AES-based 192-bit key extension system and method

A key expansion and bit-bit technology, which is applied in data encryption, key expansion in Advanced Encryption Standard AES, and network communication, can solve the problems of increasing encryption time, large data volume, and large power consumption, and reduce the number of cycles , The effect of simplifying the judgment conditions

Inactive Publication Date: 2014-10-29
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] There are currently two widely used key expansion methods: one is the real-time key expansion method used in "A Rijndael Cryptoprocessor Using Shared On-the-fly Key Scheduler", that is, the key expansion unit performs key expansion at the same time Provide a round key for the encryption process; the disadvantage of this method is that the round key cannot be reused, so for occasions where the amount of data is large and the round key needs to be used continuously, the power consumption caused by the continuous execution of the key expansion operation is relatively large; The other is the pre-key expansion method used in "An Optimized FPGA Implementation Method of AES Algorithm", that is, the key expansion is performed first to generate all the round keys and stored in the memory, and then encrypted; in this method In the process of encryption, since the encryption process can only be performed after the key expansion is completed, the time required for encryption is increased and the efficiency of the entire encryption process is reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AES-based 192-bit key extension system and method
  • AES-based 192-bit key extension system and method
  • AES-based 192-bit key extension system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] refer to figure 1 , the present invention is based on the 192-bit key expansion system of the Advanced Encryption Standard AES, comprising: an expansion counting unit 1, a temporary storage unit 2, a round key storage unit 3, a loop register 4, a word loop unit 5, a replacement register 6, a byte Replacement unit 7, S box unit 8, wheel constant selection unit 9, exclusive OR register unit 10, exclusive OR unit 11, loop control unit 12, the S box unit 8 includes 4 pre-stored ROMs with S boxes: No. 0 ROM, No. 1 ROM, No. 2 ROM and No. 3 ROM; the XOR register unit 10 includes 6 registers with a bit width of 32 bits: No. 0 register, No. 1 register, No. 2 register, No. 3 register, No. 4 register and No. 5 register; the XOR unit 11 includes 6 XOR subunits: No. 0 XOR subunit, No. 1 XOR subunit, No. 2 XOR subunit, No. 3 XOR subunit, and No. 4 XOR subunit unit and No. 5 XOR subunit. in:

[0063] The extended counting unit 1 is used to add one to the serial number n, and output...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a 192 bit key expansion system and method based on an AES (Advanced Encryption Standard), which are used for mainly solving the problems of low efficiency and high power consumption of the traditional 192 bit AES encryption algorithm in a key expansion process. The method comprises the steps of: storing an initial key in a first turn of key expansion, taking the front four lines as turn keys of the turn of key expansion, carrying out word circulation, byte replacement and bitwise XOR operation; using results as the turn keys and storing the results in a local register and an external memory unit, reading by an encryption process; and finally, repeating the operation for the turn keys obtained in the former turn in each turn until all 12 turn keys are obtained, and ending the key expansion. The 192 bit secret key expansion system and method can be compatible with the instantaneity of the key expansion and the reusability of the turn keys, realize high-efficiency and low-consumption key expansion, and is suitable for a 192 bit key expansion process of the AES encryption algorithm.

Description

technical field [0001] The invention belongs to the technical field of safety, relates to data encryption, in particular to a key expansion method in the Advanced Encryption Standard AES, which can be used for network communication. Background technique [0002] In November 2001, the National Institute of Standards and Technology NIST of the US Department of Commerce published the Advanced Encryption Standard AES, which is an algorithm for unclassified encryption. Since its release, the AES algorithm has been widely used in high-end products such as encryption protocols, communication terminals, and servers. [0003] The AES algorithm adopts a subset of the Rijnddel symmetric key algorithm, and supports groups with a length of 128 bits and keys with lengths of 128, 192, and 256 bits. The algorithm obtains the round key by performing key expansion on the initial key, and uses the round key to encrypt and decrypt 128-bit data blocks. [0004] In the AES algorithm, depending ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 史江一赵哲斐郝跃邸志雄李康赵彦尚
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products