Encryption/decryption function generating method, an encryption/decryption method and related apparatuses

A function generation and function technology, applied in the information field, can solve problems such as imperfect design

Active Publication Date: 2017-05-10
HUAWEI INT
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the current design of white-box encryption and decryption function generation algorithms is not perfect, because the encryption and decryption functions in white-box AES can generally be divided into several 8-bit to 8-bit pre-calculated tables T

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption/decryption function generating method, an encryption/decryption method and related apparatuses
  • Encryption/decryption function generating method, an encryption/decryption method and related apparatuses
  • Encryption/decryption function generating method, an encryption/decryption method and related apparatuses

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0175] An embodiment of the present invention provides a method for generating an encryption function. Specifically, as Figure 8 As shown in , the method includes the following steps:

[0176] 801. The encryption function generator obtains the random seed and the original key.

[0177] Specifically, in the encryption function generation method provided in the embodiment of the present invention, the encryption function generation device first needs to obtain a random seed and an original key.

[0178] A random seed is a fixed-length bit string and can be used to generate random numbers by using a random number generator. A random number generator can be thought of as a function g(x) where the input is a fixed-length random seed such as a k-bit string and the output is a sequence of random numbers having a length of any number of bits and used as a source of random numbers for subsequent use; and A key is a set of information codes and the key participates in and exerts ce...

Embodiment 2

[0260] An embodiment of the present invention provides an encryption method. Specifically, as Figure 10 As shown in , the method includes the following steps:

[0261] 1001. The encryption device receives the plaintext input by the user.

[0262] 1002. The encryption device calculates input mask data according to the pre-stored affine extension mask and the input affine extension mask in the plaintext.

[0263] Specifically, in the embodiment of the present invention, the affine extension mask is an affine transformation matrix for mapping m-bit data to n-bit data, where m and n are preset positive integers, and n>m.

[0264] In this way, after performing the affine expansion transformation in step 1002, the plaintext can be expanded from an m-dimensional column vector to an n-dimensional column vector. Exemplarily, assuming that the plaintext input in the embodiment of the present invention is 128 bits, the input plaintext can be extended from 128 bits to 16n bits by mean...

Embodiment 3

[0293] An embodiment of the present invention provides a method for generating a decryption function. Specifically, as Figure 12 As shown in , the method includes the following steps:

[0294] 1201. The device for generating a decryption function obtains a random seed and an original key.

[0295] Specifically, in the decryption function generation method provided in the embodiment of the present invention, the decryption function generation device first needs to obtain a random seed and an original key.

[0296] A random seed is a fixed-length bit string and can be used to generate random numbers by using a random number generator. A random number generator can be viewed as a function g(x) where the input is a fixed-length random seed, such as a k-bit string, and the output is a sequence of random numbers of any number of bits in length and used as a source of random numbers for subsequent use; And the key is a set of information codes, and the key participates in the "op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An encryption / decryption function generating method, an encryption / decryption method and related apparatuses, which can ensure the confidentiality of make a key used in a white-box encryption and decryption function when a white-box encryption and decryption function generating algorithm is disclosed. The method includes: receiving a random seed and an original key that are input by a user; generating, according to the original key, a round key required for R-round iterative computing; generating, according to the random seed, an affine expansion mask required for the R-round iterative computing and random disturbance data required for the R-round iterative computing; and generating an encryption / decryption function.

Description

technical field [0001] The present invention relates to the field of information technology, and in particular, to methods for generating encryption functions and decryption functions, encryption and decryption methods, and related devices. Background technique [0002] The white-box model is a typical model among existing cryptographic attack models. In the white-box model, an attacker can be considered to have gained access to the system of computing modules used for encryption and decryption calculations and has taken full control of the system. That is to say, the calculation module F() is completely transparent to the attacker and the attacker can view or modify the value of all data at any time, and can also view and modify the intermediate results of any calculation steps. [0003] Because the system is fully controlled, a white-box attacker can view all data in memory. In conventional cryptographic algorithms, keys are stored directly in memory during the computati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G09C1/00H04L9/06
CPCG09C1/00H04L9/0618H04L2209/046H04L2209/16H04L9/0631H04L9/0861H04L9/14
Inventor 吴双
Owner HUAWEI INT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products