Method and table look-up device for encrypting and decrypting data by using symmetric cryptographic algorithm

A symmetric cryptographic algorithm, encryption and decryption technology, applied in the field of methods and table lookup devices, can solve problems such as unsatisfactory and occupying a lot of hardware resources

Active Publication Date: 2012-10-03
CHINA IWNCOMM
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0043] From the above description of the encryption and decryption implementation principles of the AES cipher algorithm, SM4 cipher algorithm, and Zu Chongzhi (ZUC) cipher algorithm, it can be seen that in the specific implementation process of encryption and decryption o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and table look-up device for encrypting and decrypting data by using symmetric cryptographic algorithm
  • Method and table look-up device for encrypting and decrypting data by using symmetric cryptographic algorithm
  • Method and table look-up device for encrypting and decrypting data by using symmetric cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0117] In this embodiment, an algorithm subunit uses a look-up table unit, as attached Figure 11 shown. Taking the standard symmetric encryption algorithm that requires the use of four S-boxes with 6-bit input and 4-bit output as an example, assuming that the total length of the input data of the algorithm subunit is 48 bits, the specific steps for implementing this application method are as follows:

[0118] (1) First determine that the S-box is an internal component of the symmetric encryption algorithm, and then determine that the type of S-box is 1, and the number of S-boxes is 4;

[0119] (2) Since the number of S boxes is greater than 1, S boxes can be reused;

[0120] (3) Select S-box multiplexing, and confirm that the number of S-boxes used is 3, then the maximum length of the input data of the table lookup unit is 18 bits;

[0121] (4) Divide the maximum length of the input data of the table lookup unit into three data units of 6 bits, determine that the first data...

Embodiment 2

[0127] This embodiment describes the application mode in which two or more algorithmic subunits share a table lookup unit, as shown in the attached Figure 12 shown. Taking the standard symmetric encryption algorithm that requires eight 8-bit input and 8-bit output S-boxes as an example, it has two algorithm subunits, and the total length of input data for each algorithm subunit is 32bits. The specific steps for implementing this application method are as follows:

[0128] (1) First determine that the S-box is an internal component of the symmetric encryption algorithm, and then determine that the type of S-box is 1, and the number of S-boxes is 8;

[0129] (2) Since the number of S boxes is greater than 1, S boxes can be reused;

[0130] (3) Select S-box multiplexing, and confirm that the number of S-boxes used is 2, then the maximum length of the input data of the table lookup unit is 16 bits;

[0131] (4) Divide the maximum length of the input data of the table lookup uni...

Embodiment 3

[0136] This embodiment describes the application mode in which two or more algorithmic subunits independently use a table lookup unit, as shown in the attached Figure 13 shown. Taking the standard symmetric encryption algorithm that requires eight 8-bit input and 8-bit output S boxes as an example, it has two algorithm subunits, and the total length of input data for each algorithm subunit is 32bits. The specific steps for implementing this application method are as follows:

[0137] (1) First determine that the S-box is an internal component of the symmetric encryption algorithm, and then determine that the type of S-box is 1, and the number of S-boxes is 8;

[0138] (2) Since the number of S boxes is greater than 1, S boxes can be reused;

[0139] (3) Choose to reuse the S box;

[0140] (4) Determine the table lookup unit used by the first algorithm subunit, the specific steps are as follows:

[0141] a. Make sure that the number of S boxes used is 2, then the maximum le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a table look-up device for encrypting and decrypting data by using a symmetric cryptographic algorithm. The method comprises the following steps of: determining all types of S boxes required to be used when the S boxes are required to be used for table look-up in the symmetric cryptographic algorithm; determining the total amount Ni of the S boxes of each type, and when Ni is more than 1, determining that the S boxes of the type satisfy a multiplexing condition; and when the data are encrypted and decrypted by using the symmetric cryptographic algorithm, multiplexing the S boxes of at least one type satisfying the multiplexing condition. By the method and the device, occupation of the symmetric cryptographic algorithm on hardware resources can be reduced under the condition that the hardware resources are relatively constrained.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for encrypting and decrypting data using a symmetric cryptographic algorithm and a table look-up device. Background technique [0002] Symmetric cryptographic algorithm is a cryptographic system that uses the same key for encryption and decryption, and it is mainly used in the encryption and decryption processing functions of data information. In some specific application situations, symmetric cryptographic algorithms are implemented in hardware systems. When hardware resources are relatively tight, reducing the occupation of hardware resources by symmetric cryptographic algorithms becomes the primary consideration in the design of algorithm implementation schemes. [0003] In the structure of symmetric cryptographic algorithm, the S box (Sbox) is usually a necessary functional component in the symmetric cryptographic algorithm. The S box mainly realizes the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/06H04L9/0631G09C1/00H04L9/065H04L9/16H04L9/3263H04L2209/122
Inventor 李志勇曹军颜湘
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products