Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Decryption method and system based on aes algorithm

An algorithm and ciphertext technology, applied in the field of network communication, can solve problems such as decryption errors and second packet discarding, and achieve the effects of ensuring security, not affecting chip bandwidth, and reducing the probability of discarding

Active Publication Date: 2022-04-15
SUZHOU CENTEC COMM CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Usually, in order to ensure high bandwidth, a pipeline method is used to implement; when using pipeline operations, there will be some special situations. When two back-to-back messages with the same key index need to be decrypted, the first message will be decrypted according to the key index. Get the corresponding initial vector and calculate the corresponding authentication label at eop. If the eop of the first packet has not arrived yet, the second packet has already entered the pipeline for decryption. At this time, the second packet needs to Get your own initial vector, but the authentication label calculation of the first package is not yet completed, so the initial vector obtained by the second package is the old value, at this time the decryption of the second package will be wrong, resulting in back-to-back The second packet is dropped

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption method and system based on aes algorithm
  • Decryption method and system based on aes algorithm
  • Decryption method and system based on aes algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in detail below with reference to the specific embodiments shown in the accompanying drawings. However, these embodiments do not limit the present invention, and structural, method, or functional changes made by those skilled in the art according to these embodiments are all included in the protection scope of the present invention.

[0044] like figure 1 As shown, in an embodiment of the present invention, the decryption method based on the Aes algorithm includes:

[0045]S1. Receive the ciphertext, and obtain the original authentication label carried by the ciphertext and the corresponding key index.

[0046] After the packet starts to be sent, each ciphertext in the packet is acquired in turn, and each packet is parsed to obtain the original authentication label and the corresponding key index carried by each ciphertext.

[0047] S2, at the sop moment of the current ciphertext, search the initial vector memory corresponding t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a decryption method and system based on the Aes algorithm. The method includes: receiving ciphertext, obtaining the corresponding original authentication label and key index; According to the Aes protocol rules, it is updated and stored in the standby initial vector memory to form a corresponding standby initial vector; according to the same Aes protocol operation logic, the first plaintext and corresponding to the current ciphertext are respectively obtained according to the parameters obtained above. The second plaintext, and obtain the corresponding first authentication label and second authentication label; according to the corresponding relationship between the first authentication label, the second authentication label and the original authentication label, confirm the output decryption result. The invention can correctly decrypt the back-to-back messages to be decrypted with the same key index, reduces the discarding probability in the decryption process of such messages, and does not affect the chip bandwidth while ensuring the security of the network messages.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a decryption method and system based on an Aes algorithm. Background technique [0002] AES (Advanced Encryption Standard) is a symmetric block cipher algorithm released by the National Institute of Standards and Technology in FIPS PUB 197 in 2001. The Ethernet switching chip needs to perform encryption and decryption calculations on the input packets according to the Aes algorithm in the 802.1AE protocol to ensure information security. text) to decrypt the Aes algorithm, it is necessary to obtain the corresponding data from ivInfo (initial vector memory) and calculate iv (Initial Vector, initial vector) at the time of sop (Start of packet, start of packet), that is, when the message starts to be sent, The correct icv (Integrity Check Value, authentication label) is calculated at eop (End of packet), that is, at the end of the packet, and compared with the authentication lab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 孙冠男江源蔡晓艳
Owner SUZHOU CENTEC COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products