Encoding method
An encryption method, encryption algorithm technology, applied in encryption devices with shift registers/memory, digital transmission systems, electrical components, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0103] figure 1 A partial schematic diagram showing the first twofold subcycle of one subcycle of the Comp128-1 algorithm. In this algorithm, a 16-byte long key Ki with 16 key bytes K[0], K[1], ..., K[15] and a 16-byte long key Ki with 16 The plaintext C (challenge) of plaintext bytes C[0], C[1], ..., C[15] calculates a 12-byte long hash value.
[0104] In the first sub-loop, the i-th key byte K[i] and the i-th plaintext byte C[i] are calculated for i=0...7, and the (i+8)-th key Byte K[i+8] and the (i+8)th plaintext byte C[i+8], so that the first sub-cycle U1, U2, U3 is calculated for each i from 0 to 7 , 4 results for U4. A first result Z1 of the second sub-cycle and a second result Z2 of the second sub-cycle are calculated from U1 and U2. A third result Z3 of the second sub-cycle and a fourth result Z4 of the second sub-cycle are calculated from U3 and U4. For i=0, the results Z1, Z2, Z3, Z4 of the second sub-cycle are only related to the key byte pair (KA1, KA2) with ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


