Novel symmetric key algorithm for high speed encryption

A technology of symmetric key and encryption algorithm, which is applied in the direction of encryption device with shift register/memory, digital transmission system, electrical components, etc. The effects of key repetition, improved security, and fast encryption speed

Active Publication Date: 2017-05-10
上海同态信息科技有限责任公司
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But for the adversary, the length of the plaintext is known when the ciphertext is intercepted. Assuming that the length of the plaintext message sent is N, the length of the ciphertext is also N. Then when the value of N is smaller than the computing power of the adversary, there is no secrecy sex at all
In addition, because the one-time encryption key is randomly distributed, and assuming that the plaintext has a certain prior probability distribution, then according to the posterior probability distribution of the ciphertext, it can also pose a certain threat to the plaintext
[0010] (2) Inconvenience in actual use: Assuming that a long message is encrypted, a codebook of the same length as the message sample itself is required, because the codebook is the key itself, so the key must be safely sent to the receiver
However, the stream cipher algorithm is not provably secure, but only sacrifices provable security to compromise practicality
[0012] Chinese invention patent CN201610467088.7, the publication date is 2016.09.21, discloses an AES data encryption method based on FPGA-based online key generation, but the encryption method has too many rounds of encryption, the encryption method is single, and the key will appear repeatedly , data security cannot be guaranteed
[0013] Therefore, there is an urgent need for an efficient key algorithm with one-time pad, fast encryption speed, and non-recurring keys, but there is no report about this algorithm at present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel symmetric key algorithm for high speed encryption
  • Novel symmetric key algorithm for high speed encryption
  • Novel symmetric key algorithm for high speed encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] A kind of encryption algorithm specific process of the novel symmetric key algorithm that is used for high-speed encryption of the present invention is as follows:

[0060] A1: Let the plaintext population be M, group the plaintext population M to get M i ,M i The packet length is 1024bit (or an integer multiple of 1024bit), so there are M i ∈{M 0 , M 1 ,···,M n-1};

[0061] A2: Use a random number generator to generate two strings of 1024-bit binary sequence random numbers R 1 and R 2 , R 1 and R 2 as the base key, R 1 ∈{0,1} 1024 , R 2 ∈{0,1} 1024 ;

[0062] A3: If figure 1 As shown, the plaintext M is converted into a binary sequence Mess, and the plaintext length L is counted, and the calculation formula is (1); the last group M n-1 It may be less than 1024 bits, so it is necessary to M n-1 for padding; if M n-1 When ∈(0,1000), first fill in the binary key generator identification code after the plaintext, the identification code is 24 bits, the ide...

Embodiment 2

[0081] A kind of decryption algorithm specific process of the novel symmetric key algorithm that is used for high-speed encryption of the present invention is as follows:

[0082] B1: received ciphertext key C R , decrypt it with the RSA-OAEP scheme, and obtain the basic key R 1 and R 2 ;

[0083] B2: First intercept the last 2048-bit binary sequence of the ciphertext, and use the basic key R obtained by decryption 1 and R 2 Perform an XOR operation after offsetting n bits in the same direction as the encryption, and get 2048 bits containing M n-1 the binary sequence;

[0084] B3: contains M for 2048 bits n-1 Search the binary sequence and identify the 24-bit key generator identification code generated when filling, and get the key offset generator G, then discard the random number sequence to get M n-1 Plaintext group, the calculation formula is (13);

[0085]

[0086] B4: From C 0 Starting in the forward direction, one operation is performed according to the numb...

Embodiment 3

[0089] In order to perform encryption more securely, the basic key of a novel symmetric key algorithm for high-speed encryption of the present invention will be reconstructed.

[0090] A set of two strings of random number sequences R generated by initial encryption 1 and R 2 , first for M n-1 After encryption, and then sequentially from M 0 Start the corresponding offset encryption, for the base key R 1 , each plaintext group encryption is equivalent to shifting one bit to the right, so when encrypting to M 1023 when R 1 Duplication occurs, so when M i When i mod 1024-1=0, the basic key needs to be reconstructed.

[0091] like image 3 As shown, the basic key reconstruction process is as follows:

[0092] C1: a set of base keys R 1 and R 2 , the encrypted plaintext space is 1024×1024 bits, and the encrypted equivalent space is the ciphertext block (C-Block);

[0093] C2: When the basic key needs to be reconstructed, the new basic key is selected from the previous c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A novel symmetric key algorithm for high speed encryption comprises an encryption algorithm and a decryption algorithm, wherein the encryption algorithm comprises the following steps: grouping plaintexts M to obtain Mi; generating basic keys R1 and R2 by using a random number generator; collecting statistics about a plaintext length L, and filling Mn-1 with plaintext, that is, firstly filling a binary key generator identification code, calculating remaining bits, and filling with random binary code; getting a key offset generator G; encrypting a Mn-1 plaintext group; obtaining an encrypted key Keyi; encrypting all the plaintext groups; encrypting the basic keys R1 and R2, to obtain a cipher key CR; and completing the encryption, and transmitting the obtained ciphertext. The novel symmetric key algorithm has the advantages that the probability of key repetition is zero, and the encryption subkey of each plaintext segment is unique and random, so that the security is high; and the encryption speed is fast, that is, only two offsets, two modular operations, one multiplication, two additions, one judgment, two different or same 10-step basic operations are needed.

Description

technical field [0001] The invention relates to the technical field of information encryption, in particular to a novel symmetric key algorithm for high-speed encryption. Background technique [0002] With the improvement of computer performance and the rise of big data, our requirements for data processing and computing power have increased geometrically. At the same time, with the emergence of side-channel attacks, many highly secure cryptographic algorithms have been destroyed, and the original highly secure AES (Advanced Encryption Standard) algorithm was cracked in the 128-bit system. People began to design and find algorithms with faster encryption efficiency and higher security. [0003] The current mainstream symmetric key algorithms or stream cipher algorithms typically include the RC4 algorithm, the RC6 algorithm, the Rijndael algorithm in AES encryption, and the national secret standard SM4 algorithm. [0004] (1) RC4 algorithm: RC4 encryption algorithm is a str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618
Inventor 李朋林屈玮华魏立斐
Owner 上海同态信息科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products