Implementation method of novel lightweight block cipher CORL

A technology of block ciphers and implementation methods, applied in encryption devices with shift registers/memory, digital transmission systems, electrical components, etc., can solve problems such as complex algorithm decryption process, low encryption performance, and vulnerability to attacks

Active Publication Date: 2020-07-17
HENGYANG NORMAL UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a novel light-weight and high-efficiency block cipher CORL implementation method, and its purpose is to overcome the following problems in the prior art light-weight block cipher algorithm: Feistel network structure algorithm, di...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of novel lightweight block cipher CORL
  • Implementation method of novel lightweight block cipher CORL
  • Implementation method of novel lightweight block cipher CORL

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0059] CORL block cipher implementation method, the block length of the designed cipher algorithm is 64 bits, the key length is 80 bits, and the number of algorithm round iterations is N R It is 22 rounds of operation.

[0060] The encryption structure of the CORL block cipher algorithm is as follows: figure 1 As shown, the decryption structure of the CORL block cipher algorithm is as follows figure 2 shown;

[0061] The round function operation of the algorithm mainly includes F-function transformation (F-Function) and round transposing T transformation (RoundTransposing); but the last round of function operation does not perform round transposing T transformation, see image 3 shown.

[0062] The F function transformation process is row shift transformation (Rowshift)→round key plus transformation (AddRoundKey)→S box replacement transformation (S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an implementation method of a novel lightweight block cipher CORL. According to the method, a novel generalized Feistel network structure is designed, the structural algorithmoptimizes the defect that a round of iterative operation of a traditional Feistel network structure only changes a half of data packet data, and achieves an effect that three fourths of packet data ischanged through a round of iteration. An algorithm round function comprises an F function, and the conversion process of the F function sequentially comprises row shifting, round key addition, S boxreplacement, row shifting and column confusion. The algorithm structure is convenient for software and hardware realization, the algorithm decryption basically multiplexes the encryption module, decryption can be performed only by adding some control signals, the operation is simple, and decryption is realized without consuming more resources. Compared with the current block cipher, the occupied resource is small, the encryption performance is high, and the known attack can be resisted.

Description

technical field [0001] The invention designs a method for realizing a novel lightweight block cipher CORL. Background technique [0002] The block cipher algorithm is an algorithm that uses the same key for encryption and decryption. In essence, the block cipher algorithm is a finite iterative permutation transformation with a key. ciphertext. The block cipher algorithm has the characteristics of fast speed, standardization and easy hardware and software implementation. It has always been an encryption scheme under resource constraints. As the core cipher in information security, block cipher has a wide range of applications in the field of Internet of Things application security. [0003] In recent years, with the rapid development of Internet of Things technology, wireless sensors (WSN) and radio frequency (RFID) are more and more widely used. These devices have hardware manufacturing, low maintenance costs, network robustness, strong self-organization, and wide applicab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/0631H04L9/0625
Inventor 李浪龙荣桀
Owner HENGYANG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products