CN106788971A - A kind of sub-key generation method based on stream cipher arithmetic - Google Patents
A kind of sub-key generation method based on stream cipher arithmetic Download PDFInfo
- Publication number
- CN106788971A CN106788971A CN201611156487.8A CN201611156487A CN106788971A CN 106788971 A CN106788971 A CN 106788971A CN 201611156487 A CN201611156487 A CN 201611156487A CN 106788971 A CN106788971 A CN 106788971A
- Authority
- CN
- China
- Prior art keywords
- sub
- key
- stream cipher
- cipher arithmetic
- present
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of sub-key generation method based on stream cipher arithmetic, it is characterised in that comprise the following steps:According to specific block encryption algorithm, confirm encryption round number r, and generate master key K and initialization vector IV, initialization vector IV is identical with the bit number of master key K, master key K and initialization vector IV are loaded into the internal register of stream cipher arithmetic, operation stream cipher arithmetic r times, so as to obtain r sub-key, r sub-key is participated in the calculating process of r wheel round functions of block encryption algorithm respectively.The security that the sub- password that the method provided using the present invention is generated carries out block encryption is very high, and the present invention is very high for security requirement, and is not that critically important application scenarios are very applicable for efficiency.
Description
Technical field
The present invention relates to a kind of generation method for being grouped the sub-key of enciphering and deciphering algorithm.
Background technology
With the development of information technology, the problem of Information Security but more and more looms large, it is ensured that the one of information security
Individual important technology is exactly cryptography.Cryptography plays the role on basis in information security technology, is that attacker is most difficult to break through
Module.And block cipher is the most frequently used algorithm in cryptography, is the main force in information security, commonly referred to information security
In post horse.Design and research of the academic circles at present to block cipher are quite ripe, have many new encryptions to calculate every year
Method is released.Due to the raising of hardware speed and incrementally increasing for calculator memory, it has been found that traditional AES can band
Carry out increasing problem, therefore, the focus that the design to the block cipher of high security has been paid close attention into academia.
Block cipher is the basic algorithm in cryptography, and it is the basis of many upper layer information security protocols.Block cipher
Design include two aspects, component is the basic round function of design, and another component is the basic key schedule of design
Algorithm.So-called cipher key schedule algorithm is the sub-keys much taken turns based on a master key generation, and is all made per respective loops
In round function.For a security for block cipher, the security of sub-key generating algorithm is particularly important.At present
The best attack of various pop block ciphers for occurring, such as the attack to AES and IDEA algorithms is all using the life of its key
The attack carried out into algorithm weaknesses.
Existing block encryption algorithm is all the close of fairly simple, common advanced encryption algorithm AES due to key generation
Key generating algorithm is only replaced using simple shift register plus simple S boxes, can not reach the security of stream cipher.
The content of the invention
The technical problem to be solved in the present invention is:Improve the security of block encryption algorithm.
In order to solve the above-mentioned technical problem, the technical scheme is that there is provided a kind of sub close based on stream cipher arithmetic
Key generation method, it is characterised in that comprise the following steps:
According to specific block encryption algorithm, encryption round number r is confirmed, and generate master key K and initialization vector IV, initially
Change vector IV identical with the bit number of master key K, the inside that master key K and initialization vector IV are loaded into stream cipher arithmetic is posted
Storage, operation stream cipher arithmetic r times, so as to obtain r sub-key, r sub-key participates in the r wheels of block encryption algorithm respectively
In the calculating process of round function.
It is concentrated mainly on its key stream generator for the safety analysis of stream cipher arithmetic at present, and current design is good
Good stream cipher can be seen as being a PRNG that such as Salsa20 stream cipher arithmetics are not looked for also currently
To the method less than exhaustive attack, it is possible to assuming that the key stream generator of the stream cipher arithmetic of safety is unidirectional and pseudorandom
's.So, each respective loops for being generated using master key just can be regarded as independent of one another and random, and this is more any than current
The sub-key dispatching method of block encryption algorithm is all safer, because the security of the sub-key of the method for the present invention is to set up
In the unidirectional reliability of stream cipher generator, and other block ciphers are then without this security feature.
To sum up analyze, the security that the sub- password that the method provided using the present invention is generated carries out block encryption is very high,
The present invention is very high for security requirement, and is not that critically important application scenarios are very applicable for efficiency.
Brief description of the drawings
A kind of flow chart of sub-key generation method based on stream cipher arithmetic that Fig. 1 is provided for the present invention.
Specific embodiment
With reference to specific embodiment, the present invention is expanded on further.It should be understood that these embodiments are merely to illustrate the present invention
Rather than limitation the scope of the present invention.In addition, it is to be understood that after the content for having read instruction of the present invention, people in the art
Member can make various changes or modifications to the present invention, and these equivalent form of values equally fall within the application appended claims and limited
Scope.
With reference to Fig. 1, if block encryption algorithm uses AES-128, then for the block encryption algorithm, the one of present invention offer
The sub-key generation method based on stream cipher arithmetic is planted to comprise the following steps:
AES-128 needs the sub- password of 11 wheels.Then generate the initialization vector IV and 128 bits of 128 bit
The master key K of AES-128.The master key K loadings of the initialization vector IV of 128 bits and the AES-128 of 128 bits are become a mandarin close
In the internal register of code algorithm (stream cipher arithmetic can use popular stream cipher arithmetic, such as RC4, Salsa20).Then
Run the stream cipher arithmetic 11 times, obtain 11 sub- passwords, every sub- password is 128 bits.The specific generation step of sub- password
For:The key stream of 11*128=1408 bits is first generated, then the key stream is divided into 11 sub-keys, each sub-key is 128
Bit.Then in the calculating process of the round function that every individual sub- password participates in block encryption algorithm respective wheel number.Block encryption is calculated
Method carries out a series of computings using 11 sub-keys with corresponding round function, and its process is:
The clear packets of given 128 bits, are carried out using the round function and corresponding sub-key of AES-128 AESs
Conversion.1st takes turns the input value for using the 1st sub-key and round function to block cipher, and also referred to as state enters line translation, the 2nd wheel
Enter line translation to internal state using the 2nd sub-key and round function, by that analogy, until 11th round uses the 11st sub-key
Conversion is updated to state with round function, ciphertext is finally given.
The present invention has redesigned a kind of sub-key generation method of block encryption algorithm, and the generation of this sub-key is to be based on
Stream cipher is generated.The security of the sub-key generation method depends on the one-way security of stream cipher.If stream cipher is generated
Algorithm is one-way safety, then this sub-key generating algorithm is also safe.
Claims (1)
1. a kind of sub-key generation method based on stream cipher arithmetic, it is characterised in that comprise the following steps:
According to specific block encryption algorithm, confirm encryption round number r, and generate master key K and initialization vector IV, initialize to
IV is identical with the bit number of master key K for amount, and master key K and initialization vector IV are loaded into the inside deposit of stream cipher arithmetic
Device, operation stream cipher arithmetic r times, so as to obtain r sub-key, r sub-key participates in the r wheel wheels of block encryption algorithm respectively
In the calculating process of function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611156487.8A CN106788971A (en) | 2016-12-14 | 2016-12-14 | A kind of sub-key generation method based on stream cipher arithmetic |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611156487.8A CN106788971A (en) | 2016-12-14 | 2016-12-14 | A kind of sub-key generation method based on stream cipher arithmetic |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106788971A true CN106788971A (en) | 2017-05-31 |
Family
ID=58888909
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611156487.8A Pending CN106788971A (en) | 2016-12-14 | 2016-12-14 | A kind of sub-key generation method based on stream cipher arithmetic |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106788971A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112231719A (en) * | 2019-07-15 | 2021-01-15 | 美光科技公司 | Cryptographic key management |
CN112865960A (en) * | 2020-12-31 | 2021-05-28 | 广州万协通信息技术有限公司 | System, method and device for realizing high-speed key chain pre-calculation based on stream cipher |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1993922A (en) * | 2004-07-30 | 2007-07-04 | 英特尔公司 | Stream cipher combining system and method |
CN101782956A (en) * | 2010-02-09 | 2010-07-21 | 杭州晟元芯片技术有限公司 | Method and device for protecting data on basis of AES real-time encryption |
CN103166753A (en) * | 2013-03-26 | 2013-06-19 | 桂林电子科技大学 | Method for encrypting four non-linear driven light-weight stream ciphers |
-
2016
- 2016-12-14 CN CN201611156487.8A patent/CN106788971A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1993922A (en) * | 2004-07-30 | 2007-07-04 | 英特尔公司 | Stream cipher combining system and method |
CN101782956A (en) * | 2010-02-09 | 2010-07-21 | 杭州晟元芯片技术有限公司 | Method and device for protecting data on basis of AES real-time encryption |
CN103166753A (en) * | 2013-03-26 | 2013-06-19 | 桂林电子科技大学 | Method for encrypting four non-linear driven light-weight stream ciphers |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112231719A (en) * | 2019-07-15 | 2021-01-15 | 美光科技公司 | Cryptographic key management |
CN112865960A (en) * | 2020-12-31 | 2021-05-28 | 广州万协通信息技术有限公司 | System, method and device for realizing high-speed key chain pre-calculation based on stream cipher |
CN112865960B (en) * | 2020-12-31 | 2022-09-09 | 广州万协通信息技术有限公司 | System, method and device for realizing high-speed key chain pre-calculation based on stream cipher |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1993922B (en) | Stream cipher combining system and method | |
CN107637010A (en) | Data encryption device and method and data deciphering device and method | |
CN103634102B (en) | A kind of means of defence of side-channel attack and fault attacks | |
CN104486073A (en) | Encryption and decryption method of character data | |
CN103019648A (en) | True random number generator with digital post-processing circuit | |
CN105100115A (en) | Data storage method for privacy protection based on encryption password and data fractionation | |
CN103051446B (en) | A kind of key encrypting and storing method | |
CN108476132A (en) | Key for an encrypting operation sequence generates | |
CN105007154B (en) | A kind of encrypting and decrypting device based on aes algorithm | |
CN107659398A (en) | Suitable for Android symmetric encryption method | |
CN104602015A (en) | Real-time video monitoring encryption and authentication method | |
CN104065473A (en) | Compact realization method of SM4 block cipher algorithm S box | |
CN107257279A (en) | A kind of clear data encryption method and equipment | |
CN107864033A (en) | A kind of symmetrical full homomorphic cryptography method of bootstrap type | |
CN103746805B (en) | The generation method and system of external authentication key | |
CN106788963A (en) | A kind of full homomorphic cryptography method of identity-based on improved lattice | |
CN106788971A (en) | A kind of sub-key generation method based on stream cipher arithmetic | |
CN105933101A (en) | Fully homomorphic encryption public key compression method based on parameter high power offset | |
CN104219045B (en) | RC4 stream cipher generators | |
Murtaza et al. | Parallelized key expansion algorithm for advanced encryption standard | |
CN106656500A (en) | Encryption device and method | |
CN107465508A (en) | A kind of method, system and the equipment of software and hardware combining construction true random number | |
CN107835070B (en) | Simple embedded encryption method | |
CN104871476B (en) | The method and apparatus for replacing box for that can calculate, large-scale, variable and safe | |
CN106059748B (en) | A kind of lightweight secure storage method of data regenerating code safely based on block |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170531 |