Generation method of a new keyed message integrity authentication code

A technology of message integrity and message authentication code, which is applied in the field of generation of new key-containing message integrity authentication code, can solve problems such as insecure message authentication code technology, and achieve the effect of ensuring security

Active Publication Date: 2021-03-30
成都盛拓源科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the block cipher algorithm is cracked, the above-mentioned message authentication code techniques will all be insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation method of a new keyed message integrity authentication code
  • Generation method of a new keyed message integrity authentication code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment one, see figure 2 , the present embodiment provides a method for generating a novel keyed message integrity authentication code, comprising the following steps:

[0045] Step S101, select two block cipher encryption transformations E with a block size of B bits 1 ,E 2 ;

[0046] Step S102, inject key k1 into E 1 , get the block cipher algorithm E 1,k1 ;

[0047] Step S103, inject key k2 into E 2 , get the block cipher algorithm E 2,k2 ;

[0048] To fill the message to be processed, follow steps S104 to S107 as follows.

[0049] Step S104, set the length of the original message as len, and calculate the value t of len mod B, that is, the remainder after dividing len by B is t;

[0050] Step S105, when the t value is less than 64, first add 1 after the original message, then add B+t-64 0s, and then add the 64-bit representation of the bit length value len of the original message, if len is less than 64 bits Add 0 in its high position;

[0051] Step ...

Embodiment 2

[0067] Embodiment 2, Advanced Encryption Standard AES and China's Block Cipher Algorithm Encryption Standard SM4 are two well-known block cipher algorithms. A method for generating a new key-containing message integrity authentication code of the present invention is constructed.

[0068] Step S201, generating two sets of 128-bit keys, namely k1 and k2;

[0069] Step S202, selecting two encryption algorithms as AES and SM4 encryption algorithms respectively, denoted as AES and SM4;

[0070] Step S203, injecting k1 and k2 into the encryption functions of AES and SM4 respectively to obtain the encryption algorithm AES k1 ,SM4 k2 ;

[0071] To fill the message to be processed, follow steps S204 to S207 as follows.

[0072] Step S204, set the original message length as len, and calculate the value t of len mod128, that is, the remainder after dividing len by 128 is t;

[0073] Step S205, when the t value is less than 64, first add 1 after the original message, then add 64+t 0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cryptography and in particular relates to a method for generating a novel key-containing message integrity authentication code, which comprises the following steps: firstly, pre-processing to separately obtain block cipher algorithms E1, k1, E2 and k2; filling a message to be processed, selecting a random number C0, and dividing the filled message into formula according to single processing length by the block cipher algorithms; using the formula to process formula to obtain intermediate data Cn, wherein i is not greater than n and not smaller than 1; finally, using the formula to process the intermediate data Cn so as to obtain a message authentication code MAC. The method for generating a novel key-containing message integrity authentication code in the invention can be used for data integrity verification, and the traditional CBC-MAC mode and various variants thereof are improved from calling of only one block cipher algorithm to calling of two block cipher algorithms simultaneously, so that the message integrity authentication code is more secure.

Description

technical field [0001] The invention belongs to the technical field of cryptography, in particular to a method for generating a novel key-containing message integrity authentication code. Background technique [0002] Message integrity is a fundamental requirement of information security, which prevents data from being altered without authorization. With the continuous advancement of network technology, especially the continuous development of e-commerce, it is becoming more and more important to ensure the integrity of information, especially when the two parties communicate on an insecure channel, there needs to be a way to ensure that the The data can be verified by the other party to be correct and not tampered with. The proposed message integrity authentication function with key is specially designed to solve this kind of problem. [0003] The most famous message integrity authentication algorithm is CBC-MAC, which is also an ANSI standard (X9.17). CBC-MAC actually e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/14
CPCH04L9/0618H04L9/0637H04L9/14
Inventor 王志伟
Owner 成都盛拓源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products