Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reconfigurable technology-based basic operator extraction method in encryption and decryption algorithm

An encryption and decryption algorithm and extraction method technology, which is applied in the field of extraction of basic operators in encryption and decryption algorithms, can solve problems such as decomposition of cryptographic algorithms, little or no system security considerations, and improve universality and efficiency , good universality and simplicity, and the effect of improving utilization

Active Publication Date: 2015-05-20
TSINGHUA UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] At present, there are relatively few studies on the extraction of basic operators in cryptographic algorithms in China, and in the existing research results abroad, some extraction methods are aimed at relatively single cryptographic algorithms (Mostafa I.FPGA implementation and performance evaluation of a high throughput crypto coprocessor[J].Journal of Parallel and Distributed Computing,Volume 71 Issue 8,Pages 1075-1084,August,2011), and the basic operators extracted by some methods have poor performance after implementation due to their complexity
The main reason is that each module in the cryptographic algorithm is not fully decomposed, but the obtained set of basic operators may not be able to cover more algorithms, or even if multiple algorithms can be implemented, but due to incomplete decomposition, it can be reconfigured. The basic unit implementation in the chip is too complex
In addition, in most studies, little consideration is given to improving the security of the system at the level of basic operators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reconfigurable technology-based basic operator extraction method in encryption and decryption algorithm
  • Reconfigurable technology-based basic operator extraction method in encryption and decryption algorithm
  • Reconfigurable technology-based basic operator extraction method in encryption and decryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0030] The invention provides a method for extracting basic operators in an encryption and decryption algorithm based on reconfigurable technology, which includes the following steps:

[0031] S1: Analyze the encryption and decryption algorithms to be implemented, draw the data flow graph of each algorithm and divide the data flow graph into sub-modules, mark the calculation granularity of each sub-module in the data flow graph, and calculate the the length of the critical path in the module;

[0032] S2: Segment the sub-modules in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a reconfigurable technology-based basic operator extraction method in an encryption and decryption algorithm. The method comprises the following steps of: firstly, analyzing the encryption and decryption algorithm to be realized, drawing data flow graph of each algorithm, dividing submodules, marking the computing granularity of each submodule in the data flow graphs, and computing the length of a critical path in each submodule; secondly, segmenting the submodules in the data flow graphs, thus obtaining a basic operator set; and adding the random logic into the basic operators finally. The basic operator set obtained by the method is very good in universality and simplicity, so that various cryptographic algorithms can be effectively realized by a reconfigurable crypto chip, and the throughput capacity of the crypto chip can be improved. The side channel attack can be disturbed by the basic operators provided by the method, so that the safety of the crypto chip can be improved.

Description

technical field [0001] The invention relates to a method for extracting basic operators in cryptographic algorithms, in particular to a method for extracting basic operators in encryption and decryption algorithms based on reconfigurable technology. Background technique [0002] With the development of communication technology, people's demand for information encryption is increasing, and many modern cryptographic algorithms have emerged, such as RSA, AES, IDEA, SMS4 and other algorithms. Usually, hardware implementation such as ASIC (Application Specific Integrated Circuit, application specific integrated circuit) can effectively meet the performance requirements of the communication system for the cryptographic algorithm. However, with the development of the chip manufacturing process, especially when the process enters the 45nm era, the one-time design cost of using a single chip is getting higher and higher, and the function of the traditional ASIC chip cannot be modifie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 李兆石刘雷波尹首一朱敏王博魏少军
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products