Encryption method based on algorithm transformation
An encryption method and algorithm transformation technology, applied in the field of information security, can solve problems such as increasing the amount of calculation, increasing the complexity and difficulty of deciphering, increasing the amount of encryption and decryption calculations, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0018] The following is an example of a block cipher. For convenience and concise description, a relatively short algorithm is adopted and the structure and specific encryption components of the AES algorithm that are already well known to the public are imitated. This algorithm adopts a triple transformation algorithm, which respectively adopts representative transformations, including selecting a function from multiple functions according to a part of the key, determining the order of the function components of the operation according to a part of the key, and One part determines the structure.
[0019] This embodiment is based on a cipher algorithm with 128 bits for both the packet length and the key length. The number of iterations is 10. In the original AES algorithm, except for the initial round and the end round, each round includes byte substitution and row Four steps: shift, column mixing and key addition. The end round consists of three steps: byte substitution, row sh...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com