Unlock instant, AI-driven research and patent intelligence for your innovation.

Encoding method

An encryption method, encryption algorithm technology, applied in encryption devices with shift registers/memory, digital transmission systems, electrical components, etc.

Inactive Publication Date: 2012-08-29
GIESECKE DEVRIENT MOBILE SECURITY GMBH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this also limits the number of regular implementations that can take place within this time interval
This greatly limits the user-friendliness of the encryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encoding method
  • Encoding method
  • Encoding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] figure 1 A partial schematic diagram showing the first twofold subcycle of one subcycle of the Comp128-1 algorithm. In this algorithm, a 16-byte long key Ki with 16 key bytes K[0], K[1], ..., K[15] and a 16-byte long key Ki with 16 The plaintext C (challenge) of plaintext bytes C[0], C[1], ..., C[15] calculates a 12-byte long hash value.

[0104] In the first sub-loop, the i-th key byte K[i] and the i-th plaintext byte C[i] are calculated for i=0...7, and the (i+8)-th key Byte K[i+8] and the (i+8)th plaintext byte C[i+8], so that the first sub-cycle U1, U2, U3 is calculated for each i from 0 to 7 , 4 results for U4. A first result Z1 of the second sub-cycle and a second result Z2 of the second sub-cycle are calculated from U1 and U2. A third result Z3 of the second sub-cycle and a fourth result Z4 of the second sub-cycle are calculated from U3 and U4. For i=0, the results Z1, Z2, Z3, Z4 of the second sub-cycle are only related to the key byte pair (KA1, KA2) with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for increasing security against the determination of the key in an encoding method. Said method consists in calculating an encoded text using an encryption algorithm on input data, i.e. an uncoded text and a key. Input data is monitored in advance or during the method and is evaluated and the encryption algorithm is used on the key and on the uncoded text in order to calculate the encoded text or an intermediate result which is obtained during the calculation of the encoded text according to the evaluation.

Description

technical field [0001] The invention relates to a method for encrypting plaintext and a data carrier for implementing the method. Background technique [0002] In an encryption algorithm, a key is used to encrypt plaintext into ciphertext. Here, the term encryption algorithm is to be understood as an algorithm for calculating an identification code for plaintext, a so-called MAC (Message Identification Code). Such an algorithm is also called a hash function with a key (cryptographic hash function). Here, the MAC is computed from the plaintext using the key. In general, contrary to true encryption algorithms in the narrower sense, such functions cannot be reversed, ie decryption can no longer be performed. [0003] An encryption algorithm is used, for example, to authenticate a first instance against a second instance. To this end, for example, the first instance encrypts the plaintext it previously obtained in unencrypted form from the second instance with a common key, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L2209/26H04L2209/80H04L9/06H04L9/0643H04L9/0618H04L9/0675
Inventor 赫尔曼·德雷克斯勒拉尔斯·霍夫曼于尔根·普尔库斯
Owner GIESECKE DEVRIENT MOBILE SECURITY GMBH