System for realizing SM4 block symmetric cipher algorithm

A symmetric cipher algorithm and key technology, applied in the field of block cipher algorithm, can solve the problem of high component redundancy and achieve the effect of reducing system redundancy

Inactive Publication Date: 2014-05-21
INST OF MICROELECTRONICS CHINESE ACAD OF SCI
View PDF10 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, considering the overall structure of the system, the encryption and decryption module and the key expansion module have relatively similar functions, and the use of two modules to realize the functions of the system makes the components of the system more redundant.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for realizing SM4 block symmetric cipher algorithm
  • System for realizing SM4 block symmetric cipher algorithm
  • System for realizing SM4 block symmetric cipher algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] Example 1, such as image 3 As shown, the encryption operation process:

[0072] When the system receives the key, the key enters the input key processing and result memory, and the input key MK=(MK 0 , MK 1 , MK 2 , MK 3 ) and system constant (FK 0 , FK 1 , FK 2 , FK 3 ) to complete the operation

[0073] ( K 0 , K 1 , K 2 , K 3 ) = ( MK 0 ⊕ FK 0 , MK 1 ⊕ FK 1 , MK 2 ⊕ FK 2 ...

Embodiment 2

[0083] Example 2, such as Figure 4 As shown, the decryption operation process:

[0084] When the system receives the key, the key enters the input key processing and result memory, and the input key MK=(MK 0 , MK 1 , MK 2 , MK 3 ) and (FK 0 , FK 1 , FK 2 , FK 3 ) to complete the operation

[0085] ( K 0 , K 1 , K 2 , K 3 ) = ( MK 0 ⊕ FK 0 , MK 1 ⊕ FK 1 , MK 2 ⊕ FK 2 , ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system for realizing an SM4 block symmetric cipher algorithm. The system comprises an input key processing and result memory used for processing an input key, obtaining a result of the direct involvement of an iterative operation and storing the result, a key buffer used for updating and storing the intermediate result of a key expansion operation which is the round key needed by encryption algorithm according to the control signal outputted by a control module, a data buffer used for updating and storing the intermediate result of a decryption iteration operation according to the control signal outputted by the control module, a data processing selection module used for making a selection that the data which participates in the operation is key or data of encryption and decryption according to the control signal outputted by the control module, an operation logic module used for carrying out encryption and decryption operation and key expansion operation, and a control module used for outputting the corresponding encryption and decryption signal and key expansion control signal according to the inputted work mode control signal. By using the system, the system redundancy is reduced.

Description

technical field [0001] The invention relates to the technical field of block cipher algorithms, in particular to a system for realizing the SM4 block symmetric cipher algorithm. Background technique [0002] The SM4 block symmetric encryption algorithm is the original SMS4 algorithm. It is the first commercial encryption algorithm for wireless LAN products published in China. This algorithm is the first public encryption algorithm for special fields in my country. are all significant. SM4 is an S-box-based block symmetric cipher algorithm, which performs encryption and decryption operations on a set of bit data, instead of only operating on a single bit like a stream cipher. The packet length of this algorithm is 128 bits, and the key length is 128 bits. Both the encryption algorithm and the key expansion algorithm adopt a 32-round nonlinear iterative structure. The structure of the decryption algorithm is the same as that of the encryption algorithm, except that the order...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 黑勇王晨光乔树山任高峰
Owner INST OF MICROELECTRONICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products