Block ciphering method based on random function to resist against known plaintext-ciphertext pair attack

A random function and block encryption technology, applied in the field of symmetric cryptography

Active Publication Date: 2014-01-15
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So here we use t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following is an embodiment of a block encryption method. For convenience and succinct description, an algorithm with a relatively short key, a short key, and a small number of rounds is used. Since the existing encryption methods are very complicated, in order to avoid a large number of complicated descriptions Algorithm, and cover up the limited new features of the present invention, simplify the reading of embodiment, we borrow existing AES algorithm structure and some computing components wherein, because existing algorithm is existing, so do not directly introduce every part of algorithm here one step.

[0026] The block encryption method is a cipher algorithm in which the block length and the binary length of the key k are both 128 bits, and the number of iterations is 10. The specific encryption process is as follows: 1. Use a key expansion function to expand the key k, here k is called the original key, the method of this expansion is the same as the AES algo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information security, and relates to a block ciphering method. The block ciphering method is constructed by a random function. The cryptographic (encryption) algorithm is uncertain and random, when the random function is used to encrypt, the concrete form of the function is determined by a secrete key which also determines the concrete form of the function and is an input parameter of the function, so an analyzer cannot think about the whole situation. By virtue of the design, a cipher analyzer cannot determine the algorithm when the analyzer does not know the secrete key, thus the analyzer cannot effectively analyze the cipher through the known plaintext-ciphertext pair.

Description

technical field [0001] The invention belongs to the field of symmetric cryptography, and relates to a group encryption method against known plaintext and ciphertext pair attacks. Background technique [0002] Existing encryption systems are all based on definite encryption algorithms. Although they are convenient, widely used and standardized, and easy to be widely evaluated, these algorithms have a very clear and fixed structure, only plaintext, key and Some parameters are changed, and they all participate in the calculation under the fixed algorithm framework to obtain the ciphertext. These constraints on the degree of freedom of the cryptographic system also have a negative impact on the security of the cryptosystem. A large number of cryptanalysis is also aimed at the situation determined by the algorithm, and these analyzes have assumed that the algorithm is already known. We can think of a deterministic algorithm as a deterministic function. If the function correspon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30
Inventor 王勇蔡国永杜诚林华
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products