Check patentability & draft patents in minutes with Patsnap Eureka AI!

Common key encryption device

A technology of public key and encryption device, applied in encryption device with shift register/memory, secure communication device, encoding/decoding device, etc. delays

Inactive Publication Date: 2005-05-25
KK TOSHIBA
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] However, since the same extended key R n The time that is not required for the generation process of , there is a problem of delay before starting decryption
[0021] As mentioned above, in the prior art, since the extended keys cannot be generated in the reverse order, all the extended keys need to be generated and stored before the decryption process, but there is a problem that, for example, in a poor hardware environment like an IC card, all the keys required for decryption are not stored. Problems with the remaining storage area for extended keys
[0022] In order to avoid this problem by key generation at any time, it is necessary to temporarily perform the same extended key generation process as in the encryption, obtain the output value obtained by applying the round function in the final cycle, and apply the output value in the reverse direction of the cycle in advance. The inverse function of each round function, but at this time there is also the problem that the delay before starting decryption cannot be avoided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Common key encryption device
  • Common key encryption device
  • Common key encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084] The present invention is applicable to all common-key encryption methods that use extended keys in reverse order for encryption and decryption, but the common-key encryption method for performing data mixing processing using each extended key one by one for block data of a specified length will be described below. An example of a keyed block encryption method.

[0085] In each of the figures referred to below (to focus on this encryption), the data to be encrypted is shown as plaintext, but of course, the data to be encrypted may be ciphertext encrypted by the same or another encryption method. This encryption method can utilize hardware to realize, also can utilize software to realize, and the structural example shown below also can be used as the functional block diagram of encryption device (decryption device), also can be used as the functional block diagram or flow chart of encryption algorithm (decryption algorithm).

[0086] figure 1 A configuration example of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an encryption and decryption device and an extended key generation device, method and recording medium. In the extended key generation unit of the encryption apparatus of the common key encryption method that uses the extended key in the reverse order during encryption and decryption, two cyclic functions f equal to the number of stages of the first stage and the stage number of the last stage are set. 1 and f n+1 are set to be inverse functions of each other. In this way, since the expansion key generation at the time of encryption and the expansion key generation at the time of decryption are basically the same, the expansion keys can be generated immediately and one by one in the order of use by using the public key as input at the time of encryption and at the time of decryption, which can avoid Generates a delay for generating extended keys, and can perform key generation on-the-fly.

Description

technical field [0001] This application is based on and claims the priority of prior Japanese Patent Application No. 2000-211686 filed on July 12, 2000, the entire contents of which are hereby incorporated by reference. [0002] The present invention relates to an encryption device, a decryption device, an extended key generation device, an extended key generation method, and a recording medium that use a plurality of extended keys in reverse order for encryption and decryption. Background technique [0003] Encryption technology is becoming more and more important for the security control of electronic information, especially copyright-related information, confidential information, or private information. Encryption is actually utilized in various forms in various fields. [0004] There are various encryption methods, one of which is public key encryption. The public key encryption method is a method in which decryption is performed using the same key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G09C1/00H04L9/06
CPCH04L9/002H04L9/0618H04L2209/08H04L2209/125H04L2209/20H04L2209/24G09C1/00
Inventor 村谷博文本山雅彦大熊建司佐野文彦川村信一
Owner KK TOSHIBA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More