Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for block-encryption of discrete data

A technology for block encryption and discrete data, applied in encryption devices with shift registers/memory, digital transmission systems, usage of multiple keys/algorithms, etc., can solve low encryption rate, high encryption rate, 56-bit encryption Key bit length and other issues, to achieve the effect of increased encryption rate, high anti-decryption resistance, and increased rate

Inactive Publication Date: 2006-10-18
莫斯科戈罗德电话设备公开股份公司 +3
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] However, the above methods also have some disadvantages, that is, when implemented in the form of software, the encryption rate is low
In addition, due to the short length of the 56-bit key used in this method, illegal users can use high-performance computers to decipher the key by exhaustively enumerating all possible key values, resulting in confidentiality.
For this reason, this method needs to use many different keys to repeat the encryption process many times, making it difficult to obtain a high encryption rate even if it is implemented in hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for block-encryption of discrete data
  • Method for block-encryption of discrete data
  • Method for block-encryption of discrete data

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0040] In this example, the 64-bit data block is encrypted by using a controlled permutation operation as an operation performed on the subkey from one of the transformed data blocks. The generated encryption key is in the form of 16 subkeys K each with a length of 32 bits. 1 , K 2 , K 3 ,...,K 16 . Also no additional subkeys are used. The input data block is decomposed into two 32-bit sub-blocks A and B. The input data block encryption algorithm is as follows:

[0041] 1. Set the encryption round counter r: = 1;

[0042] 2. According to the formula B:=BP A (K 2r ) to transform the sub-block B, where P A (K 2r ) indicates that the subkey K is paired according to the value of subblock A 2r The digit permutation operation performed.

[0043] 3. Transform the sub-block A according to the formula A:=AB

[0044] 4. According to the formula A:=AP B (K 2r-1 ) to transform the sub-block A, where P B (K 2r-1 ) means pairing subkey K according to the value of subbloc...

example 2

[0059]What is used in this example is the cyclic offset operation performed on the subkey according to the transformed subblock. The steps are as follows: First, generate a subkey K in the form of 16 bits with a length of 32 bits 1 , K 2 ,...,K 32 encryption key; then decompose a 64-bit input data block into two 32-bit sub-blocks A and B; then encrypt according to the following algorithm:

[0060] 1. Set the round counter value r=1

[0061] 2. According to formula B:=B(K 2r 2r <<

[0062] 3. Transform the sub-block A according to the formula A:=AB, where "" ​​means modulo 2 32 Addition operation.

[0063] 4. According to the formula A:=A(K 2r-1 2r-1 2r-1 Performs a circular shift operation that shifts B digits to the left.

[0064] 5. Sub-block B is transformed according to the formula B:=BA.

[0065] 6. If r≠16, add one to the counter r:=r+1, and jump to step 2, otherw...

[0068] What is used in this example is the replacement operation performed on the subkey according to the subblock to be transformed. For this example, data block P 1 and P 2 Indicates the operation data block on which the replacement operation is performed according to an appropriate number of sub-blocks. Wherein the substitution operation represents the replacement of the binary signal value on the input of the operation data block P with another binary value (set by the output of the operation data block) (which is obtained by referring to a substitution table and according to the input of the data block P value to perform the selected) operation. Two forms of substitution operations can be implemented as follows:

[0069] (1) replace an n-bit input binary vector with an n-bit output binary vector, whereby different output binary vectors correspond to different input binary vectors;

[0070] (2) An m-bit binary vector is replaced by an n-bit output binary vector, where ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of electronic communication and computer technology, in particular, the present invention relates to an encryption method and device for digital data. The method comprises the steps of: generating an encryption key in the form of a combination of a group of sub-keys; decomposing the data block into N≥2 sub-blocks, and performing double address operations on the sub-blocks and sub-keys alternately Sub-blocks are transformed. The method is characterized in that: before performing dual-address operation on the i-th sub-block and the sub-key, the transformation operation based on the j-th sub-block will be performed on the sub-key, where j≠i. The method is further characterized in that the transformation operation based on the jth sub-block is based on the replacement operation performed by the jth sub-block on the digits of the subkey. Another feature of this method is that the transformation operation based on the jth sub-block is based on the subkey cyclic shift operation of the jth sub-block. The method is finally characterized in that the transformation operation based on the jth subblock is a substitution operation performed on the subkeys according to the jth subblock.

Description

technical field [0001] The invention relates to the technical field of electronic communication and computer, in particular to a method for encrypting messages (information). Background technique [0002] In the ensuing description of the required method, all terms used have the following meanings: [0003] - the key represents a combination of digits known only to legitimate users; [0004] - The encryption key is a combination of digits used in the encryption process of data information signals; the encryption key can be changed during the encryption process to transform a given message or multiple given messages; the encryption key is based on a determined program Formed with a key; in many encryptors, this key is often used; [0005] - Encryptor is the general term for all basic steps of transforming input data using an encryption key; an encryptor can be implemented by a computer program or by an independent electronic device; [0006] - a subkey means a part of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00G09C1/00H04L9/06
CPCH04L9/0625H04L2209/24H04L9/14
Inventor 亚历山大·安得烈耶维奇·莫尔多维安尼古莱伊·安得烈耶维奇·莫尔多维安尼古莱伊·维克托罗维奇·萨乌卢科夫
Owner 莫斯科戈罗德电话设备公开股份公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More