Format-preserving encryption method and decryption method based on message authentication code algorithm

A technology of format-preserving encryption and message authentication code, which is applied in the field of information security, can solve the problems of slow execution efficiency of FPE algorithm, decreased execution efficiency, and difficult implementation of FPE algorithm.

Active Publication Date: 2021-06-18
工业信息安全(四川)创新中心有限公司
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) First of all, the execution efficiency of these FPE algorithms is very slow, which is significantly lower than that of ordinary encryption modules, such as ECB, CBC, CTR, etc.; for example, the current PC performs AES encryption with 16 bytes usually less than 1 microseconds; but the encryption time of FF1 and FF3-1 is tens to hundreds of times of these encryption times
[0006] (2) Secondly, with the promulgation and formal implementation of the "Encryption Law of the People's Republic of China", various industries have vigorously promoted the application and implementation of commercial cryptography in my country, and these FPE algorithms proposed by NIST all use foreign AES series algorithms instead of commercial cryptography in my country algorithm, which makes these FPE algorithms difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Format-preserving encryption method and decryption method based on message authentication code algorithm
  • Format-preserving encryption method and decryption method based on message authentication code algorithm
  • Format-preserving encryption method and decryption method based on message authentication code algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0152] Such as figure 2 As shown, the present embodiment proposes a format-preserving encryption method based on the message authentication code algorithm, and the encryption method is expressed as GMFPE - Enc ( K , T , P ), including the following steps:

[0153] S11, such as image 3 As shown, string splitting: the input plaintext to be encrypted P Split into two substrings and convert them to BN-type integers:

[0154] specifically:

[0155] S111, input:

[0156] key K , the key in this example K Be a byte string of not less than 16 bytes;

[0157] An adjustment factor of length 7 bytes T ;

[0158] and the plaintext to be encrypted P ; The plaintext to be encrypted P is the length of n The character string; in this example, n satisfy , radix Satisfy 2≤ radix ≤65536;

[0159] S112, take INT type integer respectively , v ← n - u , the symbol ← stands for assignment, that is, assigned to u , n - u assigned to v ; the plaintext string P spl...

Embodiment 2

[0224] This embodiment provides a format-retaining decryption method based on a message authentication code algorithm, and the decryption method is used for the ciphertext obtained by the encryption method described in Embodiment 1 C Decryption, that is, the inverse operation of the encryption method of embodiment 1; as Figure 6 As shown, remember that the encryption method is expressed as GMFPE - December ( K , T , P ), including the following steps:

[0225] S21, string splitting: the input ciphertext to be decrypted P Split into two substrings and convert them into BN-type integers;

[0226] specifically:

[0227] S211, enter the key K , an adjustment factor of length 7 bytes T , and the ciphertext to be decrypted C ; The plaintext to be encrypted C is the length of n String, n satisfy , radix Satisfy 2≤ radix ≤65536; K , T Consistent with embodiment 1;

[0228] S212, take INT type integer respectively , v ← n - u , the symbol ← stands for assign...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a format-preserving encryption method and decryption method based on a message authentication code algorithm. The encryption method comprises the following steps: S11, character string splitting: splitting an input plaintext P to be encrypted into two sub-character strings, and respectively converting the two sub-character strings into BN type integers; s12, performing character string iteration: setting an iteration index number i to be equal to 0, 1, 2,..., 7, and performing eight rounds of iteration based on a Feistel structure and PRF conversion on the two BN type integers obtained in the step S11, wherein the PRF conversion is a pseudo-random digital node generation function based on a message authentication code algorithm HMAC-SM3; and S13, character string merging: respectively converting the two BN type integers obtained through iteration into character strings, then connecting the character strings in series and merging them into one character string, and obtaining a ciphertext C. The encryption method provided by the invention meets the requirements of localization and security and is relatively high in execution efficiency.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a format-preserving encryption method and decryption method based on a message authentication code algorithm. Background technique [0002] Nowadays, with the rapid development of computer technology, all kinds of sensitive data are spread on the network every day. A large number of third-party organizations collect, analyze, and mine these sensitive data. The use of these data has also caused many sensitive data leakage problems, and even serious privacy leakage incidents often occur, which may cause irreparable losses. . In practical applications, a common means of protection is to encrypt these sensitive data. However, for data with a specific format in the database, such as sensitive data such as bank card numbers and ID card numbers, a series of problems will arise when using traditional block cipher algorithms to directly encrypt data. Changes, etc.,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0631
Inventor 罗影张文科敖麒刘红军
Owner 工业信息安全(四川)创新中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products