A decryption method and system based on an Aes algorithm

An algorithm and ciphertext technology, applied in the field of network communication, can solve the problems of discarding the second packet, decryption errors, etc., to achieve the effect of ensuring security, not affecting the chip bandwidth, and reducing the probability of discarding

Active Publication Date: 2019-05-31
SUZHOU CENTEC COMM CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Usually, in order to ensure high bandwidth, a pipeline method is used to implement; when using pipeline operations, there will be some special situations. When two back-to-back messages with the same key index need to be decrypted, the first message will be decrypted according to the key index. Get the corresponding initial vector and calculate the corresponding authentication label at eop. If the eop of the first packet has not arrived yet, the second packet has already entered the pipeline for decryption. At this time, the second packet needs to Get your own initial vector, but the authentication label calculation of the first package is not yet completed, so the initial vector obtained by the second package is the old value, at this time the decryption of the second package will be wrong, resulting in back-to-back The second packet is dropped

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A decryption method and system based on an Aes algorithm
  • A decryption method and system based on an Aes algorithm
  • A decryption method and system based on an Aes algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in detail below in conjunction with specific embodiments shown in the accompanying drawings. However, these embodiments do not limit the present invention, and any structural, method, or functional changes made by those skilled in the art according to these embodiments are included in the protection scope of the present invention.

[0044] like figure 1 As shown, in one embodiment of the present invention, the decryption method based on the Aes algorithm includes:

[0045]S1. Receive the ciphertext, and obtain the original authentication label carried by the ciphertext and the corresponding key index.

[0046] After the message starts to be sent, each ciphertext in the message is obtained in turn, and each message is analyzed separately to obtain the original authentication label and the corresponding key index corresponding to each ciphertext.

[0047] S2. At the sop moment of the current ciphertext, correspondingly search the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a decryption method and system based on an Aes algorithm, and the method comprises the steps: receiving a ciphertext, and obtaining a corresponding original authentication labeland a key index; adding a standby initial vector memory, calling an initial vector corresponding to the key index of the current ciphertext, updating the initial vector according to an Aes protocol rule, and storing the updated initial vector in the standby initial vector memory to form a corresponding standby initial vector; according to the same Aes protocol operation logic, obtaining a first plaintext and a second plaintext corresponding to the current ciphertext respectively according to the obtained parameters, and obtaining a first authentication label and a second authentication labelcorresponding to the first plaintext and the second plaintext respectively; and confirming an output decryption result according to a corresponding relationship among the first authentication tag, thesecond authentication tag and the original authentication tag. According to the method and the device, the two back-to-back messages to be decrypted with the same key index can be correctly decrypted, so that the dropping probability in the message decryption process is reduced, and the chip bandwidth is not influenced while the network message security is ensured.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a decryption method and system based on the Aes algorithm. Background technique [0002] AES (Advanced Encryption Standard) is a symmetric block cipher algorithm released by the National Institute of Standards and Technology in FIPS PUB 197 in 2001. The Ethernet switch chip needs to encrypt and decrypt the input message according to the Aes algorithm in the 802.1AE protocol to ensure information security. This algorithm groups information into 128 bits (16 bytes). text) to decrypt the Aes algorithm, it is necessary to get the corresponding data from ivInfo (initial vector memory) and calculate iv (Initial Vector, initial vector) at the moment of sop (Start of packet, packet start), that is, when the message starts to be sent, Calculate the correct icv (Integrity Check Value, authentication label) at eop (End of packet, end of packet), and compare it with the authentication l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 孙冠男江源蔡晓艳
Owner SUZHOU CENTEC COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products