CN108933653A - A kind of AES encrypting and deciphering system and method based on large-scale data - Google Patents
A kind of AES encrypting and deciphering system and method based on large-scale data Download PDFInfo
- Publication number
- CN108933653A CN108933653A CN201810685351.9A CN201810685351A CN108933653A CN 108933653 A CN108933653 A CN 108933653A CN 201810685351 A CN201810685351 A CN 201810685351A CN 108933653 A CN108933653 A CN 108933653A
- Authority
- CN
- China
- Prior art keywords
- module
- round
- data
- expanded keys
- register
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The present invention relates to data encrypting and deciphering technical fields, provide a kind of AES encrypting and deciphering system and method based on large-scale data, and system includes encrypting module, deciphering module and expanded keys memory module;Expanded keys memory module, for storing 10 expanded keys required for 10 pre-generated wheel iteration;Encrypting module obtains the expanded keys of corresponding iteration round from expanded keys memory module, is iterated encryption to the plaintext of input, generates ciphertext;Deciphering module obtains the expanded keys of corresponding iteration round from expanded keys memory module, decryption is iterated to the ciphertext of input, it generates in plain text, cipher key expansion module is independently arranged to realize, shorten the cipher key spreading period, the depth for also shortening encryption and decryption assembly line simultaneously, improves the encryption and decryption efficiency of aes algorithm.
Description
Technical field
The invention belongs to data encrypting and deciphering technical field more particularly to a kind of AES encryption and decryption systems based on large-scale data
System and method.
Background technique
AES Advanced Encryption Standard is by American National Standards in 2000 and technical research institute by open collection comparation and assessment and authorization
After propose.The features such as algorithm is because of high efficiency, low overhead, can both applied in high-level by software realization, can also led to
Hardware realization is crossed, transmission level is acted on.The encryption rate and safety of data can be improved by hardware realization.Aes algorithm
Using 128 bit packet lengths, according to key length difference --- the key of 128/192 or 256 bit lengths is added
Close round is respectively 10 wheels, 12 wheels and 14 wheels.It selects the clear packets of 128 bits and key is encryption and decryption in three kinds of groupings
Fastest, the present invention mainly discusses 128 bit groupings situations.
AES encryption process includes initial key addition (AddRoundKey), then carries out 10 wheel iteration, wherein preceding 9 wheel changes
It include that byte replaces (Substitute Bytes), row displacement (Shift Rows), column mixing for identical, in each round
(Mixcolumns) (AddRoundKey) is added with the round key after each round extension.Last wheel is then mixed without column, other
Three constant.AES decrypting process is equally 10 wheels, and is the inverse transformation of ciphering process, and the transformation in corresponding each round is all
It is the inverse operation of encryption.
Currently, be often divided into encrypting module and deciphering module when aes algorithm encryption and decryption is realized, in encrypting module and
A cipher key expansion module is all individually integrated in deciphering module, and when needing to encrypt in plain text, initial key and plaintext are input to
In AES encryption module, cipher key expansion module obtains 10 wheel code keys after the extension of 10 round key, then to adding in plain text
It is close, ciphertext is exported after encryption;Similarly, AES deciphering module carries out cipher key spreading after receiving initialization key first, then to ciphertext
It is decrypted, finally output is in plain text.It is mostly displacement behaviour in algorithm due to the feedback mechanism that do not have of AES canonical algorithm itself
Work and xor operation are suitable for the pipeline design, and now with the increasing of data volume, encrypting and decrypting speed often becomes in system
Rate limit.So flowing water realization all is carried out during ciphering process and decryption when FPGA is allowed using resource,
Improve the efficiency of algorithm for encryption decryption.
To realize pipeline mode, it is generally divided into external flowing water, that is, 10 wheels encrypted, since FPGA limitation and combination are patrolled
Limitation is collected, flowing water design can carried out inside flowing water outside every level-one, to expand as 20 grades, 30 grades, 40 grades of isotypes.It is existing
Multiple first registers are added in common assembly line single-wheel iteration structure realizes that flowing water, this running water mode are also referred to as mixed
Pipeline mode is closed, is had following defects that
(1) all include cipher key expansion module in encrypting module and deciphering module, be the waste to FPGA resource;
(2) flowing water in AES encryption/decryption module is realized, this hybrid flow ray mode is mostly used at present, although first posts
Storage is more, and flowing water speed is fast, but corresponding first register expense is excessive, will cause the rising to design complexities, and
And a large amount of occupancy will do it to the resource of FPGA;
(3) there are many first registers before and after cipher key spreading, cause round key expanded period excessive, when data latency is handled
Between it is long;
(3) when data are discontinuous, since flowing water depth is too long, it be easy to cause efficiency to reduce instead.
Summary of the invention
The purpose of the present invention is to provide one kind can reduce FPGA using resource and reduce pipeline depth based on
The AES encrypting and deciphering system of large-scale data.
The invention is realized in this way a kind of AES encrypting and deciphering system based on large-scale data, including encrypting module, solution
Close module and expanded keys memory module;
The expanded keys memory module, for storing 10 expanded keys required for 10 pre-generated wheel iteration;
The encrypting module is connect with the expanded keys memory module, for from the expanded keys memory module
The expanded keys for obtaining corresponding iteration round are iterated encryption, generation ciphertext to the plaintext of input, wherein each plus
One corresponding the first register for being used to latch processing data is set in the iteration round of close process;
The deciphering module is connect with the expanded keys memory module, for from the expanded keys memory module
The expanded keys for obtaining corresponding iteration round are iterated decryption to the ciphertext of input, generate in plain text, wherein in each solution
One corresponding the second register for being used to latch processing data is set in the iteration round of close process.
As an improvement scheme, the system also includes:
Expanded keys generation module is connect with the expanded keys memory module, for receiving the first of 128 bits
After beginning key, carry out the single-wheel iteration in 10 periods, obtain 10 expanded keys, and 10 expanded keys will acquire and
Corresponding iteration round is stored in the expanded keys memory module.
As an improvement scheme, the encrypting module specifically include first round iterative cryptographic module to the tenth wheel iteration
Encrypting module, wherein the structure of first round iterative cryptographic module to the 9th wheel iterative cryptographic module is identical, each wheel iteration adds
First register is provided in close module.
As an improvement scheme, the first round iterative cryptographic module to the 9th wheel iterative cryptographic module include word
Section replacement module, row displacement module, column mixing module, encryption data processing module and the first register;
The byte substitution module is connect with the row displacement module, and the row displacement module and the column mixing module connect
It connects, the column mixing module is connect with the encryption data processing module, and the encryption data processing module is respectively with described
One register is connected with the expanded keys memory module;
The encryption data processing module, the extension for obtaining affiliated round from the expanded keys memory module are close
Key is iterated encryption to the data of upper iteration round input, and the data after iterative cryptographic is latched in described first and are posted
In storage.
As an improvement scheme, it is described tenth wheel iterative cryptographic module include byte substitution module, row displacement module,
Encryption data processing module and the first register;
The byte substitution module is connect with the row displacement module, and the row displacement module and the encryption data are handled
Module connection, the encryption data processing module are connect with first register and the expanded keys memory module respectively;
The encryption data processing module, the extension for obtaining the tenth round from the expanded keys memory module are close
Key is iterated encryption to the data of the 9th wheel iteration round input, and the data after iterative cryptographic is latched in described first
In register, the data of the first register output are encrypted ciphertext.
As an improvement scheme, the deciphering module specifically include first round iteration decryption module to the tenth wheel iteration
Deciphering module, wherein the structure of first round iteration decryption module to the 9th wheel iteration decryption module is identical, each wheel iterative solution
First register is provided in close module.
As an improvement scheme, the first round iteration decryption module to the 9th wheel iteration decryption module include inverse
Row shift module, inverse byte substitution module, ciphertext data processing module, inverse column mixing module and the second register;
The Retrograde transposition module is connect with the inverse byte substitution module, the inverse byte substitution module and the decryption
Data processing module connection, the ciphertext data processing module store mould with second register and the expanded keys respectively
Block connection, the inverse column mixing module are connect with the register;
The ciphertext data processing module, the extension for obtaining affiliated round from the expanded keys memory module are close
Key is iterated decryption to the data of upper iteration round input, and the data after iteration decryption is latched in described second and are posted
In storage.
As an improvement scheme, the tenth wheel iteration decryption module includes Retrograde transposition module, inverse byte substitution
Module, ciphertext data processing module and the second register;
The Retrograde transposition module is connect with the inverse byte substitution module, the inverse byte substitution module and the decryption
Data processing module connection, the ciphertext data processing module are connect with second register respectively;
The ciphertext data processing module, the extension for obtaining the tenth round from the expanded keys memory module are close
Key is iterated decryption to the data of the 9th wheel iteration round input, and the data after iteration decryption is latched in described second
In register, the data of the second register output are the clear data after decryption.
Another object of the present invention is to provide a kind of AES encryption method based on large-scale data, the method includes
Following step:
In encrypting module, when the first round, iterative cryptographic module received the clear data of input, deposited from expanded keys
The expanded keys of the first round are obtained in storage module;
According to the expanded keys of the affiliated round got, encryption is iterated to the clear data of input, and by iteration
Encrypted data are latched in the first register in the first round iterative cryptographic module;
After the completion of the operation of the first round iterative cryptographic, the expansion of affiliated round is successively obtained from expanded keys memory module
Key is opened up, and according to the expanded keys of the affiliated round got, the processing number exported to the first register from last round of time
According to carrying out successively iterative cryptographic, and the data after successively iterative cryptographic are latched in the tenth wheel iterative cryptographic module
In one register, the data in the first register in the tenth wheel iterative cryptographic module are ciphertext data.
The AES decryption method based on large-scale data that another object of the present invention is to provide a kind of, the method includes
Following step:
In deciphering module, when first round iteration decryption module receives the ciphertext data of input, deposited from expanded keys
The expanded keys of the first round are obtained in storage module;
According to the expanded keys of the first round got, decryption is iterated to the ciphertext data of input, and by iteration
Data after decryption are latched in the second register in the first round iteration decryption module;
After the completion of the operation of the first round iteration decryption, the expansion of affiliated round is successively obtained from expanded keys memory module
Key is opened up, and according to the expanded keys of the affiliated round got, the processing number exported to the second register from last round of time
According to carry out successively iterative operation it is complete after it is close, and by successively iterative operation it is complete after it is close after data be latched in it is described tenth wheel iteration behaviour
Finish in the second register in rear close module, the number in the second register after the tenth wheel iterative operation is complete in close module
According to as clear data.
In embodiments of the present invention, the AES encrypting and deciphering system based on large-scale data include encrypting module, deciphering module with
And expanded keys memory module;Expanded keys memory module, for storing 10 expansions required for 10 pre-generated wheel iteration
Open up key;Encrypting module obtains the expanded keys of corresponding iteration round from expanded keys memory module, to the plaintext of input into
Row iteration encryption, generates ciphertext;Deciphering module obtains the expanded keys of corresponding iteration round from expanded keys memory module, right
The ciphertext of input is iterated decryption, generates in plain text, is independently arranged to realize to cipher key expansion module, shortens cipher key spreading
Period, while also shortening the depth of encryption and decryption assembly line, improve the encryption and decryption efficiency of aes algorithm.
Detailed description of the invention
Fig. 1 is the structural block diagram of the AES encrypting and deciphering system provided by the invention based on large-scale data;
Fig. 2 is the implementation flow chart of the AES encryption method provided by the invention based on large-scale data;
Fig. 3 is the implementation flow chart of the AES decryption method provided by the invention based on large-scale data.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Fig. 1 shows the structural block diagram of the AES encrypting and deciphering system provided by the invention based on large-scale data, for the ease of
Illustrate, part related to the embodiment of the present invention is only gived in figure.
AES encrypting and deciphering system based on large-scale data includes encrypting module, deciphering module and expanded keys storage mould
Block;
The expanded keys memory module, for storing 10 expanded keys required for 10 pre-generated wheel iteration;
The encrypting module is connect with the expanded keys memory module, for from the expanded keys memory module
The expanded keys for obtaining corresponding iteration round are iterated encryption, generation ciphertext to the plaintext of input, wherein each plus
One corresponding the first register for being used to latch processing data is set in the iteration round of close process;
The deciphering module is connect with the expanded keys memory module, for from the expanded keys memory module
The expanded keys for obtaining corresponding iteration round are iterated decryption to the ciphertext of input, generate in plain text, wherein in each solution
One corresponding the second register for being used to latch processing data is set in the iteration round of close process.
Wherein, the expanded keys memory module is independently arranged in the AES encrypting and deciphering system at this based on large-scale data, it will
An expanded keys Implement of Function Module shared as an encrypting module and deciphering module, reduce system resource occupancy and
Waste also shortens the cipher key spreading period;
Meanwhile in the iteration round of each encryption and decryption, it is respectively provided with the register for latch data, with existing skill
Several registers are arranged in art to compare, shorten pipeline depth, while also solve as pipeline depth it is excessive caused by
The problem of serial process overlong time.
In embodiments of the present invention, it is somebody's turn to do the AES encrypting and deciphering system based on large-scale data further include:
Expanded keys generation module is connect with the expanded keys memory module, for receiving the first of 128 bits
After beginning key, carry out the single-wheel iteration in 10 periods, obtain 10 expanded keys, and 10 expanded keys will acquire and
Corresponding iteration round is stored in the expanded keys memory module;
One extension is run by the expanded keys generation module, encrypting module and deciphering module pair can be met simultaneously
The needs of expanded keys reduce the occupancy of system resource.
In embodiments of the present invention, encrypting module specifically includes first round iterative cryptographic module to the tenth wheel iterative cryptographic mould
Block, wherein the structure of first round iterative cryptographic module to the 9th wheel iterative cryptographic module is identical, each wheel iterative cryptographic module
Inside it is provided with first register;
As shown in connection with fig. 1, first round iterative cryptographic module to the 9th wheel iterative cryptographic module include byte substitution module,
Row displacement module, column mixing module, encryption data processing module and the first register;
The byte substitution module is connect with the row displacement module, and the row displacement module and the column mixing module connect
It connects, the column mixing module is connect with the encryption data processing module, and the encryption data processing module is respectively with described
One register is connected with the expanded keys memory module;
The encryption data processing module, the extension for obtaining affiliated round from the expanded keys memory module are close
Key is iterated encryption to the data of upper iteration round input, and the data after iterative cryptographic is latched in described first and are posted
In storage.
As shown in connection with fig. 1, the tenth wheel iterative cryptographic module includes byte substitution module, row displacement module, at encryption data
Manage module and the first register;
The byte substitution module is connect with the row displacement module, and the row displacement module and the encryption data are handled
Module connection, the encryption data processing module are connect with first register and the expanded keys memory module respectively;
The encryption data processing module, the extension for obtaining the tenth round from the expanded keys memory module are close
Key is iterated encryption to the data of the 9th wheel iteration round input, and the data after iterative cryptographic is latched in described first
In register, the data of the first register output are encrypted ciphertext.
In this embodiment, the byte substitution module in above-mentioned each round iterative cryptographic module, row displacement module, column mixing
Module, the function of encryption data processing module are that routine techniques content realizes that details are not described herein.
In embodiments of the present invention, deciphering module specifically includes first round iteration decryption module to the tenth wheel iteration decryption mould
Block, wherein the structure of first round iteration decryption module to the 9th wheel iteration decryption module is identical, each wheel iteration decryption module
Inside it is provided with first register;
As shown in connection with fig. 1, first round iteration decryption module to the 9th wheel iteration decryption module include Retrograde transposition module,
Inverse byte substitution module, ciphertext data processing module, inverse column mixing module and the second register;
The Retrograde transposition module is connect with the inverse byte substitution module, the inverse byte substitution module and the decryption
Data processing module connection, the ciphertext data processing module store mould with second register and the expanded keys respectively
Block connection, the inverse column mixing module are connect with the register;
The ciphertext data processing module, the extension for obtaining affiliated round from the expanded keys memory module are close
Key is iterated decryption to the data of upper iteration round input, and the data after iteration decryption is latched in described second and are posted
In storage.
As shown in connection with fig. 1, the tenth wheel iteration decryption module includes Retrograde transposition module, inverse byte substitution module, decryption number
According to processing module and the second register;
The Retrograde transposition module is connect with the inverse byte substitution module, the inverse byte substitution module and the decryption
Data processing module connection, the ciphertext data processing module are connect with second register respectively;
The ciphertext data processing module, the extension for obtaining the tenth round from the expanded keys memory module are close
Key is iterated decryption to the data of the 9th wheel iteration round input, and the data after iteration decryption is latched in described second
In register, the data of the second register output are the clear data after decryption.
In this embodiment, the Retrograde transposition module in above-mentioned each round iteration decryption module, inverse byte substitution module, solution
Ciphertext data processing module, the function of inverse column mixing module are that routine techniques content realizes that details are not described herein.
In embodiments of the present invention, key expansion function is independent from Encrypt and Decrypt module, key expansion function utilizes
RAM or register record the round key that 10 wheels generate, and are stored in expanded keys memory module, and entire AES adds
Deciphering module receives the initial key of 128 bits at first, then after 10 clock cycle, generates 10 expanded keys,
One extension is run by expanded keys generation module, the needs of encrypting module and deciphering module can be met simultaneously, is reduced
FPGA resource occupies, and relative to traditional enciphering and deciphering algorithm method, data latency handles time shortening;
Meanwhile reducing pipeline depth and assembly line main body is reduced to 10 grades, only retain 1 deposit in single-wheel iteration structure
Device, byte substitution uses look-up table in single-wheel iteration, and row displacement and column, which are mixed, realizes that centre, which is not inserted into, posts using combinational logic
Storage reduces the depth of single-wheel iteration, is reduced to 1 clock;Due to that can be completed using 1 clock cycle of single-wheel iteration
One wheel encryption, to solve when data flow is discontinuous, as flowing water depth it is excessive caused by walk processing overlong time and ask
Topic, whole flowing water rank shorten to 10 grades, reduce complicated register architecture.
In order to make it easy to understand, following encryption and decryption for providing the AES encryption system based on shown in FIG. 1 based on large-scale data
The implementation process of algorithm, specifically:
Fig. 2 shows the implementation process of the AES encryption method provided in an embodiment of the present invention based on large-scale data, tools
Body includes the following steps:
In step s101, in encrypting module, when the first round, iterative cryptographic module received the clear data of input,
The expanded keys of the first round are obtained from expanded keys memory module.
In step s 102, according to the expanded keys of the affiliated round got, the clear data of input is iterated
Encryption, and the data after iterative cryptographic are latched in the first register in the first round iterative cryptographic module.
In step s 103, it after the completion of the operation of the first round iterative cryptographic, is successively obtained from expanded keys memory module
The expanded keys of round belonging to taking, and according to the expanded keys of the affiliated round got, to the first deposit from last round of time
The processing data of device output carry out successively iterative cryptographic, and the data after successively iterative cryptographic are latched in the tenth wheel iteration
In the first register in encrypting module, the data in the first register in the tenth wheel iterative cryptographic module are ciphertext
Data.
Certainly, in the realization that this method step can also include each details function module, details are not described herein.
Fig. 3 shows the realization stream of the AES decryption method based on large-scale data of invention embodiment offer
Journey, specifically include the following steps:
In step s 201, in deciphering module, when first round iteration decryption module receives the ciphertext data of input,
The expanded keys of the first round are obtained from expanded keys memory module.
In step S202, according to the expanded keys of the first round got, the ciphertext data of input are iterated
Decryption, and the data after iteration decryption are latched in the second register in the first round iteration decryption module.
In step S203, after the completion of the operation of the first round iteration decryption, successively obtained from expanded keys memory module
The expanded keys of round belonging to taking, and according to the expanded keys of the affiliated round got, to the second deposit from last round of time
Device output processing data carry out successively iterative operation it is complete after it is close, and by successively iterative operation it is complete after it is close after data be latched in institute
State the tenth wheel iterative operation it is complete after in the second register in close module, after the tenth wheel iterative operation is complete in close module the
Data in two registers are clear data.
Certainly, in the realization that this method step can also include each details function module, details are not described herein.
In embodiments of the present invention, the AES encrypting and deciphering system based on large-scale data include encrypting module, deciphering module with
And expanded keys memory module;Expanded keys memory module, for storing 10 expansions required for 10 pre-generated wheel iteration
Open up key;Encrypting module obtains the expanded keys of corresponding iteration round from expanded keys memory module, to the plaintext of input into
Row iteration encryption, generates ciphertext;Deciphering module obtains the expanded keys of corresponding iteration round from expanded keys memory module, right
The ciphertext of input is iterated decryption, generates in plain text, is independently arranged to realize to cipher key expansion module, shortens cipher key spreading
Period, while also shortening the depth of encryption and decryption assembly line, improve the encryption and decryption efficiency of aes algorithm.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of AES encrypting and deciphering system based on large-scale data, which is characterized in that including encrypting module, deciphering module and
Expanded keys memory module;
The expanded keys memory module, for storing 10 expanded keys required for 10 pre-generated wheel iteration;
The encrypting module is connect with the expanded keys memory module, for obtaining from the expanded keys memory module
The expanded keys of corresponding iteration round are iterated encryption to the plaintext of input, generate ciphertext, wherein encrypted at each
One corresponding the first register for being used to latch processing data is set in the iteration round of journey;
The deciphering module is connect with the expanded keys memory module, for obtaining from the expanded keys memory module
The expanded keys of corresponding iteration round are iterated decryption to the ciphertext of input, generate in plain text, wherein decrypted at each
One corresponding the second register for being used to latch processing data is set in the iteration round of journey.
2. the AES encrypting and deciphering system according to claim 1 based on large-scale data, which is characterized in that the system is also
Include:
Expanded keys generation module is connect with the expanded keys memory module, for receiving the initial close of 128 bits
10 expanded keys and correspondence for after key, carrying out the single-wheel iteration in 10 periods, obtaining 10 expanded keys, and will acquire
Iteration round be stored in the expanded keys memory module.
3. the AES encrypting and deciphering system according to claim 2 based on large-scale data, which is characterized in that the encryption mould
Block specifically includes first round iterative cryptographic module to the tenth wheel iterative cryptographic module, wherein first round iterative cryptographic module to the
The structure of nine wheel iterative cryptographic modules is identical, is provided with first register in each wheel iterative cryptographic module.
4. the AES encrypting and deciphering system according to claim 3 based on large-scale data, which is characterized in that the first round
Iterative cryptographic module to the 9th wheel iterative cryptographic module includes byte substitution module, row displacement module, column mixing module, encryption
Data processing module and the first register;
The byte substitution module is connect with the row displacement module, and the row displacement module is connect with the column mixing module,
The column mixing module is connect with the encryption data processing module, and the encryption data processing module is posted with described first respectively
Storage is connected with the expanded keys memory module;
The encryption data processing module, for obtaining the expanded keys of affiliated round from the expanded keys memory module,
Encryption is iterated to the data of upper iteration round input, and the data after iterative cryptographic are latched in first register
In.
5. the AES encrypting and deciphering system according to claim 4 based on large-scale data, which is characterized in that the tenth wheel
Iterative cryptographic module includes byte substitution module, row displacement module, encryption data processing module and the first register;
The byte substitution module is connect with the row displacement module, the row displacement module and the encryption data processing module
Connection, the encryption data processing module are connect with first register and the expanded keys memory module respectively;
The encryption data processing module, for obtaining the expanded keys of the tenth round from the expanded keys memory module,
Encryption is iterated to the data of the 9th wheel iteration round input, and the data after iterative cryptographic are latched in first deposit
In device, the data of the first register output are encrypted ciphertext.
6. the AES encrypting and deciphering system according to claim 5 based on large-scale data, which is characterized in that the decryption mould
Block specifically includes first round iteration decryption module to the tenth wheel iteration decryption module, wherein first round iteration decryption module to the
The structure of nine wheel iteration decryption modules is identical, is provided with first register in each wheel iteration decryption module.
7. the AES encrypting and deciphering system according to claim 6 based on large-scale data, which is characterized in that the first round
Iteration decryption module to the 9th wheel iteration decryption module includes Retrograde transposition module, inverse byte substitution module, at ciphertext data
Manage module, inverse column mixing module and the second register;
The Retrograde transposition module is connect with the inverse byte substitution module, the inverse byte substitution module and the ciphertext data
Processing module connection, the ciphertext data processing module connect with second register and the expanded keys memory module respectively
It connects, the inverse column mixing module is connect with the register;
The ciphertext data processing module, for obtaining the expanded keys of affiliated round from the expanded keys memory module,
Decryption is iterated to the data of upper iteration round input, and the data after iteration decryption are latched in second register
In.
8. the AES encrypting and deciphering system according to claim 7 based on large-scale data, which is characterized in that the tenth wheel
Iteration decryption module includes Retrograde transposition module, inverse byte substitution module, ciphertext data processing module and the second register;
The Retrograde transposition module is connect with the inverse byte substitution module, the inverse byte substitution module and the ciphertext data
Processing module connection, the ciphertext data processing module are connect with second register respectively;
The ciphertext data processing module, for obtaining the expanded keys of the tenth round from the expanded keys memory module,
Decryption is iterated to the data of the 9th wheel iteration round input, and the data after iteration decryption are latched in second deposit
In device, the data of the second register output are the clear data after decryption.
9. a kind of AES encryption method based on large-scale data, which is characterized in that the method includes the following steps:
In encrypting module, when the first round, iterative cryptographic module received the clear data of input, mould is stored from expanded keys
The expanded keys of the first round are obtained in block;
According to the expanded keys of the affiliated round got, encryption is iterated to the clear data of input, and by iterative cryptographic
Data afterwards are latched in the first register in the first round iterative cryptographic module;
After the completion of the operation of the first round iterative cryptographic, the extension that affiliated round is successively obtained from expanded keys memory module is close
Key, and according to the expanded keys of the affiliated round got, the processing data that the first register from last round of time is exported into
Capable successively iterative cryptographic, and first that the data after successively iterative cryptographic are latched in the tenth wheel iterative cryptographic module is posted
In storage, the data in the first register in the tenth wheel iterative cryptographic module are ciphertext data.
10. a kind of AES decryption method based on large-scale data, which is characterized in that the method includes the following steps:
In deciphering module, when first round iteration decryption module receives the ciphertext data of input, mould is stored from expanded keys
The expanded keys of the first round are obtained in block;
According to the expanded keys of the first round got, decryption is iterated to the ciphertext data of input, and by iteration decryption
Data afterwards are latched in the second register in the first round iteration decryption module;
After the completion of the operation of the first round iteration decryption, the extension that affiliated round is successively obtained from expanded keys memory module is close
Key, and according to the expanded keys of the affiliated round got, the processing data that the second register from last round of time is exported into
Row successively iterative operation it is complete after it is close, and by successively iterative operation it is complete after it is close after data be latched in it is described tenth wheel iterative operation it is complete
Afterwards in the second register in close module, the data in the second register after the tenth wheel iterative operation is complete in close module are
For clear data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810685351.9A CN108933653A (en) | 2018-06-28 | 2018-06-28 | A kind of AES encrypting and deciphering system and method based on large-scale data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810685351.9A CN108933653A (en) | 2018-06-28 | 2018-06-28 | A kind of AES encrypting and deciphering system and method based on large-scale data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108933653A true CN108933653A (en) | 2018-12-04 |
Family
ID=64446376
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810685351.9A Pending CN108933653A (en) | 2018-06-28 | 2018-06-28 | A kind of AES encrypting and deciphering system and method based on large-scale data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108933653A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109617670A (en) * | 2018-12-21 | 2019-04-12 | 成都海光集成电路设计有限公司 | A kind of encryption system and decryption system |
CN109617671A (en) * | 2018-12-21 | 2019-04-12 | 成都海光集成电路设计有限公司 | Encryption and decryption, extended method and device, encrypting and deciphering system, terminal |
CN109672520A (en) * | 2018-12-25 | 2019-04-23 | 广东浪潮大数据研究有限公司 | A kind of realization framework of aes algorithm |
CN112953890A (en) * | 2021-01-12 | 2021-06-11 | 国电南瑞南京控制系统有限公司 | Information encryption method and device for client side energy utilization control system |
CN116882945A (en) * | 2023-09-05 | 2023-10-13 | 圣奥科技股份有限公司 | Collaborative office method, equipment and medium based on office area station information |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101534190A (en) * | 2009-05-05 | 2009-09-16 | 成都市华为赛门铁克科技有限公司 | A multi-channel encryption/decryption method, device and system |
CN102035641A (en) * | 2009-09-24 | 2011-04-27 | 中兴通讯股份有限公司 | Device and method for implementing AES encryption and decryption |
CN102801519A (en) * | 2012-07-10 | 2012-11-28 | 记忆科技(深圳)有限公司 | Method and device for implementing AES (Advanced Encryption Standard) enciphering and deciphering |
-
2018
- 2018-06-28 CN CN201810685351.9A patent/CN108933653A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101534190A (en) * | 2009-05-05 | 2009-09-16 | 成都市华为赛门铁克科技有限公司 | A multi-channel encryption/decryption method, device and system |
CN102035641A (en) * | 2009-09-24 | 2011-04-27 | 中兴通讯股份有限公司 | Device and method for implementing AES encryption and decryption |
CN102801519A (en) * | 2012-07-10 | 2012-11-28 | 记忆科技(深圳)有限公司 | Method and device for implementing AES (Advanced Encryption Standard) enciphering and deciphering |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109617670A (en) * | 2018-12-21 | 2019-04-12 | 成都海光集成电路设计有限公司 | A kind of encryption system and decryption system |
CN109617671A (en) * | 2018-12-21 | 2019-04-12 | 成都海光集成电路设计有限公司 | Encryption and decryption, extended method and device, encrypting and deciphering system, terminal |
CN109617670B (en) * | 2018-12-21 | 2023-05-12 | 成都海光集成电路设计有限公司 | Encryption system and decryption system |
CN109672520A (en) * | 2018-12-25 | 2019-04-23 | 广东浪潮大数据研究有限公司 | A kind of realization framework of aes algorithm |
CN112953890A (en) * | 2021-01-12 | 2021-06-11 | 国电南瑞南京控制系统有限公司 | Information encryption method and device for client side energy utilization control system |
CN112953890B (en) * | 2021-01-12 | 2023-11-21 | 国电南瑞南京控制系统有限公司 | Information encryption method and device for client side energy consumption control system |
CN116882945A (en) * | 2023-09-05 | 2023-10-13 | 圣奥科技股份有限公司 | Collaborative office method, equipment and medium based on office area station information |
CN116882945B (en) * | 2023-09-05 | 2023-12-26 | 圣奥科技股份有限公司 | Collaborative office method, equipment and medium based on office area station information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108933653A (en) | A kind of AES encrypting and deciphering system and method based on large-scale data | |
CN107707343B (en) | SP network structure lightweight block cipher realization method with consistent encryption and decryption | |
CN103516512A (en) | Encryption and decryption method and encryption and decryption device based on AES (advanced encryption standard) algorithm | |
CN105049194A (en) | SM4 algorithm realization system of pipeline structure | |
CN104639314A (en) | Device based on AES (advanced encryption standard) encryption/decryption algorithm and pipelining control method | |
CN101702709B (en) | AES encryption unit for MIPS processor | |
CN107491317A (en) | A kind of symmetrical encryption and decryption method and systems of AES for accelerating platform based on isomery | |
CN100382485C (en) | Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system | |
CN109981249B (en) | Encryption and decryption method and device based on zipper type dynamic hash and NLFSR | |
CN104852798A (en) | Data encryption and decryption system and method thereof | |
CN107534558A (en) | For the method and data highway system of the information security for protecting the data via data bus transmission | |
CN107332657A (en) | A kind of encryption method and system based on block chain digital signature | |
CN108650076A (en) | The implementation method of AES encryption system hardware module based on Quantum Reversible Logic | |
CN103346878B (en) | A kind of secret communication method based on FPGA high-speed serial I/O | |
CN101729242A (en) | Method and device for generating symmetric block ciphers | |
CN114697095A (en) | Hybrid encryption and decryption method, system, device and medium | |
El-meligy et al. | 130nm Low power asynchronous AES core | |
CN110120867A (en) | A kind of implementation method of the AES hardware encryption system based on quantum reversible link | |
CN109150495A (en) | A kind of round transformation multiplex circuit and its AES decrypt circuit | |
Jothi et al. | Parallel RC4 Key Searching System Based on FPGA | |
CN107896149A (en) | 128 symmetric encryption methods based on three group operationes | |
Yao | Hybrid Encryption Scheme for Hospital Financial Data Based on Noekeon Algorithm | |
US20120321079A1 (en) | System and method for generating round keys | |
CN108134665A (en) | A kind of 8 bit A ES circuits applied towards IoT | |
CN114679252A (en) | Resource sharing method for MACsec AES algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181204 |
|
RJ01 | Rejection of invention patent application after publication |