Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of SM4 encryption, key extension method, device, equipment and medium

An encryption method and encryption key technology, which can be applied to encryption devices with shift registers/memory, secure communication devices, digital transmission systems, etc., and can solve the problems of complex calculation, inability to meet the fast encryption of massive data, and large amount of calculation. , to achieve the effect of improving computing efficiency and simplifying the SM4 key expansion algorithm

Active Publication Date: 2020-04-07
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The output of nonlinear transformation τ is the input of linear transformation L, let the input of L be output as but From the above calculation process, it can be seen that the calculation of T substitution in the existing SM4 encryption algorithm requires 4 times of table lookup calculations, 4 times of circular left shift calculations and 4 times of XOR operations, which is a large amount of calculation and complicated calculation
[0005] With the application of ciphers in cloud computing and big data, people have put forward higher requirements for the performance of cipher algorithms, expecting to quickly realize the encryption of massive data, but the existing SM4 encryption algorithm has a large amount of calculation and is complicated to meet Requirements for fast encryption of massive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of SM4 encryption, key extension method, device, equipment and medium
  • A kind of SM4 encryption, key extension method, device, equipment and medium
  • A kind of SM4 encryption, key extension method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The specific implementation manners of the SM4 encryption and key expansion method, device, equipment and medium provided by the embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0035] Such as figure 1 As shown, the SM4 encryption method that the embodiment of the present invention provides, its steps can comprise:

[0036] S11. Use the pre-generated round key to perform 32 iterative calculations on the 128-bit data to be encrypted, and the iterative calculation is: i=0, 1, ..., 31, where, RK i is the pre-generated round key, Indicates an XOR operation, and the calculation method of T is: if the input of T is A, but

[0037] During specific implementation, the round key may be generated using a method in the prior art, or may be generated using the round key extension method provided in the following embodiments of the present invention, which is not limited in this embodiment of the present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an SM4 encryption method and device, a key expansion method and device, equipment and a medium, which are used for optimizing an SM4 encryption algorithm andrealizing rapid encryption of mass data. The SM4 encryption method comprises the following steps: performing 32 times of iterative calculation on 128-bit data to be encrypted by utilizing a pre-generated round key, wherein the iteration calculation is as follows: i = 0, 1,..., 31, the RKi is a pre-generated round key and represents an exclusive-OR operation, and the calculation method of T is as follows: if T input is A, an iteration result of 32 times of iteration calculation is taken as encrypted data.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to an SM4 encryption and key expansion method, device, equipment and medium. Background technique [0002] SM4 is a block cipher algorithm, which is mainly used for data encryption. Its block length and key length are both 128 bits. Both the encryption algorithm and the key expansion algorithm adopt a 32-round nonlinear iterative structure. [0003] The calculation method of the T replacement in the existing SM4 encryption algorithm is T(·)=L(τ(·)), wherein, the nonlinear transformation τ is composed of 4 parallel S-boxes, and the input is set as output as then (b 0 , b 1 , b 2 , b 3 )=τA=(Sbox(a 0 ), Sbox (a 1 ), Sbox (a 2 ), Sbox (a 3 )). [0004] The output of nonlinear transformation τ is the input of linear transformation L, let the input of L be output as but From the above calculation process, it can be seen that the calculation of the T substituti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618
Inventor 王学进蒋红宇安晓江
Owner BEIJING HAITAI FANGYUAN HIGH TECH