Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Nonlinear transformation method for symmetric key encryption and implementation method thereof

A technology of symmetric key encryption and nonlinear transformation, applied in the field of information security

Inactive Publication Date: 2011-04-06
BEIHANG UNIV
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the theoretical security of the algorithm and the actual implementation performance are often a pair of contradictions, how to find a balance point is a very complicated issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Nonlinear transformation method for symmetric key encryption and implementation method thereof
  • Nonlinear transformation method for symmetric key encryption and implementation method thereof
  • Nonlinear transformation method for symmetric key encryption and implementation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with specific examples.

[0039] The hardware implementation of the S-box provided by the present invention can use the composite domain method, its algebraic structure, and the hardware implementation adopts the relationship between the computing structure of the composite domain method and the simplified computing structure such as figure 2 As shown, according to the simplified structure, image 3 The overall design drawing is given, which can be divided into the following three parts:

[0040] 1. Perform a linear transformation T on the input 8-bit data, and its matrix form is:

[0041] T · x = 0 0 1 0 0 0 0 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a nonlinear transformation method and a nonlinear transformation device for symmetric key encryption. Nonlinear transformation can be used directly as an S box; the S box uses function complex affine transformation in a finite field; and on the basis of keeping the original structure and code cryptographic characteristics of the S box of advanced encryption standard (AES), by increasing the times of nonlinear operation, the algebraic immunity of the S box is improved without reducing the complexity of the implementation mode of complex field hardware of the S box. The invention also provides a method for implementing the hardware of the S box. In the method, the complex field representation of elements is introduced, the inversion of an original field is converted into the inversion of a complex field, a plurality of linear and affine transformations are combined, and sub-field operations involved in the inversion of the complex field, such as multiplication, square operation, constant multiplication and inversion are all converted into inter-bit exclusive or operation and and operation. The whole S box hardware implementation process only requires a simple logic gate circuit, table lookup is avoided, hardware implement expense is reduced and the path delay is reduced.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to the design of a non-linear transformation (S-box) in a block cipher algorithm and its composite domain hardware implementation. Background technique [0002] Information security involves the confidentiality, integrity and authentication of information. Among them, cryptographic theory is the basis of information security. Cryptographic algorithms are mainly divided into two categories: symmetric cryptographic algorithms and asymmetric cryptographic algorithms. A symmetric encryption algorithm means that the encryption key and the decryption key are the same, or knowing one of the keys is easy to derive the other key. Usually, the design of a symmetric cryptographic algorithm should not only consider the security strength of the algorithm, but also pay attention to the implementation performance of the algorithm: software implementation performance and hardware i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 郑志明王钊邱望洁王文华张筱高莹郭炳晖
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products