Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypting-decrypting method based on AES algorithm and encrypting-decrypting device

An encryption and decryption and algorithm technology, applied in the field of encryption and decryption technology, can solve the problems of unfavorable AES modularization, increased area overhead, large area overhead, etc.

Inactive Publication Date: 2007-02-28
HUAWEI TECH CO LTD
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Taking the input as a 128-bit key as an example, if the parallel algorithm is executed, 20 S-box permutations and 16 S-box inverse permutations are required, that is, a total of 36 16×16 lookup tables are required, which requires a lot of effort in design large area overhead
[0014] Second, the existing AES algorithm mixed column transformation (MixColumn) and mixed column inverse transformation (InvMixColumn) use a separate unit for operation, so that encryption and decryption need to use different modules, which is not conducive to the realization of AES modularization, More direct increase in area overhead
This method will also cause a large area overhead when the circuit design is implemented. For example, for a 256-bit key, a 14×128-bit key storage unit is required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypting-decrypting method based on AES algorithm and encrypting-decrypting device
  • Encrypting-decrypting method based on AES algorithm and encrypting-decrypting device
  • Encrypting-decrypting method based on AES algorithm and encrypting-decrypting device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0228] Optionally, the present invention also provides a second implementation of the encryption and decryption method based on the AES algorithm, referring to Figure 11, the specific implementation steps of the method are as follows:

[0229] First in step S200, the number of iterations Nr is set according to the key length, the key length can be 128 bits, 192 bits and 256 bits, correspondingly, the number of iterations Nr can be 10, 12 or 14;

[0230] In step S201, dynamically generate sub-keys required for Nr encryption iterations or decryption iterations for key operations, it should be pointed out that this step runs through Nr encryption iterations or decryption iterations;

[0231] In step S202, the data to be encrypted or decrypted is initialized, that is, after the data to be encrypted or decrypted is input, before it performs the first round of key iteration, it is first combined with the subkey generated in step S201 The key is used to perform key operation operatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for coding and decoding, based on AES algorism. Wherein, it comprises that a, based on the key length, fixing the literate time Nr; b, initializing the data, before first literating the input data, treating it with key operation on it with sub key; c, loading coding or decoding control signal; d, under the control of coding control signal, the decoding / coding literate complex module processes Nr literate operation for Nr times, and under the control of decoding control signal, said module processes decoding literate for Nr times. The invention also provides a relative decoder or coder, which comprises a decoding / coding literate complex module. The invention has a circuit which can simplify the AES algorism, with low power consumption and cost.

Description

technical field [0001] The invention relates to the technical field of data communication security, in particular to an encryption and decryption technology. Background technique [0002] The AES algorithm is the abbreviation of Advanced Encrypt Standard, which is a new symmetric key encryption algorithm standard announced by the American National Standards Committee NIST. The AES algorithm has the advantages of wide application range, short waiting time, easy concealment, and high throughput. Therefore, the AES algorithm is applied in more and more security fields. [0003] As a new symmetric key encryption algorithm standard that replaces the Data Encryption Standard (DES), the AES algorithm is an iterative block cipher algorithm with a block length of 128 bits and a key length that can be specified as 128 bits, 192 bits or 256 bits. The key iteration of the AES algorithm consists of three reversible transformations called layers, which are linear mixing layer, nonlinear ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28
Inventor 谭丽娟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products