Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Affine transformation subbytes box-based lightweight hash method

A technology of affine transformation and byte replacement, which is applied in the field of cryptographic hash functions, can solve the problems of increasing linear layer confusion, small hardware overhead, statistical saturation method attacks, etc., to achieve enhanced confusion, low hardware overhead, and improved resistance The effect of the ability to stat saturation attacks

Active Publication Date: 2017-09-01
BEIHANG UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to solve the problem that the structure of the linear diffusion layer is single in the lightweight hash function with block cipher, especially the PRESENT-like structure as the internal replacement structure, and is vulnerable to the attack of the statistical saturation method. A lightweight hashing method for section replacement boxes. This method increases the confusion of the linear layer through the affine transformation of the S-box. To a certain extent, it makes up for the lack of a linear layer with a PRESENT-like structure that is too simple, and has better anti-statistic Saturation attack capability with low hardware overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Affine transformation subbytes box-based lightweight hash method
  • Affine transformation subbytes box-based lightweight hash method
  • Affine transformation subbytes box-based lightweight hash method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] see figure 1 , is the basic logical structure of the light-weight hash method based on the affine transformation byte replacement box of the present invention. In the figure, the input message is denoted as M, and the initial iteration state is denoted as STATE 0 , the grouped message after message initialization is denoted as {m 0 ,m 1 ,..., m l-1}, the message output each time in the output summary stage is denoted as {h 0 ,h 1 ,h 2 ,h 3}, the output times of the three versions of this method are all 4 times. Among them, the length of the summary is n, the length of the internal iteration state is b, the length of the XOR of the internal permutation is not with the message, the length of the packet is r (b=r+c), and the length of the message output each time is r'(4r' =n). The present invention provides three versions of lightweight hash parameter combinations, the digest lengths n are 80 bits, 128 bits and 160 bits respectively, the internal iteration state l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an affine transformation subbytes box-based lightweight hash method. The method comprises the following steps of a message initializing stage, a message absorption stage, and an abstract output stage. The method has the advantages that first, the method uses a sponge structure externally, has a computable security boundary, provides three versions of parameter combination so as to meet application demands of different environments, and can provide from anti-collision of 40 bit to first preimage security of 128 bit; second, the affine transformation S box with an internal replacement structure is added with linearity layer confusion, so that the defect that the linearity layer of a similar PRESENT structure is too simple is overcome, the anti-statistical saturation attack ability of the internal replacement structure is enhanced, therefore, the overall security of the lightweight hash method is improved; and third, a non-linearity layer of the internal replacement structure adopts an S box of three bit with good differential characteristic, and the S box of three bit is lower in hardware overhead compared with an S box of four bit of a same type of lightweight hash function family.

Description

technical field [0001] The present invention relates to an integrity verification algorithm aimed at the safety of an embedded system, in particular to a lightweight hashing method based on an affine transformation of a subbytes box (Subbytes Box, hereinafter referred to as an S box). It belongs to the field of cryptographic hash functions. Background technique [0002] With the development of information technology, computer technology and microelectronics technology, the application requirements of embedded systems are increasing day by day, especially in the fields of communication, network, industrial control, automation, transportation, medical treatment and consumer electronics. Its application areas mainly include: industrial control, traffic management, information appliances, home intelligent management system, POS network and e-commerce, environmental engineering and nature, real-time monitoring of hydrological data, earthquake monitoring network, real-time weather...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618H04L9/0631H04L9/0643
Inventor 王翔杜培王维克何展宏李林
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products