Grouping encryption method based on random functions and resisting to known plaintext cipher attacks
A random function and block encryption technology, applied in the field of symmetric cryptography, can solve problems such as difficult calculations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0027] Embodiment 1: The block encryption method is a cipher algorithm in which both the block length and the binary length of the key k are 128 bits, and the number of iterations is 10. The specific encryption process is as follows: 1. Use a key expansion function to expand the key k, here k is called the original key, the method of this expansion is the same as the AES algorithm, the input parameter is only the key, and the expansion generates a sequence to intercept packets in turn The length of 128 bits is used as the round key of each round, and the round key is used to participate in the key addition operation. 2. The initial round is 1 round, the encryption method is the same as AES, which is a definite operation, and only a key addition operation is performed. 3. There are 9 rounds of repeated rounds, using the same round function. The round function is a random function. Each round of repeated rounds includes the following components in turn: S-box substitution, row s...
Embodiment 2
[0029] Embodiment 2: The block encryption method is a cryptographic algorithm in which the block length and the binary length of the key k are both 128 bits, and the number of iterations is 10. The specific encryption process is as follows: 1. Use a key expansion function to expand the key k, here k is called the original key, this expansion method is the same as the AES algorithm, the input parameter is only the key, and the expansion generates a sequence to intercept the grouping in turn The length of 128 bits is used as the round key of each round, and the round key is used to participate in the key addition operation. 2. The initial round is 1 round, the encryption method is the same as AES, which is a definite operation, and only a key addition operation is performed. 3. There are 9 rounds of repeated rounds, using the same round function. The round function is a random function. Each round of repeated rounds includes the following components in turn: S-box substitution, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com