Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Encryption method for network and information security

A technology of information security and encryption method, which is applied in the field of data encryption, and can solve problems such as slow calculation speed and slow diffusion speed

Active Publication Date: 2010-06-30
INST OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCI
View PDF1 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it takes 4 rounds of iterations for each active byte to spread to all positions. The diffusion speed is slow. The encryption algorithm needs 32 rounds of iterations, and the operation speed is not very fast.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for network and information security
  • Encryption method for network and information security
  • Encryption method for network and information security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096]The invention is an efficient symmetrical block cipher algorithm. The block length of this algorithm is 128 bits, and the key length is 128 bits. This algorithm adds 128-bit system parameters, which provides a guarantee for mutual isolation under different systems, and also provides a basis for realizing public key ciphers based on integrated circuits and block cipher algorithms. Programs offer possibilities. The encryption algorithm adopts a multi-round SP network type nonlinear iterative structure, and the encryption round key is generated by the encryption key through the encryption round transformation. The decryption algorithm is the inverse transformation of the encryption algorithm, the decryption key is the last output of the key expansion of the encryption key, and the decryption round key is the reverse order of the encryption round key, which is generated by the decryption key using the decryption round transformation.

[0097] 1. This encryption algorithm fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption method for network and information security; the adopted packet length and key length are 128 bits, and a 128-bit system parameter is added; encryption algorithm comprises a plurality of rounds of round transform iteration consisting of mixed layers and diffusion layers, wherein the last round is incomplete round transformation, and the incomplete round transformation consists of the mixed layer; the mixed layer comprises key plus, S box portfolio transform and system parameter minus; the S box portfolio transform comprises 8-input 8-output reversible S box transform and inverse S box transform in the same number which are output by parity exchange; the diffusion layer can construct linear transformation with a reversible re-model polynomial matrix; an encryption round key is generated by an encryption key through encryption round transformation; and decryption algorithm is the inverse transformation of encryption algorithm. The encryption methodfor network and information security has the advantages of high diffusion speed, good security strength, hardware resource saving, and very high speed when being realized by hardware and on a software platform.

Description

technical field [0001] The invention relates to a data encryption method, which belongs to the technical field of data processing. Background technique [0002] Cryptography is the core of network and information security technology. Block cipher is an important branch of cryptography. It has the characteristics of fast speed, easy standardization, and easy hardware and software implementation. It is usually the core system for data encryption, digital signature, authentication, and key management in information and network security. [0003] DES (Data Encryption Standard) has been used by many organizations and departments in the past 20 years since it was announced, and cryptographers in various countries have also carried out in-depth analysis on it. It is by far the most widely used and most successful block cipher, but its 56-bit key length is too short to resist exhaustive key search attacks. Since the mid-90s of the last century, DES has gradually been unable to mee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06
Inventor 胡波黎彤亮程煜
Owner INST OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products