Grouping encryption method based on random functions and resisting to known plaintext cipher attacks

A random function and block encryption technology, applied in the field of symmetric cryptography, can solve problems such as difficult calculations

Active Publication Date: 2014-02-26
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This computational...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment 1: The block encryption method is a cipher algorithm in which both the block length and the binary length of the key k are 128 bits, and the number of iterations is 10. The specific encryption process is as follows: 1. Use a key expansion function to expand the key k, here k is called the original key, the method of this expansion is the same as the AES algorithm, the input parameter is only the key, and the expansion generates a sequence to intercept packets in turn The length of 128 bits is used as the round key of each round, and the round key is used to participate in the key addition operation. 2. The initial round is 1 round, the encryption method is the same as AES, which is a definite operation, and only a key addition operation is performed. 3. There are 9 rounds of repeated rounds, using the same round function. The round function is a random function. Each round of repeated rounds includes the following components in turn: S-box substitution, row s...

Embodiment 2

[0029] Embodiment 2: The block encryption method is a cryptographic algorithm in which the block length and the binary length of the key k are both 128 bits, and the number of iterations is 10. The specific encryption process is as follows: 1. Use a key expansion function to expand the key k, here k is called the original key, this expansion method is the same as the AES algorithm, the input parameter is only the key, and the expansion generates a sequence to intercept the grouping in turn The length of 128 bits is used as the round key of each round, and the round key is used to participate in the key addition operation. 2. The initial round is 1 round, the encryption method is the same as AES, which is a definite operation, and only a key addition operation is performed. 3. There are 9 rounds of repeated rounds, using the same round function. The round function is a random function. Each round of repeated rounds includes the following components in turn: S-box substitution, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information safety and relates to a grouping encryption method. Random functions are used for constructing the grouping encryption method. The code (encryption) algorithm is uncertain and random, encrypts through the random functions. The specific mode of the functions is determined by secret keys, parameters shared secretly by two parties and other parameters. The secret keys influence the specific mode of the functions and are input parameters of the functions, thus, a code analyzer is made to be incapable of determining the algorithm when not knowing the secret keys and the secret parameters, so that effective code analysis cannot be conducted through known plaintext cipher. Different function specific modes of different groups are used, so that potential attacks can be effectively resisted to.

Description

technical field [0001] The invention belongs to the field of symmetric cryptography, and relates to a group encryption method against known plaintext and ciphertext pair attacks. Background technique [0002] Existing encryption systems are all based on definite encryption algorithms. Although they are convenient, widely used and standardized, and easy to be widely evaluated, these algorithms have a very clear and fixed structure, only plaintext, key and Some parameters are changed, and they all participate in the calculation under the fixed algorithm framework to obtain the ciphertext. These constraints on the degree of freedom of the cryptographic system also have a negative impact on the security of the cryptosystem. A large number of cryptanalysis is also aimed at the situation determined by the algorithm, and these analyzes have assumed that the algorithm is already known. We can think of a deterministic algorithm as a deterministic function. If the function correspon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 王勇蔡国永杜诚林华
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products