Encryption and decryption method and encryption and decryption device based on AES (advanced encryption standard) algorithm
An encryption/decryption and algorithm technology, applied in the field of encryption/decryption method and encryption/decryption device based on AES algorithm, can solve the problems of inability to share hardware resources, large overhead area, and high power consumption, and achieve the effect of hardware sharing and resource reduction.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] see figure 1 , the flow chart of a preferred embodiment of the encryption and decryption method based on the AES algorithm of the present invention, the specific implementation process of the method is as follows:
[0044] Encryption process:
[0045] Step S100, preprocessing the input data to be encrypted, and performing round key addition with the initial key k[0] generated by the key expansion module, that is, a bitwise XOR operation;
[0046] Step S110, under the control of the encrypted signal, perform 10 rounds of encryption iterative operations on the data obtained in step S100;
[0047] The steps of a single encryption iteration operation include:
[0048] Step S111, performing S-box replacement on the input data;
[0049] Step S112, performing a row shift operation on the data passed through step S111;
[0050] Step S113, performing a column mixing operation on the data passed through step S112;
[0051] Step S114, generate the subkey of this round accor...
Embodiment 2
[0096] see figure 2 , corresponding to the above method, a preferred embodiment of an AES algorithm-based encryption and decryption device is provided, including:
[0097] Preprocessing module: This module is used to add round key to the data to be encrypted received by the input interface module IF and the initial key k[0], or to perform round key addition on the received data to be decrypted and the subkey k[10]. key plus;
[0098] Key expansion module (not shown): generate the subkeys required for encryption or decryption iterative operations; corresponding to figure 2 The middle key operation module provides the sub-keys required for operation;
[0099] Control module: generate an encryption signal or a decryption signal, which are used to control the corresponding encryption or decryption iterative operations on the data; and record the number of rounds of encryption iterations or decryption iterations; the control module is in figure 2 not shown, but it is controll...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com