CN110278072A - One kind 16 takes turns SM4-128/128 whitepack password implementation method - Google Patents

One kind 16 takes turns SM4-128/128 whitepack password implementation method Download PDF

Info

Publication number
CN110278072A
CN110278072A CN201910623739.0A CN201910623739A CN110278072A CN 110278072 A CN110278072 A CN 110278072A CN 201910623739 A CN201910623739 A CN 201910623739A CN 110278072 A CN110278072 A CN 110278072A
Authority
CN
China
Prior art keywords
round
transformation
key
coding
whitepack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910623739.0A
Other languages
Chinese (zh)
Inventor
杨亚涛
张也
张筱薇
赵阳
林天祥
胡浩通
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Original Assignee
BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE filed Critical BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Priority to CN201910623739.0A priority Critical patent/CN110278072A/en
Publication of CN110278072A publication Critical patent/CN110278072A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

In an unsafe environment; binary system, the key in reading memory and the program that cryptanalysis person can be run by tracing program execute the modes such as intermediate result, static analysis to implement the attack to algorithm and key, and whitepack cryptographic algorithm can protect key under this dangerous environment.The invention discloses one kind 16 to take turns SM4-128/128 whitepack password implementation method, describes the new model that SM4 cryptographic algorithm is improved when encryption round number is 16 wheel, which improves structure, that is, Encryption Algorithm iterative process of round function;A kind of improved SM4 whitepack cryptographic algorithm is proposed, entire encryption and decryption process can be converted into the form for calculating the affine transformation and look-up table that randomly select.Its principle is the internal state of input, output scrambling and coding hidden algorithm, and key is embedded in look-up table in a compiled manner, while reducing look-up table scale using matrix in block form.

Description

One kind 16 takes turns SM4-128/128 whitepack password implementation method
Technical field
The invention belongs to field of information security technology, and in particular to a kind of improved SM4 whitepack password implementation method.This hair For the bright one kind that further relates to when SM4 algorithm for encryption wheel number is 16 wheel, clear packets are the 128 bits even Encryption Algorithm of greater value New model.
Background technique
Currently, generally believing disclosed cryptographic algorithm guaranteeing that key can provide corresponding peace in the case where being secret All risk insurance card, and the running environment of cryptographic algorithm might not safe enough.In an unsafe environment, cryptanalysis person can lead to The binary system, the key in reading memory and program for crossing tracing program operation, which execute the modes such as intermediate result, static analysis, to be come in fact Apply the attack to algorithm and key.This attack context is known as white-box attack context, it is assumed that attacker possesses device end Internal data when program operation can be observed and be changed to complete control ability.White-box attack context is sent out in information technology Open up very applicable model rapid today.
2002, Chow et al. was by with look-up table indicating (to traverse several steps constituted function that combines The output valve of the input of function, storage function constitutes look-up table, so as to hide the internal information of the function), key is embedded in Look-up table is protected to look-up table and using random dijection (the random dijection such as Chow is referred to as coding), is constructed in a creative way first Whitepack AES scheme and first whitepack DES scheme.With the continuous expansion of the application field of whitepack password, scene is increasing, it Design have very important security implications.
SM4 cryptographic algorithm (original name SMS4) is the commercial block cipher standard that China commercial cipher management office is announced, It is widely used to the encryption of Wireless LAN Equipments.The block length and key length of standard SM4 algorithm are 128 bits, Using 32 wheel nonlinear iteration structure encryption and decryption, and decryption is similar with the algorithm structure of Encryption Algorithm, the difference is that only wheel Key uses sequence opposite.
Patent document 1 (publication number: CN106452729, publication date on February 22nd, 2017) provides a kind of based on random The encryption method of displaced whitepack password, cardinal principle obscure letter by introducing input ambiguity function P, random permutation S and output Number Q, so that more other information cannot be obtained other than it can observe look-up table, to ensure that at trustless end The safety of end operation Encryption Algorithm.But from principle analysis, the output of its each round, which is obscured the input with next round and obscured, is Reciprocal, in adjacent lookup table pack, obscures effect and cancel out each other.
Patent document 2 (publication number: CN108270550A, publication date on 07 10th, 2018) proposes a kind of based on SM4 The safe and efficient whitepack implementation method and device of algorithm, cardinal principle are to introduce n 32 bit random i lumbers to carry out protection lookup Table, so that whitepack decryption look-up table formation efficiency is high, storage space needed for terminal is low.But in actual use, transmission is looked into The process of table and random number is looked for easily to be intercepted and captured by cryptanalysis person, and in the white-box attack context, server-side and terminal need to be not easy to protect Protect random number.
Patent document 3 (publication number: CN108809626A, publication date on November 13rd, 2018) proposes a kind of whitepack SM4 Cryptographic algorithm scheme and system, cardinal principle are that certain change has been carried out to the generation process of the i.e. round key of key schedule Into, key, which is grouped, from 128 bits becomes 192 bits, and in whitepack scheme look-up table scale reduced using matrix in block form and The form spliced afterwards, reduces number of tabling look-up.In this method, improve to the number of iterations limitation encryption efficiency.
By the analysis to above-mentioned three patent documents, there is not perfect places for foregoing invention.What can be cancelled out each other answers Miscellaneous in-line coding cannot effectively improve the safety of whitepack cryptographic algorithm, by introducing random number in the white-box attack context also not Safe enough is reliable.And needed in our conceptual design consider practical problem, taken into account as far as possible space and The balance of efficiency.In order to meet the safety requirements of each field high standard, it is applied in more working environments, design safety is high It is necessary for imitating, capable of resisting the SM4 whitepack Encryption Algorithm of white-box attack.
Summary of the invention
For the demand and overcome the deficiencies in the prior art of SM4 algorithm, the invention proposes a kind of encryption round numbers The improved SM4 cryptographic algorithm new model taken turns for 16, meanwhile, carry out the Curve guide impeller of whitepack algorithm.Here whitepack SM4 adds Close algorithm is similar to the structure of whitepack SM4 decipherment algorithm, and the look-up table configuration used is also identical, the difference is that using key Sequence.
During the present invention suggests plans, using new model, which encrypts according to structure of the design principle to round function and calculates The iterative process of method has carried out certain improvement, and every wheel round function is made to generate two intermediate variables, and the ciphering process of 32 wheels is subtracted As little as 16 wheels, improve the computational efficiency of algorithm entirety.Two Curve guide impellers are carried out to whitepack cryptographic algorithm, first is that first Scrambling and coding is added before wheel input and after last wheel output, carries out external encode after carrying out in-line coding, this is In order to guarantee the integrality and availability of whitepack algorithm, wherein the coding of this programme is the form of reversible affine transformation;Second is that I-th wheel output scrambling and coding and i+1 wheel input scrambling and coding differ a constant, and the constant of every wheel is to randomly select, nothing Method is obtained from look-up table, and by calculating, scrambling and coding is added after last wheel output, together by these local stabilities It offsets, so that the output ciphertext one of the output ciphertext of improved SM4 whitepack cryptographic algorithm and improved SM4 cryptographic algorithm new model It causes;
Present invention has an advantage that
1. proposing one kind 16 takes turns SM4-128/128 cryptographic algorithm new model.By the iteration mistake for improving standard SM4 algorithm Journey makes every wheel round function generate two intermediate variables, and the ciphering process of 32 wheels is reduced to 16 wheels, 16 wheel SM4-128/ are obtained 128 cryptographic algorithm new models.
2. proposing one kind 16 takes turns SM4-128/128 whitepack cryptographic algorithm scheme and system.Improved SM4 whitepack password is real The entire realization process of existing method is to be combined based on improved SM4 cryptographic algorithm new model using affine transformation and look-up table Form carries out external encode while carrying out in-line coding, to construct 16 wheel SM4-128/128 whitepack cryptographic algorithm sides Case and system.
3. execution efficiency is high, occupy little space.Existing SM4 whitepack algorithm has an a large amount of matrix multiplication operation, and this hair Bright algorithm operational process is mainly made of reversible affine transformation and look-up table, and in contrast speed is faster.Entire algorithm totally 16 Iterative process is taken turns, the first round is all that 4 32 bits compare to 32 with the input and output scrambling and coding part after last wheel before Special reversible affine transformation;Each round is divided into three parts, and first part includes affine transformation of 2 32 bits to 32 bits, Second part includes look-up table of 48 bits to 32 bits, and Part III includes affine transformation of 4 32 bits to 32 bits; So the occupied space of 16 wheel SM4-128/128 whitepack password implementation method program execution proposed by the present invention is smaller.
The present invention, which suggests plans, to be executed primary encryption algorithm and needs to carry out 64 times to table look-up, and 48 XOR operation, 104 times affine Transformation.In memory space and speed is executed with more apparent advantage.
4. highly-safe.The main purpose of whitepack cryptographic algorithm design is to prevent attacker in white-box attack context Key is extracted from the implementation procedure of cryptographic algorithm.The present invention hides key information in a lookup table, and increases outside Coding, so that the coding that outputs and inputs that look-up table randomly selects is difficult to be broken recovery, then key information also cannot be by Attacker is readily available.
The safety of whitepack cryptographic algorithm is mainly seen from look-up table to analyze key or recover input and output and be encoded Complexity.By calculating existing whitepack safety index: whitepack diversity and whitepack ambiguity degree, 16 wheels proposed by the invention SM4-128/128 whitepack password implementation method is safe.By analysis, the present invention, which suggests plans, can resist BGE attack, attack The person of hitting is difficult to be inferred to input and output scrambling and coding and key information from affine transformation or look-up table.
Detailed description of the invention
Fig. 1 is 16 wheel SM4-128/128 cipher algorithm encryption algorithm calculating processes;
Fig. 2 is 16 wheel SM4-128/128 cipher algorithm encryption round function operational flow diagrams;
Fig. 3 is improved SM4 whitepack cryptographic algorithm overall structure;
Fig. 4 is improved SM4 whitepack cryptographic algorithm first part;
Fig. 5 is improved SM4 whitepack cryptographic algorithm second part;
Fig. 6 is improved SM4 whitepack cryptographic algorithm Part III.
Specific embodiment
It suggests plans and is further described in detail to the present invention with reference to the accompanying drawing, but do not limit this hair in any way Bright range.
The present invention suggests plans to be improved based on SM4 cryptographic algorithm.Improved SM4 cryptographic algorithm is still one and changes It for cryptographic algorithm, is made of enciphering and deciphering algorithm and key schedule, length of the plaintext and key length are 128 bits, initially The ciphertext of 128 bits is calculated by 16 interative computations and 1 antitone mapping R in plain text.
Step 1, as shown in Figure 2, every wheel round function generates two intermediate variables during interative computation, i.e.,
Wherein,It is bit exclusive or symbol, Xj(j=0,1 ..., 32) be 32 bit values are that 128 bits pass through in plain text The intermediate variable that interative computation generates;
(1) synthesis displacement T:It is an inverible transform, is combined by nonlinear transformation τ and linear transformation L, That is T ()=L (τ ());
(2) nonlinear transformation τ is made of 4 parallel S boxes, if input isOutput ForThen (b0, b1, b2, b3)=τ (A)=(Sbox (a0), Sbox (a1), Sbox (a2), Sbox (a3)), wherein S box is consistent with standard SM4 algorithm;
(3) output of nonlinear transformation τ is the input of linear transformation L, if input isOutput isThen
(4)It is generated by key schedule in standard SM4 cryptographic algorithm, in new model, Using 16 round key (rk0, rk1..., rk15) carry out operation.
Step 2 after 16 wheel interative computations, exports ciphertext by antitone mapping, i.e., as shown in figure
(Y0, Y1, Y2, Y3)=R (X32, X33, X34, X35)=(X35, X34, X33, X32)
Wherein, antitone mapping R is defined are as follows: R (A0, A1, A2, A3)=(A3, A2, A1, A0),
The generation of this programme sub-key is fixed against the cipher key spreading operation of standard SM4 cryptographic algorithm, and improved SM4 password is calculated Encryption Algorithm has a 16 wheel interative computations in method new model, therefore 16 sub-keys is needed to carry out operations, standard SM4 cryptographic algorithm it is close The wheel of key extended arithmetic one generates 1 sub-key, so needing to carry out 16 round key extended arithmetics.Encryption key isFor 128 bits, round keyFor 32 bits.
The generation step of round key are as follows:
Wherein, FK=(FK0, FK1, FK2, FK3) be standard SM4 cryptographic algorithm system parameter, CK=(CK0, CK1..., CK15) be standard SM4 cryptographic algorithm preset parameter, wherein FKi(i=0 ..., 3), CKi(i=0 ..., 15) is 32 bits. T ' transformation and the T transformation in round function in Encryption Algorithm are essentially identical, and linear transformation L is being become L ' by difference:
Decryption transformation is identical as the structure of enciphering transformation when decryption, and different is only the opposite using sequence of round key.Add Round key is (rk using sequence when close0, rk1..., rk15), round key is (rk using sequence when decryption15, rk30..., rk0)。
One kind 16, which takes turns SM4-128/128 whitepack password implementation method, to be done based on above-mentioned improvement SM4 cryptographic algorithm new model Whitepack.SM4 whitepack Encryption Algorithm is still identical as the structure of SM4 whitepack decipherment algorithm, and the look-up table configuration used is identical, The difference is that not repeated them here using the sequence of key to decipherment algorithm process.
The suggested plans SM4 whitepack cryptographic algorithm of the present invention entirely realizes that process can be converted into and calculates affine transformation and look-up table Form, with 128 bit data (X0, X1, X2, X3) as input in plain text, after external scrambling and coding and 16 round transformations, into Row antitone mapping, 128 bit ciphertext (Y of final output0, Y1, Y2, Y3);In 16 round transformation, i-th (0≤i≤15) round transformation With 4 32 bit value X '2i, X '2i+1, X '2i+2, X '2i+3As input, 2 32 bit value X ' are exported2i+4, X '2i+5
As shown in figure 3, improved SM4 whitepack cryptographic algorithm has all done addition later and has set with last wheel before the first round Disorderly coding.To 128 bit clear packets (X of input0, X1, X2, X3) all with 32 rank invertible matrix PiObscured, obtains X 'i= Pi·XiThe input of (i=0,1,2,3) as round function, and pass through the output X ' that 16 round transformations generate32, X '33, X '34, X '35, With 32 rank invertible matrix PiCarrying out scrambling and coding isThen an antitone mapping R is carried out, is obtained The X arrived35, X34, X33, X32As ciphertext block.Wherein, the coding of this programme is the form of reversible affine transformation, mathematical table Up to formula are as follows:Wherein P represents an affine transformation, and l [P] is invertible matrix, is the linear segment of P, c [P] is column vector form, is the constant term of P.And PiFirst part in (i=0,1,2,3) and preceding four-wheel is to X 'i(i=0,1, 2,3) input scramble offsets,With the Part III in last four-wheel to X 'i(i=32,33,34, 35) constant of output scramble and 16 cumulative wheels offsets.
Present invention each round round function in 16 wheel round transformations of suggesting plans is divided into three parts, use affine transformation as Input scrambling and coding hides each internal state of SM4 algorithm with output scrambling and coding, and transformation is realized using look-up table Function T hides key information contained in T by way of the input and output value coding to look-up table.I-th round transformation is defeated Enter 4 32 bit value X '2i, X '2i+1, X '2i+2, X '2i+3, export a 32 bit value X '2i+4, X '2i+5;This mistake of this programme Journey is divided into three parts.
As shown in figure 4, first part: calculating X, it is known that scheme uses networking coding mode, first to the input X ' of the i-th wheel2i+2, X′2i+3It is pre-processed, eliminates a part of the output scrambling and coding in last round of transformation, then encoded.First calculating Journey can indicate are as follows: i.e. Here Ai+jFor 32 × 32 invertible matrix on GF (2), ai+jIt is the constant of 32 bits;Ei=diag (E 'i0, E 'i1, E 'i2, E′i3), E 'i0、E′i1、E′i2、E′i3It is reversible affine transformation of 8 bits on GF (2) to 8 bits;Because of Pi+jWith EiAll be with Machine is selected and is maintained secrecy, and only needs to saveTo be converted into the compound affine change of 32 bits to 32 bits It changes.
As shown in figure 5, second part: being encoded to original T transformation, form look-up table, key is hidden in a lookup table. In each round of algorithm, key and S box are combined together, i.e., round key is hidden in a lookup table by dispersion.
Wherein,L indicates the linear transformation of T transformation in SM4 algorithm, is two 32 × 32 matrix on a GF (2);Ei0, Ei1, Ei2, Ei3It is reversible affine transformation of 8 bits on GF (2) to 8 bits, Its input coding as look-up table;Q2iFor the reversible affine transformation of 32 bits to 32 bits, it is compiled as the output of look-up table Code.
As shown in fig. 6, Part III: calculating X '2i+4, X '2i+5I.e.I.e.This programme uses networking coding mode, first to eliminate one A part of output scrambling and coding in round transformation, then carries out calculation code.
The i-th wheel output scrambling and coding and i+1 wheel input scrambling and coding differ one in improved SM4 whitepack cryptographic algorithm Constant, this constant randomly select, and can not obtain from look-up table, and pass through addition scrambling and coding after last wheel output, Alternative offsets these constants, so that the output ciphertext of improved SM4 whitepack cryptographic algorithm and improved SM4 cryptographic algorithm There are two kinds of possibility for the phase same sex of the output ciphertext of new model.

Claims (7)

1. one kind 16 takes turns SM4-128/128 whitepack password implementation method, which is characterized in that describe when encryption round number is 16 wheel and change Into SM4 cryptographic algorithm new model, the mode according to design principle to structure, that is, Encryption Algorithm iterative process of round function into It has gone certain improvement, has inputted 128 bit plaintext m, and using 32 bits as block length, i.e., Plaintext m obtains the ciphertext of 128 bits through 16 wheel interative computations and 1 antitone mapping
2. improved SM4 cryptographic algorithm new model according to claim 1, which is characterized in that during interative computation Every wheel round function generates two intermediate variables, it may be assumed that
Wherein,It is bit exclusive or symbol, Xj(j=0,1 ..., 32) be 32 bit values are 128 bits in plain text through iteration The intermediate variable that operation generates;
(1) synthesis displacementIt is an inverible transform, is combined by nonlinear transformation τ and linear transformation L, i.e. T ()=L (τ ());
(2) nonlinear transformation τ is made of 4 parallel S boxes, if input isOutput isThen (b0, b1, b2, b3)=τ (A)=(Sbox (a0), Sbox (a1), Sbox (a2), Sbox (a3));
(3) output of nonlinear transformation τ is the input of linear transformation L, if input isOutput isThen
(4)It is that key schedule generates in standard SM4 cryptographic algorithm, in new model, only adopts With preceding 16 round key (rk0, rk1..., rk15) carry out operation.
3. improved SM4 cryptographic algorithm new model according to claim 1, which is characterized in that its thinking cannot be only used for point The case where group length/key length is 128 bits/128 bit, it can also be used to length of the plaintext and the bigger situation of key length, Such as 128 bits/256 bits and 256 bits/256 bits.
4. one kind 16 takes turns SM4-128/128 whitepack password implementation method, which is characterized in that propose a kind of improved SM4 whitepack Password implementation method, entire realization process can be converted into the form for calculating affine transformation and look-up table, with 128 bit data (X0, X1, X2, X3) as inputting in plain text, after external scrambling and coding and 16 round transformations, antitone mapping is carried out, final output 128 compares Special ciphertext (Y0, Y1, Y2, Y3);In 16 round transformation, the i-th (0≤i≤15) round transformation is with 4 32 bit value X '2i, X ′2i+1, X '2i+2, X '2i+3As input, 2 32 bit value X ' are exported2i+4, X '2i+5
5. improved SM4 whitepack password implementation method according to claim 4, which is characterized in that exist before and after round transformation Scrambling and coding is added before first round input and after last wheel output, carries out external encode while carrying out in-line coding To guarantee the integrality and availability of whitepack algorithm;Wherein the coding of this programme is the form of reversible affine transformation, mathematics Expression formula are as follows:Wherein P represents an affine transformation, and l [P] is invertible matrix, is the linear portion of P Point, c [P] is column vector form, is the constant term of P.Therefore X ' can be expressed asi=Pi·Xi(i=0,1,2,3);
6. improved SM4 whitepack password implementation method according to claim 4, which is characterized in that the i-th round transformation input 4 A 32 bit value X '2i, X '2i+1, X '2i+2, X '2i+3, export 2 32 bit value X '2i+4, X '2i+5;This process of this programme point For three parts.
Wherein, first part: calculating X is Ei=diag (E 'i0, E 'i1, E 'i2, E '13), E 'i0、E′i1、E′i2、E′i3It is 8 ratios on GF (2) Reversible affine transformation of the spy to 8 bits;This programme uses networking coding mode, first to the input X ' of the i-th wheel2i+2, X '2i+3Into Row decoding process eliminates a part of the output scrambling and coding in last round of transformation, then carries out output scrambling and coding;
Second part:
Wherein,
Original T transformation is encoded, look-up table is formed, key is hidden in a lookup table.In each round of algorithm, by key It is combined together with S box, i.e., round key is hidden in a lookup table by dispersion.
Part III: X ' is calculated2i+4, X '2i+5I.e.I.e.This programme uses networking coding mode, first to eliminate one A part of output scrambling and coding in round transformation, then carries out calculation code.
7. improved SM4 whitepack password implementation method according to claim 4, which is characterized in that the i-th wheel output scramble is compiled Code and i+1 wheel input scrambling and coding differ a constant, this constant is randomly selected, can not be obtained from look-up table, and is passed through It crosses last wheel output and adds scrambling and coding later, alternative offsets these constants, so that improved SM4 whitepack password is calculated There are two kinds of possibility for the phase same sex of the output ciphertext of method and the output ciphertext of improved SM4 cryptographic algorithm new model.
CN201910623739.0A 2019-07-11 2019-07-11 One kind 16 takes turns SM4-128/128 whitepack password implementation method Pending CN110278072A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910623739.0A CN110278072A (en) 2019-07-11 2019-07-11 One kind 16 takes turns SM4-128/128 whitepack password implementation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910623739.0A CN110278072A (en) 2019-07-11 2019-07-11 One kind 16 takes turns SM4-128/128 whitepack password implementation method

Publications (1)

Publication Number Publication Date
CN110278072A true CN110278072A (en) 2019-09-24

Family

ID=67964243

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910623739.0A Pending CN110278072A (en) 2019-07-11 2019-07-11 One kind 16 takes turns SM4-128/128 whitepack password implementation method

Country Status (1)

Country Link
CN (1) CN110278072A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110784306A (en) * 2019-11-01 2020-02-11 成都卫士通信息产业股份有限公司 SM4 algorithm white box implementation method and device, electronic equipment and computer medium
CN111884794A (en) * 2020-07-13 2020-11-03 广州安研信息科技有限公司 SM4 white box implementation method based on interference wheel and external coding
CN111901097A (en) * 2020-08-06 2020-11-06 成都卫士通信息产业股份有限公司 White box implementation method and device, electronic equipment and computer storage medium
CN111934860A (en) * 2020-08-06 2020-11-13 山东省计算中心(国家超级计算济南中心) Method and system for realizing mobile terminal key storage
CN112003687A (en) * 2020-08-26 2020-11-27 成都卫士通信息产业股份有限公司 White box operation method and device, electronic equipment and computer storage medium
CN112115461A (en) * 2020-11-20 2020-12-22 腾讯科技(深圳)有限公司 Equipment authentication method and device, computer equipment and storage medium
CN112199696A (en) * 2020-10-09 2021-01-08 西安电子科技大学 Encryption and decryption method based on white-box block cipher
CN113824548A (en) * 2021-08-05 2021-12-21 国网江苏省电力有限公司信息通信分公司 Nonlinear white box SM4 implementation method applied to edge Internet of things proxy
CN114095148A (en) * 2021-10-28 2022-02-25 重庆邮电大学 White-box password encryption method based on local differential privacy protection
CN114205157A (en) * 2021-12-13 2022-03-18 航天信息股份有限公司 SM4 white box encryption implementation method based on redundancy wheel, computer equipment and medium
CN114337993A (en) * 2022-03-15 2022-04-12 国网江苏省电力有限公司信息通信分公司 White box SM4 encryption and decryption method and system applied to edge Internet of things proxy
CN114553397A (en) * 2022-02-14 2022-05-27 山东大学 Encryption optimization method and device for SM4 block cipher algorithm
CN114827176A (en) * 2022-04-08 2022-07-29 华中科技大学 Method and system for defending Sybil attack in distributed storage system
CN115426111A (en) * 2022-06-13 2022-12-02 中国第一汽车股份有限公司 Data encryption method and device, electronic equipment and storage medium
CN116633529A (en) * 2023-07-25 2023-08-22 ***量子科技有限公司 Method and equipment for enhancing white-box SM4 cryptographic algorithm by adopting derivative key

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110784306B (en) * 2019-11-01 2023-10-27 成都卫士通信息产业股份有限公司 SM4 algorithm white box implementation method and device, electronic equipment and computer medium
CN110784306A (en) * 2019-11-01 2020-02-11 成都卫士通信息产业股份有限公司 SM4 algorithm white box implementation method and device, electronic equipment and computer medium
CN111884794A (en) * 2020-07-13 2020-11-03 广州安研信息科技有限公司 SM4 white box implementation method based on interference wheel and external coding
CN111901097A (en) * 2020-08-06 2020-11-06 成都卫士通信息产业股份有限公司 White box implementation method and device, electronic equipment and computer storage medium
CN111934860A (en) * 2020-08-06 2020-11-13 山东省计算中心(国家超级计算济南中心) Method and system for realizing mobile terminal key storage
CN111934860B (en) * 2020-08-06 2024-01-05 山东省计算中心(国家超级计算济南中心) Implementation method and system for mobile terminal key storage
CN111901097B (en) * 2020-08-06 2023-04-07 成都卫士通信息产业股份有限公司 White box implementation method and device, electronic equipment and computer storage medium
CN112003687A (en) * 2020-08-26 2020-11-27 成都卫士通信息产业股份有限公司 White box operation method and device, electronic equipment and computer storage medium
CN112199696B (en) * 2020-10-09 2022-12-06 西安电子科技大学 Encryption and decryption method based on white-box block cipher
CN112199696A (en) * 2020-10-09 2021-01-08 西安电子科技大学 Encryption and decryption method based on white-box block cipher
CN112115461A (en) * 2020-11-20 2020-12-22 腾讯科技(深圳)有限公司 Equipment authentication method and device, computer equipment and storage medium
CN113824548B (en) * 2021-08-05 2023-08-29 国网江苏省电力有限公司信息通信分公司 Nonlinear white box SM4 implementation method applied to edge internet of things proxy
CN113824548A (en) * 2021-08-05 2021-12-21 国网江苏省电力有限公司信息通信分公司 Nonlinear white box SM4 implementation method applied to edge Internet of things proxy
CN114095148A (en) * 2021-10-28 2022-02-25 重庆邮电大学 White-box password encryption method based on local differential privacy protection
CN114095148B (en) * 2021-10-28 2023-09-26 重庆邮电大学 White box password encryption method based on local differential privacy protection
CN114205157A (en) * 2021-12-13 2022-03-18 航天信息股份有限公司 SM4 white box encryption implementation method based on redundancy wheel, computer equipment and medium
CN114205157B (en) * 2021-12-13 2024-04-12 航天信息股份有限公司 SM4 white-box encryption realization method based on redundant wheel, computer equipment and medium
CN114553397A (en) * 2022-02-14 2022-05-27 山东大学 Encryption optimization method and device for SM4 block cipher algorithm
CN114553397B (en) * 2022-02-14 2024-04-12 山东大学 Encryption optimization method and device for SM4 group cipher algorithm of national cipher
CN114337993A (en) * 2022-03-15 2022-04-12 国网江苏省电力有限公司信息通信分公司 White box SM4 encryption and decryption method and system applied to edge Internet of things proxy
CN114337993B (en) * 2022-03-15 2022-06-14 国网江苏省电力有限公司信息通信分公司 White box SM4 encryption and decryption method and system applied to edge Internet of things proxy
CN114827176A (en) * 2022-04-08 2022-07-29 华中科技大学 Method and system for defending Sybil attack in distributed storage system
CN115426111A (en) * 2022-06-13 2022-12-02 中国第一汽车股份有限公司 Data encryption method and device, electronic equipment and storage medium
CN116633529A (en) * 2023-07-25 2023-08-22 ***量子科技有限公司 Method and equipment for enhancing white-box SM4 cryptographic algorithm by adopting derivative key
CN116633529B (en) * 2023-07-25 2023-10-31 ***量子科技有限公司 Method and equipment for enhancing white-box SM4 cryptographic algorithm by adopting derivative key

Similar Documents

Publication Publication Date Title
CN110278072A (en) One kind 16 takes turns SM4-128/128 whitepack password implementation method
CN106788974B (en) Mask S box, grouping key calculation unit, device and corresponding construction method
CN1993922B (en) Stream cipher combining system and method
CN101753292B (en) Methods and devices for a chained encryption mode
CN113940028B (en) Method and device for realizing white box password
CN106411518B (en) A kind of unfixed symmetrical whitepack encryption method of key and device
US9189425B2 (en) Protecting look up tables by mixing code and operations
EP2293487A1 (en) A method of diversification of a round function of an encryption algorithm
CN108809626A (en) A kind of whitepack SM4 cryptographic algorithms scheme and system
US8504845B2 (en) Protecting states of a cryptographic process using group automorphisms
Moldovyan et al. A cipher based on data-dependent permutations
CN110474761A (en) One kind 16 takes turns SM4-256 whitepack password implementation method
CN104639314A (en) Device based on AES (advanced encryption standard) encryption/decryption algorithm and pipelining control method
US8675866B2 (en) Multiplicative splits to protect cipher keys
CN105591734A (en) White-box cryptograph non-linear encoding protection method based on table lookup
CN108476132A (en) Key for an encrypting operation sequence generates
CN102571331A (en) Cryptographic algorithm realization protecting method used for defending energy analysis attacks
CN105184115A (en) Method For Including An Implicit Integrity Or Authenticity Check Into A White-box Implementation
CN105191206A (en) Electronic block cipher device suitable for obfuscation
CN107257279A (en) A kind of clear data encryption method and equipment
CN111555862A (en) White-box AES implementation method of random redundancy round function based on mask protection
CN105095695A (en) Realizing authorization via incorrect functional behavior of a white-box implementation
Yap et al. On the effective subkey space of some image encryption algorithms using external key
US20130243191A1 (en) Encryption key generating apparatus
CN105022937A (en) Interface compatible approach for gluing white-box implementation to surrounding program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190924

WD01 Invention patent application deemed withdrawn after publication