Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing lightweight authenticated encryption by using symmetric cryptographic algorithm

A symmetric cryptographic algorithm and lightweight authentication technology, which is applied in the field of implementing lightweight authentication and encryption using symmetric cryptographic algorithms, and can solve problems such as increasing costs.

Inactive Publication Date: 2012-09-26
武传坤
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The authentication of the SIM card is one of the typical applications that use symmetric cryptography to achieve authentication, but in many sensor network and RFID node applications, using a specially designed cryptographic algorithm independent of the encryption algorithm to achieve authentication will increase a lot of costs, and even cannot be tolerated
Moreover, the SIM card in the GSM system can only complete one-way authentication, while many sensor networks and RFID application systems require two-way authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing lightweight authenticated encryption by using symmetric cryptographic algorithm
  • Method for realizing lightweight authenticated encryption by using symmetric cryptographic algorithm
  • Method for realizing lightweight authenticated encryption by using symmetric cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Embodiment 1 (design of a cryptographic module): Assume that the encryption algorithm is Zu Chongzhi's encryption algorithm ZUC, and the encryption algorithm and the decryption algorithm are completely the same at this time, so we use ZUC to represent the encryption algorithm E and the decryption algorithm D. The counter Ctr is an array of 64 bits (that is, 8 bytes). We assume that the input data character format and meaning are as follows:

[0053] The first bit: 1 means encryption, 0 means decryption;

[0054] The second bit: 1 means the first request, 0 means the request continues;

[0055] The third bit: 1 means that there is an initial vector, and 0 means that there is no initial vector;

[0056] Specifically we have:

[0057] 111: Encrypted request, the first request, with an initial vector;

[0058] 110: encrypted request, first request, no initialization vector

[0059] 100: Encrypted request, request again;

[0060] 011: Decryption request, the first requ...

Embodiment 2

[0077] Embodiment 2 (application of cryptographic module):

[0078] Assuming that the user U has a cryptographic module as described in Embodiment 1, a two-way secure communication is established between the server S and the user U. In the early stage of system use, the server and the user share a preset initial key k0. After the system is enabled, the server hopes to update the user's long-term key. Of course, the server can update the user's long-term key at any time through instructions. key.

[0079] The key update (including counter update) protocol flow is as follows: the server selects a 128-bit key1 and a 64-bit counter value Ctr1, and sends (Uid, 001xxxxx, Ctr1, ciphertext c, verification ciphertext vc) to the user, where Uid is the user identification, verify ciphertext After receiving the instruction from the server, the user sends the part except Uid to the cryptographic module, and the cryptographic module judges that this is a system initialization instructi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing lightweight authenticated encryption by using a symmetric cryptographic algorithm. The composition and using method of an encryption module, the composition and using method of a decryption module, and the using method of a password module integrating the encryption module and the decryption module when confidentiality and authentication are realized are included. Through skillfully using a counter, the authentication function can be realized without information interaction while data is encrypted; and a replay attack can be effectively resisted. By combining the lightweight authenticated encryption algorithm, the method is suitable for an energy limited environment such as a wireless sensor and an RFID (Radio Frequency Identification Device).

Description

technical field [0001] The invention relates to the use of cryptographic algorithms and the realization of lightweight authentication and encryption functions, and is suitable for providing low-energy authentication and encryption functions for devices with limited energy in the Internet of Things system. Background technique [0002] With the development of communication networks and the reduction of the cost of communication equipment, communication has become an essential element in people's lives. The development of the Internet of Things industry has enabled the wider use of wireless communication and lightweight cryptography. In traditional secure communication, the basic function of a cryptographic module is to implement cryptographic algorithms, including encryption and decryption algorithms, message integrity algorithms, and digital signature algorithms. As a crucial authentication issue in secure communication systems, traditionally digital signatures are often us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 武传坤
Owner 武传坤