Method for realizing lightweight authenticated encryption by using symmetric cryptographic algorithm
A symmetric cryptographic algorithm and lightweight authentication technology, which is applied in the field of implementing lightweight authentication and encryption using symmetric cryptographic algorithms, and can solve problems such as increasing costs.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] Embodiment 1 (design of a cryptographic module): Assume that the encryption algorithm is Zu Chongzhi's encryption algorithm ZUC, and the encryption algorithm and the decryption algorithm are completely the same at this time, so we use ZUC to represent the encryption algorithm E and the decryption algorithm D. The counter Ctr is an array of 64 bits (that is, 8 bytes). We assume that the input data character format and meaning are as follows:
[0053] The first bit: 1 means encryption, 0 means decryption;
[0054] The second bit: 1 means the first request, 0 means the request continues;
[0055] The third bit: 1 means that there is an initial vector, and 0 means that there is no initial vector;
[0056] Specifically we have:
[0057] 111: Encrypted request, the first request, with an initial vector;
[0058] 110: encrypted request, first request, no initialization vector
[0059] 100: Encrypted request, request again;
[0060] 011: Decryption request, the first requ...
Embodiment 2
[0077] Embodiment 2 (application of cryptographic module):
[0078] Assuming that the user U has a cryptographic module as described in Embodiment 1, a two-way secure communication is established between the server S and the user U. In the early stage of system use, the server and the user share a preset initial key k0. After the system is enabled, the server hopes to update the user's long-term key. Of course, the server can update the user's long-term key at any time through instructions. key.
[0079] The key update (including counter update) protocol flow is as follows: the server selects a 128-bit key1 and a 64-bit counter value Ctr1, and sends (Uid, 001xxxxx, Ctr1, ciphertext c, verification ciphertext vc) to the user, where Uid is the user identification, verify ciphertext After receiving the instruction from the server, the user sends the part except Uid to the cryptographic module, and the cryptographic module judges that this is a system initialization instructi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 