Method for quickly encrypting and decrypting transmission key based on packet key mode
A transmission key, encryption and decryption technology, applied in the field of fast encryption and decryption of the transmission key based on the group key mode
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] A method for quickly encrypting and decrypting a transmission key under network transmission, which is mainly applied to encrypted transmission of multimedia data.
[0047] Encryption and decryption end devices are of the same type, store the same group key ekey, and require the XOR value of each byte of each group key ekey[i] to be 0.
[0048] The encryption end device reads the encryption key key, encryption algorithm Algorithm, and plaintext data C, and encrypts the plaintext data C through the encryption key key and encryption algorithm Algorithm to generate ciphertext data SC.
[0049] The encryption end device XORs each byte key[i] of the encryption key to obtain the group key index value index.
[0050] The encryption end device selects a group of keys ekey[index] under the group key through the group key index value index, and performs XOR operation with the encryption key key to generate the transmission key tkey.
[0051] The encryption end device sends the t...
Embodiment 2
[0057] A secure encryption and decryption hardware IP, mainly used for data encryption and decryption in safe mode.
[0058] The secure encryption and decryption hardware IP stores the same group key ekey, and requires the XOR value of each byte of each group key ekey[i] to be 0.
[0059] The CPU inputs the encryption algorithm Algorithm and plaintext data C, and initiates a data encryption request to the security encryption hardware IP.
[0060] The secure encryption hardware IP generates a random encryption key key, and encrypts the plaintext data C to be encrypted through the encryption algorithm Algorithm to generate encrypted ciphertext data SC.
[0061] The secure encryption hardware IP XORs each byte of the encryption key key to obtain the group key index value index.
[0062] The secure encryption hardware IP selects a group of keys ekey[index] under the group key through the group key index value index, and performs XOR operation with the encryption key key to genera...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

