CN101764686B - 一种用于网络与信息安全的加密方法 - Google Patents
一种用于网络与信息安全的加密方法 Download PDFInfo
- Publication number
- CN101764686B CN101764686B CN 201010033342 CN201010033342A CN101764686B CN 101764686 B CN101764686 B CN 101764686B CN 201010033342 CN201010033342 CN 201010033342 CN 201010033342 A CN201010033342 A CN 201010033342A CN 101764686 B CN101764686 B CN 101764686B
- Authority
- CN
- China
- Prior art keywords
- takes turns
- key
- constant
- turns constant
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | a | b | c | d | e | f | |
0 | 9b | ba | 29 | 13 | 63 | 6d | f8 | e8 | 28 | f3 | 7f | 98 | d1 | 93 | a4 | 6f |
1 | dd | 4c | f6 | 3b | 3a | e2 | 81 | ae | e7 | 69 | c0 | ca | 86 | 9d | fa | 89 |
2 | 55 | 1d | cf | 94 | 1a | 17 | 62 | 0b | 61 | 35 | ee | c4 | fd | 52 | ea | 09 |
3 | 12 | c6 | b0 | 74 | 64 | 57 | 77 | fb | 7c | c7 | af | cd | bf | b9 | 82 | 43 |
4 | eb | 47 | 46 | 07 | bc | 75 | 6a | 9a | c8 | a2 | 02 | 50 | 0a | 7e | e9 | 90 |
5 | 59 | 34 | fc | 42 | 2b | d6 | 5f | f7 | d0 | d5 | ff | 8a | 00 | ed | 37 | 79 |
6 | e1 | 66 | 03 | 24 | 41 | d4 | c9 | a9 | 4b | f2 | e5 | b5 | 87 | 73 | 20 | db |
7 | ce | 08 | 26 | 95 | 91 | 3c | cc | 0f | 2a | a3 | 7b | 58 | 22 | be | 23 | e4 |
8 | 9e | 5e | 8e | 6c | ab | 3d | 0d | 6b | b1 | 83 | a7 | 54 | ec | 4d | 01 | a8 |
9 | f5 | ad | 40 | e0 | 67 | b4 | a6 | dc | 2d | 72 | b8 | 7d | 45 | 0e | c5 | 71 |
a | 31 | df | 5d | 18 | 8c | 60 | 8f | 51 | 27 | 6e | a1 | 84 | 97 | 80 | b2 | 8d |
b | d3 | bb | 9c | 1f | 4a | aa | 16 | 5a | 25 | c3 | 85 | d8 | 39 | e6 | 32 | ef |
c | 04 | 1b | b7 | 96 | f9 | 4e | 49 | f4 | f0 | ac | 48 | 33 | f1 | 68 | a5 | b6 |
d | d7 | 36 | e3 | 06 | 99 | 65 | cb | d2 | 2c | 8b | bd | 3f | 53 | 30 | 15 | 19 |
e | 88 | d9 | 1e | 3e | 70 | a0 | 56 | 7a | 44 | 5c | 21 | 2e | 10 | b3 | 1c | de |
f | fe | 92 | 2f | 76 | da | 5b | 05 | 9f | 14 | c1 | 38 | 78 | 4f | c2 | 11 | 0c |
0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | a | b | c | d | e | f | |
0 | 5c | 8e | 4a | 62 | c0 | f6 | d3 | 43 | 71 | 2f | 4c | 27 | ff | 86 | 9d | 77 |
1 | ec | fe | 30 | 03 | f8 | de | b6 | 25 | a3 | df | 24 | c1 | ee | 21 | e2 | b3 |
2 | 6e | ea | 7c | 7e | 63 | b8 | 72 | a8 | 08 | 02 | 78 | 54 | d8 | 98 | eb | f2 |
3 | dd | a0 | be | cb | 51 | 29 | d1 | 5e | fa | bc | 14 | 13 | 75 | 85 | e3 | db |
4 | 92 | 64 | 53 | 3f | e8 | 9c | 42 | 41 | ca | c6 | b4 | 68 | 11 | 8d | c5 | fc |
5 | 4b | a7 | 2d | dc | 8b | 20 | e6 | 35 | 7b | 50 | b7 | f5 | e9 | a2 | 81 | 56 |
6 | a5 | 28 | 26 | 04 | 34 | d5 | 61 | 94 | cd | 19 | 46 | 87 | 83 | 05 | a9 | 0f |
7 | e4 | 9f | 99 | 6d | 33 | 45 | f3 | 36 | fb | 5f | e7 | 7a | 38 | 9b | 4d | 0a |
8 | ad | 16 | 3e | 89 | ab | ba | 1c | 6c | e0 | 1f | 5b | d9 | a4 | af | 82 | a6 |
9 | 4f | 74 | f1 | 0d | 23 | 73 | c3 | ac | 0b | d4 | 47 | 00 | b2 | 1d | 80 | f7 |
a | e5 | aa | 49 | 79 | 0e | ce | 96 | 8a | 8f | 67 | b5 | 84 | c9 | 91 | 17 | 3a |
b | 32 | 88 | ae | ed | 95 | 6b | cf | c2 | 9a | 3d | 01 | b1 | 44 | da | 7d | 3c |
c | 1a | f9 | fd | b9 | 2b | 9e | 31 | 39 | 48 | 66 | 1b | d6 | 76 | 3b | 70 | 22 |
d | 58 | 0c | d7 | b0 | 65 | 59 | 55 | d0 | bb | e1 | f4 | 6f | 97 | 10 | ef | a1 |
e | 93 | 60 | 15 | d2 | 7f | 6a | bd | 18 | 07 | 4e | 2e | 40 | 8c | 5d | 2a | bf |
f | c8 | cc | 69 | 09 | c7 | 90 | 12 | 57 | 06 | c4 | 1e | 37 | 52 | 2c | f0 | 5a |
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010033342 CN101764686B (zh) | 2010-01-11 | 2010-01-11 | 一种用于网络与信息安全的加密方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010033342 CN101764686B (zh) | 2010-01-11 | 2010-01-11 | 一种用于网络与信息安全的加密方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101764686A CN101764686A (zh) | 2010-06-30 |
CN101764686B true CN101764686B (zh) | 2013-01-02 |
Family
ID=42495683
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201010033342 Active CN101764686B (zh) | 2010-01-11 | 2010-01-11 | 一种用于网络与信息安全的加密方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101764686B (zh) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101944991B (zh) * | 2010-09-27 | 2012-07-04 | 北京航空航天大学 | 一种使用对称密钥进行数据加密的加密方法 |
CN102025484B (zh) * | 2010-12-17 | 2012-07-04 | 北京航空航天大学 | 一种分组密码加解密方法 |
CN102185692B (zh) * | 2011-04-25 | 2012-07-04 | 北京航空航天大学 | 基于aes加密算法的多模式可重构加密方法 |
CN103051442B (zh) * | 2012-10-16 | 2015-06-10 | 中国科学院软件研究所 | 采用Feistel-PG结构的密码装置及加密方法 |
CN103391186B (zh) * | 2013-06-27 | 2016-02-24 | 清华大学 | 一种实现aes算法中s盒和逆s盒替换的方法 |
DE102015006670A1 (de) * | 2014-06-26 | 2015-12-31 | Intel Corporation | Befehle und logik zum bereitstellen von kryptographischer allzweck-gf(256)-simd- arithmetikfunktionalität |
SG10201405852QA (en) * | 2014-09-18 | 2016-04-28 | Huawei Internat Pte Ltd | Encryption function and decryption function generating method, encryption and decryption method and related apparatuses |
US9819486B2 (en) * | 2014-12-19 | 2017-11-14 | Nxp B.V. | S-box in cryptographic implementation |
CN106341230B (zh) * | 2015-07-08 | 2020-08-21 | 吴清山 | 通过缩短密文长度来实现现代密码体制无条件安全的方法 |
CN106685637B (zh) * | 2015-11-07 | 2019-05-28 | 上海复旦微电子集团股份有限公司 | 加/解密电路 |
CN105912938B (zh) * | 2016-04-01 | 2019-02-12 | 青岛大学 | 一种求多元素逆元的计算方法及计算系统 |
CN107425963A (zh) * | 2017-05-09 | 2017-12-01 | 上海众人网络安全技术有限公司 | 一种密码墙的构建方法及系统 |
CN107257279B (zh) * | 2017-06-29 | 2020-02-11 | 广东浩云长盛网络股份有限公司 | 一种明文数据加密方法及设备 |
CN108933652B (zh) * | 2018-06-11 | 2021-03-05 | 安徽工程大学 | 一种普通轮变换运算单元、普通轮变换电路及aes解密电路 |
CN108566271B (zh) * | 2018-06-11 | 2020-12-15 | 安徽工程大学 | 复用轮变换电路、aes加密电路及其加密方法 |
CN109981256B (zh) * | 2019-04-03 | 2022-08-05 | 华南师范大学 | 基于FeistelBox结构的白盒分组密码构造方法及系统 |
CN110266468B (zh) * | 2019-05-20 | 2022-05-27 | 陕西师范大学 | 用于分组密码代换-置换网络块中的扩散变换方法 |
CN110147678B (zh) * | 2019-05-21 | 2020-10-27 | 湖南大学 | 一种用于工控系统的数据加密方法和系统 |
CN111464288B (zh) * | 2019-12-18 | 2022-09-30 | 安徽继远软件有限公司 | 一种s盒的生成方法及系统 |
CN112636899B (zh) * | 2020-09-21 | 2022-03-18 | 中国电子科技集团公司第三十研究所 | 一种轻量化s盒设计方法 |
CN112511293B (zh) * | 2020-09-21 | 2022-03-18 | 中国电子科技集团公司第三十研究所 | 基于比特与运算的s盒参数化设计方法及存储介质 |
CN113541942B (zh) * | 2021-07-12 | 2022-06-07 | 西安电子科技大学 | 基于arx白盒分组密码的数字内容加解密方法 |
CN113746642B (zh) * | 2021-11-08 | 2022-02-11 | 西安热工研究院有限公司 | 一种计算机间通信方法及系统 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040047466A1 (en) * | 2002-09-06 | 2004-03-11 | Joel Feldman | Advanced encryption standard hardware accelerator and method |
-
2010
- 2010-01-11 CN CN 201010033342 patent/CN101764686B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
CN101764686A (zh) | 2010-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101764686B (zh) | 一种用于网络与信息安全的加密方法 | |
Khan et al. | A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems | |
CN101938350B (zh) | 一种基于组合编码的文件加密和解密的方法 | |
CN104065474B (zh) | 一种轻量级Surge分组密码实现方法 | |
CN101951314B (zh) | 对称密码加密中s-盒的设计方法 | |
US11606189B2 (en) | Method and apparatus for improving the speed of advanced encryption standard (AES) decryption algorithm | |
CN101895389B (zh) | 采用比例计算的基于组合编码的文件加密和解密的方法 | |
CN101848081A (zh) | 一种s盒构造方法及s盒 | |
CN103634101A (zh) | 加密处理方法及设备 | |
CN109921899B (zh) | 一种完全雪崩4×4的s盒实现方法 | |
CN104184579A (zh) | 基于双伪随机变换的轻量级分组密码vh算法 | |
CN101814985A (zh) | 应用多混沌映射多动态s盒的分组密码系统 | |
CN101841415A (zh) | 一种面向字的密钥流生成方法及加密方法 | |
CN111245598B (zh) | 一种轻量级aerogel分组密码的实现方法 | |
CN101826959B (zh) | 一种面向字节的密钥流生成方法及加密方法 | |
CN103780794A (zh) | 一种基于混沌系统的图像加密改进方法 | |
Salman et al. | Creation of S-Box based One-Dimensional Chaotic Logistic Map: Colour Image Encryption Approach. | |
CN104320420A (zh) | 一种基于aes算法的scada文件加密方法 | |
CN106921486A (zh) | 数据加密的方法和装置 | |
CN105162580A (zh) | 基于ofb模式和分组密码vh的轻量级流密码技术vho | |
CN101848079B (zh) | 一种面向字、带记忆的序列扰动方法及加密方法 | |
Panda et al. | Encryption and Decryption algorithm using two dimensional cellular automata rules in Cryptography | |
Mahboob et al. | An innovative technique for constructing highly non-linear components of block cipher for data security against cyber attacks | |
CN113691364A (zh) | 一种基于位片技术的动态s盒分组密码的加密及解密方法 | |
WO2012060685A1 (en) | A method for linear transformation in substitution-permutation network symmetric-key block cipher |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C53 | Correction of patent for invention or patent application | ||
CB03 | Change of inventor or designer information |
Inventor after: Hu Bo Inventor after: Li Tongliang Inventor after: Cheng Yu Inventor after: Li Zhengtao Inventor after: Han Xiansheng Inventor before: Hu Bo Inventor before: Li Tongliang Inventor before: Cheng Yu |
|
COR | Change of bibliographic data |
Free format text: CORRECT: INVENTOR; FROM: HU BO LI TONGLIANG CHENG YU TO: HU BO LI TONGLIANG CHENG YU LI ZHENGTAO HAN XIANSHENG |
|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20170104 Address after: 050081 Hebei, Shijiazhuang friendship south street, building 46, No. 1 Patentee after: APPLICATION MATHEMATICS INSTITUTE, HEBEI ACADEMY OF SCIENCES Address before: 050081 Shijiazhuang friendship Street, Hebei, building 46, No. 1 Patentee before: Shijiazhuang Development Zone Jike Shangshi Sci-Tech Co., Ltd. |