Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption Method of Inner Round Permutation Stream Cipher with Variable Key

An encryption method and a technology of permutation streams, which are applied in the field of information security, can solve the problems of poor internal scrambling effect, difficult internal operation of stream cipher encryption algorithm, and vulnerability to attacks.

Active Publication Date: 2015-11-18
GUILIN UNIV OF ELECTRONIC TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, the message sender and receiver share a seed key k through a secure channel. For each bit of plaintext xi, the sender uses a stream cipher encryption algorithm to generate a corresponding one-bit key stream zi, and then uses zi and The ciphertext yi is obtained by XORing the plaintext with xi, that is, After receiving yi, the receiver of the message uses the same method and the same key to generate the same key stream bit zi, and the plaintext xi can be recovered after XORing zi and yi, namely However, the internal operation of the traditional stream cipher encryption algorithm is not easy to realize, the internal scrambling effect is not good, and it is vulnerable to attacks. Therefore, the traditional stream cipher encryption algorithm needs to be further improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption Method of Inner Round Permutation Stream Cipher with Variable Key
  • Encryption Method of Inner Round Permutation Stream Cipher with Variable Key
  • Encryption Method of Inner Round Permutation Stream Cipher with Variable Key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] A method for encrypting an inner round permutation stream cipher with a variable key, comprising the following steps:

[0101] (1) Internal state initialization phase:

[0102] (1.1) Randomly select 3 to 8 32-bit seed keys K=(k 0 , k 1 ,...,k 7 ) and three 32-bit initial vectors v=(v 0 , v 1 , v 2 ), determine three 32-bit constant values ​​c=(c 0 , c 1 , c 2 ); Start two 32-bit count vectors t=(t 0 , t 1 ).

[0103] The seed key K=(k 0 , k 1 ,...,k 7 ) is 3×32 bits, then the seed key K=(k 0 , k 1 ,...,k 7 ) Randomly select the first 3 words, namely k 0 ,k 1 ,k 2 , and the remaining 5 characters are k 3 ,k 4 ,k 5 ,k 6 ,k 7 It is fixed as all zeros or all ones;

[0104] The seed key K=(k 0 , k 1 ,...,k 7 ) is 4×32 bits, then the seed key K=(k 0 , k 1 ,...,k 7 ) Randomly select the first 4 words, namely k 0 ,k 1 ,k 2 ,k 3 , the remaining 4 characters are k 4 ,k 5 ,k 6 ,k 7 It is fixed as all zeros or all ones;

[0105] Seed key K=(k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an inner wheel displacement flow password encryption method with a variable key. In the method, different mathematical operators are adopted, so that the confusion among key bits is realized rapidly; a bit mixing scrambling technique for combining ''longitudinal'' diffusion with ''transverse'' compression is adopted in the computation of key flow bytes; the key flow bytes are obtained by adopting a multi-wheel ''iteration'' method, so that attack resistance of an algorithm is ensured; a fixed constant is introduced, so that an inner wheel function structure is damaged, and slipping attacks are avoided; resistance to time-space compromise attack is ensured through the lengths of a seed key and an initial vector; operators of the algorithm appear alternately and are distributed uniformly, so that general side channel attack, particularly power analysis attacks can be resisted; an iteration internal state in which 15 wheels is adopted has sufficient robustness, so that the traditional differential attacks can be resisted sufficiently; the length of the seed key can be selected according to the safety strength; the algorithm is concise, and has high safety; and each key flow block is generated separately, so that the method is particularly suitable for parallel computation, is easy and rapid for realizing software and hardware, and is implemented flexibly on various platforms.

Description

technical field [0001] The invention relates to the field of information security, in particular to an encryption method of an inner round permutation stream cipher with a variable key. Background technique [0002] In the process of data transmission, some sensitive data needs to be encrypted to prevent the attacker from eavesdropping, so that the attacker can only eavesdrop on the ciphertext but cannot obtain any useful information, and only the legitimate receiver who has the key can decrypt and restore the real news. In data encryption algorithms, there are two types of encryption algorithms. One is the block encryption algorithm, and the other is the stream cipher encryption algorithm (also known as the sequence cipher). The encrypted data of the block encryption algorithm is of fixed length (divided into groups), while the encryption length of the stream cipher encryption algorithm is a value with a large variable range. The block cipher uses a certain size as the b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18H04L9/08
Inventor 丁勇韦永壮李新国丁继强官秀国
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products