Block encryption apparatus, block encryption method and program

A block encryption and encryption key technology, which is applied in the field of block encryption devices, can solve problems such as insecurity, and achieve the effect of sufficient distance reduction

Active Publication Date: 2012-07-18
NEC CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Here, Mix is ​​a linear transformation of kn bits, but since Mix does not have different inter-block influences under the permutation based on n-bit block units, it is not safe under any circumstances.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block encryption apparatus, block encryption method and program
  • Block encryption apparatus, block encryption method and program
  • Block encryption apparatus, block encryption method and program

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0074] Next, a first embodiment of the present invention will be described in detail with reference to the drawings. figure 1 [Struc1] is a diagram showing the configuration of the first embodiment of the present invention. figure 2 [Block1] is a diagram showing the configuration of the first embodiment of the present invention using processing blocks.

[0075] refer to figure 2 , represents the block encryption device 10 including the following units: an input unit 100 , a key amplification unit 101 , a Feistel replacement unit 102 for R rounds, a block replacement unit 103 for R−1 rounds, and an output unit 104 .

[0076] The block encryption device 10 can be realized by various information processing devices including a CPU, a memory, a magnetic disk, and the like. In addition, each of the above-described units of the block encryption device 10 can be realized by storing a program in a disk in advance and operating the program on the CPU.

[0077] Next, each of the ab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Pseudo randomness and strong pseudo randomness are efficiently achieved in block encryption based on a generalized Feistel network. When a plaintext consisting of k blocks each having n bits is encrypted, Feistel substitution is applied to the plaintext with respect to each 2n bits. Then, substitution in units of blocks is applied thereto which is based on a binary de Bruijn graph symmetrically colored in accordance with a rule called type-2 branch coloration. One round is defined as a combination of one operation of the Feistel substitution and one operation of the substitution in the units of blocks. A ciphertext is outputted after this round is repeated a predetermined number of times.

Description

technical field [0001] [Remarks for related application] [0002] The present invention claims the priority of Japanese Patent Application: Japanese Patent Application No. 2009-246307 (applied on October 27, 2009), and the entire description content of this application is cited and described in this specification. [0003] The present invention relates to a block encryption device, a block encryption method, and a program, and more particularly, to a block encryption apparatus, a block encryption method, and a program using Feistel permutation. Background technique [0004] The so-called block encryption is a kind of common key encryption, which is a technique of encrypting plaintext (plaintext) of a certain block size using a key (key). As a typical configuration method of block encryption, there is a method using Feistel permutation. In Feistel permutation, one block is divided into two unit blocks A and B, one unit block A is input to a non-linear function with a key ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06G09C1/00
CPCH04L9/0625
Inventor 峰松一彦
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products