Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer-oriented symmetric password formalized description method and system

A formal description, symmetric encryption technology, applied in encryption devices with shift registers/memory, digital data authentication, etc., can solve the problem of low efficiency of symmetric encryption algorithm implementation

Active Publication Date: 2021-04-16
SHANDONG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] In order to solve the above problems, the present invention proposes a computer-oriented symmetric encryption formal description method and system, which is compatible with the nonlinear operation and linear operation of the symmetric encryption algorithm, Describe all common symmetric cipher algorithms, add cascading and decomposing sentences to describe the cascading and decomposing relationships between large variables and small variables, improve the security and applicability of computer-aided analysis of symmetric cipher algorithms, and solve manual problems Analyze the problem of low efficiency of symmetric cryptographic algorithm implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer-oriented symmetric password formalized description method and system
  • Computer-oriented symmetric password formalized description method and system
  • Computer-oriented symmetric password formalized description method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] like figure 1 As shown, this embodiment provides a computer-oriented symmetric cryptographic formal description method, including:

[0052] S1: Decompose a symmetric cipher into multiple component functions;

[0053] S2: According to the input bit variable of the single operation in the ith component function, call the cascade statement to cascade the input of the ith component function into the input n 1 bit variable;

[0054] S3: According to the output bit variable of a single operation in the i-th component function, call the decomposition statement to decompose the output bit variable into n 2 a 1-bit variable;

[0055] S4: According to the input n 1 Bit variables and output bit variables, which formally describe the single operation of the i-th component function;

[0056] S5: put n 2 After the bit permutation of the 1-bit variable and the i+1th component function, the formal description of each component function in the symmetric cipher is obtained in turn....

Embodiment 2

[0158] This embodiment provides a computer-oriented symmetric cryptographic formal description system, including:

[0159] A decomposition module for decomposing a symmetric cipher into multiple component functions;

[0160] The cascade module is used to call the cascade statement to cascade the input of the ith component function into the input n according to the input bit variable of the single operation in the ith component function 1 bit variable;

[0161] The decomposition module is used to decompose the output bit variable into n by calling the decomposition statement according to the output bit variable of a single operation in the ith component function 2 a 1-bit variable;

[0162] describe module for input n according to 1 Bit variables and output bit variables, which formally describe the single operation of the i-th component function;

[0163] iterative description module for converting n 2 After the bit permutation of the 1-bit variable and the i+1th componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer-oriented symmetric password formalized description method and system. The method comprises the following steps: decomposing a symmetric password into a plurality of component functions; according to an input bit variable of a single operation in the ith component function, calling a cascade statement to cascade the input of the ith component function into an input n1 bit variable; according to an output bit variable of the single operation in the ith component function, calling a decomposition statement to decompose the output bit variable into n2 1-bit variables; according to an input n1 bit variable and an output bit variable, carrying out formalized description on the single operation of the ith component function; and after the n2 1-bit variables and the (i+1)th component function are subjected to bit replacement, sequentially obtaining formalized description of each component function in the symmetric password. The security and applicability of the algorithm for analyzing the symmetric password by computer assistance are improved, and the problem of low implementation efficiency of the algorithm for manually analyzing the symmetric password is solved.

Description

technical field [0001] The invention relates to the technical field of information security block cipher design and analysis, in particular to a computer-oriented symmetric cipher formal description method and system. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] Symmetric ciphers refer to cipher algorithms that use the same key for encryption and decryption, and are mainly used for data encryption; symmetric ciphers include block ciphers, message hash functions, and message authentication codes. And authentication encryption algorithm (authentication encryption algorithm) and so on. [0004] There are many types of symmetric cryptographic algorithms, such as SPN (substitution-permutation network) structure and Feistel structure, etc. Symmetric cryptographic algorithms are composed of nonlinear operations and linear (affine) operations....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46H04L9/06
Inventor 王美琴付勇胡凯初志辉陈师尧杨晨鹤张际福孙宇阳崔佳敏徐翌豪牛超
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products