Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for quickly encrypting and decrypting transmission key based on packet key mode

A transmission key, encryption and decryption technology, applied in the field of fast encryption and decryption of the transmission key based on the group key mode

Active Publication Date: 2021-03-19
HANGZHOU NATCHIP SCI & TECH
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a method for fast encryption and decryption of the transmission key based on the group key mode, to solve the security transmission of the existing encryption algorithm key, and to quickly encrypt and decrypt

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for quickly encrypting and decrypting transmission key based on packet key mode
  • Method for quickly encrypting and decrypting transmission key based on packet key mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] A method for quickly encrypting and decrypting a transmission key under network transmission, which is mainly applied to encrypted transmission of multimedia data.

[0047] Encryption and decryption end devices are of the same type, store the same group key ekey, and require the XOR value of each byte of each group key ekey[i] to be 0.

[0048] The encryption end device reads the encryption key key, encryption algorithm Algorithm, and plaintext data C, and encrypts the plaintext data C through the encryption key key and encryption algorithm Algorithm to generate ciphertext data SC.

[0049] The encryption end device XORs each byte key[i] of the encryption key to obtain the group key index value index.

[0050] The encryption end device selects a group of keys ekey[index] under the group key through the group key index value index, and performs XOR operation with the encryption key key to generate the transmission key tkey.

[0051] The encryption end device sends the t...

Embodiment 2

[0057] A secure encryption and decryption hardware IP, mainly used for data encryption and decryption in safe mode.

[0058] The secure encryption and decryption hardware IP stores the same group key ekey, and requires the XOR value of each byte of each group key ekey[i] to be 0.

[0059] The CPU inputs the encryption algorithm Algorithm and plaintext data C, and initiates a data encryption request to the security encryption hardware IP.

[0060] The secure encryption hardware IP generates a random encryption key key, and encrypts the plaintext data C to be encrypted through the encryption algorithm Algorithm to generate encrypted ciphertext data SC.

[0061] The secure encryption hardware IP XORs each byte of the encryption key key to obtain the group key index value index.

[0062] The secure encryption hardware IP selects a group of keys ekey[index] under the group key through the group key index value index, and performs XOR operation with the encryption key key to genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for quickly encrypting and decrypting a transmission key based on a packet key mode. In an existing method, a secret key belongs to plaintext transmission, and ciphertext data is easy to crack. According to the invention, the grouping secret keys at the encryption end and the decryption end are kept consistent, and the value of successive XOR of each byte of the grouping secret keys is 0. The encryption comprises the steps: enabling the encryption end to randomly generate an encryption key, carrying out XOR on each byte successively, generating a block cipher selection index, and obtaining a block key; performing exclusive OR on the encryption key and the grouping key to generate a transmission key; and sending the encrypted ciphertext data together with the transmission key and the encryption algorithm. The decryption comprises the steps: enabling the decryption end to successively perform exclusive OR on each byte of the transmission key to generate ablock cipher selection index to obtain a block key; performing exclusive OR on the packet key and the transmission key to generate a decryption key, and decrypting the ciphertext data through a decryption algorithm and the decryption key to obtain plaintext data. According to the method provided by the invention, the security of the encryption and decryption key in the transmission process is ensured, and the security of ciphertext data is protected.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to the technical field of encryption and decryption of communication data, and relates to a method for fast encryption and decryption of a transmission key based on a group key mode. Background technique [0002] With the rapid development and wide application of information technology, information security has attracted more and more attention and attention, and the requirements for data content security in the transmission process have become increasingly prominent. There are many traditional encryption and decryption algorithms, including AES (Advanced Encryption Standard) encryption and decryption algorithm, DES (Data Encryption Standard) encryption and decryption algorithm, and 3DES (Triple Data Encryption Algorithm) encryption and decryption algorithm. Each encryption and decryption algorithm needs to be encrypted. The decryption key key, but the encryption and de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/32
CPCH04L9/0861H04L9/0625H04L9/0631H04L9/3234
Inventor 林贤生刘建华刘非赵广富沈建春黄俊翔
Owner HANGZHOU NATCHIP SCI & TECH