Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Novel low-resource efficient lightweight Surge block cipher implementation method

A technology of a block cipher and an implementation method, applied in the direction of encryption devices with shift registers/memory, etc., can solve the problems of low efficiency, high resource occupation, low encryption performance, etc.

Active Publication Date: 2015-04-08
HENGYANG NORMAL UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method for implementing a lightweight Surge block cipher, the purpose of which is to overcome the problems of heavy resource occupation, low efficiency, low encryption performance and vulnerability to attacks of the lightweight block cipher algorithm in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel low-resource efficient lightweight Surge block cipher implementation method
  • Novel low-resource efficient lightweight Surge block cipher implementation method
  • Novel low-resource efficient lightweight Surge block cipher implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0062] The implementation method of the Surge block cipher adopts the SPN structure, the block length is 64-bit, and the key length is designed to be 64-bit, 80-bit, and 128-bit, which are respectively recorded as Surge-64, Surge-80, and Surge-128 . Surge-64, Surge-80 and Surge-128 iteration rounds N R They are 32 rounds, 36 rounds and 40 rounds respectively. Surge encryption operation process is as follows: figure 1 As shown, the encryption round operation includes five modules: constant plus transformation (AddConstants), round key plus transformation (AddRoundKey), S-box replacement transformation (SubCells), row shift transformation (ShiftRows), and column mix transformation (MixColumns). The decryption operation flow is as follows figure 2 , the algorithm decryption round operation includes column mixing inverse transformation (InvMixColumns),...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a novel low-resource efficient lightweight Surge block cipher implementation method. The method comprises the steps that the Surge block length is designed to be of a 64-bit type, and the secrete key length is designed to be of the 64-bit type, the 80-bit type and the 128-bit type on the basis of the SPN structure; a secrete key is in a non-extensible mode; five modules of a round function are combined in a new mode, the encryption sequence is constant addition, round key addition, S-box replacement, row shifting and column mixing transformation, and column mixing transformation does not exist in the last round; a constant addition transformation module operates a round constant in each round; according to the round constant selection combination, 0, 1, 2 and 3 are selected as the high bits, the combination of one odd number, one even number, one even number and one add number from 0 to 15 is selected as the low bits, and the obtained combinatorial numbers are randomly fixed into a permutation; a column mixing transformation module utilizes the (0,1,2 and 4) combination which facilitates hardware implementation for forming a matrix, and hardware is constructed on a galois field GF (24) to obtain the friendly matrix. The experimental result shows that the occupied area resources are smaller, meanwhile, the encryption performance is good and the known attacks can be resisted compared with existing lightweight ciphers of the SPN structure.

Description

technical field [0001] The invention relates to a method for realizing a lightweight Surge block cipher. Background technique [0002] The block cipher algorithm uses the same key for encryption and decryption, which is fast, easy to implement, and easy to achieve synchronization. The transmission error of one cipher group will not affect other groups, and the loss of a ciphertext group will not affect the decryption of subsequent groups. Impact, that is, transmission errors will not spread, so it is widely used in various software and hardware security systems. With the development and popularization of the Internet of Things technology, many devices in the Internet of Things have low computing power, small storage space, and limited resources, such as smart cards, RFID tags, sensor nodes, pay TV cards, smart meter cards, etc.; among these devices Traditional block encryption algorithms cannot be well applied. [0003] Currently, block ciphers mainly have two structures: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 李浪刘波涛邓运员余孝忠杜国权曾婷
Owner HENGYANG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products