Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A highly efficient symmetrical secret key apparatus which allows pairing and a pairing method

A technology of symmetric keys and paired keys, which is applied to encryption devices with shift registers/memory, etc., can solve problems such as single encryption mode, reduced security, and increased keys, and achieve good scalability, reduced area, Overall compact effect

Inactive Publication Date: 2015-11-04
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, as the number of users increases, the number of keys required by users will increase greatly, but only a single encryption mode can be used, resulting in a greatly reduced security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A highly efficient symmetrical secret key apparatus which allows pairing and a pairing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0037] The present invention selects SM4, AES, DES, RC6 as the design object: SM4 and AES are based on the operation on the integer field, we call it homogeneous type algorithm; DES, RC6 are different, are called heterogeneous type algorithm. The multiple algorithms selected in this way illustrate the universality and good scalability of the architecture design of the present invention.

[0038] Such as figure 1 As shown, the top-level architecture design of the cryptographic algorithm is carried out according to the design requirements of high-efficiency and configurable and the design method of the general function IP core. encrypted / plaintext. The register module is used to store user configuration information and module status information. The control logic flexibly generates control information according to the u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a highly efficient symmetrical secret key apparatus which allows pairing and a method thereof. The apparatus comprises a bus interface, a register, a logic controller and a core arithmetic unit. The bus interface is separately connected to the register and the core arithmetic unit. The register is connected to the logic controller which is further connected to the core arithmetic unit. As for a secret key algorithm apparatus of the present invention, operation logics of algorithms is fully analyzed and split according to characteristics of the algorithms. The various algorithms are highly efficiently realized on a same operation core module by a basic operation unit reconfigurable method. The configuration can satisfy demands of usage by users for high efficiency and pairing of a plurality of symmetrical secret key algorithms, and a very good expansibility is realized. Realization of further reconstruction of a new symmetrical secret key algorithm is provided with convenience.

Description

technical field [0001] The invention relates to a symmetric key device and a pairing method, in particular to an efficient and configurable symmetric key device and a pairing method. Background technique [0002] Symmetric encryption refers to encryption algorithms that use the same key for encryption and decryption. That is, the encryption key can be deduced from the decryption key, and the decryption key can also be deduced from the encryption key. [0003] Today, information has become an important strategic resource, and information security plays an extremely important role in national security and social stability. Therefore, effective measures must be taken to ensure information security. In recent years, the theory and technology in the field of information security have developed rapidly, and many important achievements have been made. Symmetric key algorithm refers to the algorithm that uses the same key for encryption and decryption, or the encryption and decryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 张威龙杨昆姜学平
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products