Short block processing method in block encryption algorithm

A technology of group encryption and encryption algorithm, which is applied in encryption devices with shift registers/memory, digital transmission systems, electrical components, etc., can solve problems such as inability to realize secure data transmission, eliminate potential safety hazards, ensure transmission efficiency, The effect of ensuring safety

Inactive Publication Date: 2007-06-27
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the secure transmission of data will not be achieved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short block processing method in block encryption algorithm
  • Short block processing method in block encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to solve the problems existing in the prior art, the present invention provides a method for processing short packets in a packet encryption algorithm. The main idea of ​​the method is: fill the short packets into a Complete group, and then use the existing encryption algorithm to encrypt the complete group, so as to ensure that all plaintext data sent by the sender is encrypted, and improve the reliability of system data transmission.

[0059] The method of the present invention is applicable to the situation that the length of the plaintext of the data block to be encrypted is greater than the length m of the complete group, that is, the group contains at least one complete group with the length m after grouping.

[0060] Fig. 1 shows a flow chart of a sender encrypting a short packet according to a preferred embodiment of the present invention. Here, it is assumed that the data blocks that need to be encrypted are divided into k groups according to the size ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a treatment method for short grouping in grouping encipher algorithm. Wherein, the enciphering comprises: after enciphering the last full-grouping plaintext, the sender divides the obtained cipher text into two parts for cipher text grouping with one part; forming a complete grouping by concatenating a filling part and said short-grouping part; enciphering the complete grouping to send to receiver. The deciphering comprises: after receiving the last full grouping ciphertext grouping, the receiver deciphers the grouping to divide the deciphered groupings into two parts with one as said short-grouping plain text and concatenate another part with received ciphertext grouping to obtain complete ciphertext grouping for the last plain text after deciphering. This invention can improve data transmission security greatly.

Description

technical field [0001] The invention relates to data encryption technology, in particular to a processing method for short packets in packet encryption algorithms. Background technique [0002] In a communication system, security is an important indicator to evaluate the performance of a communication system, especially in a wireless communication system, due to the characteristics of openness and mobility of a wireless communication system, the security of a wireless communication system is particularly important . [0003] IEEE 802.16d / e series protocols define protocol standards for wireless broadband fixed and mobile access air interfaces. In order to ensure the security of air interface data transmission, the above-mentioned series of protocols define a security sublayer (Privacy Sublayer), which is used to realize the authentication of wireless communication system users, distribution and management of keys, subsequent data encryption and authentication, etc. . Afte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/06
Inventor 肖正飞
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products