., and achieve easy and fast implementation, high security, and safe and reasonable design Effect

Active Publication Date: 2007-08-08
MAYWIDE TECH
View PDF0 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Many algorithms ensure the security of the algorithm through a more complex logical structure, but the speed of the algorithm is slowed down, and it is difficult to implement the program or on a micro-circuit chip; some other algorithms have a simpler structure and ar

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method of block cipher
  • Encryption method of block cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Describe the present invention in detail below in conjunction with accompanying drawing.

[0028] With reference to accompanying drawing 1, in one embodiment of the present invention, the technical scheme that realizes the object of the invention comprises the following steps:

[0029] Step 1: Group the plaintext data into groups of fixed 128 bits, and put each plaintext group into 4 registers in turn, and each register stores 4 bytes. Set the number of key bytes N of each group of key K to 16, and the corresponding key group size is 128 bits.

[0030] Step 2: XOR each plaintext group with the corresponding key group bit by bit to obtain the changed intermediate plaintext group.

[0031] Step 3: Perform simple modulo 2 addition (exclusive OR) and circular shift operations on the data in each register.

[0032] Step 4: Set the nonlinear permutation model of the cipher block, and perform nonlinear permutation on the intermediate data.

[0033] Step 5: Perform a three-d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to one method for group coding on message data, which comprises the following steps: dividing groups and setting key; setting recycle displacement constant L and displacement parameter R for mode 2 and recycle displacement operation; setting and processing nonlinear conversion; setting and processing multi-dimensional conversion diffusion; setting codes formula wheel function; processing middle data as codes data set. The invention provides one group coding formula based on complete math theory.

Description

technical field [0001] The invention relates to the technical field of information security encryption, in particular to a method for forming an encryption code to protect information by using an electronic computer and encoding technology. Background technique [0002] With the rapid development and wide application of computer and data communication technology, the society relies more and more on the safe storage, safe processing and safe transmission of information, and the issue of information security protection becomes more important. Reliable encryption methods can make some sensitive and confidential information safely stored or transmitted on media without protective measures. [0003] The block cipher method is one of the modern cryptography techniques to solve the problem of information security protection. Its birth and development have important theoretical value and extensive application background. The promulgation of the American Data Encryption Standard DES...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/14
Inventor 柳毅汪剑刘金秀
Owner MAYWIDE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products