Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

AES key arrangement method

A key and round key technology, applied in the field of information security, can solve the problems of inability to complete algorithm power consumption, efficiency and security performance, and achieve the effect of reducing correlation, increasing security, and increasing cryptographic characteristics

Pending Publication Date: 2022-07-05
HARBIN UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, in the wireless channel protocol, whether it is the WIFI protocol, the Bluetooth protocol or the Zigbee protocol, the Advanced Encryption Standard is used as the encryption algorithm built into the protocol, and the existing lightweight block encryption algorithms also use the Advanced Encryption Standard as a reference or as an advanced encryption standard. A variant of the encryption standard. A good cryptographic algorithm should satisfy both efficiency and security. With the rapid development of the Internet of Things and wireless sensor networks, the traditional encryption algorithm has been unable to complete the power consumption, efficiency and security of the algorithm in the current wireless network environment. Security performance requirements, so an AES key arrangement method is designed to enhance the security of the AES encryption process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AES key arrangement method
  • AES key arrangement method
  • AES key arrangement method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0023] see figure 1 , an AES-128 key arrangement method, when using AES-128 encryption for sensitive data sets, using software or hardware to implement the present invention, and generating a random sequence Rand through a binary integer chaotic sequence generation module, the binary integer chaotic sequence The sequence generation module is connected with a round function module and a key expansion module, the round function module i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an advanced encryption standard (AES) key arrangement method. According to the method, firstly, the confusion and diffusion performance of the algorithm is improved by using the good cryptographic characteristic of a chaos equation, and a chaos sequence and a round function are combined to be used for generating a round key by combining the advantages of the original round function; known attacks aiming at an algorithm are resisted by changing operation of a round function and introducing an initial encryption concept, then a new round constant table and two key arrangement schemes are designed, correlation between round keys is reduced, the round keys can reach brute force cracking strength in the second round, and meanwhile, the number of the round keys is reduced. By using the algorithm provided by the invention, the stream encryption of the packet can be realized, different round keys can be generated when the same initial key is used when the plaintext packet is encrypted each time, the KRAK attack aiming at a wireless channel protocol can be resisted, and the safety performance of the original algorithm is greatly improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an AES key arrangement method. Background technique [0002] While WLAN brings convenience to users, people also pay attention to its security. However, due to the inherent openness of wireless network transmission media, the limitation of wireless terminal resources, the mobility of wireless terminals and the network topology The dynamics of wireless networks, therefore, security issues, as the biggest challenge in the development of wireless networks, have always been the focus of research in both academia and industry. [0003] The Advanced Encryption Standard is a block cipher algorithm released by the National Institute of Standards and Technology (NIST) after the data encryption standard is broken. Since the publication of the Advanced Encryption Standard, it has been used as a core encryption algorithm in various security protocols. Because of its fast implem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/06
CPCH04L9/001H04L9/0631Y02D30/70
Inventor 朱巍伟仇化平李子祺
Owner HARBIN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products