Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption achieving method and device

A technology for encrypting and processing data to be encrypted. It is applied in the field of cryptography and can solve problems that affect the hardware implementation performance of encryption and decryption, low data throughput rate, and occupying more hardware resources.

Active Publication Date: 2013-12-04
华大云芯(南京)科技有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, the way of implementing AES encryption and decryption process by hardware is either the data throughput rate is too low, or it takes up too much hardware resources, which affects the hardware implementation performance of encryption and decryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption achieving method and device
  • Encryption and decryption achieving method and device
  • Encryption and decryption achieving method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] A method for implementing encryption provided by the present invention is to use a multi-stage pipeline to perform multi-stage encryption processing on the received data to be encrypted, wherein:

[0072] The current pipeline that receives the data to be encrypted, performs corresponding processing on the data including at least one round of encryption processing according to the number of stages of the current pipeline, and outputs the processed data as the data to be encrypted in the next pipeline until the end The corresponding processing of the first-level pipeline is completed; wherein, the total duration of the corresponding processing by the pipelines of each level is equal, and the sum of the total rounds of the encryption processing performed by the pipelines of each level is the total number of rounds to be executed for data encryption.

[0073] After outputting the processed data as the data to be encrypted in the next stage of the pipeline, it may further inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption achieving method. A multistage pipeline structure is adopted to perform multistage encryption processing to received data. Corresponding processing including at least one-round encryption processing is performed to the data according to the stage number of an existing pipeline receiving data to be encrypted, and processed data serve as data to be encrypted of a next-stage pipeline to be output till a final-stage pipeline finishes the corresponding processing. The total time durations of the pipelines performing the corresponding processing are identical, the sum of total round number of encryption processing executed by all of pipelines is the total round number required by data encryption. The encryption achieving method adopt a pipeline mode and ensures that an encryption and decryption achieving method does not enable the data throughput rate to be over low and does not occupy excessive hardware resources, so that high data throughput rate and hardware resource occupation ratio are obtained. The invention further provides a decryption achieving method and an encryption and decryption achieving device.

Description

technical field [0001] The invention relates to the field of cryptography, in particular to a method and device for realizing encryption and decryption. Background technique [0002] Encryption technology is the most commonly used means of security and confidentiality. Encryption technology includes two important elements: algorithm and key. Algorithm is the step of combining intelligible information, that is, plaintext, with agreed data to generate incomprehensible ciphertext, and the agreed data refers to the key. In security and confidentiality, the security of information communication can be guaranteed through appropriate encryption algorithms. [0003] The AES algorithm is another block encryption algorithm recommended by NIST after DES and 3DE S. It has the characteristics of simple design, fast key installation, less memory space required, and works well on all platforms. Since its acceptance as a standard, the AES algorithm has been widely used by banking, govern...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 李云岗胡兵潘红升
Owner 华大云芯(南京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products