Method and table look-up device for encrypting and decrypting data by using symmetric cryptographic algorithm

A symmetric cryptographic algorithm, encryption and decryption technology, applied in the field of methods and table lookup devices, can solve problems such as occupying considerable hardware resources and unsatisfactory

Active Publication Date: 2015-03-11
CHINA IWNCOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0043] From the above description of the encryption and decryption implementation principles of the AES cipher algorithm, SM4 cipher algorithm, and Zu Chongzhi (ZUC) cipher algorithm, it can be seen that in the specific implementation process of encryption and decryption of each algorithm, a large number of S-boxes will be used, resulting in the use of hardware If the encryption and decryption are implemented, the S box part will take up quite a lot of hardware resources, which is not ideal when the hardware resources are relatively tight.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and table look-up device for encrypting and decrypting data by using symmetric cryptographic algorithm
  • Method and table look-up device for encrypting and decrypting data by using symmetric cryptographic algorithm
  • Method and table look-up device for encrypting and decrypting data by using symmetric cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0117] In this embodiment, an algorithm subunit uses a look-up table unit, as attached Figure 11 shown. Taking the standard symmetric encryption algorithm that requires the use of four S-boxes with 6-bit input and 4-bit output as an example, assuming that the total length of the input data of the algorithm subunit is 48 bits, the specific steps for implementing this application method are as follows:

[0118] (1) First determine that the S-box is an internal component of the symmetric encryption algorithm, and then determine that the type of S-box is 1, and the number of S-boxes is 4;

[0119] (2) Since the number of S boxes is greater than 1, S boxes can be reused;

[0120] (3) Select S-box multiplexing, and confirm that the number of S-boxes used is 3, then the maximum length of the input data of the table lookup unit is 18 bits;

[0121] (4) Divide the maximum length of the input data of the table lookup unit into three data units of 6 bits, determine that the first data...

Embodiment 2

[0127] This embodiment describes the application mode in which two or more algorithmic subunits share a table lookup unit, as shown in the attached Figure 12 shown. Taking the standard symmetric encryption algorithm that requires eight 8-bit input and 8-bit output S-boxes as an example, it has two algorithm subunits, and the total length of input data for each algorithm subunit is 32bits. The specific steps for implementing this application method are as follows:

[0128] (1) First determine that the S-box is an internal component of the symmetric encryption algorithm, and then determine that the type of S-box is 1, and the number of S-boxes is 8;

[0129] (2) Since the number of S boxes is greater than 1, S boxes can be reused;

[0130] (3) Select S-box multiplexing, and confirm that the number of S-boxes used is 2, then the maximum length of the input data of the table lookup unit is 16 bits;

[0131] (4) Divide the maximum length of the input data of the table lookup uni...

Embodiment 3

[0136] This embodiment describes the application mode in which two or more algorithmic subunits independently use a table lookup unit, as shown in the attached Figure 13 shown. Taking the standard symmetric encryption algorithm that requires eight 8-bit input and 8-bit output S boxes as an example, it has two algorithm subunits, and the total length of input data for each algorithm subunit is 32bits. The specific steps for implementing this application method are as follows:

[0137] (1) First determine that the S-box is an internal component of the symmetric encryption algorithm, and then determine that the type of S-box is 1, and the number of S-boxes is 8;

[0138] (2) Since the number of S boxes is greater than 1, S boxes can be reused;

[0139] (3) Choose to reuse the S box;

[0140] (4) Determine the table lookup unit used by the first algorithm subunit, the specific steps are as follows:

[0141] a. Make sure that the number of S boxes used is 2, then the maximum le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a method for conducting data encryption and decryption using a symmetric cryptography algorithm and a table look-up device. The method comprises: when it is determined that it is required to use S-boxes to look up a table in a symmetric cryptography algorithm, determining all types of S-boxes to be used; for each type of S-box, determining the total number Ni of the type of S-box, and when Ni is larger than 1, determining that the type of S-box meets a multiplexing condition; and when data encryption and decryption are conducted using the symmetric cryptography algorithm, multiplexing at least one type of S-box which meets the multiplexing condition. The present application can reduce the occupation by the symmetric cryptography algorithm of hardware resources under the condition of comparative shortage of hardware resources.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for encrypting and decrypting data using a symmetric cryptographic algorithm and a table look-up device. Background technique [0002] Symmetric cryptographic algorithm is a cryptographic system that uses the same key for encryption and decryption, and it is mainly used in the encryption and decryption processing functions of data information. In some specific application situations, symmetric cryptographic algorithms are implemented in hardware systems. When hardware resources are relatively tight, reducing the occupation of hardware resources by symmetric cryptographic algorithms becomes the primary consideration in the design of algorithm implementation schemes. [0003] In the structure of symmetric cryptographic algorithm, the S box (Sbox) is usually a necessary functional component in the symmetric cryptographic algorithm. The S box mainly realizes the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L9/0631G09C1/00H04L9/065H04L9/16H04L9/3263H04L2209/122
Inventor 李志勇曹军颜湘
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products