A novel key generation shield block cipher implementation method, device and readable storage medium

A key generation and block cipher technology, which is applied in encryption devices with shift registers/memory, secure communication devices, digital transmission systems, etc. It can solve the problem that the key expansion function is not easy to save, vulnerable to attacks, and fixed S-boxes occupying resources Occupation and other issues

Active Publication Date: 2021-02-19
HENGYANG NORMAL UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a Shield block cipher implementation method, device and readable storage medium related to a new type of key generation. Attacks and the 8×8 fixed S-box occupying a lot of resources and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A novel key generation shield block cipher implementation method, device and readable storage medium
  • A novel key generation shield block cipher implementation method, device and readable storage medium
  • A novel key generation shield block cipher implementation method, device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0085] A shield block cipher implementation method for new key generation. In this example, the implementation method of the Shield block cipher adopts the SPN structure, the block length is 128 bits, the key length is not fixed, and the iteration is 32 rounds. Shield encryption operation process is as follows: figure 1 As shown, it includes key generation function and encryption round function. The encryption round function operation includes round key plus transformation (AddRoundKey), S-box replacement transformation (SubCells), row shift transformation (ShiftRows), column mixing transformation (MixColumns) Four modules. The decryption operation flow is as follows figure 2 The algorithm decryption round operation includes four modules: column mix inverse transformation (InvMixColumns), row shift inverse transformation (InvShiftRows), S-box replace...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, device and readable storage medium for realizing a Shield block cipher for generating a new type of key. The Shield block length of the method is designed to be 128 bits, the key is of any length, the encryption round function is based on the SPN structure, and the encryption sequence is The sequence is round key addition, S-box replacement, row shift and column mixed transformation. The key expansion function divides the original key into three parts, and uses the hash function MD5 to generate three round keys, which are used in different rounds of round key addition operations. S-box replacement transformation uses two 4×4 S-boxes to perform 128-bit data replacement transformation, and divides the data into 32 4-bit units. As the number of encryption / decryption rounds changes, the data units are replaced by corresponding S-box increments / decrements. operate. The Shield cipher occupies a small area and resources, which reduces the storage space for saving the original key. By increasing the key length and expanding the key space, it can well resist known attacks.

Description

technical field [0001] The invention relates to a novel key generation Shield block cipher realization method, device and readable storage medium. Background technique [0002] In recent years, the development of supercomputers in the world has been advancing by leaps and bounds. Its computing power has been showing exponential growth in recent years. The security of cryptographic systems and cryptographic algorithms has received serious impact. Using powerful computing power to carry out the most basic brute force attack method to crack the key of the password. The key length determines the number of possible keys, so increasing the key length increases the difficulty of cracking. After DES is cracked, the 3DES scheme is adopted to improve the security of the cryptographic algorithm by increasing the key length, while AES As for the encryption algorithm, the AES algorithm with a key length of 256 bits is used for encrypted transmission of highly confidential information. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618H04L9/0643
Inventor 刘波涛李浪李秋萍张剑赵军霞刘青云李永超黄莹
Owner HENGYANG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products