Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method for wireless local area network

A technology of wireless local area network and encryption method, applied in the field of encryption for wireless local area network, can solve the problems of large circuit implementation area and power consumption, unsatisfactory operation speed, high hardware overhead, etc., to improve encryption and decryption speed, simple design, hardware The effect of high utilization

Inactive Publication Date: 2013-08-28
苏州国芯科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the data is exposed to the air during transmission, it is easy to be intercepted by people with ulterior motives
[0003] At present, in the implementation methods of existing algorithms, most of them are realized by software method, which is simple and convenient, but its operation speed is not very ideal, it is difficult to meet the real-time needs, and the hardware implementation method has a large hardware overhead. The cost is too high, the circuit implementation area and power consumption are large, etc.
Moreover, as the society's demand for information security is getting higher and higher, it also poses great challenges to the circuit implementation of encryption algorithms and the management of keys. In practical applications, compared with the related performance of decryption, users Often more attention is paid to the performance indicators of encryption, so how to improve the encryption speed of cryptographic algorithms while satisfying the security of encrypted data is a new problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for wireless local area network
  • Encryption method for wireless local area network
  • Encryption method for wireless local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] Embodiment: a kind of encryption method for wireless local area network,

[0033] Include the following steps:

[0034]step one. Divide the first group of plaintext codes into 4 code words in units of words, and divide the first group of master key codes into 4 key words in units of words.

[0035] Step two. Exclusive OR operation of the 1st to 3rd key word in the first group of master key codes with a constant, then perform reversible transformation, and then XOR with the 0th key word to generate a Word length of the first round key, and then move the first to third key word to the position of the 0th to the second key word, and move the first round key to The position of the 3rd key word, and keep the wheel key.

[0036] Step three. Repeat step 2 to generate 31 subkeys encoded by the first set of master keys.

[0037] Step four. After XORing the first round key with the first group of plaintext codes from the 1st to the 3rd coded word, reversible transformation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method for a wireless local area network. The encryption method comprises the steps of dividing a first set of plaintext codes into four coded words with a word as a unit, dividing a first set of master key codes into four secret key words with a word as a unit, allowing a first-bit secret key word, a second-bit secret key word and a third-bit secret key word in the first set of master key codes to be operated with a zero-bit secret key word to form a first round of sub-keys in the length of one word, then forwards moving the first-bit secret key word, the second-bit secret key word and the third-bit secret key word to the position of the zero-bit secret key word, the position of the first-bit secret key word and the position of the second-bit secret key word, moving the first round of sub-keys to the position of the third-bit secret key word, inputting a second set of plaintext codes, allowing the second set of plaintext codes and the former set of plaintext codes to be at the interval of at least four rounds of clock periods, meanwhile, inputting a second set of master key codes, and allowing a time interval between the second set of master key codes and the former set of master key codes to be the same as the time interval between the second set of plaintext codes and the first set of plaintext codes. The encryption method for the wireless local area network greatly improves encryption and decryption speed and data handling capacity in unit time, and safety of data is high.

Description

technical field [0001] The invention relates to a method for realizing a packet encryption algorithm, in particular to an encryption method for a wireless local area network. Background technique [0002] With the wide application of WLAN, its security issues are becoming more and more prominent. For wireless local area networks, it is very vulnerable in terms of security, because the transmission rate can reach 11M, and the coverage range is up to 100 meters. It is its fast transmission speed and wide coverage that make it very vulnerable in terms of security. Because the data is exposed in the air during transmission, it is easy to be intercepted by people with ulterior motives. [0003] At present, most of the existing algorithms are realized by software, which is simple and convenient, but its calculation speed is not ideal, and it is difficult to meet the real-time needs, while the hardware implementation has a large hardware overhead. The cost is too high, and the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W84/12H04L9/06H04W12/03H04W12/041
Inventor 郑茳肖佐楠林雄鑫钟名富
Owner 苏州国芯科技股份有限公司