Device and method for implementing AES encryption and decryption

An encryption and decryption technology to be encrypted, applied in the field of encryption and decryption, it can solve the problems of inability to realize resource sharing and huge hardware overhead, and achieve the effect of reducing scale and saving hardware resources.

Inactive Publication Date: 2011-04-27
ZTE CORP
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, for 128-bit AES encryption and decryption, the 128-bit data has a total of 16 bytes. When performing a transformation, both encryption and decryption need to use 16 substitution tables. In addition, 4 more tables are needed in the round key expansion part. A replacement table,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for implementing AES encryption and decryption
  • Device and method for implementing AES encryption and decryption
  • Device and method for implementing AES encryption and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0028] The Rijndael algorithm is a block encryption algorithm with variable block length and variable key length. The block length and key length can be independently set to any integer multiple of 32 bits, and the minimum value is 128 bits. The maximum value is 256 bits, that is, both the data length and the key length can be 128 bits, 192 bits and 256 bits.

[0029] AES is actually a special case of Rijndael. In its specification standard, it is clearly defined that the data packet length is fixed at 128 bits, and the key length can be 128 bits, 192 bits or 256 bits, which are called "AES-128", " AES-192" and "AES-256". The present invention is described by taking "AES-128" as an example.

[0030] The input and output of AES can be regarded as a one-dimensional array in bytes. The intermediate value obtained by data processing in the pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a device and a method for implementing AES (advanced encryption standard) encryption and decryption. The method comprises the following steps of: receiving data to be encrypted or decrypted, and copying the data to be encrypted or decrypted into a state matrix; adding the state matrix and an initial key; performing Nr-1 round transformation on the state matrix added with the initial key; and performing incomplete round transformation on the state matrix subjected to Nr-1 round transformation so as to complete the encryption or decryption processing, wherein Nr is the round number required by encryption and decryption. The invention provides a device and a method for implementing AES encryption and AES decryption; meanwhile, the circuit scale can be greatly reduced.

Description

technical field [0001] The invention belongs to the technical field of encryption and decryption, and in particular relates to a device and a method for realizing an AES (Advanced Encryption Standard, Advanced Encryption Standard) encryption and decryption algorithm. Background technique [0002] With the rapid development of network technology, communication technology and multimedia technology, information technology represented by the Internet and mobile communication has completely penetrated into people's daily life. The ensuing information security problem has become an urgent problem that people need to solve. Information security needs to rely on security mechanisms, and security mechanisms mainly rely on cryptography, which is the core technology of information security. The use of safe and efficient encryption algorithms is the key to ensuring information security, so the research on encryption algorithms and their implementation has strong practical significance....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/0681H04L2209/122H04L9/0631
Inventor 范艳芳赵博生
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products