Block encryption device, block encryption method, block decryption device, and block decryption method capable of integrity verification

A block encryption and block technology, which is applied to encryption devices with shift registers/memory, secure communication devices, computer security devices, etc., to achieve the effect of satisfying confidentiality

Active Publication Date: 2018-01-26
INSTITUTE FOR INFORMATION INDUSTRY
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the amount of data to be encrypted is large, doubling the time consumption is still a non-negligible burden for general applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block encryption device, block encryption method, block decryption device, and block decryption method capable of integrity verification
  • Block encryption device, block encryption method, block decryption device, and block decryption method capable of integrity verification
  • Block encryption device, block encryption method, block decryption device, and block decryption method capable of integrity verification

Examples

Experimental program
Comparison scheme
Effect test

no. 10 example

[0181] The tenth embodiment of the present invention is a computer-implemented block encryption method, the flow chart of which is depicted in Figure 8B . The operation principle of the tenth embodiment is the same as that of the ninth embodiment, but this embodiment uses a known encrypted block interlocker to complete certain steps. Only the differences between the tenth embodiment and the ninth embodiment will be described in detail below. For ease of understanding, please refer to Figure 3C .

[0182] Similarly, the block encryption method of this embodiment first executes steps S700, S701 and S703. Next, step S811 is executed to perform an XOR operation on each of the message blocks and the previous message block to obtain several temporary blocks. It should be explained that when the first one of the message blocks is processed in step S811, the preceding message block is an all-zero vector, and when the second one of the message blocks is processed in step S811, T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a block encryption device, a block encryption method, a block decryption device and a block decryption method with integrity verification. The encryption device divides an electronic file into several message blocks, and the message blocks have a sequence. The encryption device uses a check vector as the last of the message blocks. The encryption device performs the following operations on each of the message blocks in this order: generate an input block, encrypt the input block into an output block with a key, and compare the output block with the previous message block An XOR operation is performed to obtain a ciphertext block, and the value of the input block is equal to the value after XOR operation of the message block, the output block corresponding to the previous message block, and the previous message block. The encryption device concatenates the ciphertext blocks in sequence to generate an electronic ciphertext. The decryption device operates correspondingly to the encryption device.

Description

technical field [0001] The present invention relates to a block encryption device, a block encryption method, a block decryption device, and a block decryption method; more specifically, the present invention relates to a block encryption device and a block encryption device with integrity verification. An encryption method, a block decryption device and a block decryption method. Background technique [0002] In one-to-one secure communication, only when the three basic security requirements of confidentiality, integrity and source authentication are met at the same time can the message transmission process be guaranteed to be safe and sound. Confidentiality means that the content of the message will not be obtained by a third party during the transmission process. Integrity means that the receiver of the message must be able to ensure that the content of the received message is consistent with the content of the message sent by the sender, that is, the content of the mess...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L2209/72H04L9/0637H04L9/32H04L63/0435H04L63/123G06F21/6209H04L9/0618
Inventor 颜嵩铭涂政宏吴瑞明
Owner INSTITUTE FOR INFORMATION INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products