Method for constructing block encryption algorithm based on random function

A random function and construction method technology, applied in the field of information security, can solve problems that are difficult for cryptanalysts

Active Publication Date: 2012-07-11
桂林碧琪信息科技有限公司
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the function corresponding to an encryption algorithm is ra

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The following is an embodiment of block cipher construction. For convenience and concise description, an algorithm with relatively short keys, short keys, and fewer rounds is used, and the structure of the existing AES algorithm is imitated.

[0014] The construction process of this embodiment is as follows:

[0015] First, design a random encryption algorithm: the constructed block encryption algorithm is a block length and a narrow key K 2The length of the cryptographic algorithm is 128bit, and the number of iterations is 10. The specific implementation process of the algorithm is as follows: 1. Design a random function component for key expansion. The random function component has 8 specific forms. The random function consists of K 2 To generate a sequence, these sequences sequentially intercept the number of bits of the packet length as the round key of each round, and the round key is used to participate in the key addition operation. 2. The initial round is 1 ro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information security and relates to construction of encryption algorithm. The password (encryption) algorithm is uncertain and random by using the random function to construct the block encryption method. The uncertainties are determined by partial data in the secret key and some information of plaintext. The encryption method has the advantage that the indeterminacy of the algorithm ensures that the password analysis becomes very difficult as a result of the lack of the information about the algorithm, so that a great amount of known (selected) plaintext ciphertext pair of the same algorithm and the same secret key cannot be acquired, and the condition for password analysis is destroyed to enhance the security. The existing abundant password analysis aims at determined algorithm, and the password analysis is difficult to perform when the algorithm is random. The uncertainty of the password system is increased through multiple ways. The encryption algorithm of the plaintext is uncertain, and the algorithms of different blocks are different, therefore, the secret key space can be increased so as to enhance the safety.

Description

technical field [0001] The invention belongs to the field of information security, and relates to a construction method of a class of encryption algorithms, in particular to a construction method of a block encryption algorithm. Background technique [0002] Existing encryption systems are all based on definite encryption algorithms. Although they are convenient, widely used and standardized, and easy to be widely evaluated, these algorithms have a very clear and fixed structure, only plaintext, key and Some parameters are changed, and they all participate in the calculation under the fixed algorithm framework to obtain the ciphertext. These constraints on the degree of freedom of the cryptographic system also have a negative impact on the security of the cryptosystem. A large number of cryptanalysis is also aimed at the situation determined by the algorithm, and these analyzes have assumed that the algorithm is already known. We can think of a deterministic algorithm as a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 王勇
Owner 桂林碧琪信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products