+

CN104618092A - Information encryption method and system - Google Patents

Information encryption method and system Download PDF

Info

Publication number
CN104618092A
CN104618092A CN201510003877.0A CN201510003877A CN104618092A CN 104618092 A CN104618092 A CN 104618092A CN 201510003877 A CN201510003877 A CN 201510003877A CN 104618092 A CN104618092 A CN 104618092A
Authority
CN
China
Prior art keywords
output valve
module
value
score value
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510003877.0A
Other languages
Chinese (zh)
Inventor
武毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201510003877.0A priority Critical patent/CN104618092A/en
Publication of CN104618092A publication Critical patent/CN104618092A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

本发明提供一种信息加密方法及系统,上述方法包括以下步骤:根据密钥生成器生成的子密钥及右部分值,通过预设函数进行运算后,获得第一输出值;将所述第一输出值与左部分值进行异或运算,获得第二输出值;将所述右部分值替换左部分值,将所述第二输出值替换右部分值,重复上述步骤,直至预设循环次数,获得左部分目标值及右部分目标值;组合左部分目标值及右部分目标值,输出目标密文;其中,预先将明文划分为位数相等的左右两部分;本发明采用不同明文生成不同密钥的方法,来实现真实密钥的不可预测性,大大提高了其加密算法的安全性,同时,在性能方面也不会有太多的降低。

The present invention provides an information encryption method and system. The above method includes the following steps: according to the subkey and the right part value generated by the key generator, the first output value is obtained after operation through a preset function; the first output value is obtained by the second An XOR operation is performed between an output value and the left part value to obtain a second output value; the right part value is replaced by the left part value, the second output value is replaced by the right part value, and the above steps are repeated until the preset number of cycles , to obtain the target value of the left part and the target value of the right part; combine the target value of the left part and the target value of the right part, and output the target ciphertext; wherein, the plaintext is divided into left and right parts with equal digits in advance; the present invention uses different plaintexts to generate different The key method is used to realize the unpredictability of the real key, which greatly improves the security of its encryption algorithm, and at the same time, there will not be too much reduction in performance.

Description

一种信息加密方法及系统An information encryption method and system

技术领域technical field

本发明属于通信安全领域,尤其涉及一种信息加密方法及系统。The invention belongs to the field of communication security, in particular to an information encryption method and system.

背景技术Background technique

DES加密算法是应计算机科学技术的快速发展而生成的产物,而在计算能力卓越的今天,DES算法的加密强度已经不符合我们的要求,容易受到穷举攻击的破解,在历史上,DES算法被破解的案例也屡见不鲜,在现代社会中也出现了很多替代DES算法的产物,除了选择DES的替代物之外,还可以选择改进该算法,以加强它的加密强度,使得不那么容易被破解。The DES encryption algorithm is a product generated in response to the rapid development of computer science and technology. Today, with excellent computing power, the encryption strength of the DES algorithm does not meet our requirements, and it is easily cracked by exhaustive attacks. In history, the DES algorithm The cases of being cracked are not uncommon. In modern society, there are many products that replace the DES algorithm. In addition to choosing a substitute for DES, you can also choose to improve the algorithm to strengthen its encryption strength and make it less easy to be cracked. .

原有加密算法的局限性:Limitations of the original encryption algorithm:

在DES加密算法中,只要原始密钥不变,则每一轮所产生的轮密钥也会是一样的,这样就给攻击者带了一个很大的安全漏洞,可以通过明文攻击方法,轻松地获取到加密密钥。In the DES encryption algorithm, as long as the original key remains unchanged, the round key generated in each round will also be the same, which brings a big security hole to the attacker, and the plaintext attack method can be used to easily to obtain the encryption key.

现有的DES算法改进:Improvements to the existing DES algorithm:

1、一重DES加密可以很轻易地被破解,那么就多加几重加密,比如现在常用的三重DES加密算法,虽然较好地抵制了明文方法的攻击,但是却付出了运算的代码,其加密难度相比起普通的DES加密算法来说,将增加n-1倍(n为n重加密算法,比如3重加密算法将比普通DES加密算法增加2倍的难度)。1. One-layer DES encryption can be easily cracked, so add several more layers of encryption, such as the commonly used triple-DES encryption algorithm, although it can better resist the attack of the plaintext method, but it pays for the calculation code, and its encryption difficulty Compared with the ordinary DES encryption algorithm, it will increase by n-1 times (n is the n-fold encryption algorithm, for example, the 3-fold encryption algorithm will increase the difficulty by 2 times compared with the ordinary DES encryption algorithm).

2、改变每轮变换时所使用的子密钥,让子密钥的生成不仅仅与初始密钥有关,还与明文有关。其实现是在普通DES算法的基础上,在生成子密钥的那一步,改变子密钥生成函数,将原来生成的子密钥与上一轮生成的明文进行相关操作,使子密钥变得不可预测,这样将有效地抵制明文攻击方法,将猜密钥的方法变得没有可能,其缺点也是显而易见的,由于每一次的轮变换都将重新生成一个子密钥,其运算复杂度也是会有所增加的。2. Change the subkey used in each round of transformation, so that the generation of the subkey is not only related to the initial key, but also related to the plaintext. Its implementation is based on the ordinary DES algorithm, at the step of generating the subkey, change the subkey generation function, and perform correlation operations between the original generated subkey and the plaintext generated in the previous round, so that the subkey becomes Unpredictable, this will effectively resist the plaintext attack method, and the method of guessing the key becomes impossible. Its disadvantages are also obvious. Since each round transformation will regenerate a subkey, its computational complexity will increase.

发明内容Contents of the invention

本发明提供一种信息加密方法及系统,以解决上述问题。The present invention provides an information encryption method and system to solve the above problems.

本发明提供一种信息加密方法,上述方法包括以下步骤:The present invention provides a kind of information encryption method, and above-mentioned method comprises the following steps:

根据密钥生成器生成的子密钥及右部分值,通过预设函数进行运算后,获得第一输出值;According to the sub-key and the right part value generated by the key generator, the first output value is obtained after the operation is performed through the preset function;

将所述第一输出值与左部分值进行异或运算,获得第二输出值;performing an XOR operation on the first output value and the left partial value to obtain a second output value;

将所述右部分值替换左部分值,将所述第二输出值替换右部分值,重复上述步骤,直至预设循环次数,获得左部分目标值及右部分目标值;replacing the left partial value with the right partial value, replacing the right partial value with the second output value, and repeating the above steps until the preset number of cycles to obtain the left partial target value and the right partial target value;

组合左部分目标值及右部分目标值,输出目标密文;其中,预先将明文划分为位数相等的左右两部分。Combining the target value of the left part and the target value of the right part, the target ciphertext is output; wherein, the plaintext is divided into two parts with the same number of digits in advance.

本发明还提供一种信息加密系统,包括划分模块、第一输出值模块、第二输出值模块、目标部分获取模块、目标密文输出模块;The present invention also provides an information encryption system, including a division module, a first output value module, a second output value module, a target part acquisition module, and a target ciphertext output module;

其中,所述划分模块通过所述第一输出值模块与所述第二输出值模块相连;所述第一输出值模块通过所述第二输出值模块与所述目标部分获取模块相连;所述第二输出值模块通过所述目标部分获取模块与所述目标密文输出模块相连;所述划分模块还与所述目标部分获取模块相连;Wherein, the division module is connected to the second output value module through the first output value module; the first output value module is connected to the target part acquisition module through the second output value module; The second output value module is connected to the target ciphertext output module through the target part acquisition module; the division module is also connected to the target part acquisition module;

所述划分模块,用于预先将明文划分为位数相等的左右两部分并将划分结果通知所述第一输出值模块、所述目标部分获取模块The division module is used to divide the plaintext into left and right parts with equal number of digits in advance and notify the first output value module and the target part acquisition module of the division result

所述第一输出值模块,用于根据密钥生成器生成的子密钥及右部分值,通过预设函数进行运算后,获得第一输出值并将所述第一输出值发送至所述第二输出值模块;The first output value module is configured to obtain a first output value after performing operations through a preset function according to the subkey and the right part value generated by the key generator, and send the first output value to the the second output value module;

所述第二输出值模块,用于将所述第一输出值与左部分值进行异或运算,获得第二输出值;The second output value module is configured to perform an XOR operation on the first output value and the left partial value to obtain a second output value;

所述目标部分获取模块,用于将所述右部分值替换左部分值,将所述第二输出值替换右部分值,重复上述步骤,直至预设循环次数,获得左部分目标值及右部分目标值并将所述左部分目标值及右部分目标值发送至所述目标密文输出模块;The target part acquisition module is used to replace the right part value with the left part value, replace the second output value with the right part value, repeat the above steps until the preset number of cycles, and obtain the left part target value and the right part target value and send the left part target value and the right part target value to the target ciphertext output module;

所述目标密文输出模块,用于组合左部分目标值及右部分目标值,输出目标密文。The target ciphertext output module is used to combine the left part of the target value and the right part of the target value to output the target ciphertext.

相较于之前技术,本发明提供的一种信息加密方法及系统,采用不同明文生成不同密钥的方法,来实现真实密钥的不可预测性,大大提高了其加密算法的安全性,同时,在性能方面也不会有太多的降低。Compared with the previous technology, the information encryption method and system provided by the present invention adopts the method of generating different keys from different plaintexts to realize the unpredictability of the real key, which greatly improves the security of the encryption algorithm. At the same time, In terms of performance, there will not be much degradation.

附图说明Description of drawings

此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The accompanying drawings described here are used to provide a further understanding of the present invention and constitute a part of the application. The schematic embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute improper limitations to the present invention. In the attached picture:

图1所示为本发明实施例1的信息加密方法流程图;Fig. 1 shows the flow chart of the information encryption method of Embodiment 1 of the present invention;

图2所示为本发明实施例2的信息加密方法流程图;Fig. 2 shows the flow chart of the information encryption method of Embodiment 2 of the present invention;

图3所示为本发明实施例3的信息加密系统结构图。FIG. 3 is a structural diagram of an information encryption system according to Embodiment 3 of the present invention.

具体实施方式Detailed ways

下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

DES加密算法是由IBM开发的一种对称加密算法,是一个16轮的Feis tel型结构密码,它的分组长度为64bi ts,密钥长度也为64bi ts,实用56bi ts,其中有8位作为奇偶校验。The DES encryption algorithm is a symmetric encryption algorithm developed by IBM. It is a 16-round Feis tel structure cipher. Its block length is 64bits, and the key length is also 64bits. parity.

图1所示为本发明实施例1的信息加密方法流程图,包括以下步骤:Fig. 1 shows the flow chart of the information encryption method of embodiment 1 of the present invention, comprises the following steps:

步骤101:预先将明文划分为位数相等的左右两部分;Step 101: pre-dividing the plaintext into left and right parts with equal number of digits;

步骤102:根据密钥生成器生成的子密钥及右部分值,通过预设函数进行运算后,获得第一输出值;Step 102: According to the sub-key and the right partial value generated by the key generator, the first output value is obtained after operation through the preset function;

步骤103:将所述第一输出值与左部分值进行异或运算,获得第二输出值;Step 103: performing XOR operation on the first output value and the left partial value to obtain a second output value;

步骤104:将所述右部分值替换左部分值,将所述第二输出值替换右部分值,重复上述步:202-204,直至预设循环次数,获得左部分目标值及右部分目标值;Step 104: replace the left part value with the right part value, replace the right part value with the second output value, repeat the above steps: 202-204, until the preset number of cycles, and obtain the left part target value and the right part target value ;

步骤105:组合左部分目标值及右部分目标值,输出目标密文。Step 105: Combine the left part of the target value and the right part of the target value, and output the target ciphertext.

图2所示为本发明实施例2的信息加密方法流程图,包括以下步骤:Fig. 2 shows the flow chart of the information encryption method of embodiment 2 of the present invention, comprises the following steps:

步骤201:将明文划分为左右两部分,左部分值为L0,右部分值为R0,其中,L0位数和R0位数相同。Step 201: Divide the plaintext into left and right parts, the value of the left part is L0, and the value of the right part is R0, wherein the number of digits in L0 is the same as that in R0.

例如:将明文的64bi ts划分为左右两部分,分别为L0和R0,其中,L0位数和R0位数均为32bi ts。For example: Divide the 64bits of the plaintext into left and right parts, L0 and R0 respectively, where the number of digits in L0 and R0 are both 32bits.

这样是为了打乱明文组的排序,相当于是一个初始的简单加密过程。This is to disrupt the ordering of plaintext groups, which is equivalent to an initial simple encryption process.

步骤202:将所述R0与密钥生成器生成的子密钥k1进行f函数运算后,获得f(R0,k1);Step 202: After performing the f function operation on the R0 and the subkey k1 generated by the key generator, f(R0, k1) is obtained;

步骤203:将所述f(R0,k1)与所述L0进行异或运算,获得 Step 203: XOR operation is performed on the f(R0, k1) and the L0 to obtain

步骤204:将所述R0记为L1替换左部分值,同时把记为R1替换右部分值,从而完成第一轮迭代运算;Step 204: Record the R0 as L1 to replace the left partial value, and at the same time write Record it as R1 to replace the right partial value, thus completing the first round of iterative operation;

步骤205:重复步骤102-105,直至循环16次,获得左部分目标值R16、右部分目标值L16;Step 205: Repeat steps 102-105 until the cycle is repeated 16 times to obtain the target value of the left part R16 and the target value of the right part L16;

步骤206:将获得的R16、L16分组结合并进行排序加密,输出目标密文。Step 206: Combining the obtained R16 and L16 packets, sorting and encrypting them, and outputting the target ciphertext.

图3所示为本发明实施例3的信息加密系统结构图,包括划分模块、第一输出值模块、第二输出值模块、目标部分获取模块、目标密文输出模块;Fig. 3 shows the structure diagram of the information encryption system according to Embodiment 3 of the present invention, including a division module, a first output value module, a second output value module, a target part acquisition module, and a target ciphertext output module;

其中,所述划分模块通过所述第一输出值模块与所述第二输出值模块相连;所述第一输出值模块通过所述第二输出值模块与所述目标部分获取模块相连;所述第二输出值模块通过所述目标部分获取模块与所述目标密文输出模块相连;所述划分模块还与所述目标部分获取模块相连;Wherein, the division module is connected to the second output value module through the first output value module; the first output value module is connected to the target part acquisition module through the second output value module; The second output value module is connected to the target ciphertext output module through the target part acquisition module; the division module is also connected to the target part acquisition module;

所述划分模块,用于预先将明文划分为位数相等的左右两部分并将划分结果通知所述第一输出值模块、所述目标部分获取模块The division module is used to divide the plaintext into left and right parts with equal number of digits in advance and notify the first output value module and the target part acquisition module of the division result

所述第一输出值模块,用于根据密钥生成器生成的子密钥及右部分值,通过预设函数进行运算后,获得第一输出值并将所述第一输出值发送至所述第二输出值模块;The first output value module is configured to obtain a first output value after performing operations through a preset function according to the subkey and the right part value generated by the key generator, and send the first output value to the the second output value module;

所述第二输出值模块,用于将所述第一输出值与左部分值进行异或运算,获得第二输出值;The second output value module is configured to perform an XOR operation on the first output value and the left partial value to obtain a second output value;

所述目标部分获取模块,用于将所述右部分值替换左部分值,将所述第二输出值替换右部分值,重复上述步骤,直至预设循环次数,获得左部分目标值及右部分目标值并将所述左部分目标值及右部分目标值发送至所述目标密文输出模块;The target part acquisition module is used to replace the right part value with the left part value, replace the second output value with the right part value, repeat the above steps until the preset number of cycles, and obtain the left part target value and the right part target value and send the left part target value and the right part target value to the target ciphertext output module;

所述目标密文输出模块,用于组合左部分目标值及右部分目标值,输出目标密文。The target ciphertext output module is used to combine the left part of the target value and the right part of the target value to output the target ciphertext.

相较于之前技术,本发明提供的一种信息加密方法及系统,采用不同明文生成不同密钥的方法,来实现真实密钥的不可预测性,大大提高了其加密算法的安全性,同时,在性能方面也不会有太多的降低。Compared with the previous technology, the information encryption method and system provided by the present invention adopts the method of generating different keys from different plaintexts to realize the unpredictability of the real key, which greatly improves the security of the encryption algorithm. At the same time, In terms of performance, there will not be much degradation.

以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. For those skilled in the art, the present invention may have various modifications and changes. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included within the protection scope of the present invention.

Claims (7)

1. an information ciphering method, is characterized in that, comprises the following steps:
The sub-key generated according to key generator and right part score value, after carrying out computing, obtain the first output valve by preset function;
Described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeats above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value;
Combination left half desired value and right half desired value, export target ciphertext; Wherein, expressly the equal left and right two parts of figure place will be divided in advance.
2. method according to claim 1, is characterized in that, if left part score value is L0, right part score value is R0, and the sub-key that key generator generates is k1, and preset function is f function, then the first output valve is f (R0, k1).
3. method according to claim 2, is characterized in that, described first output valve and left part score value are carried out XOR, and the second output valve process that obtains is:
Described f (R0, k1) is carried out XOR with described L0, and obtaining the second output valve is
4. method according to claim 3, is characterized in that, described right part score value is replaced left part score value, by the process that described second output valve replaces right part score value is:
Described R0 is designated as L1 and replaces left part score value, simultaneously handle be designated as R1 and replace right part score value.
5. method according to claim 1, is characterized in that, preset loop number of times is 16.
6. method according to claim 1, is characterized in that, combination left half desired value and right half desired value, and the process exporting target ciphertext is:
Line ordering of the left half desired value of acquisition and the combination of right half desired value being gone forward side by side is encrypted, and exports target ciphertext.
7. an information encryption system, is characterized in that, comprises and divides module, the first output valve module, the second output valve module, target part acquisition module, target ciphertext output module;
Wherein, described division module is connected with described second output valve module by described first output valve module; Described first output valve module is connected with described target part acquisition module by described second output valve module; Described second output valve module is connected with described target ciphertext output module by described target part acquisition module; Described division module is also connected with described target part acquisition module;
Described division module, for will being expressly divided into the equal left and right two parts of figure place and division result being notified described first output valve module, described target part acquisition module in advance
Described first output valve module, for the sub-key that generates according to key generator and right part score value, after carrying out computing, obtains the first output valve and described first output valve is sent to described second output valve module by preset function;
Described second output valve module, for described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described target part acquisition module, for described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeat above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value and described left half desired value and right half desired value are sent to described target ciphertext output module;
Described target ciphertext output module, for combining left half desired value and right half desired value, exports target ciphertext.
CN201510003877.0A 2015-01-05 2015-01-05 Information encryption method and system Pending CN104618092A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510003877.0A CN104618092A (en) 2015-01-05 2015-01-05 Information encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510003877.0A CN104618092A (en) 2015-01-05 2015-01-05 Information encryption method and system

Publications (1)

Publication Number Publication Date
CN104618092A true CN104618092A (en) 2015-05-13

Family

ID=53152387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510003877.0A Pending CN104618092A (en) 2015-01-05 2015-01-05 Information encryption method and system

Country Status (1)

Country Link
CN (1) CN104618092A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108933655A (en) * 2018-07-12 2018-12-04 江苏慧学堂系统工程有限公司 A kind of computer network authentication system
CN109617681A (en) * 2018-12-06 2019-04-12 成都卫士通信息产业股份有限公司 Encryption and decryption method and device, electronic equipment, computer readable storage medium
CN111865591A (en) * 2020-09-21 2020-10-30 北京华云安信息技术有限公司 Symmetric encryption method, device, equipment and storage medium
CN112866288A (en) * 2021-03-01 2021-05-28 上海海事大学 Data symmetric encryption method for double-plaintext transmission

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6570989B1 (en) * 1998-04-27 2003-05-27 Matsushita Electric Industrial Co., Ltd. Cryptographic processing apparatus, cryptographic processing method, and storage medium storing cryptographic processing program for realizing high-speed cryptographic processing without impairing security
CN101262341A (en) * 2008-02-22 2008-09-10 北京航空航天大学 A Hybrid Encryption Method in Conference System
CN101952870A (en) * 2008-01-21 2011-01-19 索尼公司 Data converter, data conversion method and computer program
CN103905181A (en) * 2014-03-22 2014-07-02 哈尔滨工程大学 Improved RC5 encryption algorithm for secret key encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6570989B1 (en) * 1998-04-27 2003-05-27 Matsushita Electric Industrial Co., Ltd. Cryptographic processing apparatus, cryptographic processing method, and storage medium storing cryptographic processing program for realizing high-speed cryptographic processing without impairing security
CN101952870A (en) * 2008-01-21 2011-01-19 索尼公司 Data converter, data conversion method and computer program
CN101262341A (en) * 2008-02-22 2008-09-10 北京航空航天大学 A Hybrid Encryption Method in Conference System
CN103905181A (en) * 2014-03-22 2014-07-02 哈尔滨工程大学 Improved RC5 encryption algorithm for secret key encryption

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108933655A (en) * 2018-07-12 2018-12-04 江苏慧学堂系统工程有限公司 A kind of computer network authentication system
CN109617681A (en) * 2018-12-06 2019-04-12 成都卫士通信息产业股份有限公司 Encryption and decryption method and device, electronic equipment, computer readable storage medium
CN111865591A (en) * 2020-09-21 2020-10-30 北京华云安信息技术有限公司 Symmetric encryption method, device, equipment and storage medium
CN112866288A (en) * 2021-03-01 2021-05-28 上海海事大学 Data symmetric encryption method for double-plaintext transmission
CN112866288B (en) * 2021-03-01 2022-09-06 上海海事大学 A Symmetric Data Encryption Method for Double Plaintext Transmission

Similar Documents

Publication Publication Date Title
CN107070630B (en) A Fast and Safe Hardware Structure of AES Algorithm
EP3154217B1 (en) Scrambled tweak mode of block ciphers for differential power analysis resistant encryption
US8369516B2 (en) Encryption apparatus having common key encryption function and embedded apparatus
Hussain et al. Construction of S8 Liu J S-boxes and their applications
US11546135B2 (en) Key sequence generation for cryptographic operations
CN107147487B (en) Symmetric key random block cipher
TW201918926A (en) Methods for constructing secure hash functions from bit-mixers
CN110572255B (en) Encryption method and device based on lightweight block cipher algorithm Shadow and computer readable medium
CN107947916B (en) An Integrated Encryption and Decryption Module Based on DES Algorithm
CN113098675A (en) Binary data encryption system and method based on polynomial complete homomorphism
CN104618092A (en) Information encryption method and system
CN112787820B (en) Lightweight authentication encryption and decryption implementation method suitable for hardware implementation
Bhattacharyya et al. Secure message authentication against related-key attack
CN108234108B (en) High-efficiency de-ordering encryption method for weak leakage
CN114513298B (en) Lightweight encryption method capable of accepting arbitrary plaintext length
CN111262685A (en) Novel method and device for realizing Shield block cipher generated by secret key and readable storage medium
Shoukat et al. Randomized substitution method for effectively secure block ciphers in IOT environment
CN107835070B (en) Simple embedded encryption method
KR20080044150A (en) Apparatus and method for designing compression function of block cipher hash operation mode
TWI731770B (en) Computer system
CN106788971A (en) A kind of sub-key generation method based on stream cipher arithmetic
TW202242692A (en) Circuit module of single round advanced encryption standard
Murtaza et al. Fortification of aes with dynamic mix-column transformation
Khalil et al. Modify PRESENT Algorithm by New technique and key Generator by External unit
Jean et al. Analysis of the CAESAR candidate Silver

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150513

WD01 Invention patent application deemed withdrawn after publication
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载