CN106921486A - The method and apparatus of data encryption - Google Patents

The method and apparatus of data encryption Download PDF

Info

Publication number
CN106921486A
CN106921486A CN201511001418.5A CN201511001418A CN106921486A CN 106921486 A CN106921486 A CN 106921486A CN 201511001418 A CN201511001418 A CN 201511001418A CN 106921486 A CN106921486 A CN 106921486A
Authority
CN
China
Prior art keywords
data
encryption
initial
key
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201511001418.5A
Other languages
Chinese (zh)
Inventor
王国文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201511001418.5A priority Critical patent/CN106921486A/en
Publication of CN106921486A publication Critical patent/CN106921486A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to information security field, the method and apparatus for disclosing data encryption, the method includes:Data to be encrypted are grouped;Initial encryption is carried out using initial key respectively for every group of data, data after initial encryption are encrypted as initial input with carrying out many wheels;In every wheel encryption, the data of input are encrypted displacement, data are encrypted after being replaced using key pair encryption corresponding with this encryption round number, the input data that encrypted data is encrypted as next round.The present invention can better meet demand of the mobile terminal for encryption technology.

Description

The method and apparatus of data encryption
Technical field
The present invention relates to information security field, in particular it relates to a kind of method and apparatus of data encryption.
Background technology
In recent years, cryptography theoretical research and practical application obtain development energetically, and designing largely can with high safety Block cipher by property and better performances is applied to password field simultaneously, and the research and design work of new cryptographic algorithm greatly promotees The application of cryptography and cipher application in every field is entered, to national security, Intellectual Property Right of Enterprises protection and individual privacy Positive guaranteeing role is played etc. information security work.But, with big data, cloud computing, Internet of Things and mobile Internet Development and wireless network life popularization and application, new application scenarios the safety of mobile terminal is proposed it is higher will Ask, for mobile terminal it is flexible convenient, easy to carry the characteristics of from the point of view of, block cipher such as DES, 3DES, SM4 of universality etc. Algorithm is higher due to its computational complexity, and the equipment that mobile terminal belongs to resource-constrained type, have certain in terms of speed Influence.Accordingly, it is desirable to provide a kind of AES that disclosure satisfy that mobile terminal demand.
The content of the invention
It is an object of the invention to provide a kind of method and apparatus of data encryption, with solution or at least part of solution State technical problem.
To achieve these goals, the present invention provides a kind of method of data encryption, and the method includes:
Data to be encrypted are grouped;
Initial encryption is carried out using initial key respectively for every group of data, using data after initial encryption as initial input To carry out many wheel encryptions;
In every wheel encryption, the data of input are encrypted displacement, use key pair corresponding with this encryption round number Data are encrypted after keyed permutation, the input data that encrypted data is encrypted as next round.
Preferably, methods described also includes:Data to be decrypted are grouped;For every group of data use respectively with most Latter wheel is encrypted corresponding key and is initially decrypted, and data are decrypted as initial input with carrying out many wheels after initial decrypting; In every wheel decryption, the data of input are decrypted displacement, decryption is replaced using key corresponding with this decryption round number Data are decrypted afterwards, and input data is decrypted using data after decryption as next round.
Preferably, methods described also includes:Key to configuring is extended, after being extended by key number needed for encryption Key is segmented, and each section of key is corresponding with key used in initial encryption and the encryption of each wheel respectively.
Preferably, it is described that the data of input are encrypted displacement, including:The data being input into are entered using keyed permutation table Row S box keyed permutations;P displacements are carried out to data after S box keyed permutations using keyed permutation table.
Preferably, methods described also includes:The random number of predetermined number byte is produced, initial encryption is produced using random number Permutation table and/or permutation table is initially decrypted, initial encryption permutation table and/or initial decryption permutation table repeatedly alternately put Change, generate for the keyed permutation table of keyed permutation and/or the decryption permutation table for decrypting displacement.
According to another aspect of the present invention, a kind of device of data encryption is also disclosed, the device includes:Grouping module, For data to be encrypted to be grouped;Initial encryption module, for being carried out using initial key respectively for every group of data Initial encryption, encrypting module is input into using data after initial encryption as original input data;The encrypting module is used in every wheel In encryption, the data of input are encrypted displacement, data after being replaced using key pair encryption corresponding with this encryption round number It is encrypted, the input data that encrypted data is encrypted as next round.
Preferably, described device also includes:Initial deciphering module and deciphering module;The grouping module is additionally operable to wait to solve Close data are grouped;The initial deciphering module is corresponding with last wheel encryption for being used respectively for every group of data Key is initially decrypted, and data are input into the deciphering module as original input data after initially decrypting;The decryption mould Block is used in every wheel decryption, the data of input is decrypted into displacement, using key corresponding with this decryption round number to solution Data are decrypted after close displacement, and input data is decrypted using data after decryption as next round.
Preferably, the grouping module is additionally operable to be extended the key for configuring, and will expand by key number needed for encryption Key is segmented after exhibition, and each section of key is corresponding with key used in initial encryption and the encryption of each wheel respectively.
Preferably, the encrypting module is used to carry out S box keyed permutations to the data being input into using keyed permutation table;Use Keyed permutation table carries out P displacements to data after S box keyed permutations.
Preferably, described device also includes:Generation module, the random number for producing predetermined number byte, using random Number produces initial encryption permutation table and/or initially decrypts permutation table, and initial encryption permutation table and/or initial decryption permutation table are entered The multiple alternating permutation of row, generates for the keyed permutation table of keyed permutation and/or the decryption permutation table for decrypting displacement.
By above-mentioned technical proposal, data to be encrypted are grouped, initial key is used respectively for every group of data Initial encryption is carried out, data after initial encryption are encrypted as initial input with carrying out many wheels;In every wheel encryption, by what is be input into Data are encrypted displacement, and data are encrypted after being replaced using key pair encryption corresponding with this encryption round number, will encrypt The input data that data are encrypted as next round afterwards.So, it is possible to provide that a kind of security is higher, the less encryption skill of operand Art scheme, and then demand of the mobile terminal for encryption technology can be better met.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Accompanying drawing is, for providing a further understanding of the present invention, and to constitute the part of specification, with following tool Body implementation method is used to explain the present invention together, but is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the flow chart of the method for data encryption according to an embodiment of the invention;
Fig. 2 is the flow chart of the method for data deciphering according to an embodiment of the invention;
Fig. 3 is the structure chart of the device of data encryption according to an embodiment of the invention;
Fig. 4 is the structure chart of the device of data encryption according to an embodiment of the invention;And
Fig. 5 is the structure chart of the device of data encryption according to an embodiment of the invention.
Specific embodiment
Specific embodiment of the invention is described in detail below in conjunction with accompanying drawing.It should be appreciated that this place is retouched The specific embodiment stated is merely to illustrate and explain the present invention, and is not intended to limit the invention.
Fig. 1 is the flow chart of the method for data encryption according to an embodiment of the invention.As shown in figure 1, the present invention can be wrapped Include following steps.
In step s 110, data to be encrypted are grouped.
For example, by clear-text message coded representation into plaintext sequence, the packet that length is m is divided into, for example, is divided into The packet of 64.In subsequent step, every packet is transformed into isometric output ciphertext sequence in the presence of key respectively.Its In, key can make the key of the bit length of support 64,80,96,112,128 by extended mode, packet iteration wheel number may be selected 10, 11st, 12,13 and 14 times.
In one embodiment, methods described also includes:Key to configuring is extended, will by key number needed for encryption Key is segmented after extension, and each section of key is corresponding with key used in initial encryption and the encryption of each wheel respectively.
For example, the key of L byte lengths will be extended to 8 (r+1) bytes, the key after extension is K0|K1|...|Ki |...|Kr=k0|k1|...|ki|...k8r+7, each K hereiIt is 8 byte lengths, 0≤i≤r;Each kiThere is a word Section, 0≤i≤8r+7, r are iteration wheel number when being encrypted.Therefore key K is 8,10,12,14 and 16 bytes, is grouped iteration Wheel number r may be selected 10,11,12,13 and 14 times.
In one embodiment, methods described may also include:The random number of predetermined number byte is produced, is produced using random number Initial encryption permutation table and/or permutation table is initially decrypted, initial encryption permutation table and/or initial decryption permutation table are carried out repeatedly Alternating permutation, generation keyed permutation table and/or decryption permutation table.
For example, keyed permutation table and decryption permutation table are generated by pseudo-random permutation, are introduced iteration Logistic and (are patrolled Volume) mapping, produce the not repeat number of 256 bytes first, the scope of not repeat number is 0-30000, keyed permutation table S [256] and Decryption permutation table S-1[256] it is pseudo-random permutation table that 256 new bytes are obtained by multiple alternating permutation, alternating permutation process For:T:S [T (j)]=T (j+1), S [T (255)]=T (0);S-1[T (j+1)]=T (j), S-1[T (0)]=T (255);Wherein 0 ≤j≤254。
In the step s 120, initial encryption is carried out using initial key respectively for every group of data, by number after initial encryption Encrypted with carrying out many wheels according to as initial input.
In step s 130, it is every wheel encryption in, the data of input are encrypted displacement, using with this encryption round number Data are encrypted after corresponding key pair encryption displacement, the input data that encrypted data is encrypted as next round.
In one embodiment, it is described the data of input are encrypted displacement to include:Using keyed permutation table to input Data carry out S box keyed permutations;P displacements are carried out to data after S box keyed permutations using keyed permutation table.
For example, during initial encryption, using initial key K0Data are carried out with XOR treatment, initial ciphertextWherein P is the initial plaintext text of 64, K0It is the key of 8 initial bytes.
In r wheel ciphering process, r is predetermined encryption wheel number, and i belongs to [1, r], and the iteration of each round includes:S is carried out first Box keyed permutation, the data of each byte using keyed permutation table S to being input into perform pseudo-random permutation, i.e. Mi(j)=S [Ci-1 (j)];Then by the data M of 64iThe matrix of the row of 8 row 8 is placed in, using keyed permutation table S to being held on each diagonal in matrix Row pseudo-random permutation;Finally by the ciphertext for performing xor operation acquisition each round iterationEpicycle gained is close Text repeats r encryption as the input of next round encryption.When last wheel is gone to, that is, obtain final close Literary C, completes ciphering process.
In one embodiment, as shown in Fig. 2 methods described may also include the steps of.
In step S210, data to be decrypted are grouped.In step S220, used respectively for every group of data The corresponding key of encryption is taken turns with last initially to be decrypted, data are solved as initial input to carry out many wheels after initial decrypting It is close.In step S230, in every wheel decryption, the data of input are decrypted displacement, using corresponding with this decryption round number Key to decryption displacement after data be decrypted, using data after decryption as next round decrypt input data.
For example, ciphertext data are grouped by default size.Use last 8 byte K of key KrTo ciphertext It is decrypted,Wherein C is the ciphertext text of 64, KrIt is last 8 bytes of key K.Take turns decrypted in r Cheng Zhong, i belong to [1, r], and r is predetermined encryption wheel number.The decryption of each round may include:First by decryption permutation table S-1To each The data of byte perform pseudo-random permutation, i.e. Mi(j)=S-1[Pi+1(j)];Then the data M for being by 64iIt is placed in the square of the row of 8 row 8 Battle array, uses decryption permutation table S-1To performing pseudo-random permutation on each diagonal in matrix;Obtained finally by xor operation is performed Obtain the data after each round decryptionData are carried out as the input data that next round is decrypted after each round is decrypted Decryption.When last wheel is gone to, that is, final plaintext P is obtained, complete decrypting process.
Beneficial effects of the present invention include:
Evaluate that block cipher security is main to be evaluated with regard to the security of its core S boxes, mainly pass through Nonlinearity and the difference uniformity are measured, and the present invention program still weighs the security of S boxes using the two metrics, with Under in terms of nonlinearity and the difference uniformity two come its safety factor is described in detail in detail.
For nonlinearity:
OrderIt is a n units Boolean function, claimsIt is the nonlinearity of f (x).Its In, LnRepresent linear and affine function the collection of entirety n units;dH(f, l) represents the Hamming distance between f and l.OrderIt is a multiple output function, the nonlinearity of S is
In Linear Cryptanalysis, a crucial step is the effective linear approximation for constructing single-wheel, and single-wheel linear approximation is total It is the linear approximation for be unableing to do without S boxes (i.e. keyed permutation table), therefore, the nonlinearity of S boxes is the bigger the better.Thus, it is of the invention The S boxes that technical scheme is constructed have non-linear, can preferably resist " Best linear approximation " to attack, and nonlinearity is preferable.
For difference uniformity:
The ability of difference analysis is resisted according to one cipher function of measurement, It is a multiple output function, the difference uniformity of S (x) is
Also Difference formula probability can be usedTo represent input The XOR distribution situation of output.
Wherein, the x is the set for being possible to input, described 2nIt is the element number of the set.In fact, DPfInstitute's table What is shown is to give an input difference Δ x, is output as the maximum likelihood of Δ y.Difference uniformity is directed to differential cryptanalysis And introduce, it is used for measuring the ability that a cipher function resists difference analysis.The difference uniformity of S boxes is the smaller the better.Root According to the calculating to difference uniformity, Difference formula degree is smaller in technical scheme, therefore deduces that it is equal in difference Even property aspect performance is preferable.
S boxes are unique non-linear components in many block ciphers, and its Cipher Strength determines that whole password is calculated The security of method, its operating rate determines the scramble speed of whole algorithm.Non-linear and difference uniformity two indices are determined The security of S boxes, may certify that technical scheme shows more good in terms of security by experimental result, can It is effectively adapted to use requirement of the mobile terminal to cryptographic algorithm.
As shown in figure 3, a kind of device of data encryption may include such as lower module.
Grouping module 310, for data to be encrypted to be grouped.
Initial encryption module 320, for carrying out initial encryption using initial key respectively for every group of data, will initially add Close rear data are input into encrypting module as original input data.
Encrypting module 330, in every wheel encryption, the data of input being encrypted into displacement, encrypts using with this Data are encrypted after the corresponding key pair encryption displacement of wheel number, the input data that encrypted data is encrypted as next round.
In one embodiment, as shown in figure 4, device also includes:Initial deciphering module 410 and deciphering module 420.Packet mould Block 310 is additionally operable to be grouped data to be decrypted;Initial deciphering module 410 be used for for every group of data use respectively with most Latter wheel is encrypted corresponding key and is initially decrypted, and data are input into the decryption as original input data after initially decrypting Module;Deciphering module 420 be used for it is every wheel decryption in, the data of input are decrypted displacement, using with this decryption round number Corresponding key is decrypted to data after decryption displacement, and input data is decrypted using data after decryption as next round.
In one embodiment, grouping module 310 is additionally operable to be extended the key for configuring, by key number needed for encryption Key after extension is segmented, each section of key is corresponding with key used in initial encryption and the encryption of each wheel respectively.
In one embodiment, encrypting module 330 is put for the data being input into be carried out with the encryption of S boxes using keyed permutation table Change;P displacements are carried out to data after S box keyed permutations using keyed permutation table.
In one embodiment, as shown in figure 5, device may also include generation module 510, for producing predetermined number byte Random number, is produced using random number and initial encryption permutation table and/or initially decrypts permutation table, by initial encryption permutation table and/or Initial decryption permutation table carries out multiple alternating permutation, generates for the keyed permutation table of keyed permutation and/or is replaced for decrypting Decryption permutation table.
Said apparatus are corresponding with preceding method, and specific embodiment and technique effect refer to correspondence record in method, This is repeated no more.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention is not limited to above-mentioned reality The detail in mode is applied, in range of the technology design of the invention, various letters can be carried out to technical scheme Monotropic type, these simple variants belong to protection scope of the present invention.
It is further to note that each particular technique feature described in above-mentioned specific embodiment, in not lance In the case of shield, can be combined by any suitable means, in order to avoid unnecessary repetition, the present invention to it is various can The combination of energy is no longer separately illustrated.
Additionally, can also be combined between a variety of implementation methods of the invention, as long as it is without prejudice to originally The thought of invention, it should equally be considered as content disclosed in this invention.

Claims (10)

1. a kind of method of data encryption, the method includes:
Data to be encrypted are grouped;
Carry out initial encryption using initial key respectively for every group of data, using data after initial encryption as initial input entering The many wheel encryptions of row;
In every wheel encryption, the data of input are encrypted displacement, use key pair encryption corresponding with this encryption round number Data are encrypted after displacement, the input data that encrypted data is encrypted as next round.
2. method according to claim 1, it is characterised in that methods described also includes:
Data to be decrypted are grouped;
Used respectively for every group of data and initially decrypted with last wheel corresponding key of encryption, data after initially decrypting Decrypted with carrying out many wheels as initial input;
In every wheel decryption, the data of input are decrypted displacement, using key corresponding with this decryption round number to decryption Data are decrypted after displacement, and input data is decrypted using data after decryption as next round.
3. method according to claim 1, it is characterised in that methods described also includes:
Key to configuring is extended, and is segmented key after extension by key number needed for encryption, each section of key difference It is corresponding with key used in initial encryption and the encryption of each wheel.
4. according to any described method of claims 1 to 3, it is characterised in that described that the data of input are encrypted into displacement, Including:
S box keyed permutations are carried out to the data being input into using keyed permutation table;
P displacements are carried out to data after S box keyed permutations using keyed permutation table.
5. method according to claim 1, it is characterised in that methods described also includes:
The random number of predetermined number byte is produced, initial encryption permutation table is produced using random number and/or is initially decrypted permutation table, Initial encryption permutation table and/or initial decryption permutation table are carried out into multiple alternating permutation, the encryption generated for keyed permutation is put Change table and/or the decryption permutation table for decrypting displacement.
6. a kind of device of data encryption, the device includes:
Grouping module, for data to be encrypted to be grouped;
Initial encryption module, for carrying out initial encryption using initial key respectively for every group of data, by number after initial encryption Encrypting module is input into according to as original input data;
The encrypting module be used for it is every wheel encryption in, the data of input are encrypted displacement, using with this encryption round number Data are encrypted after corresponding key pair encryption displacement, the input data that encrypted data is encrypted as next round.
7. device according to claim 6, it is characterised in that described device also includes:Initial deciphering module and decryption mould Block;
The grouping module is additionally operable to be grouped data to be decrypted;
The initial deciphering module is used to be used respectively for every group of data to be carried out initially with last wheel corresponding key of encryption Decryption, data are input into the deciphering module as original input data after initially decrypting;
The deciphering module be used for it is every wheel decryption in, the data of input are decrypted displacement, using with this decryption round number Corresponding key is decrypted to data after decryption displacement, and input data is decrypted using data after decryption as next round.
8. device according to claim 6, it is characterised in that the grouping module is additionally operable to expand the key for configuring , be segmented for key after extension by key number needed for encryption by exhibition, during each section of key is encrypted with initial encryption and each wheel respectively Key correspondence used.
9. according to any described device of claim 6 to 8, it is characterised in that the encrypting module is used to use keyed permutation Table carries out S box keyed permutations to the data being input into;P displacements are carried out to data after S box keyed permutations using keyed permutation table.
10. device according to claim 6, it is characterised in that described device also includes:
Generation module, the random number for producing predetermined number byte, using random number generation initial encryption permutation table and/or just Begin decryption permutation table, and initial encryption permutation table and/or initial decryption permutation table are carried out into multiple alternating permutation, generates for encrypting The keyed permutation table of displacement and/or the decryption permutation table for decrypting displacement.
CN201511001418.5A 2015-12-28 2015-12-28 The method and apparatus of data encryption Pending CN106921486A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511001418.5A CN106921486A (en) 2015-12-28 2015-12-28 The method and apparatus of data encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511001418.5A CN106921486A (en) 2015-12-28 2015-12-28 The method and apparatus of data encryption

Publications (1)

Publication Number Publication Date
CN106921486A true CN106921486A (en) 2017-07-04

Family

ID=59456269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511001418.5A Pending CN106921486A (en) 2015-12-28 2015-12-28 The method and apparatus of data encryption

Country Status (1)

Country Link
CN (1) CN106921486A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277048A (en) * 2017-07-26 2017-10-20 浙江吉利汽车研究院有限公司 A kind of encrypting and decrypting method for communication authentication
CN108737073A (en) * 2018-06-22 2018-11-02 北京智芯微电子科技有限公司 The method and apparatus that power analysis is resisted in block encryption operation
CN115208626A (en) * 2022-06-02 2022-10-18 北京交大微联科技有限公司 Communication method and device based on secure communication ciphertext transmission in railway signal system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060045264A1 (en) * 1998-06-03 2006-03-02 Kocher Paul C Prevention of side channel attacks against block cipher implementations and other cryptographic systems
CN101013938A (en) * 2007-01-12 2007-08-08 广州市诚毅科技软件开发有限公司 Encryption method of block cipher
CN101383703A (en) * 2008-09-12 2009-03-11 华南理工大学 Dynamic ciphering system and method based on broad sense information field
CN103516512A (en) * 2013-10-21 2014-01-15 深圳市芯通信息科技有限公司 Encryption and decryption method and encryption and decryption device based on AES (advanced encryption standard) algorithm
CN104184579A (en) * 2014-09-12 2014-12-03 南京航空航天大学 Lightweight block cipher VH algorithm based on dual pseudo-random transformation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060045264A1 (en) * 1998-06-03 2006-03-02 Kocher Paul C Prevention of side channel attacks against block cipher implementations and other cryptographic systems
CN101013938A (en) * 2007-01-12 2007-08-08 广州市诚毅科技软件开发有限公司 Encryption method of block cipher
CN101383703A (en) * 2008-09-12 2009-03-11 华南理工大学 Dynamic ciphering system and method based on broad sense information field
CN103516512A (en) * 2013-10-21 2014-01-15 深圳市芯通信息科技有限公司 Encryption and decryption method and encryption and decryption device based on AES (advanced encryption standard) algorithm
CN104184579A (en) * 2014-09-12 2014-12-03 南京航空航天大学 Lightweight block cipher VH algorithm based on dual pseudo-random transformation

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277048A (en) * 2017-07-26 2017-10-20 浙江吉利汽车研究院有限公司 A kind of encrypting and decrypting method for communication authentication
CN107277048B (en) * 2017-07-26 2020-04-24 浙江吉利汽车研究院有限公司 Encryption and decryption method for communication authentication
CN108737073A (en) * 2018-06-22 2018-11-02 北京智芯微电子科技有限公司 The method and apparatus that power analysis is resisted in block encryption operation
CN108737073B (en) * 2018-06-22 2021-09-28 北京智芯微电子科技有限公司 Method and device for resisting energy analysis attack in block encryption operation
CN115208626A (en) * 2022-06-02 2022-10-18 北京交大微联科技有限公司 Communication method and device based on secure communication ciphertext transmission in railway signal system
CN115208626B (en) * 2022-06-02 2023-12-01 北京交大微联科技有限公司 Communication method and device based on secure communication ciphertext transmission in railway signal system

Similar Documents

Publication Publication Date Title
EP3154217B1 (en) Scrambled tweak mode of block ciphers for differential power analysis resistant encryption
CN102185692B (en) Multimode reconfigurable encryption method based on advanced encryption standard (AES) encryption algorithm
CN108964872B (en) Encryption method and device based on AES
CN107147487B (en) Symmetric key random block cipher
CN104333446B (en) A kind of novel ultra-light magnitude QTL block cipher implementation method
CN105490802A (en) Improved SM4 parallel encryption and decryption communication method based on GPU (Graphics Processing Unit)
JP2015158665A (en) Variable-length block encrypting device and method for form storage encryption
CN104065474B (en) Novel low-resource efficient lightweight Surge block cipher implementation method
CN105324956A (en) Method and apparatus to encrypt plaintext data
CN104184579A (en) Lightweight block cipher VH algorithm based on dual pseudo-random transformation
Kumar et al. Lightweight data security model for IoT applications: a dynamic key approach
CN106296561A (en) Image encryption method based on hyperchaotic system and device, decryption method and device
Agrawal et al. Elliptic curve cryptography with hill cipher generation for secure text cryptosystem
KR101095386B1 (en) A Cryptosystem with a Discretized Chaotic Map
JP5689826B2 (en) Secret calculation system, encryption apparatus, secret calculation apparatus and method, program
CN105049204A (en) Lightweight stream cipher technology VHC based on CTR mode and block cipher VH
CN101826959B (en) Byte-oriented key stream generation method and encryption method
Xiang et al. An improved chaotic cryptosystem with external key
CN106921486A (en) The method and apparatus of data encryption
CN103812658B (en) A kind of secure communication protocols based on stream cipher
Atia Development of a new algorithm for key and S-box generation in blowfish algorithm
CN107835070B (en) Simple embedded encryption method
CN105162580A (en) Lightweight stream cipher technology VHO based on OFB mode and block cipher VH
CN105391546A (en) Lightweight block cipher technology VHF based on double pseudo random transformation and Feistel structure
CN102523085A (en) Data encryption method, data encrypting device and smart card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170704