Long key-based realization system and method for SM4 key extending algorithm

A key expansion and implementation system technology, which is applied in the implementation system field of SM4 key expansion algorithm, can solve the problem of small key space, achieve the effect of strengthening randomness, solving potential safety hazards, and increasing key space

Active Publication Date: 2016-12-07
HEILONGJIANG UNIV
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on the above deficiencies, the present invention provides a system and method for realizing the SM4 key ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Long key-based realization system and method for SM4 key extending algorithm
  • Long key-based realization system and method for SM4 key extending algorithm
  • Long key-based realization system and method for SM4 key extending algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] Such as figure 1 Shown, a kind of implementation system of SM4 key expansion algorithm based on long key, including chaotic mapping module, data cache module, XOR module, non-linear permutation S box module and linear transformation L module, described chaotic mapping module input As part of the initial key, by using multiple iterations of the chaotic map, a pseudo-random sequence with good randomness is generated as the input of the original SM4 key expansion algorithm. By considering the chaotic performance and hardware resource consumption, the chaotic map module selection Logistic mapping;

[0021] The XOR module is a multi-input XOR logic gate circuit;

[0022] The non-linear permutation S-box module uses four parallel 8-input S-boxes in total, each parallel S-box addresses the input 8-bit number address, and outputs 8-bit data stored in the S-box;

[0023] The linear transformation L module is simply a shift and XOR operation.

Embodiment 2

[0025] Such as image 3 As shown, the implementation method of a long-key based SM4 key expansion algorithm obtained by the system of Embodiment 1 comprises the following steps:

[0026] Step 1001: Divide the initial key into two parts. One part is a fixed-size 128-bit k 1 , the remaining initial key is another part k 2 . k 2 The number of bits needs to be greater than or equal to 32 bits. Therefore, the number of bits of the entire initial key needs to be greater than or equal to 160 bits.

[0027] Step 1002: set the fixed 128-bit key k 1 Divide into 4 32-bit data sequentially from high bit to low bit, and store in X i 、X i+1 、X i+2 and x i+3 middle. The remaining initial key k 2 As the initial value of the Logistic chaos map, and stored in y i middle.

[0028] Step 1003: put X i+1 、X i+2 and x i+3 XOR, finally with k 2 The low 32-bit data XOR is extracted to obtain the final 32-bit number V.

[0029] Step 1004: Divide the 32-bit number V into four 8-bit nu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a long key-based realization system and method for an SM4 key extending algorithm. The system comprises a chaotic mapping module, a data caching module, an xor module, a nonlinear permutation S box module and a linear transformation L module, wherein an input of the chaotic mapping module is a partial initial key, a pseudorandom sequence with good randomness is generated as an input of an original SM4 key extending algorithm by utilizing multi-time iterations of chaotic mapping, and the chaotic mapping module selects Logistic mapping through considering chaotic performance and hardware implementation resource consumption; and the chaotic mapping is fused in the SM4 key extending algorithm. By optimizing the SM4 key extending algorithm, the key space of the SM4 algorithm is expanded and the randomness of sub-keys in each round is enhanced.

Description

technical field [0001] The invention relates to the field of information security, in particular to a system and a method for realizing a SM4 key expansion algorithm based on a long key. Background technique [0002] The SM4 algorithm is an encryption algorithm used in the WAPI wireless network standard algorithm widely used in China. The SM4 algorithm, formerly known as the SMS4 algorithm, was identified as the national encryption industry standard by the State Administration of Commercial Cryptography in 2012, with the standard number GM / T0002-2012 and renamed as the SM4 algorithm. The SM4 block cipher algorithm, the SM2 elliptic curve public key cryptography algorithm, and the SM3 cryptographic hash algorithm are jointly used as the national cryptography industry standard, and have an important position in my country's cryptography industry. [0003] The key length determines the size of the key space. The key space is the most basic security guarantee to protect the en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/001H04L9/0869
Inventor 丁群王传福
Owner HEILONGJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products