Binary linear transformation method for diffusion layer in substitution-permutation network block encryption

A binary linear and permutation network technology, applied in electrical components, safety communication devices, digital transmission systems, etc., can solve problems such as inexhaustibility, high computational complexity, and failure to reach the theoretical optimal value, and achieve high operating efficiency, Achieve logical and simple effects

Inactive Publication Date: 2011-01-12
BEIHANG UNIV
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The upper bound of the number of branches of the 8×8 binary matrix has been proved to be 5, which cannot reach the theoretical optimal value of 9
Kanda et al. found 10080 8×8 binary matrices with 5 branches (MasayukiKanda, Youichi Takashima, Tsutomu Matsumoto, et al. A Strategy for Constructing Fast R...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary linear transformation method for diffusion layer in substitution-permutation network block encryption
  • Binary linear transformation method for diffusion layer in substitution-permutation network block encryption
  • Binary linear transformation method for diffusion layer in substitution-permutation network block encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention is further described by examples below, but it should be noted that the purpose of announcing the embodiments is to help further understand the present invention, but those skilled in the art can understand: without departing from the spirit of the present invention and the appended claims Various substitutions and modifications are possible within the scope. Therefore, the present invention should not be limited to the content disclosed in the examples, and the protection scope of the present invention is subject to the scope defined in the claims.

[0025] As we all know, it is difficult to generate all standard Latin squares of order 6 and above, and it can be said to be a historical problem. A processing method provided by this example is to first analyze the properties of the four heavy five elements, write four heavy five elements according to this property, and then convert it into the first four lines of the 8th-order Latin square, and fina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a binary linear transformation method for a diffusion layer in substitution-permutation network block encryption. The method mainly comprises the following steps of: transforming an 8-order Latin square to form a binary matrix, the Hamming weights of each row and each list of which are 8*8 of 5; and then detecting whether the matrix meets linear independence of random 3 lists, if passing the test, detecting whether the test of the matrix is reversible, if so, judging the matrix as a proper matrix. The invention provides a new binary linear transformation method for the diffusion layer in the substitution-permutation network block encryption; and the method has the advantages of simple implementation logic and high running efficiency, and meanwhile does not lose the attack resistance of a code structure.

Description

technical field [0001] The invention relates to a linear transformation method, in particular to a binary linear transformation method applied to a diffusion layer in substitution-permutation network block encryption. Background technique [0002] Information security itself covers a wide range, and from the perspective of security requirements, it involves information confidentiality, integrity, availability, authentication and non-repudiation. Among them, encryption technology is the core technology to ensure information security. Cryptographic technology mainly includes symmetric cryptographic algorithms and asymmetric cryptographic algorithms and protocols. Cryptographic algorithms are mainly divided into two categories: symmetric cryptographic algorithms and asymmetric cryptographic algorithms. A symmetric encryption algorithm means that the encryption key and the decryption key are the same, or knowing one of the keys is easy to derive the other key. Usually, the en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00
Inventor 郑志明高莹王钊邱望洁王文华张筱郭贵凤
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products