Supercharge Your Innovation With Domain-Expert AI Agents!

Encryption method based on AES encryption algorithm

An encryption algorithm and encryption method technology, applied in encryption devices with shift registers/memory, digital transmission systems, electrical components, etc., can solve the leakage of plaintext data information, increase the cost of obtaining sensitive data, and increase the strength of ciphertext problems, to achieve the effect of improving security performance and increasing the difficulty of cracking

Pending Publication Date: 2021-08-03
国网黑龙江省电力有限公司齐齐哈尔供电公司 +1
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The ciphertext obtained by using AES to encrypt the same plaintext is usually fixed, so that a table corresponding to plaintext-ciphertext can be obtained. As long as the plaintext-ciphertext table is comprehensive enough, illegal crackers can use the plaintext-ciphertext table to crack Calculate the plaintext you want to crack, resulting in the leakage of plaintext data information
[0005] Patent Document 1 (publication number: CN106385313A) discloses a random ciphertext system based on block encryption algorithm and its implementation method, which automatically judges the length of the number of bits of the encrypted plaintext and the block length of the block encryption algorithm used, and intelligently fills the plaintext The random ciphertext generation method can generate different ciphertext information after each encryption, which greatly increases the cost for hackers to obtain sensitive data, increases the strength of ciphertext, and can only improve the security of related systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method based on AES encryption algorithm
  • Encryption method based on AES encryption algorithm
  • Encryption method based on AES encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] A kind of encryption method based on AES encryption algorithm, this method comprises the steps: at first, plaintext is input in the AES encryption algorithm in the form of parameter, carries out the key expansion operation and obtains the round key; Carries out the circular iterative operation of round encryption: byte Substitution, row shifting, column mixing and round key addition to get the ciphertext C; execute the pseudo-random number generation function and use the system time as the seed to generate a random data string G; the final ciphertext consists of ciphertext C and random data characters The string G is composed of two parts; the randomness of the ciphertext is realized, the difficulty of cracking is increased, and the security performance of the encryption algorithm is improved.

Embodiment 2

[0036] According to a kind of encryption method based on AES encryption algorithm described in embodiment 1, the concrete steps of described encryption method are as follows:

[0037] Step 1: The plaintext is passed into the AES encryption algorithm in the form of parameters to obtain the system time;

[0038] Step 2: Execute the key expansion algorithm to obtain the round key;

[0039] Step 3: Execute the byte substitution algorithm;

[0040] Step 4: Execute the row shift algorithm;

[0041] Step 5: Execute the column mixing algorithm;

[0042] Step 6: Execute the round key addition algorithm;

[0043] Step 7: Judging whether the number of loop iterations has been reached, if yes, go to 8 to obtain the ciphertext C, otherwise go to 3;

[0044] Step 8: Execute the pseudo-random number generation function to obtain the random data string G;

[0045] Step 9: Output the final ciphertext C+G.

Embodiment 3

[0047] According to a kind of encryption method based on AES encryption algorithm described in embodiment 2, use AES encryption algorithm to encrypt plaintext data to obtain ciphertext C, pseudo-random number generator generates random data string G, and final ciphertext is composed of ciphertext C and random The data string G consists of two parts. The resulting ciphertext is random.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method based on an AES encryption algorithm. Existing encryption algorithms are divided into a symmetric encryption algorithm and an asymmetric encryption algorithm, the same key is used for encryption and decryption operation, a ciphertext obtained by encrypting the same plaintext through AES is generally fixed, a plaintext-ciphertext table is sufficiently comprehensive, an illegal cracker can crack the plaintext, and leakage of plaintext data information is caused. The method comprises the following steps: firstly, inputting a plaintext into an AES encryption algorithm in a parameter form, and executing a key expansion operation to obtain a round key; executing loop iteration operation of round encryption: byte substitution, row shift, column mixing and round key addition to obtain a ciphertext C; executing a pseudo-random number generation function, and generating a random data character string G by taking the time of the system as a seed; the final ciphertext is composed of a ciphertext C and a random data character string G; the randomness of the ciphertext is realized, the cracking difficulty is increased, and the safety performance of an encryption algorithm is improved. The invention is applied to the encryption method based on the AES encryption algorithm.

Description

technical field [0001] The invention relates to the technical field of Internet of Things data node data encryption, in particular to an encryption method based on an AES encryption algorithm. Background technique [0002] Data encryption is a reliable method to ensure the data security of IoT data nodes. Data is converted from plaintext to ciphertext through encryption algorithms and encryption keys, thereby protecting data security; [0003] Existing encryption algorithms are divided into two types: symmetric encryption algorithm and asymmetric encryption algorithm. The characteristic of symmetric encryption algorithm is that the encryption and decryption operations use the same key, such as AES encryption algorithm and DES encryption algorithm; the characteristics of asymmetric encryption algorithm are Encryption and decryption operations use different keys, including ABE encryption algorithm, ECC encryption algorithm, and homomorphic encryption algorithm; the predecessor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
CPCH04L9/0631H04L9/0656
Inventor 孙杰陆仲达申林全晓峰柳杨李海涛王成松高宇许健宇曹羽生靳方明胡志洋郝志鹏李环玉王秋林刘岩
Owner 国网黑龙江省电力有限公司齐齐哈尔供电公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More