CN101827107A - IEEE802.1AE protocol-based GCM high-speed encryption and decryption equipment - Google Patents
IEEE802.1AE protocol-based GCM high-speed encryption and decryption equipment Download PDFInfo
- Publication number
- CN101827107A CN101827107A CN201010168517.3A CN201010168517A CN101827107A CN 101827107 A CN101827107 A CN 101827107A CN 201010168517 A CN201010168517 A CN 201010168517A CN 101827107 A CN101827107 A CN 101827107A
- Authority
- CN
- China
- Prior art keywords
- circleplus
- module
- data
- ghash
- aes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 13
- 238000000605 extraction Methods 0.000 claims abstract description 8
- 230000008569 process Effects 0.000 claims abstract description 8
- 238000004519 manufacturing process Methods 0.000 claims description 8
- 230000008859 change Effects 0.000 claims description 6
- 238000012546 transfer Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 abstract description 3
- 238000013461 design Methods 0.000 description 12
- 238000005516 engineering process Methods 0.000 description 5
- 102100023882 Endoribonuclease ZC3H12A Human genes 0.000 description 4
- 101710112715 Endoribonuclease ZC3H12A Proteins 0.000 description 4
- 101100120298 Rattus norvegicus Flot1 gene Proteins 0.000 description 4
- 101100412403 Rattus norvegicus Reg3b gene Proteins 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000008676 import Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 3
- 238000003786 synthesis reaction Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000012804 iterative process Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000005498 polishing Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 230000003245 working effect Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses IEEE802.1AE protocol-based galois/counter mode (GCM) high-speed encryption and decryption equipment. The encryption and decryption equipment comprises an information extraction module, an advanced encryption standard (AES) module and a Ghash module, wherein the information extraction module is used for extracting a safety protocol key, a safety channel identifier, a data packet number, a destination address and a source address from the input data, converting the safety protocol key, the safety channel identifier, the data packet number, the destination address and the source address into a corresponding primary key K, an initial vector IV, additional information A and a plain text P/cipher text C and transmitting the data to the AES module; the AES module finishes the encryption/decryption of the data and outputs the cipher text/plain text; and the Ghash module generates an authentication tag T through a Ghash function according to the additional information A and the cipher text C. The high-speed encryption and decryption equipment can process a plurality of groups of data at the same time without previously determining the total number of the grouped data to be processed and has high processing speed and low complexity of the hardware.
Description
Technical field
The present invention relates to a kind of high-speed encryption and decryption device, specifically a kind of GCM high-speed encryption and decryption device that is applicable to the IEEE802.1AE agreement.
Background technology
IEEE802.1AE medium access control safety (MACsec) agreement of announcing in May, 2005 provides encapsulation and has encrypted framework for the Ethernet protection; it is integrated into safeguard protection in the wired ethernet; by the unauthorized website on the identification local area network (LAN), the protection local area network (LAN) is not subjected to the attack of passive wiring, personation, go-between and some denial of service etc.
GCM (Galois/Counter Mode) is the authenticated encryption pattern of a high speed, uses CTR (Counter) pattern of AES (Advanced Encryption Sandard) respectively and is defined in GF (2
128) Ghash function on the territory, produce ciphertext and authenticating tag simultaneously.The IEEE802.1AE agreement adopts the GCM algorithm that frame is carried out the enciphering/deciphering processing and completeness check is handled, and ensures communication safety better.
When the GCM algorithm is encrypted data, four input signals are arranged: encryption key K, initialization vector IV, expressly P, and additional authentication information A; Two output signal: ciphertext C are arranged and differentiate sign T.P and A are pressed 128 groupings, be designated as respectively: P1, P2, P3 ..., P (n-1), Pn
*And A1, A2, A3 ..., A (m-1), Am
*Wherein, Pn
*And Am
*Length be respectively u and v (1≤u, v≤128); Other block length is all 128.
The definition of GCM cryptographic algorithm as the formula (1).
Wherein, || the expression serial data connects; Len () returns the serial data length of 64-bit; E (K, Y) expression is carried out the AES enciphering/deciphering with key K to Y; Function incr () is that minimum 32 with parameter regard a unsigned number as, and it is added 1 back and delivery 2
32
The definition of GCM decipherment algorithm as the formula (2).
Comparison expression (1), (2) as can be known, the GCM decipher circuit can be multiplexing.
The GHASH function definition is: GHASH (H, A, C)=and Xm+n+1, and Xi, i=0 ... m+n+1 is as the formula (3).
Multiplication is to be defined in GF (2
128) on computing, the reduction multinomial is formula (4).
P(α)=1+α+α
2+α
7+α
128 (4)
The computing of GHASH function is an iterative process, and order is carried out and taken advantage of add operation, and multiplier unit has bigger time-delay, is the bottleneck that improves throughput.So still lacking the high speed GCM hardware that is applicable to the IEEE802.1AE agreement at present realizes.
2007, Satoh A designed a GCM encryption equipment.In the GHASH modular design a kind of parallel adder and multiplier, make the throughput of GCM break through 100Gbps, reach 162.56Gbps (0.13 μ m technology), be the best design of delivering at present of performance.Yet further research can find that the GCM hardware configuration of this design can not be applicable to the IEEE802.1AE agreement.Because Ghash module that should design such as will determine at pending grouped data sum when transfer of data begins, controlling the concurrent operation process, the actual conditions of this and data transmission procedure are not inconsistent.
Summary of the invention
The purpose of this invention is to provide a kind of GCM high-speed encryption and decryption device based on the IEEE802.1AE agreement, this encryption and decryption device adopts novel parallel adder and multiplier, can handle multi-group data simultaneously, and pending grouped data sum such as does not need to pre-determine.Data processing speed of the present invention is fast, hardware complexity is low.
Goal of the invention of the present invention is achieved through the following technical solutions:
A kind of GCM high-speed encryption and decryption device based on the IEEE802.1AE agreement is characterized in that: this GCM high-speed encryption and decryption device comprises information extraction modules, AES module and Ghash module; Information extraction modules is used for from input extracting data security protocol key, escape way sign, packet numbers, destination address and source address, and according to the corresponding initial key K of different working mode change one-tenth, initial vector IV, additional information A and plaintext P/ ciphertext C, and transfer data to the AES module; The AES module is finished the data enciphering/deciphering, and the output ciphertext/expressly; The Ghash module produces discriminating sign T according to additional information A and ciphertext C by the Ghash function.
Among the present invention, the Ghash module adopts parallel adder and multiplier, handles multi-group data simultaneously, pending grouped data sum such as does not need to pre-determine; During Ghash function input (pq+n) group data, the expression formula of output Xpq+n is applicable to that promptly the parallel adder and multiplier expression formula of novel q degree of IEEE802.1AE agreement is as follows:
P wherein, q, n are positive integer, 1≤n≤q.
Among the present invention, described AES module comprises cipher key expansion module and AES enciphering/deciphering module; Wherein, AES enciphering/deciphering module adopts Fully-pipelined structure, and the inner loop of this process is all launched, insert a level production line at every repeating query interannular, have streamline between 10 step cones, every level production line inside is adopted 6 grades of sub-pipeline organizations again simultaneously, amounts to comprise 60 level production lines; Cipher key expansion module is the loop unrolling structure.
Ghash modular design among the present invention a kind of novel parallel adder and multiplier, can handle multi-group data simultaneously, and pending grouped data sum such as not need to pre-determine.For further improving enciphering/deciphering speed, AES enciphering/deciphering module has adopted Fully-pipelined structure.In addition, constantly change in order to support each clock cycle of key, cipher key expansion module has designed the loop unrolling structure among the AES.The present invention has at a high speed, the characteristics of low hardware complexity.
Method for designing of the present invention is applicable in the similar high speed circuit design; If adopt multichannel technology, throughput of the present invention is expected to be further enhanced.
Description of drawings
Fig. 1 is a structured flowchart of the present invention;
Fig. 2 is the circuit structure diagram of AES enciphering/deciphering module among the present invention;
Fig. 3 is the circuit structure diagram of cipher key expansion module among the present invention;
Fig. 4 is the circuit structure diagram (q=2) of Ghash module among the present invention;
Fig. 5 (a) is five input instance graphs of Ghash module among the present invention to Fig. 5 (c);
Fig. 6 is a circuit structure diagram of the present invention.
Embodiment
A kind of GCM high-speed encryption and decryption device based on the IEEE802.1AE agreement of the present invention, Fig. 1 is a structured flowchart of the present invention.This encryption and decryption device comprises information extraction modules 1, AES module 2 and Ghash module 5, and wherein AES module 2 comprises cipher key expansion module 3 and AES enciphering/deciphering module 4 again.Information extraction modules 1 is used for from input extracting data security protocol key, escape way sign, packet numbers, destination address and source address, and becomes corresponding initial key K, initial vector IV, additional information A and plaintext P/ ciphertext C according to different working mode change.AES module 2 is finished the data enciphering/deciphering, the output ciphertext/expressly.Ghash module 5 produces discriminating sign T according to additional information A and ciphertext C by the Ghash function.
To introduce the hardware designs of AES module 2 and Ghash module 5 and the overall hardware of GCM below respectively realizes.
AES enciphering/deciphering module is used for realizing GCM-128 enciphering/deciphering function, imports 128 plain/cipher text, 128 ciphertexts of process enciphering/deciphering output/expressly.The GCM-128 encryption/decryption algorithm is shown in expression formula (1) and (2).
For further improving enciphering/deciphering speed, AES enciphering/deciphering module of the present invention has adopted Fully-pipelined structure, as shown in Figure 2.The inner loop of this process is all launched, insert a level production line at every repeating query interannular, have streamline between 10 step cones, every level production line inside is adopted 6 grades of sub-pipeline organizations again simultaneously, total comprises 60 grades of flowing water, can handle 60 groups of data simultaneously at most, adds the one-period that initial round key adds, through after initial 61 clock cycle, each clock can both be exported 1 group 128 ciphertext/expressly.
The cipher key expansion module input initial key K of AES exports 11 groups 128 round key (comprising initial key K) through cipher key spreading.
Because in network transmission process, each user data may use different key K.Cipher key expansion module of the present invention has designed the loop unrolling structure, to support each clock cycle of key constantly to change.As shown in Figure 3, this structure comprises 11 key expansion unit, AES enciphering/deciphering module has also comprised identical flowing water design, guaranteed that two modules can coordinate computing at a high speed, 9 grades of key expansion unit of the zero level to the of cipher key expansion module have identical structure, and the structure of the 10th grade of key expansion unit with preceding 10 grades different.Wherein, SubBytes represents 4 byte datas are carried out the computing of S box; ShiftLeft is with one of each byte data ring shift left.
Initial key K of each clock cycle input of cipher key expansion module, through after initial 61 clock cycle, each clock can both be exported 11 groups 128 key, has guaranteed the AES module when key K constantly changes, still can high speed operation.
The computing of Ghash function is an iterative process, and order is carried out and taken advantage of add operation, shown in expression formula (3).And multiplier unit has bigger time-delay, is the bottleneck that improves throughput.The key that improves Ghash functional operation speed is to adopt parallel multiplying alternate orders computing.
Existing parallel adder and multiplier is not suitable for the IEEE802.1AE agreement, because adopt the Ghash module of this parallel adder and multiplier, pending grouped data sum such as will determine when transfer of data begins, with control concurrent operation process, the actual conditions of this and data transmission procedure are not inconsistent.At this point, the present invention has designed a kind of novel parallel adder and multiplier, can be applicable to the IEEE802.1AE agreement fully.
Earlier the formula (3) with the Ghash function launches, and shown in expression formula (6), Xi no longer is variable expression but constant expression, for concurrent operation provides may.
Can further be summed up by formula (6), during Ghash function input (pq+n) group data, the expression formula of output Xpq+n is formula (5), p wherein, and q, n are positive integer, 1≤n≤q.
Can design a kind of parallel adder and multiplier of novel q degree of the IEEE802.1AE of being applicable to agreement by formula (5).With q=2 is example, the circuit structure of Ghash module as shown in Figure 4, this structure designs at actual conditions, pending grouped data sum such as do not need to pre-determine, as long as one group of data of last input are judged, the control logic of concurrent operation process is simple: if import two data at last, then MUX1 exports H2, and MUX2 exports H; If have only data, then MUX1 exports H, MUX2 output 0.
When Fig. 5 is 5 data A1-A5 of input, Ghash module five input instance graphs.Among Fig. 5 (a), import two data A1, A2, MUX1 gets H2, MUX2 gets H, through two cycles output X2 suc as formula (7a); X2 and input data A3 make XOR, and the result deposits register Reg1 in, and A4 deposits register Reg2 in, and MUX1 gets H2, and MUX2 gets H, through two cycles output X4 suc as formula (7b), shown in Fig. 5 (b); Import one 128 bit data A5 at last, MUX1 gets H, and MUX2 gets 0, through two cycles output X5 suc as formula (7c), shown in Fig. 5 (c).
Adopt Synopsys DC instrument to carry out logic synthesis, the critical path time-delay that draws multiplier among the present invention is the twice of AES module approximately.Therefore Ghash module of the present invention adopts the parallel structure of two degree among Fig. 4, and two multiplier unit concurrent workings reduce by half the critical path time-delay of Ghash module, balance the critical path time-delay of Ghash module and AES module, improved circuit speed.Each clock of GCM is imported one group of data, first row cache, and through two clock cycle input Ghash modules, two clock cycle of the multiplier unit among the Ghash are finished multiplication operation, thereby have broken through the restriction of the bigger time-delay of multiplier unit to speed.According to the above analysis, when carrying out logic synthesis with DC, notice that the multicycle route method is adopted in the multiplication path in the Ghash module, promptly two clock cycle are finished multiplication operation.
In sum, based on the GCM high-speed encryption and decryption device of IEEE802.1AE agreement, its integrated circuit structure comprises cipher key expansion module (KEYEXP) as shown in Figure 6, AES enciphering/deciphering module (Enc/Dec) and the parallel Ghash module of two degree.128 register Y is as counter, and each clock cycle adds 1.When the length of last group data less than 128 the time, 128 register MASK is used for data mask.Reg1, Reg2 are that the degree of depth is 128 register, the data that each clock cycle input is 128, and Reg1, two clock cycle such as Reg2 are filled with 128 bit data successively; After if the data that input earlier is 128 deposit Reg1 in, wait a clock cycle not have data input, then Reg2 zero setting; If discontented 128 of input data are then added 0 polishing.
The present invention uses Fujitsu 0.13 μ m 1.2V 1P8M CMOS technology library to carry out logic synthesis, and obtaining clock frequency is 764.5MHz, and maximum throughput rate is 97.9Gbps, and area is the 547K door.Introduce the hardware efficiency performance parameter, be defined as follows:
Hardware efficiency of the present invention is the 178.9Kbps/ door, and the design hardware efficiency more best than the performance of delivering at present is slightly high.The present invention adopts novel parallel adder and multiplier, can handle multi-group data simultaneously, and pending grouped data sum such as does not need to pre-determine.For further improving enciphering/deciphering speed, AES enciphering/deciphering module has adopted Fully-pipelined structure.In addition, constantly change in order to support each clock cycle of key, cipher key expansion module has designed the loop unrolling structure among the AES.The present invention has at a high speed, the characteristics of low hardware complexity.
Method for designing of the present invention is applicable in the similar high speed circuit design; If adopt multichannel technology, throughput of the present invention is expected to be further enhanced.
Claims (3)
1. GCM high-speed encryption and decryption device based on the IEEE802.1AE agreement, it is characterized in that: this GCM high-speed encryption and decryption device comprises information extraction modules (1), AES module (2) and Ghash module (5); Information extraction modules (1) is used for from input extracting data security protocol key, escape way sign, packet numbers, destination address and source address, and according to the corresponding initial key K of different working mode change one-tenth, initial vector IV, additional information A and plaintext P/ ciphertext C, and transfer data to AES module (2); AES module (2) is finished the data enciphering/deciphering, and the output ciphertext/expressly; Ghash module (5) produces discriminating sign T according to additional information A and ciphertext C by the Ghash function.
2. a kind of GCM high-speed encryption and decryption device based on the IEEE802.1AE agreement according to claim 1 is characterized in that: Ghash module (5) adopts parallel adder and multiplier, handles multi-group data simultaneously, pending grouped data sum such as does not need to pre-determine; During Ghash function input (pq+n) group data, the expression formula of output Xpq+n is applicable to that promptly the parallel adder and multiplier expression formula of novel q degree of IEEE802.1AE agreement is as follows:
P wherein, q, n are positive integer, 1≤n≤q.
3. a kind of GCM high-speed encryption and decryption device according to claim 1 based on the IEEE802.1AE agreement, it is characterized in that: described AES module (2) comprises cipher key expansion module (3) and AES enciphering/deciphering module (4); Wherein, AES enciphering/deciphering module (4) adopts Fully-pipelined structure, and the inner loop of this process is all launched, insert a level production line at every repeating query interannular, have streamline between 10 step cones, every level production line inside is adopted 6 grades of sub-pipeline organizations again simultaneously, amounts to comprise 60 level production lines; Cipher key expansion module (3) is the loop unrolling structure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010168517.3A CN101827107A (en) | 2010-05-11 | 2010-05-11 | IEEE802.1AE protocol-based GCM high-speed encryption and decryption equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010168517.3A CN101827107A (en) | 2010-05-11 | 2010-05-11 | IEEE802.1AE protocol-based GCM high-speed encryption and decryption equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101827107A true CN101827107A (en) | 2010-09-08 |
Family
ID=42690808
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010168517.3A Pending CN101827107A (en) | 2010-05-11 | 2010-05-11 | IEEE802.1AE protocol-based GCM high-speed encryption and decryption equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101827107A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102647455A (en) * | 2012-03-23 | 2012-08-22 | 华为技术有限公司 | Mobile advertisement processing method, proxy server and terminal |
CN104253684A (en) * | 2014-09-23 | 2014-12-31 | 深圳市汇顶科技股份有限公司 | Encryption method and encryption device |
CN105227298A (en) * | 2015-09-30 | 2016-01-06 | 大连理工大学 | Based on the intelligent substation message safe transmission implementation method of modified model GCM |
CN109347621A (en) * | 2018-08-31 | 2019-02-15 | 南京航空航天大学 | The high speed AES encryption circuit of defensive collision attack based on random delay S box |
CN109831293A (en) * | 2017-11-23 | 2019-05-31 | 盛科网络(苏州)有限公司 | Decryption method and system based on Aes algorithm |
CN111064563A (en) * | 2019-12-12 | 2020-04-24 | 北京计算机技术及应用研究所 | Efficient parallel GCM (GCM) implementation method |
CN111092716A (en) * | 2018-10-24 | 2020-05-01 | 北京嘉楠捷思信息技术有限公司 | Encryption mode realization method, device, equipment and medium of AES (advanced encryption Standard) algorithm |
CN111555859A (en) * | 2020-03-31 | 2020-08-18 | 杭州熠芯科技有限公司 | SM4-GCM algorithm and application in network security protocol |
CN112927125A (en) * | 2021-01-31 | 2021-06-08 | 成都商汤科技有限公司 | Data processing method and device, computer equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101335741A (en) * | 2007-06-28 | 2008-12-31 | 财团法人工业技术研究院 | Acceleration method and apparatus for GHASH computation in authenticated encryption Galois counter mode |
US20100027783A1 (en) * | 2007-03-12 | 2010-02-04 | Itt Manufacturing Enterprises, Inc. | Precalculated encryption key |
US7886143B2 (en) * | 2006-11-30 | 2011-02-08 | Broadcom Corporation | Multi-data rate cryptography architecture for network security |
-
2010
- 2010-05-11 CN CN201010168517.3A patent/CN101827107A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7886143B2 (en) * | 2006-11-30 | 2011-02-08 | Broadcom Corporation | Multi-data rate cryptography architecture for network security |
US20100027783A1 (en) * | 2007-03-12 | 2010-02-04 | Itt Manufacturing Enterprises, Inc. | Precalculated encryption key |
CN101335741A (en) * | 2007-06-28 | 2008-12-31 | 财团法人工业技术研究院 | Acceleration method and apparatus for GHASH computation in authenticated encryption Galois counter mode |
Non-Patent Citations (1)
Title |
---|
《Circuits and Systems, 2009. ISCAS 2009. IEEE International Symposium》 20090527 Chuan Zhang等 High-throughput GCM VLSI architecture for IEEE 802.1ae applications , * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102647455B (en) * | 2012-03-23 | 2015-08-05 | 华为技术有限公司 | The processing method of moving advertising, proxy server and terminal |
CN102647455A (en) * | 2012-03-23 | 2012-08-22 | 华为技术有限公司 | Mobile advertisement processing method, proxy server and terminal |
US10164771B2 (en) | 2014-09-23 | 2018-12-25 | Shenzhen GOODIX Technology Co., Ltd. | Encryption method and encryption device |
CN104253684A (en) * | 2014-09-23 | 2014-12-31 | 深圳市汇顶科技股份有限公司 | Encryption method and encryption device |
CN104253684B (en) * | 2014-09-23 | 2018-02-02 | 深圳市汇顶科技股份有限公司 | Encryption method and encryption device |
CN105227298A (en) * | 2015-09-30 | 2016-01-06 | 大连理工大学 | Based on the intelligent substation message safe transmission implementation method of modified model GCM |
CN105227298B (en) * | 2015-09-30 | 2018-02-16 | 大连理工大学 | Intelligent substation message safe transmission implementation method based on modified GCM |
CN109831293A (en) * | 2017-11-23 | 2019-05-31 | 盛科网络(苏州)有限公司 | Decryption method and system based on Aes algorithm |
CN109347621A (en) * | 2018-08-31 | 2019-02-15 | 南京航空航天大学 | The high speed AES encryption circuit of defensive collision attack based on random delay S box |
CN111092716A (en) * | 2018-10-24 | 2020-05-01 | 北京嘉楠捷思信息技术有限公司 | Encryption mode realization method, device, equipment and medium of AES (advanced encryption Standard) algorithm |
CN111064563A (en) * | 2019-12-12 | 2020-04-24 | 北京计算机技术及应用研究所 | Efficient parallel GCM (GCM) implementation method |
CN111064563B (en) * | 2019-12-12 | 2023-04-07 | 北京计算机技术及应用研究所 | Efficient parallel GCM (GCM) implementation method |
CN111555859A (en) * | 2020-03-31 | 2020-08-18 | 杭州熠芯科技有限公司 | SM4-GCM algorithm and application in network security protocol |
CN112927125A (en) * | 2021-01-31 | 2021-06-08 | 成都商汤科技有限公司 | Data processing method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101827107A (en) | IEEE802.1AE protocol-based GCM high-speed encryption and decryption equipment | |
CN106788974B (en) | Mask S box, grouping key calculation unit, device and corresponding construction method | |
Mandal et al. | Performance evaluation of cryptographic algorithms: DES and AES | |
CN105227298B (en) | Intelligent substation message safe transmission implementation method based on modified GCM | |
CN104639314A (en) | Device based on AES (advanced encryption standard) encryption/decryption algorithm and pipelining control method | |
Lamba | Design and analysis of stream cipher for network security | |
Haldankar et al. | Implementation of AES and blowfish algorithm | |
CN101345616B (en) | Communication encryption and decryption method of four-item weight score Fourier transform based on multi-parameter | |
CN101867471A (en) | Irrational number based DES authentication encryption algorithm | |
CN114679252A (en) | Resource sharing method for MACsec AES algorithm | |
CN111614457B (en) | P replacement improvement-based lightweight packet encryption and decryption method, device and storage medium | |
Kapoor et al. | Analysis of symmetric and asymmetric key algorithms | |
CN107896149A (en) | 128 symmetric encryption methods based on three group operationes | |
Mateescu et al. | A hybrid approach of system security for small and medium enterprises: Combining different cryptography techniques | |
Buell | Modern symmetric ciphers—Des and Aes | |
Gaur et al. | A comparative study and analysis of cryptographic algorithms: RSA, DES, AES, BLOWFISH, 3-DES, and TWOFISH | |
Bajaj et al. | AES algorithm for encryption | |
Li et al. | An implementation method for SM4-GCM on FPGA | |
Bali | Comparative study of private and public key cryptography algorithms: A survey | |
Encarnacion et al. | Performance Analysis on Enhanced Round Function of SIMECK Block Cipher | |
Acar et al. | Hardware/software co-design of a lightweight crypto algorithm BORON on an FPGA | |
Krishna et al. | Comparison of Encryption Techniques In Internet Of Things | |
CN112787820B (en) | Lightweight authentication encryption and decryption implementation method suitable for hardware implementation | |
Jintcharadze et al. | Implementation and Comparative Analysis of Symmetric Encryption Model Based on Substitution Cipher Techniques | |
Bekkaoui et al. | A robust scheme to improving security of data using graph theory |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20100908 |