AES (Advanced Encryption Standard)-based encryption method and device

An encryption method and technology to be encrypted, applied in the field of information security, can solve the problem of weak anti-side channel attack ability, achieve the effect of improving anti-side channel attack ability and increasing data complexity and difficulty

Inactive Publication Date: 2018-12-07
WUHAN UNIV
View PDF9 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides an AES-based encryption method and device to solve or at least partially solve the technical problem of weak anti-side channel attack ability existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AES (Advanced Encryption Standard)-based encryption method and device
  • AES (Advanced Encryption Standard)-based encryption method and device
  • AES (Advanced Encryption Standard)-based encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] This embodiment provides an encryption method based on AES, please refer to figure 1 , the method includes:

[0056] Step S101: Obtain the data to be encrypted and the preset key of the standard AES algorithm.

[0057] Specifically, the standard AES algorithm (Advanced Encryption Standard), the packet length of the AES algorithm is 128bit, and the preset key is the key used for the encryption operation of the AES algorithm, which includes the key word (also known as the seed key). In a specific implementation process, the preset key can be converted into a matrix form, and a certain column of the matrix is ​​a key word, for example, a 4*4 matrix includes 4 key words.

[0058] Step S102: Generate the number of bits r for cyclic shift, where r=0, 1, 2 or 3.

[0059] Specifically, a random number generator can be used to generate the number r of the cyclic shift, or a random number can be obtained from a preset random source to generate the number r of the cyclic shift, ...

Embodiment 2

[0115] This embodiment provides an AES-based encryption device, please refer to figure 2 , the device consists of:

[0116] Obtaining module 201, for obtaining the data to be encrypted and the preset key of standard AES algorithm;

[0117] A generating module 202, configured to generate the number of bits r of the cyclic shift, where r=0, 1, 2 or 3;

[0118] A conversion module 203, configured to convert the data to be encrypted into a first plaintext square matrix, and convert the preset key into a first key square matrix;

[0119] The first cyclic left shift module 204 is used to cyclically shift the columns of the first plaintext square matrix to the left by r bits to obtain the second plaintext square matrix after the circular left shift;

[0120] The second cyclic left shift module 205 is used to cyclically shift the column of the first key square matrix to the left by r bits to obtain the second key square matrix after the circular left shift;

[0121] An encryption ...

Embodiment 3

[0137] Based on the same inventive concept, the present application also provides a computer-readable storage medium 300, please refer to image 3 , on which a computer program 311 is stored, and the method in Embodiment 1 is implemented when the program is executed.

[0138] Since the computer-readable storage medium introduced in Embodiment 3 of the present invention is a computer-readable storage medium used to implement the AES-based encryption method in Embodiment 1 of the present invention, based on the method described in Embodiment 1 of the present invention, this Those skilled in the art can understand the specific structure and deformation of the computer-readable storage medium, so details will not be repeated here. All computer-readable storage media used in the method of Embodiment 1 of the present invention belong to the scope of protection of the present invention.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an AES (Advanced Encryption Standard)-based encryption method and device. The method comprises the following steps: firstly, acquiring to-be-encrypted data and a preset key of astandard AES algorithm; secondly, generating a digit number r of cyclic shift, converting the to-be-encrypted data into a first plaintext square matrix, and converting the preset key into a first keysquare matrix; thirdly, cyclically shifting the column of the first plaintext square matrix leftwards by r digits to acquire a second plaintext square matrix subjected to cyclic leftward shifting, and cyclically shifting the column of the first key square matrix leftwards by r digits to acquire a second key square matrix subjected to cyclic leftward shifting; fourthly, performing AES encryption on the second plaintext square matrix based on the second key square matrix to acquire a first output square matrix, wherein during the performing of the AES encryption, a differential energy consumption analysis-resistant side channel protection method is combined; and finally, cyclically shifting the first output square matrix rightwards by r columns to acquire a second output square matrix, wherein the second output square matrix is used as an encryption result. The AES-based encryption method achieves a technical effect of enhancing the side channel attack resistance.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an AES-based encryption method and device. Background technique [0002] AES is an international advanced encryption algorithm standard, adopted by the US government as the standard for block ciphers. The packet length of the AES algorithm is 128 bits (bits), and the length of the key can be 128 bits, 192 bits or 256 bits, and the corresponding transformation rounds are 10 rounds, 12 rounds and 14 rounds respectively. [0003] The security of the AES algorithm in resisting traditional password attacks has been proved by theory and practice. But this algorithm is insecure in the face of side-channel attacks, and there are many side-channel attack methods that can attack the AES algorithm. The side channel attack is a method of attacking the encryption device for the leakage of the side channel information during the operation of the encryption electronic device. Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/06
CPCH04L9/003H04L9/0631
Inventor 杨敏肖本长孟庆树
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products