CN110278072A - One kind 16 takes turns SM4-128/128 whitepack password implementation method - Google Patents
One kind 16 takes turns SM4-128/128 whitepack password implementation method Download PDFInfo
- Publication number
- CN110278072A CN110278072A CN201910623739.0A CN201910623739A CN110278072A CN 110278072 A CN110278072 A CN 110278072A CN 201910623739 A CN201910623739 A CN 201910623739A CN 110278072 A CN110278072 A CN 110278072A
- Authority
- CN
- China
- Prior art keywords
- round
- transformation
- key
- coding
- whitepack
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
In an unsafe environment; binary system, the key in reading memory and the program that cryptanalysis person can be run by tracing program execute the modes such as intermediate result, static analysis to implement the attack to algorithm and key, and whitepack cryptographic algorithm can protect key under this dangerous environment.The invention discloses one kind 16 to take turns SM4-128/128 whitepack password implementation method, describes the new model that SM4 cryptographic algorithm is improved when encryption round number is 16 wheel, which improves structure, that is, Encryption Algorithm iterative process of round function;A kind of improved SM4 whitepack cryptographic algorithm is proposed, entire encryption and decryption process can be converted into the form for calculating the affine transformation and look-up table that randomly select.Its principle is the internal state of input, output scrambling and coding hidden algorithm, and key is embedded in look-up table in a compiled manner, while reducing look-up table scale using matrix in block form.
Description
Technical field
The invention belongs to field of information security technology, and in particular to a kind of improved SM4 whitepack password implementation method.This hair
For the bright one kind that further relates to when SM4 algorithm for encryption wheel number is 16 wheel, clear packets are the 128 bits even Encryption Algorithm of greater value
New model.
Background technique
Currently, generally believing disclosed cryptographic algorithm guaranteeing that key can provide corresponding peace in the case where being secret
All risk insurance card, and the running environment of cryptographic algorithm might not safe enough.In an unsafe environment, cryptanalysis person can lead to
The binary system, the key in reading memory and program for crossing tracing program operation, which execute the modes such as intermediate result, static analysis, to be come in fact
Apply the attack to algorithm and key.This attack context is known as white-box attack context, it is assumed that attacker possesses device end
Internal data when program operation can be observed and be changed to complete control ability.White-box attack context is sent out in information technology
Open up very applicable model rapid today.
2002, Chow et al. was by with look-up table indicating (to traverse several steps constituted function that combines
The output valve of the input of function, storage function constitutes look-up table, so as to hide the internal information of the function), key is embedded in
Look-up table is protected to look-up table and using random dijection (the random dijection such as Chow is referred to as coding), is constructed in a creative way first
Whitepack AES scheme and first whitepack DES scheme.With the continuous expansion of the application field of whitepack password, scene is increasing, it
Design have very important security implications.
SM4 cryptographic algorithm (original name SMS4) is the commercial block cipher standard that China commercial cipher management office is announced,
It is widely used to the encryption of Wireless LAN Equipments.The block length and key length of standard SM4 algorithm are 128 bits,
Using 32 wheel nonlinear iteration structure encryption and decryption, and decryption is similar with the algorithm structure of Encryption Algorithm, the difference is that only wheel
Key uses sequence opposite.
Patent document 1 (publication number: CN106452729, publication date on February 22nd, 2017) provides a kind of based on random
The encryption method of displaced whitepack password, cardinal principle obscure letter by introducing input ambiguity function P, random permutation S and output
Number Q, so that more other information cannot be obtained other than it can observe look-up table, to ensure that at trustless end
The safety of end operation Encryption Algorithm.But from principle analysis, the output of its each round, which is obscured the input with next round and obscured, is
Reciprocal, in adjacent lookup table pack, obscures effect and cancel out each other.
Patent document 2 (publication number: CN108270550A, publication date on 07 10th, 2018) proposes a kind of based on SM4
The safe and efficient whitepack implementation method and device of algorithm, cardinal principle are to introduce n 32 bit random i lumbers to carry out protection lookup
Table, so that whitepack decryption look-up table formation efficiency is high, storage space needed for terminal is low.But in actual use, transmission is looked into
The process of table and random number is looked for easily to be intercepted and captured by cryptanalysis person, and in the white-box attack context, server-side and terminal need to be not easy to protect
Protect random number.
Patent document 3 (publication number: CN108809626A, publication date on November 13rd, 2018) proposes a kind of whitepack SM4
Cryptographic algorithm scheme and system, cardinal principle are that certain change has been carried out to the generation process of the i.e. round key of key schedule
Into, key, which is grouped, from 128 bits becomes 192 bits, and in whitepack scheme look-up table scale reduced using matrix in block form and
The form spliced afterwards, reduces number of tabling look-up.In this method, improve to the number of iterations limitation encryption efficiency.
By the analysis to above-mentioned three patent documents, there is not perfect places for foregoing invention.What can be cancelled out each other answers
Miscellaneous in-line coding cannot effectively improve the safety of whitepack cryptographic algorithm, by introducing random number in the white-box attack context also not
Safe enough is reliable.And needed in our conceptual design consider practical problem, taken into account as far as possible space and
The balance of efficiency.In order to meet the safety requirements of each field high standard, it is applied in more working environments, design safety is high
It is necessary for imitating, capable of resisting the SM4 whitepack Encryption Algorithm of white-box attack.
Summary of the invention
For the demand and overcome the deficiencies in the prior art of SM4 algorithm, the invention proposes a kind of encryption round numbers
The improved SM4 cryptographic algorithm new model taken turns for 16, meanwhile, carry out the Curve guide impeller of whitepack algorithm.Here whitepack SM4 adds
Close algorithm is similar to the structure of whitepack SM4 decipherment algorithm, and the look-up table configuration used is also identical, the difference is that using key
Sequence.
During the present invention suggests plans, using new model, which encrypts according to structure of the design principle to round function and calculates
The iterative process of method has carried out certain improvement, and every wheel round function is made to generate two intermediate variables, and the ciphering process of 32 wheels is subtracted
As little as 16 wheels, improve the computational efficiency of algorithm entirety.Two Curve guide impellers are carried out to whitepack cryptographic algorithm, first is that first
Scrambling and coding is added before wheel input and after last wheel output, carries out external encode after carrying out in-line coding, this is
In order to guarantee the integrality and availability of whitepack algorithm, wherein the coding of this programme is the form of reversible affine transformation;Second is that
I-th wheel output scrambling and coding and i+1 wheel input scrambling and coding differ a constant, and the constant of every wheel is to randomly select, nothing
Method is obtained from look-up table, and by calculating, scrambling and coding is added after last wheel output, together by these local stabilities
It offsets, so that the output ciphertext one of the output ciphertext of improved SM4 whitepack cryptographic algorithm and improved SM4 cryptographic algorithm new model
It causes;
Present invention has an advantage that
1. proposing one kind 16 takes turns SM4-128/128 cryptographic algorithm new model.By the iteration mistake for improving standard SM4 algorithm
Journey makes every wheel round function generate two intermediate variables, and the ciphering process of 32 wheels is reduced to 16 wheels, 16 wheel SM4-128/ are obtained
128 cryptographic algorithm new models.
2. proposing one kind 16 takes turns SM4-128/128 whitepack cryptographic algorithm scheme and system.Improved SM4 whitepack password is real
The entire realization process of existing method is to be combined based on improved SM4 cryptographic algorithm new model using affine transformation and look-up table
Form carries out external encode while carrying out in-line coding, to construct 16 wheel SM4-128/128 whitepack cryptographic algorithm sides
Case and system.
3. execution efficiency is high, occupy little space.Existing SM4 whitepack algorithm has an a large amount of matrix multiplication operation, and this hair
Bright algorithm operational process is mainly made of reversible affine transformation and look-up table, and in contrast speed is faster.Entire algorithm totally 16
Iterative process is taken turns, the first round is all that 4 32 bits compare to 32 with the input and output scrambling and coding part after last wheel before
Special reversible affine transformation;Each round is divided into three parts, and first part includes affine transformation of 2 32 bits to 32 bits,
Second part includes look-up table of 48 bits to 32 bits, and Part III includes affine transformation of 4 32 bits to 32 bits;
So the occupied space of 16 wheel SM4-128/128 whitepack password implementation method program execution proposed by the present invention is smaller.
The present invention, which suggests plans, to be executed primary encryption algorithm and needs to carry out 64 times to table look-up, and 48 XOR operation, 104 times affine
Transformation.In memory space and speed is executed with more apparent advantage.
4. highly-safe.The main purpose of whitepack cryptographic algorithm design is to prevent attacker in white-box attack context
Key is extracted from the implementation procedure of cryptographic algorithm.The present invention hides key information in a lookup table, and increases outside
Coding, so that the coding that outputs and inputs that look-up table randomly selects is difficult to be broken recovery, then key information also cannot be by
Attacker is readily available.
The safety of whitepack cryptographic algorithm is mainly seen from look-up table to analyze key or recover input and output and be encoded
Complexity.By calculating existing whitepack safety index: whitepack diversity and whitepack ambiguity degree, 16 wheels proposed by the invention
SM4-128/128 whitepack password implementation method is safe.By analysis, the present invention, which suggests plans, can resist BGE attack, attack
The person of hitting is difficult to be inferred to input and output scrambling and coding and key information from affine transformation or look-up table.
Detailed description of the invention
Fig. 1 is 16 wheel SM4-128/128 cipher algorithm encryption algorithm calculating processes;
Fig. 2 is 16 wheel SM4-128/128 cipher algorithm encryption round function operational flow diagrams;
Fig. 3 is improved SM4 whitepack cryptographic algorithm overall structure;
Fig. 4 is improved SM4 whitepack cryptographic algorithm first part;
Fig. 5 is improved SM4 whitepack cryptographic algorithm second part;
Fig. 6 is improved SM4 whitepack cryptographic algorithm Part III.
Specific embodiment
It suggests plans and is further described in detail to the present invention with reference to the accompanying drawing, but do not limit this hair in any way
Bright range.
The present invention suggests plans to be improved based on SM4 cryptographic algorithm.Improved SM4 cryptographic algorithm is still one and changes
It for cryptographic algorithm, is made of enciphering and deciphering algorithm and key schedule, length of the plaintext and key length are 128 bits, initially
The ciphertext of 128 bits is calculated by 16 interative computations and 1 antitone mapping R in plain text.
Step 1, as shown in Figure 2, every wheel round function generates two intermediate variables during interative computation, i.e.,
Wherein,It is bit exclusive or symbol, Xj(j=0,1 ..., 32) be 32 bit values are that 128 bits pass through in plain text
The intermediate variable that interative computation generates;
(1) synthesis displacement T:It is an inverible transform, is combined by nonlinear transformation τ and linear transformation L,
That is T ()=L (τ ());
(2) nonlinear transformation τ is made of 4 parallel S boxes, if input isOutput
ForThen (b0, b1, b2, b3)=τ (A)=(Sbox (a0), Sbox (a1), Sbox (a2), Sbox
(a3)), wherein S box is consistent with standard SM4 algorithm;
(3) output of nonlinear transformation τ is the input of linear transformation L, if input isOutput isThen
(4)It is generated by key schedule in standard SM4 cryptographic algorithm, in new model,
Using 16 round key (rk0, rk1..., rk15) carry out operation.
Step 2 after 16 wheel interative computations, exports ciphertext by antitone mapping, i.e., as shown in figure
(Y0, Y1, Y2, Y3)=R (X32, X33, X34, X35)=(X35, X34, X33, X32)
Wherein, antitone mapping R is defined are as follows: R (A0, A1, A2, A3)=(A3, A2, A1, A0),
The generation of this programme sub-key is fixed against the cipher key spreading operation of standard SM4 cryptographic algorithm, and improved SM4 password is calculated
Encryption Algorithm has a 16 wheel interative computations in method new model, therefore 16 sub-keys is needed to carry out operations, standard SM4 cryptographic algorithm it is close
The wheel of key extended arithmetic one generates 1 sub-key, so needing to carry out 16 round key extended arithmetics.Encryption key isFor 128 bits, round keyFor 32 bits.
The generation step of round key are as follows:
Wherein, FK=(FK0, FK1, FK2, FK3) be standard SM4 cryptographic algorithm system parameter, CK=(CK0, CK1...,
CK15) be standard SM4 cryptographic algorithm preset parameter, wherein FKi(i=0 ..., 3), CKi(i=0 ..., 15) is 32 bits.
T ' transformation and the T transformation in round function in Encryption Algorithm are essentially identical, and linear transformation L is being become L ' by difference:
Decryption transformation is identical as the structure of enciphering transformation when decryption, and different is only the opposite using sequence of round key.Add
Round key is (rk using sequence when close0, rk1..., rk15), round key is (rk using sequence when decryption15, rk30...,
rk0)。
One kind 16, which takes turns SM4-128/128 whitepack password implementation method, to be done based on above-mentioned improvement SM4 cryptographic algorithm new model
Whitepack.SM4 whitepack Encryption Algorithm is still identical as the structure of SM4 whitepack decipherment algorithm, and the look-up table configuration used is identical,
The difference is that not repeated them here using the sequence of key to decipherment algorithm process.
The suggested plans SM4 whitepack cryptographic algorithm of the present invention entirely realizes that process can be converted into and calculates affine transformation and look-up table
Form, with 128 bit data (X0, X1, X2, X3) as input in plain text, after external scrambling and coding and 16 round transformations, into
Row antitone mapping, 128 bit ciphertext (Y of final output0, Y1, Y2, Y3);In 16 round transformation, i-th (0≤i≤15) round transformation
With 4 32 bit value X '2i, X '2i+1, X '2i+2, X '2i+3As input, 2 32 bit value X ' are exported2i+4, X '2i+5。
As shown in figure 3, improved SM4 whitepack cryptographic algorithm has all done addition later and has set with last wheel before the first round
Disorderly coding.To 128 bit clear packets (X of input0, X1, X2, X3) all with 32 rank invertible matrix PiObscured, obtains X 'i=
Pi·XiThe input of (i=0,1,2,3) as round function, and pass through the output X ' that 16 round transformations generate32, X '33, X '34, X '35,
With 32 rank invertible matrix PiCarrying out scrambling and coding isThen an antitone mapping R is carried out, is obtained
The X arrived35, X34, X33, X32As ciphertext block.Wherein, the coding of this programme is the form of reversible affine transformation, mathematical table
Up to formula are as follows:Wherein P represents an affine transformation, and l [P] is invertible matrix, is the linear segment of P, c
[P] is column vector form, is the constant term of P.And PiFirst part in (i=0,1,2,3) and preceding four-wheel is to X 'i(i=0,1,
2,3) input scramble offsets,With the Part III in last four-wheel to X 'i(i=32,33,34,
35) constant of output scramble and 16 cumulative wheels offsets.
Present invention each round round function in 16 wheel round transformations of suggesting plans is divided into three parts, use affine transformation as
Input scrambling and coding hides each internal state of SM4 algorithm with output scrambling and coding, and transformation is realized using look-up table
Function T hides key information contained in T by way of the input and output value coding to look-up table.I-th round transformation is defeated
Enter 4 32 bit value X '2i, X '2i+1, X '2i+2, X '2i+3, export a 32 bit value X '2i+4, X '2i+5;This mistake of this programme
Journey is divided into three parts.
As shown in figure 4, first part: calculating X, it is known that scheme uses networking coding mode, first to the input X ' of the i-th wheel2i+2,
X′2i+3It is pre-processed, eliminates a part of the output scrambling and coding in last round of transformation, then encoded.First calculating
Journey can indicate are as follows: i.e.
Here Ai+jFor 32 × 32 invertible matrix on GF (2), ai+jIt is the constant of 32 bits;Ei=diag (E 'i0, E 'i1, E 'i2,
E′i3), E 'i0、E′i1、E′i2、E′i3It is reversible affine transformation of 8 bits on GF (2) to 8 bits;Because of Pi+jWith EiAll be with
Machine is selected and is maintained secrecy, and only needs to saveTo be converted into the compound affine change of 32 bits to 32 bits
It changes.
As shown in figure 5, second part: being encoded to original T transformation, form look-up table, key is hidden in a lookup table.
In each round of algorithm, key and S box are combined together, i.e., round key is hidden in a lookup table by dispersion.
Wherein,L indicates the linear transformation of T transformation in SM4 algorithm, is two
32 × 32 matrix on a GF (2);Ei0, Ei1, Ei2, Ei3It is reversible affine transformation of 8 bits on GF (2) to 8 bits,
Its input coding as look-up table;Q2iFor the reversible affine transformation of 32 bits to 32 bits, it is compiled as the output of look-up table
Code.
As shown in fig. 6, Part III: calculating X '2i+4, X '2i+5。I.e.I.e.This programme uses networking coding mode, first to eliminate one
A part of output scrambling and coding in round transformation, then carries out calculation code.
The i-th wheel output scrambling and coding and i+1 wheel input scrambling and coding differ one in improved SM4 whitepack cryptographic algorithm
Constant, this constant randomly select, and can not obtain from look-up table, and pass through addition scrambling and coding after last wheel output,
Alternative offsets these constants, so that the output ciphertext of improved SM4 whitepack cryptographic algorithm and improved SM4 cryptographic algorithm
There are two kinds of possibility for the phase same sex of the output ciphertext of new model.
Claims (7)
1. one kind 16 takes turns SM4-128/128 whitepack password implementation method, which is characterized in that describe when encryption round number is 16 wheel and change
Into SM4 cryptographic algorithm new model, the mode according to design principle to structure, that is, Encryption Algorithm iterative process of round function into
It has gone certain improvement, has inputted 128 bit plaintext m, and using 32 bits as block length, i.e.,
Plaintext m obtains the ciphertext of 128 bits through 16 wheel interative computations and 1 antitone mapping
2. improved SM4 cryptographic algorithm new model according to claim 1, which is characterized in that during interative computation
Every wheel round function generates two intermediate variables, it may be assumed that
Wherein,It is bit exclusive or symbol, Xj(j=0,1 ..., 32) be 32 bit values are 128 bits in plain text through iteration
The intermediate variable that operation generates;
(1) synthesis displacementIt is an inverible transform, is combined by nonlinear transformation τ and linear transformation L, i.e. T
()=L (τ ());
(2) nonlinear transformation τ is made of 4 parallel S boxes, if input isOutput isThen (b0, b1, b2, b3)=τ (A)=(Sbox (a0), Sbox (a1), Sbox (a2), Sbox (a3));
(3) output of nonlinear transformation τ is the input of linear transformation L, if input isOutput isThen
(4)It is that key schedule generates in standard SM4 cryptographic algorithm, in new model, only adopts
With preceding 16 round key (rk0, rk1..., rk15) carry out operation.
3. improved SM4 cryptographic algorithm new model according to claim 1, which is characterized in that its thinking cannot be only used for point
The case where group length/key length is 128 bits/128 bit, it can also be used to length of the plaintext and the bigger situation of key length,
Such as 128 bits/256 bits and 256 bits/256 bits.
4. one kind 16 takes turns SM4-128/128 whitepack password implementation method, which is characterized in that propose a kind of improved SM4 whitepack
Password implementation method, entire realization process can be converted into the form for calculating affine transformation and look-up table, with 128 bit data (X0,
X1, X2, X3) as inputting in plain text, after external scrambling and coding and 16 round transformations, antitone mapping is carried out, final output 128 compares
Special ciphertext (Y0, Y1, Y2, Y3);In 16 round transformation, the i-th (0≤i≤15) round transformation is with 4 32 bit value X '2i, X
′2i+1, X '2i+2, X '2i+3As input, 2 32 bit value X ' are exported2i+4, X '2i+5。
5. improved SM4 whitepack password implementation method according to claim 4, which is characterized in that exist before and after round transformation
Scrambling and coding is added before first round input and after last wheel output, carries out external encode while carrying out in-line coding
To guarantee the integrality and availability of whitepack algorithm;Wherein the coding of this programme is the form of reversible affine transformation, mathematics
Expression formula are as follows:Wherein P represents an affine transformation, and l [P] is invertible matrix, is the linear portion of P
Point, c [P] is column vector form, is the constant term of P.Therefore X ' can be expressed asi=Pi·Xi(i=0,1,2,3);。
6. improved SM4 whitepack password implementation method according to claim 4, which is characterized in that the i-th round transformation input 4
A 32 bit value X '2i, X '2i+1, X '2i+2, X '2i+3, export 2 32 bit value X '2i+4, X '2i+5;This process of this programme point
For three parts.
Wherein, first part: calculating X is Ei=diag (E 'i0, E 'i1, E 'i2, E '13), E 'i0、E′i1、E′i2、E′i3It is 8 ratios on GF (2)
Reversible affine transformation of the spy to 8 bits;This programme uses networking coding mode, first to the input X ' of the i-th wheel2i+2, X '2i+3Into
Row decoding process eliminates a part of the output scrambling and coding in last round of transformation, then carries out output scrambling and coding;
Second part:
Wherein,
Original T transformation is encoded, look-up table is formed, key is hidden in a lookup table.In each round of algorithm, by key
It is combined together with S box, i.e., round key is hidden in a lookup table by dispersion.
Part III: X ' is calculated2i+4, X '2i+5。I.e.I.e.This programme uses networking coding mode, first to eliminate one
A part of output scrambling and coding in round transformation, then carries out calculation code.
7. improved SM4 whitepack password implementation method according to claim 4, which is characterized in that the i-th wheel output scramble is compiled
Code and i+1 wheel input scrambling and coding differ a constant, this constant is randomly selected, can not be obtained from look-up table, and is passed through
It crosses last wheel output and adds scrambling and coding later, alternative offsets these constants, so that improved SM4 whitepack password is calculated
There are two kinds of possibility for the phase same sex of the output ciphertext of method and the output ciphertext of improved SM4 cryptographic algorithm new model.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910623739.0A CN110278072A (en) | 2019-07-11 | 2019-07-11 | One kind 16 takes turns SM4-128/128 whitepack password implementation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910623739.0A CN110278072A (en) | 2019-07-11 | 2019-07-11 | One kind 16 takes turns SM4-128/128 whitepack password implementation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110278072A true CN110278072A (en) | 2019-09-24 |
Family
ID=67964243
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910623739.0A Pending CN110278072A (en) | 2019-07-11 | 2019-07-11 | One kind 16 takes turns SM4-128/128 whitepack password implementation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110278072A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110784306A (en) * | 2019-11-01 | 2020-02-11 | 成都卫士通信息产业股份有限公司 | SM4 algorithm white box implementation method and device, electronic equipment and computer medium |
CN111884794A (en) * | 2020-07-13 | 2020-11-03 | 广州安研信息科技有限公司 | SM4 white box implementation method based on interference wheel and external coding |
CN111901097A (en) * | 2020-08-06 | 2020-11-06 | 成都卫士通信息产业股份有限公司 | White box implementation method and device, electronic equipment and computer storage medium |
CN111934860A (en) * | 2020-08-06 | 2020-11-13 | 山东省计算中心(国家超级计算济南中心) | Method and system for realizing mobile terminal key storage |
CN112003687A (en) * | 2020-08-26 | 2020-11-27 | 成都卫士通信息产业股份有限公司 | White box operation method and device, electronic equipment and computer storage medium |
CN112115461A (en) * | 2020-11-20 | 2020-12-22 | 腾讯科技(深圳)有限公司 | Equipment authentication method and device, computer equipment and storage medium |
CN112199696A (en) * | 2020-10-09 | 2021-01-08 | 西安电子科技大学 | Encryption and decryption method based on white-box block cipher |
CN113824548A (en) * | 2021-08-05 | 2021-12-21 | 国网江苏省电力有限公司信息通信分公司 | Nonlinear white box SM4 implementation method applied to edge Internet of things proxy |
CN114095148A (en) * | 2021-10-28 | 2022-02-25 | 重庆邮电大学 | White-box password encryption method based on local differential privacy protection |
CN114205157A (en) * | 2021-12-13 | 2022-03-18 | 航天信息股份有限公司 | SM4 white box encryption implementation method based on redundancy wheel, computer equipment and medium |
CN114337993A (en) * | 2022-03-15 | 2022-04-12 | 国网江苏省电力有限公司信息通信分公司 | White box SM4 encryption and decryption method and system applied to edge Internet of things proxy |
CN114553397A (en) * | 2022-02-14 | 2022-05-27 | 山东大学 | Encryption optimization method and device for SM4 block cipher algorithm |
CN114827176A (en) * | 2022-04-08 | 2022-07-29 | 华中科技大学 | Method and system for defending Sybil attack in distributed storage system |
CN115426111A (en) * | 2022-06-13 | 2022-12-02 | 中国第一汽车股份有限公司 | Data encryption method and device, electronic equipment and storage medium |
CN116633529A (en) * | 2023-07-25 | 2023-08-22 | ***量子科技有限公司 | Method and equipment for enhancing white-box SM4 cryptographic algorithm by adopting derivative key |
-
2019
- 2019-07-11 CN CN201910623739.0A patent/CN110278072A/en active Pending
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110784306B (en) * | 2019-11-01 | 2023-10-27 | 成都卫士通信息产业股份有限公司 | SM4 algorithm white box implementation method and device, electronic equipment and computer medium |
CN110784306A (en) * | 2019-11-01 | 2020-02-11 | 成都卫士通信息产业股份有限公司 | SM4 algorithm white box implementation method and device, electronic equipment and computer medium |
CN111884794A (en) * | 2020-07-13 | 2020-11-03 | 广州安研信息科技有限公司 | SM4 white box implementation method based on interference wheel and external coding |
CN111901097A (en) * | 2020-08-06 | 2020-11-06 | 成都卫士通信息产业股份有限公司 | White box implementation method and device, electronic equipment and computer storage medium |
CN111934860A (en) * | 2020-08-06 | 2020-11-13 | 山东省计算中心(国家超级计算济南中心) | Method and system for realizing mobile terminal key storage |
CN111934860B (en) * | 2020-08-06 | 2024-01-05 | 山东省计算中心(国家超级计算济南中心) | Implementation method and system for mobile terminal key storage |
CN111901097B (en) * | 2020-08-06 | 2023-04-07 | 成都卫士通信息产业股份有限公司 | White box implementation method and device, electronic equipment and computer storage medium |
CN112003687A (en) * | 2020-08-26 | 2020-11-27 | 成都卫士通信息产业股份有限公司 | White box operation method and device, electronic equipment and computer storage medium |
CN112199696B (en) * | 2020-10-09 | 2022-12-06 | 西安电子科技大学 | Encryption and decryption method based on white-box block cipher |
CN112199696A (en) * | 2020-10-09 | 2021-01-08 | 西安电子科技大学 | Encryption and decryption method based on white-box block cipher |
CN112115461A (en) * | 2020-11-20 | 2020-12-22 | 腾讯科技(深圳)有限公司 | Equipment authentication method and device, computer equipment and storage medium |
CN113824548B (en) * | 2021-08-05 | 2023-08-29 | 国网江苏省电力有限公司信息通信分公司 | Nonlinear white box SM4 implementation method applied to edge internet of things proxy |
CN113824548A (en) * | 2021-08-05 | 2021-12-21 | 国网江苏省电力有限公司信息通信分公司 | Nonlinear white box SM4 implementation method applied to edge Internet of things proxy |
CN114095148A (en) * | 2021-10-28 | 2022-02-25 | 重庆邮电大学 | White-box password encryption method based on local differential privacy protection |
CN114095148B (en) * | 2021-10-28 | 2023-09-26 | 重庆邮电大学 | White box password encryption method based on local differential privacy protection |
CN114205157A (en) * | 2021-12-13 | 2022-03-18 | 航天信息股份有限公司 | SM4 white box encryption implementation method based on redundancy wheel, computer equipment and medium |
CN114205157B (en) * | 2021-12-13 | 2024-04-12 | 航天信息股份有限公司 | SM4 white-box encryption realization method based on redundant wheel, computer equipment and medium |
CN114553397A (en) * | 2022-02-14 | 2022-05-27 | 山东大学 | Encryption optimization method and device for SM4 block cipher algorithm |
CN114553397B (en) * | 2022-02-14 | 2024-04-12 | 山东大学 | Encryption optimization method and device for SM4 group cipher algorithm of national cipher |
CN114337993A (en) * | 2022-03-15 | 2022-04-12 | 国网江苏省电力有限公司信息通信分公司 | White box SM4 encryption and decryption method and system applied to edge Internet of things proxy |
CN114337993B (en) * | 2022-03-15 | 2022-06-14 | 国网江苏省电力有限公司信息通信分公司 | White box SM4 encryption and decryption method and system applied to edge Internet of things proxy |
CN114827176A (en) * | 2022-04-08 | 2022-07-29 | 华中科技大学 | Method and system for defending Sybil attack in distributed storage system |
CN115426111A (en) * | 2022-06-13 | 2022-12-02 | 中国第一汽车股份有限公司 | Data encryption method and device, electronic equipment and storage medium |
CN116633529A (en) * | 2023-07-25 | 2023-08-22 | ***量子科技有限公司 | Method and equipment for enhancing white-box SM4 cryptographic algorithm by adopting derivative key |
CN116633529B (en) * | 2023-07-25 | 2023-10-31 | ***量子科技有限公司 | Method and equipment for enhancing white-box SM4 cryptographic algorithm by adopting derivative key |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110278072A (en) | One kind 16 takes turns SM4-128/128 whitepack password implementation method | |
CN106788974B (en) | Mask S box, grouping key calculation unit, device and corresponding construction method | |
CN1993922B (en) | Stream cipher combining system and method | |
CN101753292B (en) | Methods and devices for a chained encryption mode | |
CN113940028B (en) | Method and device for realizing white box password | |
CN106411518B (en) | A kind of unfixed symmetrical whitepack encryption method of key and device | |
US9189425B2 (en) | Protecting look up tables by mixing code and operations | |
EP2293487A1 (en) | A method of diversification of a round function of an encryption algorithm | |
CN108809626A (en) | A kind of whitepack SM4 cryptographic algorithms scheme and system | |
US8504845B2 (en) | Protecting states of a cryptographic process using group automorphisms | |
Moldovyan et al. | A cipher based on data-dependent permutations | |
CN110474761A (en) | One kind 16 takes turns SM4-256 whitepack password implementation method | |
CN104639314A (en) | Device based on AES (advanced encryption standard) encryption/decryption algorithm and pipelining control method | |
US8675866B2 (en) | Multiplicative splits to protect cipher keys | |
CN105591734A (en) | White-box cryptograph non-linear encoding protection method based on table lookup | |
CN108476132A (en) | Key for an encrypting operation sequence generates | |
CN102571331A (en) | Cryptographic algorithm realization protecting method used for defending energy analysis attacks | |
CN105184115A (en) | Method For Including An Implicit Integrity Or Authenticity Check Into A White-box Implementation | |
CN105191206A (en) | Electronic block cipher device suitable for obfuscation | |
CN107257279A (en) | A kind of clear data encryption method and equipment | |
CN111555862A (en) | White-box AES implementation method of random redundancy round function based on mask protection | |
CN105095695A (en) | Realizing authorization via incorrect functional behavior of a white-box implementation | |
Yap et al. | On the effective subkey space of some image encryption algorithms using external key | |
US20130243191A1 (en) | Encryption key generating apparatus | |
CN105022937A (en) | Interface compatible approach for gluing white-box implementation to surrounding program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190924 |
|
WD01 | Invention patent application deemed withdrawn after publication |