Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing Magpie encryption and decryption

An encryption, decryption, and key technology, which is applied in the field of cryptographic algorithms, can solve the problems of complex decryption operations of lightweight cryptographic algorithms, short key lengths of lightweight cryptographic algorithms, and inability to effectively reuse encryption operation modules, etc.

Active Publication Date: 2015-01-07
HENGYANG NORMAL UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some of the existing lightweight cryptographic algorithms are too pursuing hardware to achieve less occupied area and reduce the number of algorithm calculation rounds, which leads to relatively poor security of the designed lightweight cryptographic algorithms; some lightweight cryptographic algorithms have complex decryption operations, In the decryption operation process, the encryption operation module cannot be effectively reused, and the key length of some lightweight cryptographic algorithms is too short, which makes it easy to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing Magpie encryption and decryption
  • Method for realizing Magpie encryption and decryption
  • Method for realizing Magpie encryption and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0045] Such as figure 1 Shown, realize the method flowchart of Magpie encryption for the present invention, comprise the following several steps:

[0046] Step 1: Load 64-bit plaintext or 64-bit ciphertext into the register;

[0047] Step 2: Perform round key addition operation on the data to be encrypted / decrypted and the first 64 bits of the 96-bit key to obtain the intermediate operation result, and perform 32 round operations on the intermediate operation result according to the control signal;

[0048] 1) According to the control signal, the intermediate calculation result is performed in round operation;

[0049] When the control signal select0 is 1, the round operation steps are as follows:

[0050] 2) Carry out constant addition operation to the intermediate operation result described in 1);

[0051] 3) the operation result obtained in 2) ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing Magpie encryption and decryption. The Magpie cipher algorithm packet length is 64 bits and the secret key length is 96 bits; a substitution-permutation network (SPN) structure is employed and 32 rounds of calculation. The Magpie includes two parts: the calculation portion and the control portion. According to the calculation portion, each round of calculation include six basic calculation modules; and according to the control portion, the 65th-bit binary number to the 96th-bit binary number of the secret key are used as control signals of the Magpie encryption algorithm. The control signals are used for controlling the calculation order of the inter-round module and are decided randomly by corresponding bit values of the secret key, so that the encryption calculation process becomes randomized. During the decryption, a ciphertext and a post-conversion round secret key are inputted instead of inputting a plain text and an initial secret key to carry out decryption. According to the invention, the method of combination of the secret key controlling and decryption is used; and the 65th-bit binary number to the 96th-bit binary number of the secret key are used as control signals of the Magpie encryption algorithm. The method is a novel control way; and the security of the cipher algorithm can be effectively improved.

Description

technical field [0001] The invention relates to the field of cryptographic algorithms in information security technology, in particular to a method for realizing Magpie encryption and decryption. Background technique [0002] In recent years, the Internet of Things has been more and more deeply applied to people's production and life, and the security of the Internet of Things has also attracted everyone's attention. Lightweight cryptographic algorithms suitable for resource constraints in the Internet of Things have been continuously studied in recent years, especially how to apply to resource-constrained smart cards, such as encryption on RFID. The lightweight encryption algorithms that have appeared in recent years include: PRESENT encryption algorithm, PUFFIN encryption algorithm, MIBS encryption algorithm, PRINCE encryption algorithm, LED encryption algorithm, EPCBC encryption algorithm, LBLOCK encryption algorithm, Piccolo encryption algorithm, Klein encryption algorit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 李浪贺位位刘波涛邹祎许琼方刘辉
Owner HENGYANG NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More