Method for constructing block encryption algorithm based on random function
A random function and construction method technology, applied in the field of information security, can solve problems that are difficult for cryptanalysts
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0013] The following is an embodiment of block cipher construction. For convenience and concise description, an algorithm with relatively short keys, short keys, and fewer rounds is used, and the structure of the existing AES algorithm is imitated.
[0014] The construction process of this embodiment is as follows:
[0015] First, design a random encryption algorithm: the constructed block encryption algorithm is a block length and a narrow key K 2The length of the cryptographic algorithm is 128bit, and the number of iterations is 10. The specific implementation process of the algorithm is as follows: 1. Design a random function component for key expansion. The random function component has 8 specific forms. The random function consists of K 2 To generate a sequence, these sequences sequentially intercept the number of bits of the packet length as the round key of each round, and the round key is used to participate in the key addition operation. 2. The initial round is 1 ro...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com