CN106921486A - The method and apparatus of data encryption - Google Patents
The method and apparatus of data encryption Download PDFInfo
- Publication number
- CN106921486A CN106921486A CN201511001418.5A CN201511001418A CN106921486A CN 106921486 A CN106921486 A CN 106921486A CN 201511001418 A CN201511001418 A CN 201511001418A CN 106921486 A CN106921486 A CN 106921486A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- initial
- key
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to information security field, the method and apparatus for disclosing data encryption, the method includes:Data to be encrypted are grouped;Initial encryption is carried out using initial key respectively for every group of data, data after initial encryption are encrypted as initial input with carrying out many wheels;In every wheel encryption, the data of input are encrypted displacement, data are encrypted after being replaced using key pair encryption corresponding with this encryption round number, the input data that encrypted data is encrypted as next round.The present invention can better meet demand of the mobile terminal for encryption technology.
Description
Technical field
The present invention relates to information security field, in particular it relates to a kind of method and apparatus of data encryption.
Background technology
In recent years, cryptography theoretical research and practical application obtain development energetically, and designing largely can with high safety
Block cipher by property and better performances is applied to password field simultaneously, and the research and design work of new cryptographic algorithm greatly promotees
The application of cryptography and cipher application in every field is entered, to national security, Intellectual Property Right of Enterprises protection and individual privacy
Positive guaranteeing role is played etc. information security work.But, with big data, cloud computing, Internet of Things and mobile Internet
Development and wireless network life popularization and application, new application scenarios the safety of mobile terminal is proposed it is higher will
Ask, for mobile terminal it is flexible convenient, easy to carry the characteristics of from the point of view of, block cipher such as DES, 3DES, SM4 of universality etc.
Algorithm is higher due to its computational complexity, and the equipment that mobile terminal belongs to resource-constrained type, have certain in terms of speed
Influence.Accordingly, it is desirable to provide a kind of AES that disclosure satisfy that mobile terminal demand.
The content of the invention
It is an object of the invention to provide a kind of method and apparatus of data encryption, with solution or at least part of solution
State technical problem.
To achieve these goals, the present invention provides a kind of method of data encryption, and the method includes:
Data to be encrypted are grouped;
Initial encryption is carried out using initial key respectively for every group of data, using data after initial encryption as initial input
To carry out many wheel encryptions;
In every wheel encryption, the data of input are encrypted displacement, use key pair corresponding with this encryption round number
Data are encrypted after keyed permutation, the input data that encrypted data is encrypted as next round.
Preferably, methods described also includes:Data to be decrypted are grouped;For every group of data use respectively with most
Latter wheel is encrypted corresponding key and is initially decrypted, and data are decrypted as initial input with carrying out many wheels after initial decrypting;
In every wheel decryption, the data of input are decrypted displacement, decryption is replaced using key corresponding with this decryption round number
Data are decrypted afterwards, and input data is decrypted using data after decryption as next round.
Preferably, methods described also includes:Key to configuring is extended, after being extended by key number needed for encryption
Key is segmented, and each section of key is corresponding with key used in initial encryption and the encryption of each wheel respectively.
Preferably, it is described that the data of input are encrypted displacement, including:The data being input into are entered using keyed permutation table
Row S box keyed permutations;P displacements are carried out to data after S box keyed permutations using keyed permutation table.
Preferably, methods described also includes:The random number of predetermined number byte is produced, initial encryption is produced using random number
Permutation table and/or permutation table is initially decrypted, initial encryption permutation table and/or initial decryption permutation table repeatedly alternately put
Change, generate for the keyed permutation table of keyed permutation and/or the decryption permutation table for decrypting displacement.
According to another aspect of the present invention, a kind of device of data encryption is also disclosed, the device includes:Grouping module,
For data to be encrypted to be grouped;Initial encryption module, for being carried out using initial key respectively for every group of data
Initial encryption, encrypting module is input into using data after initial encryption as original input data;The encrypting module is used in every wheel
In encryption, the data of input are encrypted displacement, data after being replaced using key pair encryption corresponding with this encryption round number
It is encrypted, the input data that encrypted data is encrypted as next round.
Preferably, described device also includes:Initial deciphering module and deciphering module;The grouping module is additionally operable to wait to solve
Close data are grouped;The initial deciphering module is corresponding with last wheel encryption for being used respectively for every group of data
Key is initially decrypted, and data are input into the deciphering module as original input data after initially decrypting;The decryption mould
Block is used in every wheel decryption, the data of input is decrypted into displacement, using key corresponding with this decryption round number to solution
Data are decrypted after close displacement, and input data is decrypted using data after decryption as next round.
Preferably, the grouping module is additionally operable to be extended the key for configuring, and will expand by key number needed for encryption
Key is segmented after exhibition, and each section of key is corresponding with key used in initial encryption and the encryption of each wheel respectively.
Preferably, the encrypting module is used to carry out S box keyed permutations to the data being input into using keyed permutation table;Use
Keyed permutation table carries out P displacements to data after S box keyed permutations.
Preferably, described device also includes:Generation module, the random number for producing predetermined number byte, using random
Number produces initial encryption permutation table and/or initially decrypts permutation table, and initial encryption permutation table and/or initial decryption permutation table are entered
The multiple alternating permutation of row, generates for the keyed permutation table of keyed permutation and/or the decryption permutation table for decrypting displacement.
By above-mentioned technical proposal, data to be encrypted are grouped, initial key is used respectively for every group of data
Initial encryption is carried out, data after initial encryption are encrypted as initial input with carrying out many wheels;In every wheel encryption, by what is be input into
Data are encrypted displacement, and data are encrypted after being replaced using key pair encryption corresponding with this encryption round number, will encrypt
The input data that data are encrypted as next round afterwards.So, it is possible to provide that a kind of security is higher, the less encryption skill of operand
Art scheme, and then demand of the mobile terminal for encryption technology can be better met.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Accompanying drawing is, for providing a further understanding of the present invention, and to constitute the part of specification, with following tool
Body implementation method is used to explain the present invention together, but is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the flow chart of the method for data encryption according to an embodiment of the invention;
Fig. 2 is the flow chart of the method for data deciphering according to an embodiment of the invention;
Fig. 3 is the structure chart of the device of data encryption according to an embodiment of the invention;
Fig. 4 is the structure chart of the device of data encryption according to an embodiment of the invention;And
Fig. 5 is the structure chart of the device of data encryption according to an embodiment of the invention.
Specific embodiment
Specific embodiment of the invention is described in detail below in conjunction with accompanying drawing.It should be appreciated that this place is retouched
The specific embodiment stated is merely to illustrate and explain the present invention, and is not intended to limit the invention.
Fig. 1 is the flow chart of the method for data encryption according to an embodiment of the invention.As shown in figure 1, the present invention can be wrapped
Include following steps.
In step s 110, data to be encrypted are grouped.
For example, by clear-text message coded representation into plaintext sequence, the packet that length is m is divided into, for example, is divided into
The packet of 64.In subsequent step, every packet is transformed into isometric output ciphertext sequence in the presence of key respectively.Its
In, key can make the key of the bit length of support 64,80,96,112,128 by extended mode, packet iteration wheel number may be selected 10,
11st, 12,13 and 14 times.
In one embodiment, methods described also includes:Key to configuring is extended, will by key number needed for encryption
Key is segmented after extension, and each section of key is corresponding with key used in initial encryption and the encryption of each wheel respectively.
For example, the key of L byte lengths will be extended to 8 (r+1) bytes, the key after extension is K0|K1|...|Ki
|...|Kr=k0|k1|...|ki|...k8r+7, each K hereiIt is 8 byte lengths, 0≤i≤r;Each kiThere is a word
Section, 0≤i≤8r+7, r are iteration wheel number when being encrypted.Therefore key K is 8,10,12,14 and 16 bytes, is grouped iteration
Wheel number r may be selected 10,11,12,13 and 14 times.
In one embodiment, methods described may also include:The random number of predetermined number byte is produced, is produced using random number
Initial encryption permutation table and/or permutation table is initially decrypted, initial encryption permutation table and/or initial decryption permutation table are carried out repeatedly
Alternating permutation, generation keyed permutation table and/or decryption permutation table.
For example, keyed permutation table and decryption permutation table are generated by pseudo-random permutation, are introduced iteration Logistic and (are patrolled
Volume) mapping, produce the not repeat number of 256 bytes first, the scope of not repeat number is 0-30000, keyed permutation table S [256] and
Decryption permutation table S-1[256] it is pseudo-random permutation table that 256 new bytes are obtained by multiple alternating permutation, alternating permutation process
For:T:S [T (j)]=T (j+1), S [T (255)]=T (0);S-1[T (j+1)]=T (j), S-1[T (0)]=T (255);Wherein 0
≤j≤254。
In the step s 120, initial encryption is carried out using initial key respectively for every group of data, by number after initial encryption
Encrypted with carrying out many wheels according to as initial input.
In step s 130, it is every wheel encryption in, the data of input are encrypted displacement, using with this encryption round number
Data are encrypted after corresponding key pair encryption displacement, the input data that encrypted data is encrypted as next round.
In one embodiment, it is described the data of input are encrypted displacement to include:Using keyed permutation table to input
Data carry out S box keyed permutations;P displacements are carried out to data after S box keyed permutations using keyed permutation table.
For example, during initial encryption, using initial key K0Data are carried out with XOR treatment, initial ciphertextWherein P is the initial plaintext text of 64, K0It is the key of 8 initial bytes.
In r wheel ciphering process, r is predetermined encryption wheel number, and i belongs to [1, r], and the iteration of each round includes:S is carried out first
Box keyed permutation, the data of each byte using keyed permutation table S to being input into perform pseudo-random permutation, i.e. Mi(j)=S [Ci-1
(j)];Then by the data M of 64iThe matrix of the row of 8 row 8 is placed in, using keyed permutation table S to being held on each diagonal in matrix
Row pseudo-random permutation;Finally by the ciphertext for performing xor operation acquisition each round iterationEpicycle gained is close
Text repeats r encryption as the input of next round encryption.When last wheel is gone to, that is, obtain final close
Literary C, completes ciphering process.
In one embodiment, as shown in Fig. 2 methods described may also include the steps of.
In step S210, data to be decrypted are grouped.In step S220, used respectively for every group of data
The corresponding key of encryption is taken turns with last initially to be decrypted, data are solved as initial input to carry out many wheels after initial decrypting
It is close.In step S230, in every wheel decryption, the data of input are decrypted displacement, using corresponding with this decryption round number
Key to decryption displacement after data be decrypted, using data after decryption as next round decrypt input data.
For example, ciphertext data are grouped by default size.Use last 8 byte K of key KrTo ciphertext
It is decrypted,Wherein C is the ciphertext text of 64, KrIt is last 8 bytes of key K.Take turns decrypted in r
Cheng Zhong, i belong to [1, r], and r is predetermined encryption wheel number.The decryption of each round may include:First by decryption permutation table S-1To each
The data of byte perform pseudo-random permutation, i.e. Mi(j)=S-1[Pi+1(j)];Then the data M for being by 64iIt is placed in the square of the row of 8 row 8
Battle array, uses decryption permutation table S-1To performing pseudo-random permutation on each diagonal in matrix;Obtained finally by xor operation is performed
Obtain the data after each round decryptionData are carried out as the input data that next round is decrypted after each round is decrypted
Decryption.When last wheel is gone to, that is, final plaintext P is obtained, complete decrypting process.
Beneficial effects of the present invention include:
Evaluate that block cipher security is main to be evaluated with regard to the security of its core S boxes, mainly pass through
Nonlinearity and the difference uniformity are measured, and the present invention program still weighs the security of S boxes using the two metrics, with
Under in terms of nonlinearity and the difference uniformity two come its safety factor is described in detail in detail.
For nonlinearity:
OrderIt is a n units Boolean function, claimsIt is the nonlinearity of f (x).Its
In, LnRepresent linear and affine function the collection of entirety n units;dH(f, l) represents the Hamming distance between f and l.OrderIt is a multiple output function, the nonlinearity of S is
In Linear Cryptanalysis, a crucial step is the effective linear approximation for constructing single-wheel, and single-wheel linear approximation is total
It is the linear approximation for be unableing to do without S boxes (i.e. keyed permutation table), therefore, the nonlinearity of S boxes is the bigger the better.Thus, it is of the invention
The S boxes that technical scheme is constructed have non-linear, can preferably resist " Best linear approximation " to attack, and nonlinearity is preferable.
For difference uniformity:
The ability of difference analysis is resisted according to one cipher function of measurement,
It is a multiple output function, the difference uniformity of S (x) is
Also Difference formula probability can be usedTo represent input
The XOR distribution situation of output.
Wherein, the x is the set for being possible to input, described 2nIt is the element number of the set.In fact, DPfInstitute's table
What is shown is to give an input difference Δ x, is output as the maximum likelihood of Δ y.Difference uniformity is directed to differential cryptanalysis
And introduce, it is used for measuring the ability that a cipher function resists difference analysis.The difference uniformity of S boxes is the smaller the better.Root
According to the calculating to difference uniformity, Difference formula degree is smaller in technical scheme, therefore deduces that it is equal in difference
Even property aspect performance is preferable.
S boxes are unique non-linear components in many block ciphers, and its Cipher Strength determines that whole password is calculated
The security of method, its operating rate determines the scramble speed of whole algorithm.Non-linear and difference uniformity two indices are determined
The security of S boxes, may certify that technical scheme shows more good in terms of security by experimental result, can
It is effectively adapted to use requirement of the mobile terminal to cryptographic algorithm.
As shown in figure 3, a kind of device of data encryption may include such as lower module.
Grouping module 310, for data to be encrypted to be grouped.
Initial encryption module 320, for carrying out initial encryption using initial key respectively for every group of data, will initially add
Close rear data are input into encrypting module as original input data.
Encrypting module 330, in every wheel encryption, the data of input being encrypted into displacement, encrypts using with this
Data are encrypted after the corresponding key pair encryption displacement of wheel number, the input data that encrypted data is encrypted as next round.
In one embodiment, as shown in figure 4, device also includes:Initial deciphering module 410 and deciphering module 420.Packet mould
Block 310 is additionally operable to be grouped data to be decrypted;Initial deciphering module 410 be used for for every group of data use respectively with most
Latter wheel is encrypted corresponding key and is initially decrypted, and data are input into the decryption as original input data after initially decrypting
Module;Deciphering module 420 be used for it is every wheel decryption in, the data of input are decrypted displacement, using with this decryption round number
Corresponding key is decrypted to data after decryption displacement, and input data is decrypted using data after decryption as next round.
In one embodiment, grouping module 310 is additionally operable to be extended the key for configuring, by key number needed for encryption
Key after extension is segmented, each section of key is corresponding with key used in initial encryption and the encryption of each wheel respectively.
In one embodiment, encrypting module 330 is put for the data being input into be carried out with the encryption of S boxes using keyed permutation table
Change;P displacements are carried out to data after S box keyed permutations using keyed permutation table.
In one embodiment, as shown in figure 5, device may also include generation module 510, for producing predetermined number byte
Random number, is produced using random number and initial encryption permutation table and/or initially decrypts permutation table, by initial encryption permutation table and/or
Initial decryption permutation table carries out multiple alternating permutation, generates for the keyed permutation table of keyed permutation and/or is replaced for decrypting
Decryption permutation table.
Said apparatus are corresponding with preceding method, and specific embodiment and technique effect refer to correspondence record in method,
This is repeated no more.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention is not limited to above-mentioned reality
The detail in mode is applied, in range of the technology design of the invention, various letters can be carried out to technical scheme
Monotropic type, these simple variants belong to protection scope of the present invention.
It is further to note that each particular technique feature described in above-mentioned specific embodiment, in not lance
In the case of shield, can be combined by any suitable means, in order to avoid unnecessary repetition, the present invention to it is various can
The combination of energy is no longer separately illustrated.
Additionally, can also be combined between a variety of implementation methods of the invention, as long as it is without prejudice to originally
The thought of invention, it should equally be considered as content disclosed in this invention.
Claims (10)
1. a kind of method of data encryption, the method includes:
Data to be encrypted are grouped;
Carry out initial encryption using initial key respectively for every group of data, using data after initial encryption as initial input entering
The many wheel encryptions of row;
In every wheel encryption, the data of input are encrypted displacement, use key pair encryption corresponding with this encryption round number
Data are encrypted after displacement, the input data that encrypted data is encrypted as next round.
2. method according to claim 1, it is characterised in that methods described also includes:
Data to be decrypted are grouped;
Used respectively for every group of data and initially decrypted with last wheel corresponding key of encryption, data after initially decrypting
Decrypted with carrying out many wheels as initial input;
In every wheel decryption, the data of input are decrypted displacement, using key corresponding with this decryption round number to decryption
Data are decrypted after displacement, and input data is decrypted using data after decryption as next round.
3. method according to claim 1, it is characterised in that methods described also includes:
Key to configuring is extended, and is segmented key after extension by key number needed for encryption, each section of key difference
It is corresponding with key used in initial encryption and the encryption of each wheel.
4. according to any described method of claims 1 to 3, it is characterised in that described that the data of input are encrypted into displacement,
Including:
S box keyed permutations are carried out to the data being input into using keyed permutation table;
P displacements are carried out to data after S box keyed permutations using keyed permutation table.
5. method according to claim 1, it is characterised in that methods described also includes:
The random number of predetermined number byte is produced, initial encryption permutation table is produced using random number and/or is initially decrypted permutation table,
Initial encryption permutation table and/or initial decryption permutation table are carried out into multiple alternating permutation, the encryption generated for keyed permutation is put
Change table and/or the decryption permutation table for decrypting displacement.
6. a kind of device of data encryption, the device includes:
Grouping module, for data to be encrypted to be grouped;
Initial encryption module, for carrying out initial encryption using initial key respectively for every group of data, by number after initial encryption
Encrypting module is input into according to as original input data;
The encrypting module be used for it is every wheel encryption in, the data of input are encrypted displacement, using with this encryption round number
Data are encrypted after corresponding key pair encryption displacement, the input data that encrypted data is encrypted as next round.
7. device according to claim 6, it is characterised in that described device also includes:Initial deciphering module and decryption mould
Block;
The grouping module is additionally operable to be grouped data to be decrypted;
The initial deciphering module is used to be used respectively for every group of data to be carried out initially with last wheel corresponding key of encryption
Decryption, data are input into the deciphering module as original input data after initially decrypting;
The deciphering module be used for it is every wheel decryption in, the data of input are decrypted displacement, using with this decryption round number
Corresponding key is decrypted to data after decryption displacement, and input data is decrypted using data after decryption as next round.
8. device according to claim 6, it is characterised in that the grouping module is additionally operable to expand the key for configuring
, be segmented for key after extension by key number needed for encryption by exhibition, during each section of key is encrypted with initial encryption and each wheel respectively
Key correspondence used.
9. according to any described device of claim 6 to 8, it is characterised in that the encrypting module is used to use keyed permutation
Table carries out S box keyed permutations to the data being input into;P displacements are carried out to data after S box keyed permutations using keyed permutation table.
10. device according to claim 6, it is characterised in that described device also includes:
Generation module, the random number for producing predetermined number byte, using random number generation initial encryption permutation table and/or just
Begin decryption permutation table, and initial encryption permutation table and/or initial decryption permutation table are carried out into multiple alternating permutation, generates for encrypting
The keyed permutation table of displacement and/or the decryption permutation table for decrypting displacement.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511001418.5A CN106921486A (en) | 2015-12-28 | 2015-12-28 | The method and apparatus of data encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511001418.5A CN106921486A (en) | 2015-12-28 | 2015-12-28 | The method and apparatus of data encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106921486A true CN106921486A (en) | 2017-07-04 |
Family
ID=59456269
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511001418.5A Pending CN106921486A (en) | 2015-12-28 | 2015-12-28 | The method and apparatus of data encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106921486A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107277048A (en) * | 2017-07-26 | 2017-10-20 | 浙江吉利汽车研究院有限公司 | A kind of encrypting and decrypting method for communication authentication |
CN108737073A (en) * | 2018-06-22 | 2018-11-02 | 北京智芯微电子科技有限公司 | The method and apparatus that power analysis is resisted in block encryption operation |
CN115208626A (en) * | 2022-06-02 | 2022-10-18 | 北京交大微联科技有限公司 | Communication method and device based on secure communication ciphertext transmission in railway signal system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060045264A1 (en) * | 1998-06-03 | 2006-03-02 | Kocher Paul C | Prevention of side channel attacks against block cipher implementations and other cryptographic systems |
CN101013938A (en) * | 2007-01-12 | 2007-08-08 | 广州市诚毅科技软件开发有限公司 | Encryption method of block cipher |
CN101383703A (en) * | 2008-09-12 | 2009-03-11 | 华南理工大学 | Dynamic ciphering system and method based on broad sense information field |
CN103516512A (en) * | 2013-10-21 | 2014-01-15 | 深圳市芯通信息科技有限公司 | Encryption and decryption method and encryption and decryption device based on AES (advanced encryption standard) algorithm |
CN104184579A (en) * | 2014-09-12 | 2014-12-03 | 南京航空航天大学 | Lightweight block cipher VH algorithm based on dual pseudo-random transformation |
-
2015
- 2015-12-28 CN CN201511001418.5A patent/CN106921486A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060045264A1 (en) * | 1998-06-03 | 2006-03-02 | Kocher Paul C | Prevention of side channel attacks against block cipher implementations and other cryptographic systems |
CN101013938A (en) * | 2007-01-12 | 2007-08-08 | 广州市诚毅科技软件开发有限公司 | Encryption method of block cipher |
CN101383703A (en) * | 2008-09-12 | 2009-03-11 | 华南理工大学 | Dynamic ciphering system and method based on broad sense information field |
CN103516512A (en) * | 2013-10-21 | 2014-01-15 | 深圳市芯通信息科技有限公司 | Encryption and decryption method and encryption and decryption device based on AES (advanced encryption standard) algorithm |
CN104184579A (en) * | 2014-09-12 | 2014-12-03 | 南京航空航天大学 | Lightweight block cipher VH algorithm based on dual pseudo-random transformation |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107277048A (en) * | 2017-07-26 | 2017-10-20 | 浙江吉利汽车研究院有限公司 | A kind of encrypting and decrypting method for communication authentication |
CN107277048B (en) * | 2017-07-26 | 2020-04-24 | 浙江吉利汽车研究院有限公司 | Encryption and decryption method for communication authentication |
CN108737073A (en) * | 2018-06-22 | 2018-11-02 | 北京智芯微电子科技有限公司 | The method and apparatus that power analysis is resisted in block encryption operation |
CN108737073B (en) * | 2018-06-22 | 2021-09-28 | 北京智芯微电子科技有限公司 | Method and device for resisting energy analysis attack in block encryption operation |
CN115208626A (en) * | 2022-06-02 | 2022-10-18 | 北京交大微联科技有限公司 | Communication method and device based on secure communication ciphertext transmission in railway signal system |
CN115208626B (en) * | 2022-06-02 | 2023-12-01 | 北京交大微联科技有限公司 | Communication method and device based on secure communication ciphertext transmission in railway signal system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3154217B1 (en) | Scrambled tweak mode of block ciphers for differential power analysis resistant encryption | |
CN102185692B (en) | Multimode reconfigurable encryption method based on advanced encryption standard (AES) encryption algorithm | |
CN108964872B (en) | Encryption method and device based on AES | |
CN107147487B (en) | Symmetric key random block cipher | |
CN104333446B (en) | A kind of novel ultra-light magnitude QTL block cipher implementation method | |
CN105490802A (en) | Improved SM4 parallel encryption and decryption communication method based on GPU (Graphics Processing Unit) | |
JP2015158665A (en) | Variable-length block encrypting device and method for form storage encryption | |
CN104065474B (en) | Novel low-resource efficient lightweight Surge block cipher implementation method | |
CN105324956A (en) | Method and apparatus to encrypt plaintext data | |
CN104184579A (en) | Lightweight block cipher VH algorithm based on dual pseudo-random transformation | |
Kumar et al. | Lightweight data security model for IoT applications: a dynamic key approach | |
CN106296561A (en) | Image encryption method based on hyperchaotic system and device, decryption method and device | |
Agrawal et al. | Elliptic curve cryptography with hill cipher generation for secure text cryptosystem | |
KR101095386B1 (en) | A Cryptosystem with a Discretized Chaotic Map | |
JP5689826B2 (en) | Secret calculation system, encryption apparatus, secret calculation apparatus and method, program | |
CN105049204A (en) | Lightweight stream cipher technology VHC based on CTR mode and block cipher VH | |
CN101826959B (en) | Byte-oriented key stream generation method and encryption method | |
Xiang et al. | An improved chaotic cryptosystem with external key | |
CN106921486A (en) | The method and apparatus of data encryption | |
CN103812658B (en) | A kind of secure communication protocols based on stream cipher | |
Atia | Development of a new algorithm for key and S-box generation in blowfish algorithm | |
CN107835070B (en) | Simple embedded encryption method | |
CN105162580A (en) | Lightweight stream cipher technology VHO based on OFB mode and block cipher VH | |
CN105391546A (en) | Lightweight block cipher technology VHF based on double pseudo random transformation and Feistel structure | |
CN102523085A (en) | Data encryption method, data encrypting device and smart card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170704 |