Unlock instant, AI-driven research and patent intelligence for your innovation.

Lightweight block cipher VH algorithm based on dual pseudo-random transformation

A technology of double pseudo-random transformation and block cipher, which is applied in the field of lightweight block cipher algorithm and can solve problems such as comprehensive efficiency

Inactive Publication Date: 2014-12-03
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS +1
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to make up for the deficiencies of existing algorithms, the present invention provides a lightweight block cipher VH algorithm to solve the comprehensive efficiency problem of existing lightweight block cipher algorithms and improve the utility of low-cost embedded mobile terminals in wireless communication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight block cipher VH algorithm based on dual pseudo-random transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be further described below in conjunction with the accompanying drawings.

[0061] The block length of the lightweight block cipher algorithm VH is 64 bits, and supports keys with lengths of 64, 80, 96, 112, and 128 bits, and the corresponding iteration rounds are r=10, 11, 12, 13, and 14 rounds, respectively. The VH algorithm has 3 parameters: 64bit plaintext P, key K, and 64bit ciphertext C. The encryption algorithm uses C=E K (P) means that the decryption algorithm uses P=D K (C) said. The encryption and decryption process of the VH algorithm is implemented in the following steps.

[0062] (1) Encryption transformation table S[256] and decryption transformation table S -1 [256] produced.

[0063] The encryption and decryption S-boxes are generated by pseudo-random transformation. First calculate T(i) = "|256sin(i)|", where "" represents the rounding down operation; in order to generate 256 bytes without repetition, the value of i is f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a lightweight block cipher VH algorithm based on dual pseudo-random transformation. The lightweight block cipher VH algorithm is applied to the field of wireless communication and information security and privacy. An encryption transformation table S[256] and a decryption transformation table S<-1>[256] formed by randomly arranging 256 bytes are generated to simplify design of an S box and achieve secret key expansion and data encryption and decryption of the algorithm. In the encryption process, pseudorandom transformation is carried out on each byte of 64-bit grouped data to achieve confusion, and then pseudorandom transformation is carried out on each diagonal line of the data to achieve diffusion and confusion at the same time. The safe and efficient lightweight block cipher algorithm is designed for low-cost 8-bit embedded mobile terminals.

Description

1. Technical field [0001] The invention is a light-weight block cipher algorithm in the field of secure communication, which is mainly used for the security and confidentiality of low-cost embedded mobile terminals in wireless communication. 2. Background technology [0002] With the development of wireless network technology, information penetrates into every aspect of our lives. Ordinary cryptographic algorithms are difficult to meet resource-constrained mobile terminals, and lightweight cryptographic algorithms are needed to meet the needs of resource-constrained terminals such as hardware and software, computing power, and energy consumption. [0003] Currently, the international standards for lightweight block ciphers include CLEFIA and PRESENT algorithms. CLEFIA has a packet length of 128bit, supports 128bit, 192bit, and 256bit keys, and the number of iterations is 18, 22, and 26. It adopts a generalized Feistel structure and can resist currently known attack methods....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 黄玉划代学俊刘宁钟苏菲曾庆喜
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS