Expansion system and method for 256-bit keys

A key expansion, bit-bit technology, applied in the field of key expansion, data encryption, and network communication in the advanced encryption standard AES, can solve the problems of increasing encryption time, large data volume, and reducing the efficiency of the encryption process, and achieves simplified judgment. Conditions, the effect of reducing the number of loops

Inactive Publication Date: 2012-08-22
XIDIAN UNIV
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] There are currently two widely used key expansion methods: one is the real-time key expansion method used in "A Rijndael Cryptoprocessor Using Shared On-the-fly Key Scheduler", that is, the key expansion unit performs key expansion at the same time Provide a round key for the encryption process; the disadvantage of this method is that the round key cannot be reused, so for occasions where the amount of data is large and the round key needs to be used continuously, the power consumption caused by the continuous execution of the key expansion operation is relatively large; The other is the pre-key expansion method used in "An Optimized FPGA Implementation Method of AES Algorithm", that is, the key expansion is performed first to generate all the round keys and stored in the memory, and then encrypted; in this method In the process of encryption, since the encryption process can only be performed after the key expansion is completed, the time required for encryption is increased and the efficiency of the entire encryption process is reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Expansion system and method for 256-bit keys
  • Expansion system and method for 256-bit keys
  • Expansion system and method for 256-bit keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] refer to figure 1 , the present invention is based on the advanced encryption standard AES 256-bit key expansion system comprising: expansion counting unit 1, temporary storage unit 2, round key storage unit 3, cycle register 4, word cycle unit 5, replacement register 6, byte Replacement unit 7, S box unit 8, wheel constant selection unit 9, exclusive OR register unit 10, exclusive OR unit 11, loop control unit 12, the S box unit 8 includes 4 pre-stored ROMs with S boxes: No. 0 ROM, No. 1 ROM, No. 2 ROM and No. 3 ROM; the XOR register unit 10 includes 8 registers with a bit width of 32 bits: No. 0 register, No. 1 register, No. 2 register, No. 3 register, No. 4 register, No. 5 register, No. 6 register and No. 7 register; the XOR unit 11 includes 8 XOR subunits: No. 0 XOR subunit, No. 1 XOR subunit, No. 2 XOR subunit, No. 3 XOR subunit Subunit, No. 4 XOR subunit, No. 5 XOR subunit, No. 6 XOR subunit and No. 7 XOR subunit. in:

[0076] The extended counting unit 1 is us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an expansion system and a method for 256-bit keys based on an advanced encryption standard (AES), and mainly solves the problems of low efficiency and high power consumption in a key expansion process in the existing 256-bit AES. The process includes storing an initial key in the first round of key expansion, taking the first four rows as a round key of the key expansion in the first round, and performing word cycle, byte replacement, and bitwise XOR operations; executing a new byte replacement and a secondary bitwise XOR operation according to serial number n; taking results of the two bitwise XOR operations as a round key and storing in a local register and an external storage cell for the usage of encryption process reading; and repeating the operations for round keys obtained in a former round in following rounds until 14 round keys are obtained, and finishing key expansion. According to the expansion system and the method for the 256-bit keys, instantaneity of key expansion and reusability of round keys are achieved simultaneously, key expansion with high efficiency and low power consumption is achieved, and the expansion system and the method are suitable for key expansion processes of the 256-bit AES.

Description

technical field [0001] The invention belongs to the technical field of safety, relates to data encryption, in particular to a key expansion method in the Advanced Encryption Standard AES, which can be used for network communication. Background technique [0002] The Advanced Encryption Standard AES is an encryption algorithm published by NIST in November 2001 to replace the data encryption standard DES. At present, the AES algorithm has been widely used in high-end products such as encryption protocols, communication terminals and servers. [0003] The AES algorithm adopts a subset of the Rijnddel symmetric key algorithm, and supports groups with a length of 128 bits and keys with lengths of 128, 192, and 256 bits. The algorithm obtains the round key by performing key expansion on the initial key, and uses the round key to encrypt and decrypt 128-bit data blocks. [0004] In the AES algorithm, depending on the length of the initial key, the number of rounds r of encryption...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 郝跃赵哲斐史江一邸志雄李康赵彦尚
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products