Implementation method of SM4-like cryptographic algorithm

A technology of cryptographic algorithm and implementation method, which is applied in computing, computer security devices, encryption devices with shift registers/memory, etc., and can solve problems such as low-round SM4 algorithm security threats

Active Publication Date: 2020-01-10
ANHUI JIYUAN SOFTWARE CO LTD +4
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The structure of the SM4 algorithm is designed based on 32-bit words and 8-bit bytes, but at present, it is impossible for differential, zero-correlation linear, integral, etc. to pose a threat to the security of the low-round SM4 algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of SM4-like cryptographic algorithm
  • Implementation method of SM4-like cryptographic algorithm
  • Implementation method of SM4-like cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to further illustrate the features of the present invention, please refer to the following detailed description and accompanying drawings of the present invention. The accompanying drawings are for reference and description only, and are not intended to limit the protection scope of the present invention.

[0023] Such as figure 1 As shown, this embodiment discloses a method for implementing a class SM4 cryptographic algorithm, including the following steps S1 to S5:

[0024] S1. Grouping the file data to be encrypted to generate multiple pieces of data, the multiple pieces of data are divided into the first type of input data and the second type of input data;

[0025] S2. Perform a cyclic shift operation on at least two pieces of data in the first type of input data to obtain preprocessed first type of input data;

[0026] S3. After performing the first XOR operation on the preprocessed input data of the first type, they are sequentially input to the S box ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an implementation method of an SM4-like cryptographic algorithm, which belongs to the technical field of cryptography. The method comprises the following steps of: grouping file data to be encrypted to generate a plurality of pieces of data, and dividing the plurality of pieces of data into a first type of input data and a second type of input data; performing cyclic shiftoperation on at least two branch data in the first type of input data to obtain preprocessed first type of input data; performing first exclusive-OR operation on the preprocessed first type of input data, and sequentially inputting the first type of input data into an S box for change and P replacement to obtain first output data; and performing a second XOR operation on the first output data andthe second type of input data to obtain an intermediate state, and performing iteration on the intermediate state to obtain a ciphertext. The cyclic shift operation is introduced before XOR of the first type of input data, so that the relative positions of the same data entering the S box for three times are different, and the diffusivity of the algorithm is improved.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to an implementation method of an SM4-like encryption algorithm. Background technique [0002] With the rapid development of electronic computer and communication technology, the Internet has penetrated into many fields. The information system established on this basis has brought great changes to people's daily life and work, but at the same time, the open environment has also brought security threats to the information system. Information security technology is an important means to maintain information confidentiality, integrity and reliability, and it includes all measures to protect information from illegal modification, destruction and disclosure. Cryptographic technology is the core of information security technology, which includes the design and analysis of cryptographic algorithms, identity authentication and digital signature, key management and other security areas. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/06
CPCG06F21/602H04L9/0618H04L9/0631
Inventor 叶志远倪鹏程李志浩谢科军蒲强陈颢凡恒山曹灿王文清李国春赵子岩闫龙川高德荃陈智雨李莉敏夏同飞王继业魏晓菁曾楠陈超万涛赵永生丁正阳黄进缪巍巍吴海洋
Owner ANHUI JIYUAN SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products