Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

AES (Advanced Encryption Standard) key expansion method

A key expansion and key technology, applied in the field of AES key expansion, can solve the problems of long time required, unfavorable parallel implementation, etc., and achieve the effects of reducing correlation, reducing correlation, and increasing the difficulty of deciphering

Inactive Publication Date: 2013-04-17
SHANDONG SINOCHIP SEMICON
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In addition, in the process of hardware implementation, the existing AES expansion algorithm uses an iterative algorithm, which takes a long time to complete each expansion, and each operation is in a serial relationship, which is not conducive to parallel implementation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AES (Advanced Encryption Standard) key expansion method
  • AES (Advanced Encryption Standard) key expansion method
  • AES (Advanced Encryption Standard) key expansion method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Without showing the corresponding principle more clearly, an existing AES key expansion method is described first.

[0024] It should be noted that there are three kinds of password lengths currently supported by AES, which are 128, 192 and 256 bits (bits). Therefore, the key is 4Byte, which is 32 bits, so 128 corresponds to 4 keys, and 192 corresponds to 6 keys, and 256 corresponds to 8 keys.

[0025] Refer to the attached figure 1 In the circuit structure shown, there are at most 8 keys in each round, corresponding to W[0] to W[7] respectively, in figure 1 In the structure shown, 10 inputs need to be configured, that is, each round needs to correspond to 10 keys, and the circuit is relatively complicated and the circuit area is relatively large.

[0026] Further, see the attached figure 1 , the existing AES password extension method has the following characteristics:

[0027] Existing AES128 key extension method

[0028]

[0029] Existing AES192 key extension ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an AES (Advanced Encryption Standard) key expansion method, which is realized through computation among keys and then through certain iteration instead of simple iteration based on the previous key. Therefore, the correlation between single key iteration and previous input is reduced and the deciphering difficulty is increased; and since the correlation between the previous key and the latter key is reduced, the time sequence of the entire circuit is effectively improved.

Description

technical field [0001] The present invention relates to an AES key expansion method, wherein AES is the abbreviation of Advanced Encryption Standard, ie Advanced Encryption Standard, refer to GB / T 17964-2008. Background technique [0002] AES is the Advanced Encryption Standard in cryptography and a block encryption standard adopted by the US federal government. This standard is used to replace the earlier DES (Data Encryption Standard, Data Encryption Standard), which has been analyzed by many parties and is widely used all over the world. After a five-year selection process, the Advanced Encryption Standard was published by the National Institute of Standards and Technology (NIST) in FIPS PUB 197 on November 26, 2001, and became an effective standard on May 26, 2002. In 2006, Advanced Encryption Standard became one of the most popular algorithms in symmetric key encryption. [0003] The basic requirement of AES is to adopt a symmetric block cipher system, the minimum sup...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 刘大铕高美洲孙晓宁李杨张洪柳周思远
Owner SHANDONG SINOCHIP SEMICON
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products