Novel symmetric key algorithm for high speed encryption
A technology of symmetric key and encryption algorithm, which is applied in the direction of encryption device with shift register/memory, digital transmission system, electrical components, etc. The effects of key repetition, improved security, and fast encryption speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] A kind of encryption algorithm specific process of the novel symmetric key algorithm that is used for high-speed encryption of the present invention is as follows:
[0060] A1: Let the plaintext population be M, group the plaintext population M to get M i ,M i The packet length is 1024bit (or an integer multiple of 1024bit), so there are M i ∈{M 0 , M 1 ,···,M n-1};
[0061] A2: Use a random number generator to generate two strings of 1024-bit binary sequence random numbers R 1 and R 2 , R 1 and R 2 as the base key, R 1 ∈{0,1} 1024 , R 2 ∈{0,1} 1024 ;
[0062] A3: If figure 1 As shown, the plaintext M is converted into a binary sequence Mess, and the plaintext length L is counted, and the calculation formula is (1); the last group M n-1 It may be less than 1024 bits, so it is necessary to M n-1 for padding; if M n-1 When ∈(0,1000), first fill in the binary key generator identification code after the plaintext, the identification code is 24 bits, the ide...
Embodiment 2
[0081] A kind of decryption algorithm specific process of the novel symmetric key algorithm that is used for high-speed encryption of the present invention is as follows:
[0082] B1: received ciphertext key C R , decrypt it with the RSA-OAEP scheme, and obtain the basic key R 1 and R 2 ;
[0083] B2: First intercept the last 2048-bit binary sequence of the ciphertext, and use the basic key R obtained by decryption 1 and R 2 Perform an XOR operation after offsetting n bits in the same direction as the encryption, and get 2048 bits containing M n-1 the binary sequence;
[0084] B3: contains M for 2048 bits n-1 Search the binary sequence and identify the 24-bit key generator identification code generated when filling, and get the key offset generator G, then discard the random number sequence to get M n-1 Plaintext group, the calculation formula is (13);
[0085]
[0086] B4: From C 0 Starting in the forward direction, one operation is performed according to the numb...
Embodiment 3
[0089] In order to perform encryption more securely, the basic key of a novel symmetric key algorithm for high-speed encryption of the present invention will be reconstructed.
[0090] A set of two strings of random number sequences R generated by initial encryption 1 and R 2 , first for M n-1 After encryption, and then sequentially from M 0 Start the corresponding offset encryption, for the base key R 1 , each plaintext group encryption is equivalent to shifting one bit to the right, so when encrypting to M 1023 when R 1 Duplication occurs, so when M i When i mod 1024-1=0, the basic key needs to be reconstructed.
[0091] like image 3 As shown, the basic key reconstruction process is as follows:
[0092] C1: a set of base keys R 1 and R 2 , the encrypted plaintext space is 1024×1024 bits, and the encrypted equivalent space is the ciphertext block (C-Block);
[0093] C2: When the basic key needs to be reconstructed, the new basic key is selected from the previous c...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com