Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Algorithm hardware realizing method for improving network safety

A hardware implementation and security technology, applied in network topology, security devices, electrical components, etc., can solve problems such as large circuit implementation area and power consumption, unsatisfactory calculation speed, and restrictions on encryption and decryption methods, so as to reduce the implementation area , easy to implement, and conducive to verification

Inactive Publication Date: 2013-10-02
苏州国芯科技股份有限公司
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the data is exposed to the air during transmission, it is easy to be intercepted by people with ulterior motives
[0003] At present, in the implementation methods of existing algorithms, most of them are realized by software method, which is simple and convenient, but its operation speed is not very ideal, it is difficult to meet the real-time needs, and the hardware implementation method has a large hardware overhead. The cost is too high, the circuit implementation area and power consumption are insufficient, so for some environments with high area requirements, such as the application of smart cards, the use of existing encryption and decryption methods is greatly restricted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Algorithm hardware realizing method for improving network safety
  • Algorithm hardware realizing method for improving network safety
  • Algorithm hardware realizing method for improving network safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033] Embodiment: a kind of algorithm hardware implementation method for improving network security comprises the following steps:

[0034] Encryption process:

[0035] Step 1: Divide the plaintext code into 4 code words in units of words, and divide the master key code into 4 key words in units of words.

[0036] Step 2. XOR the 1st to 3rd key word in the master key with a constant, then perform reversible transformation, and then XOR with the 0th key word to generate a word-length For the first round of keys, move the 1st to 3rd key word forward to the position of the 0th to 2nd key word, and move the first round key to the 3rd position The location of the key word.

[0037] Step 3: XOR the first-round key with the plaintext code from the 1st to 3rd coded word, perform reversible transformation, and then XOR with the 0th coded word to generate a word-length The first round of cipher text, then move the first to the third code word to the position of the 0th to the second...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an algorithm hardware realizing method for improving network safety. The method comprises the following steps: dividing plaintext codes into 4 coded words by taking a word as a unit and dividing key codes into 4 key words by taking a word as a unit; after performing operation on the first key word to the third key word and a constant, performing exclusive-or operation on the zeroth key word to generate a first turn of key with one word length, forwards moving the position of from the first key word to the third key word to the position of from the zeroth key word and the second key word, and moving the first turn of key to the position of the third key word; after performing operation on the first turn of key and the first coded word to the third coded word, performing exclusive-or operation on the zeroth key word to generate a first turn of ciphertext word, forwards moving the position of from the first coded word to the third coded word to the position of from the zeroth coded word to the second coded word, and moving the first turn of ciphertext word to the position of the third coded word. By the method, the area for realizing algorithm hardware is compact, and the circuit area for realizing the algorithm hardware is greatly reduced on the premise of guaranteeing the algorithm realizing efficiency.

Description

technical field [0001] The invention relates to a hardware implementation method of a packet encryption and decryption algorithm, in particular to an encryption and decryption method for a wireless local area network. Background technique [0002] With the wide application of WLAN, its security issues are becoming more and more prominent. For wireless local area networks, it is very vulnerable in terms of security, because the transmission rate can reach 11M, and the coverage range is up to 100 meters. It is its fast transmission speed and wide coverage that make it very vulnerable in terms of security. Because the data is exposed in the air during transmission, it is easy to be intercepted by people with ulterior motives. [0003] At present, most of the existing algorithms are realized by software, which is simple and convenient, but its calculation speed is not ideal, and it is difficult to meet the real-time needs, while the hardware implementation has a large hardware...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W84/12H04W12/041
Inventor 郑茳肖佐楠林雄鑫钟名富
Owner 苏州国芯科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products