Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cryptographic Algorithm Customization Method

A cryptographic algorithm and cryptographic technology, applied in the field of cryptographic algorithm customization, to achieve the effects of reducing development costs and difficulty, increasing cracking costs, and reducing information value

Active Publication Date: 2017-02-08
戴葵
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For ordinary users, it is not an easy task to develop a self-defined cryptographic algorithm with high security using the current method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic Algorithm Customization Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] A specific example of supporting the custom design of the block cipher algorithm is given below. By configuring the functional elements of the cryptographic algorithm and the data processing structure of the cryptographic algorithm, a self-customized Feistel block cipher can be realized.

[0054] Cryptographic algorithm functional elements:

[0055] The functional elements of the cryptographic algorithm in this implementation example include a confusion unit, a diffusion unit, an involution operation unit, a key addition unit, a key expansion unit, and a round function.

[0056] The confusing unit can be composed of one or more sub-functions (such as f 1 , f 2 ,..., f k ) to construct, providing the capability of nonlinear transformation. The sub-function may be one or more SBoxes, or a function composed of SBoxes and algebraic operations. The algebraic operations may include: one or more of addition, subtraction, multiplication, division, shift, AND, OR, NOT, XOR ...

Embodiment 2

[0098] A specific example of supporting the custom design of the hash algorithm is given below. By configuring the functional elements of the cryptographic algorithm and the data processing structure of the cryptographic algorithm, a self-customized hash cryptographic algorithm can be realized.

[0099] Cryptographic algorithm functional elements:

[0100] The functional elements of the cryptographic algorithm in this implementation example include a message filling unit, an expansion unit, and a compression unit.

[0101] The message filling unit is a functional unit that can fill a data string of a certain length with some data at the back of the data string according to a certain filling rule, so that the length of the filled data string is an integer multiple of the message packet length or function. The filling rule can be defined by the user, and the length of the message packet can be defined by the user.

[0102] The expansion unit is a functional unit or function c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cryptographic algorithm customizing method. The cryptographic algorithm customizing method is characterized in that a customizable cryptographic algorithm functional element, a variable cryptographic algorithm data processing structure, a cryptographic algorithm design constraint rule and a cryptographic algorithm safety assessment method are provided, based on the cryptographic algorithm design constraint rule, the cryptographic algorithm functional element and the cryptographic algorithm data processing structure are specifically configured by a user, so that a customized cryptographic algorithm is obtained, a set of cryptographic algorithm safety assessment method is used for conducting safety assessment on the customized cryptographic algorithm, and if the assessment result meets the algorithm design requirement, the obtained cryptographic algorithm is a target cryptographic algorithm; otherwise, configuration information is adjusted, a novel customized cryptographic algorithm is produced again, and the safety is assessed until the customized cryptographic algorithm meets the design requirement. By the adoption of the method, the safety customized cryptographic algorithm can be efficiently designed by the user.

Description

technical field [0001] The invention belongs to the field of information security and relates to a method for customizing a cryptographic algorithm. Background technique [0002] With the rapid development of information technology, people's demand for safe storage and safe transmission of information is increasing day by day. Especially in mobile and embedded devices there is a strong demand for data privacy and intellectual property protection. For example, anti-piracy of embedded systems, protection of user privacy data, etc. The most effective way to protect data privacy is to encrypt information. At present, although there are public encryption algorithms such as AES and 3DES for users to choose, the types of public encryption algorithms are limited, and the security of most encryption algorithms only means that they can resist known attack methods, and cannot guarantee that they can resist new attack methods. With the rapid development of cryptanalysis theory and co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/28
Inventor 敖天勇廖望刘恺张亮戴葵邹雪城
Owner 戴葵
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products