Piccolo encryption algorithm hardware achieving method

A hardware implementation, encryption algorithm technology, applied in the field of cryptographic algorithms, can solve the problem of occupying resources, increasing the chip implementation area, and not conducive to repeated operation of the same module.

Inactive Publication Date: 2014-04-16
HENGYANG NORMAL UNIV
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In Piccolo's original algorithm, since the last round of calculation needs to be implemented separately, this method is not conducive to repea

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Piccolo encryption algorithm hardware achieving method
  • Piccolo encryption algorithm hardware achieving method
  • Piccolo encryption algorithm hardware achieving method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] Piccolo-80 encryption algorithm optimization principle and specific operation process are as follows:

[0071] The encryption operation includes the following modules: a constant update module (UpdateConstant), an F function transformation module (Function), a round function module (PiccoloRound), and a main control module (Piccolo).

[0072] The UpdateConstant module includes four ports. In the code of the UpdateConstant module: the three input ports are the initial key key (80 bits), the number of rounds i (0i+1 (5 digits) is equal to the number of rounds i+1 and is represented by c_i; one output port is the subkey rk (by rk 2i 、rk 2i+1 composition). Use continuous assignment (assign) to construct by constant c_i Parameters, where the parameter generation code is: constant={c_i[3:7], 5'b00000, c_i[3:7], 2'b00, c_i[3:7], 5'b00000, c_i[3:7] }^32'hf1e2d3c, where 5'b00000 represents a 5-bit wide binary number. The value of q is used as the corresponding bit of the sel...

Embodiment 2

[0112] Piccolo-128 encryption algorithm optimization principle and specific operation process are as follows:

[0113] The encryption operation includes the following modules: a constant update module (UpdateConstant), an F function transformation module (Function), a round function module (PiccoloRound), and a main control module (Piccolo).

[0114] The UpdateConstant module includes input ports. In the UpdateConstant module code: key (128 bits), constant c i+1 (5 bits) is equal to the number of rounds i+1 (02i 、rk 2i+1 Composition), when (2i+2)mod8=0, use the network type variable up_key (128 bits) to indicate the readjustment of the key element value. Use continuous assignment (assign) to construct by constant c_i Parameters, where the parameter generation code is: constant={c_i[3:7], 5'b00000, c_i[3:7], 2'b00, c_i[3:7], 5'b00000, c_i[3:7] }^32'hf1e2d3c, where 5'b00000 represents a 5-bit wide binary number. The value of the last two digits of the constant c_i (equivalen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Piccolo encryption algorithm hardware achieving method. The Piccolo encryption algorithm hardware can be achieved once by utilizing identical round operation in a repeated calling mode. The original r-1 round repeated calling is directly converted into r wheel repeated calling. Meanwhile, an RP-1 round displacement function is added on the r round circulation operation, and operation is conducted once to enable an output cipher to be correct. By means of the method, an original algorithm is not required to achieve again in the last rth round, the former repeated round function module can be directly multiplexed, and users only need to add the relatively simple RP-1 in the end. By means of the method, modules in the Piccolo encryption algorithm to be highly multiplexed, hardware achieving area is effectively saved, and meanwhile the encryption speed is increased.

Description

technical field [0001] The invention relates to the field of cryptographic algorithms in information security, in particular to a hardware implementation method of a lightweight cryptographic Piccolo algorithm. Background technique [0002] The Piccolo lightweight cryptographic algorithm was proposed at the 2011 International Conference on Cryptographic Hardware and Embedded Systems (CHES), and it is a resource-constrained smart card encryption algorithm. [0003] The Piccolo algorithm is a lightweight block encryption algorithm with a block length of 64 bits and a key length of 80 bits and 128 bits. When the key is 80 bits, it is recorded as Piccolo-80, and the number of iteration rounds r is 25 rounds; 128 bits are recorded as Piccolo-128, and the number of iterations r is 31 rounds. The algorithm adopts the unbalanced Feistel structure; the algorithm includes key expansion operation, in each round, the encrypted data and the subkey are subjected to XOR operation (AddRoun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 李浪贺位位刘波涛邹祎许琼方刘辉
Owner HENGYANG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products