CN106788971A - A kind of sub-key generation method based on stream cipher arithmetic - Google Patents

A kind of sub-key generation method based on stream cipher arithmetic Download PDF

Info

Publication number
CN106788971A
CN106788971A CN201611156487.8A CN201611156487A CN106788971A CN 106788971 A CN106788971 A CN 106788971A CN 201611156487 A CN201611156487 A CN 201611156487A CN 106788971 A CN106788971 A CN 106788971A
Authority
CN
China
Prior art keywords
sub
key
stream cipher
cipher arithmetic
present
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611156487.8A
Other languages
Chinese (zh)
Inventor
罗宜元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Dianji University
Original Assignee
Shanghai Dianji University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Dianji University filed Critical Shanghai Dianji University
Priority to CN201611156487.8A priority Critical patent/CN106788971A/en
Publication of CN106788971A publication Critical patent/CN106788971A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of sub-key generation method based on stream cipher arithmetic, it is characterised in that comprise the following steps:According to specific block encryption algorithm, confirm encryption round number r, and generate master key K and initialization vector IV, initialization vector IV is identical with the bit number of master key K, master key K and initialization vector IV are loaded into the internal register of stream cipher arithmetic, operation stream cipher arithmetic r times, so as to obtain r sub-key, r sub-key is participated in the calculating process of r wheel round functions of block encryption algorithm respectively.The security that the sub- password that the method provided using the present invention is generated carries out block encryption is very high, and the present invention is very high for security requirement, and is not that critically important application scenarios are very applicable for efficiency.

Description

A kind of sub-key generation method based on stream cipher arithmetic
Technical field
The present invention relates to a kind of generation method for being grouped the sub-key of enciphering and deciphering algorithm.
Background technology
With the development of information technology, the problem of Information Security but more and more looms large, it is ensured that the one of information security Individual important technology is exactly cryptography.Cryptography plays the role on basis in information security technology, is that attacker is most difficult to break through Module.And block cipher is the most frequently used algorithm in cryptography, is the main force in information security, commonly referred to information security In post horse.Design and research of the academic circles at present to block cipher are quite ripe, have many new encryptions to calculate every year Method is released.Due to the raising of hardware speed and incrementally increasing for calculator memory, it has been found that traditional AES can band Carry out increasing problem, therefore, the focus that the design to the block cipher of high security has been paid close attention into academia.
Block cipher is the basic algorithm in cryptography, and it is the basis of many upper layer information security protocols.Block cipher Design include two aspects, component is the basic round function of design, and another component is the basic key schedule of design Algorithm.So-called cipher key schedule algorithm is the sub-keys much taken turns based on a master key generation, and is all made per respective loops In round function.For a security for block cipher, the security of sub-key generating algorithm is particularly important.At present The best attack of various pop block ciphers for occurring, such as the attack to AES and IDEA algorithms is all using the life of its key The attack carried out into algorithm weaknesses.
Existing block encryption algorithm is all the close of fairly simple, common advanced encryption algorithm AES due to key generation Key generating algorithm is only replaced using simple shift register plus simple S boxes, can not reach the security of stream cipher.
The content of the invention
The technical problem to be solved in the present invention is:Improve the security of block encryption algorithm.
In order to solve the above-mentioned technical problem, the technical scheme is that there is provided a kind of sub close based on stream cipher arithmetic Key generation method, it is characterised in that comprise the following steps:
According to specific block encryption algorithm, encryption round number r is confirmed, and generate master key K and initialization vector IV, initially Change vector IV identical with the bit number of master key K, the inside that master key K and initialization vector IV are loaded into stream cipher arithmetic is posted Storage, operation stream cipher arithmetic r times, so as to obtain r sub-key, r sub-key participates in the r wheels of block encryption algorithm respectively In the calculating process of round function.
It is concentrated mainly on its key stream generator for the safety analysis of stream cipher arithmetic at present, and current design is good Good stream cipher can be seen as being a PRNG that such as Salsa20 stream cipher arithmetics are not looked for also currently To the method less than exhaustive attack, it is possible to assuming that the key stream generator of the stream cipher arithmetic of safety is unidirectional and pseudorandom 's.So, each respective loops for being generated using master key just can be regarded as independent of one another and random, and this is more any than current The sub-key dispatching method of block encryption algorithm is all safer, because the security of the sub-key of the method for the present invention is to set up In the unidirectional reliability of stream cipher generator, and other block ciphers are then without this security feature.
To sum up analyze, the security that the sub- password that the method provided using the present invention is generated carries out block encryption is very high, The present invention is very high for security requirement, and is not that critically important application scenarios are very applicable for efficiency.
Brief description of the drawings
A kind of flow chart of sub-key generation method based on stream cipher arithmetic that Fig. 1 is provided for the present invention.
Specific embodiment
With reference to specific embodiment, the present invention is expanded on further.It should be understood that these embodiments are merely to illustrate the present invention Rather than limitation the scope of the present invention.In addition, it is to be understood that after the content for having read instruction of the present invention, people in the art Member can make various changes or modifications to the present invention, and these equivalent form of values equally fall within the application appended claims and limited Scope.
With reference to Fig. 1, if block encryption algorithm uses AES-128, then for the block encryption algorithm, the one of present invention offer The sub-key generation method based on stream cipher arithmetic is planted to comprise the following steps:
AES-128 needs the sub- password of 11 wheels.Then generate the initialization vector IV and 128 bits of 128 bit The master key K of AES-128.The master key K loadings of the initialization vector IV of 128 bits and the AES-128 of 128 bits are become a mandarin close In the internal register of code algorithm (stream cipher arithmetic can use popular stream cipher arithmetic, such as RC4, Salsa20).Then Run the stream cipher arithmetic 11 times, obtain 11 sub- passwords, every sub- password is 128 bits.The specific generation step of sub- password For:The key stream of 11*128=1408 bits is first generated, then the key stream is divided into 11 sub-keys, each sub-key is 128 Bit.Then in the calculating process of the round function that every individual sub- password participates in block encryption algorithm respective wheel number.Block encryption is calculated Method carries out a series of computings using 11 sub-keys with corresponding round function, and its process is:
The clear packets of given 128 bits, are carried out using the round function and corresponding sub-key of AES-128 AESs Conversion.1st takes turns the input value for using the 1st sub-key and round function to block cipher, and also referred to as state enters line translation, the 2nd wheel Enter line translation to internal state using the 2nd sub-key and round function, by that analogy, until 11th round uses the 11st sub-key Conversion is updated to state with round function, ciphertext is finally given.
The present invention has redesigned a kind of sub-key generation method of block encryption algorithm, and the generation of this sub-key is to be based on Stream cipher is generated.The security of the sub-key generation method depends on the one-way security of stream cipher.If stream cipher is generated Algorithm is one-way safety, then this sub-key generating algorithm is also safe.

Claims (1)

1. a kind of sub-key generation method based on stream cipher arithmetic, it is characterised in that comprise the following steps:
According to specific block encryption algorithm, confirm encryption round number r, and generate master key K and initialization vector IV, initialize to IV is identical with the bit number of master key K for amount, and master key K and initialization vector IV are loaded into the inside deposit of stream cipher arithmetic Device, operation stream cipher arithmetic r times, so as to obtain r sub-key, r sub-key participates in the r wheel wheels of block encryption algorithm respectively In the calculating process of function.
CN201611156487.8A 2016-12-14 2016-12-14 A kind of sub-key generation method based on stream cipher arithmetic Pending CN106788971A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611156487.8A CN106788971A (en) 2016-12-14 2016-12-14 A kind of sub-key generation method based on stream cipher arithmetic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611156487.8A CN106788971A (en) 2016-12-14 2016-12-14 A kind of sub-key generation method based on stream cipher arithmetic

Publications (1)

Publication Number Publication Date
CN106788971A true CN106788971A (en) 2017-05-31

Family

ID=58888909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611156487.8A Pending CN106788971A (en) 2016-12-14 2016-12-14 A kind of sub-key generation method based on stream cipher arithmetic

Country Status (1)

Country Link
CN (1) CN106788971A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231719A (en) * 2019-07-15 2021-01-15 美光科技公司 Cryptographic key management
CN112865960A (en) * 2020-12-31 2021-05-28 广州万协通信息技术有限公司 System, method and device for realizing high-speed key chain pre-calculation based on stream cipher

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1993922A (en) * 2004-07-30 2007-07-04 英特尔公司 Stream cipher combining system and method
CN101782956A (en) * 2010-02-09 2010-07-21 杭州晟元芯片技术有限公司 Method and device for protecting data on basis of AES real-time encryption
CN103166753A (en) * 2013-03-26 2013-06-19 桂林电子科技大学 Method for encrypting four non-linear driven light-weight stream ciphers

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1993922A (en) * 2004-07-30 2007-07-04 英特尔公司 Stream cipher combining system and method
CN101782956A (en) * 2010-02-09 2010-07-21 杭州晟元芯片技术有限公司 Method and device for protecting data on basis of AES real-time encryption
CN103166753A (en) * 2013-03-26 2013-06-19 桂林电子科技大学 Method for encrypting four non-linear driven light-weight stream ciphers

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231719A (en) * 2019-07-15 2021-01-15 美光科技公司 Cryptographic key management
CN112865960A (en) * 2020-12-31 2021-05-28 广州万协通信息技术有限公司 System, method and device for realizing high-speed key chain pre-calculation based on stream cipher
CN112865960B (en) * 2020-12-31 2022-09-09 广州万协通信息技术有限公司 System, method and device for realizing high-speed key chain pre-calculation based on stream cipher

Similar Documents

Publication Publication Date Title
CN1993922B (en) Stream cipher combining system and method
CN107637010A (en) Data encryption device and method and data deciphering device and method
CN103634102B (en) A kind of means of defence of side-channel attack and fault attacks
CN104486073A (en) Encryption and decryption method of character data
CN103019648A (en) True random number generator with digital post-processing circuit
CN105100115A (en) Data storage method for privacy protection based on encryption password and data fractionation
CN103051446B (en) A kind of key encrypting and storing method
CN108476132A (en) Key for an encrypting operation sequence generates
CN105007154B (en) A kind of encrypting and decrypting device based on aes algorithm
CN107659398A (en) Suitable for Android symmetric encryption method
CN104602015A (en) Real-time video monitoring encryption and authentication method
CN104065473A (en) Compact realization method of SM4 block cipher algorithm S box
CN107257279A (en) A kind of clear data encryption method and equipment
CN107864033A (en) A kind of symmetrical full homomorphic cryptography method of bootstrap type
CN103746805B (en) The generation method and system of external authentication key
CN106788963A (en) A kind of full homomorphic cryptography method of identity-based on improved lattice
CN106788971A (en) A kind of sub-key generation method based on stream cipher arithmetic
CN105933101A (en) Fully homomorphic encryption public key compression method based on parameter high power offset
CN104219045B (en) RC4 stream cipher generators
Murtaza et al. Parallelized key expansion algorithm for advanced encryption standard
CN106656500A (en) Encryption device and method
CN107465508A (en) A kind of method, system and the equipment of software and hardware combining construction true random number
CN107835070B (en) Simple embedded encryption method
CN104871476B (en) The method and apparatus for replacing box for that can calculate, large-scale, variable and safe
CN106059748B (en) A kind of lightweight secure storage method of data regenerating code safely based on block

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170531