Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key expanding method for encrypting block cipher

A key expansion, block cipher technology, applied in the field of data encryption and decryption, can solve the problems of not being able to resist cryptanalysis, reducing practicability, and not being able to achieve high-speed, synchronous encryption and decryption.

Inactive Publication Date: 2012-07-04
BEIHANG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key expansion algorithms of many typical cryptographic algorithms, such as AES, IDEA, KASUMI, and SHACAL, cannot resist specific cryptanalysis, such as key-related attacks that specifically target key expansion algorithms for cryptanalysis. and its joint attack
Some algorithms, such as RC6 and MAPRS, require a large amount of computing and storage resources when implemented, which greatly reduces their practicability. In the case of resource constraints, they cannot achieve high-speed, synchronous encryption and decryption operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key expanding method for encrypting block cipher
  • Key expanding method for encrypting block cipher
  • Key expanding method for encrypting block cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following describes technical details such as steps, schemes and other technical details of generating 8 rounds of block cipher algorithms with a key length of 256 bits and whitening subkeys through a 256-bit seed key, so as to provide a thorough understanding of the present invention.

[0051] according to figure 1 implementation flow chart. The present invention implements the steps of initialization, key iterative generation algorithm and sub-key selection algorithm in sequence.

[0052] In the initialization, the 256-bit seed key is written into the array in sequence: W[0], W[1], W[2], W[3], W[4], W[5], W[6], W[7], as input. W[8], W[9], ..., W[79] are used to store the subkeys generated by extension.

[0053] The extended key is iteratively generated by the subkey iterative algorithm, the principles and methods of the extended structure design, iterative function design and constant design are as described in the content of the invention, and the iterative pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key expanding method for a block cipher algorithm, which is used for generating each round of subkeys in the block cipher algorithm. The method provided by the invention mainly comprises the following step of calculating an iteration function for generating a subkey, wherein the iteration function is formed by a nonlinear operation, a constant operation and a cycle shift operation. The method provided by the invention can effectively and conveniently generate the subkeys, effectively reduce storage space, has higher realizing speed compared with a common commercial block cipher algorithm, can meet the requirements on real-time encryption and decryption, and simultaneously has higher safety.

Description

technical field [0001] The invention relates to a data encryption and decryption method, in particular to a key expansion method of a block cipher algorithm, which is used to generate each wheel key of the block cipher algorithm. Background technique [0002] With the rapid development of computer technology in the information age, block ciphers have become the core cryptographic algorithm for data encryption, message authentication, authentication, and key management in the field of information security because of their fast speed, easy standardization, and easy hardware and software implementation. Widely used in other fields. [0003] The block cipher algorithm is to group the original data sequence (that is, plaintext) that needs data protection, and perform an encryption operation on each group under the action of a key, and convert the plaintext into unrecognizable irregular data (that is, ciphertext). The ciphertext is transmitted to ensure data security, and the dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 郑志明张筱高莹王钊邱望洁王文华
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products