CN113078997A - 一种基于轻量级密码算法的终端保护方法 - Google Patents
一种基于轻量级密码算法的终端保护方法 Download PDFInfo
- Publication number
- CN113078997A CN113078997A CN202110316995.2A CN202110316995A CN113078997A CN 113078997 A CN113078997 A CN 113078997A CN 202110316995 A CN202110316995 A CN 202110316995A CN 113078997 A CN113078997 A CN 113078997A
- Authority
- CN
- China
- Prior art keywords
- key
- algorithm
- terminal
- lightweight
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Algebra (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Hardware Design (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
Description
I | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 |
P(i) | 0 | 8 | 16 | 24 | 1 | 9 | 17 | 25 | 2 | 10 | 18 | 26 | 3 | 11 | 19 | 27 |
i | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 |
P(i) | 4 | 12 | 20 | 28 | 5 | 13 | 21 | 29 | 6 | 14 | 22 | 30 | 7 | 15 | 23 | 31 |
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110316995.2A CN113078997B (zh) | 2021-03-24 | 2021-03-24 | 一种基于轻量级密码算法的终端保护方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110316995.2A CN113078997B (zh) | 2021-03-24 | 2021-03-24 | 一种基于轻量级密码算法的终端保护方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113078997A true CN113078997A (zh) | 2021-07-06 |
CN113078997B CN113078997B (zh) | 2022-09-20 |
Family
ID=76611693
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110316995.2A Active CN113078997B (zh) | 2021-03-24 | 2021-03-24 | 一种基于轻量级密码算法的终端保护方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113078997B (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114143051A (zh) * | 2021-11-19 | 2022-03-04 | 江苏林洋能源股份有限公司 | 一种智能电表基于性能调整tls协议选择的方法 |
CN116108471A (zh) * | 2023-04-07 | 2023-05-12 | 江阴市华明电力发展集团有限公司 | 一种综合售电平台的数据加密方法 |
CN116192389A (zh) * | 2023-04-26 | 2023-05-30 | 杭州海康威视数字技术股份有限公司 | 轻量级设备通信密钥协商方法、装置、设备及系统 |
CN117155546A (zh) * | 2023-10-27 | 2023-12-01 | 苏州元脑智能科技有限公司 | 分组密码类立方攻击的搜索方法、装置、电子设备及介质 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080130895A1 (en) * | 2006-10-25 | 2008-06-05 | Spyrus, Inc. | Method and System for Deploying Advanced Cryptographic Algorithms |
US20080232597A1 (en) * | 2007-03-20 | 2008-09-25 | Michael De Mare | Iterative symmetric key ciphers with keyed s-boxes using modular exponentiation |
CN105391546A (zh) * | 2015-12-16 | 2016-03-09 | 南京航空航天大学 | 基于双伪随机变换和Feistel结构的轻量级分组密码技术VHF |
CN105763316A (zh) * | 2016-02-01 | 2016-07-13 | 苏州中科启慧软件技术有限公司 | 基于分组密码vhf和ctr模式的轻量级流密码技术cvhf |
CN110505050A (zh) * | 2019-08-27 | 2019-11-26 | 北京电子科技学院 | 一种基于国密算法的安卓信息加密系统及方法 |
CN111314054A (zh) * | 2020-01-21 | 2020-06-19 | 衡阳师范学院 | 一种新型高安全的轻量级eceg分组密码实现方法、系统及存储介质 |
CN111431697A (zh) * | 2020-03-31 | 2020-07-17 | 衡阳师范学院 | 一种新型轻量级分组密码corl的实现方法 |
-
2021
- 2021-03-24 CN CN202110316995.2A patent/CN113078997B/zh active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080130895A1 (en) * | 2006-10-25 | 2008-06-05 | Spyrus, Inc. | Method and System for Deploying Advanced Cryptographic Algorithms |
US20080232597A1 (en) * | 2007-03-20 | 2008-09-25 | Michael De Mare | Iterative symmetric key ciphers with keyed s-boxes using modular exponentiation |
CN105391546A (zh) * | 2015-12-16 | 2016-03-09 | 南京航空航天大学 | 基于双伪随机变换和Feistel结构的轻量级分组密码技术VHF |
CN105763316A (zh) * | 2016-02-01 | 2016-07-13 | 苏州中科启慧软件技术有限公司 | 基于分组密码vhf和ctr模式的轻量级流密码技术cvhf |
CN110505050A (zh) * | 2019-08-27 | 2019-11-26 | 北京电子科技学院 | 一种基于国密算法的安卓信息加密系统及方法 |
CN111314054A (zh) * | 2020-01-21 | 2020-06-19 | 衡阳师范学院 | 一种新型高安全的轻量级eceg分组密码实现方法、系统及存储介质 |
CN111431697A (zh) * | 2020-03-31 | 2020-07-17 | 衡阳师范学院 | 一种新型轻量级分组密码corl的实现方法 |
Non-Patent Citations (1)
Title |
---|
XIANGXIN CHENG等: "《2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)》", 31 December 2020 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114143051A (zh) * | 2021-11-19 | 2022-03-04 | 江苏林洋能源股份有限公司 | 一种智能电表基于性能调整tls协议选择的方法 |
CN114143051B (zh) * | 2021-11-19 | 2024-02-23 | 江苏林洋能源股份有限公司 | 一种智能电表基于性能调整tls协议选择的方法 |
CN116108471A (zh) * | 2023-04-07 | 2023-05-12 | 江阴市华明电力发展集团有限公司 | 一种综合售电平台的数据加密方法 |
CN116108471B (zh) * | 2023-04-07 | 2023-06-13 | 江阴市华明电力发展集团有限公司 | 一种综合售电平台的数据加密方法 |
CN116192389A (zh) * | 2023-04-26 | 2023-05-30 | 杭州海康威视数字技术股份有限公司 | 轻量级设备通信密钥协商方法、装置、设备及系统 |
CN117155546A (zh) * | 2023-10-27 | 2023-12-01 | 苏州元脑智能科技有限公司 | 分组密码类立方攻击的搜索方法、装置、电子设备及介质 |
CN117155546B (zh) * | 2023-10-27 | 2024-02-09 | 苏州元脑智能科技有限公司 | 分组密码类立方攻击的搜索方法、装置、电子设备及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN113078997B (zh) | 2022-09-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113078997B (zh) | 一种基于轻量级密码算法的终端保护方法 | |
Noura et al. | A new efficient lightweight and secure image cipher scheme | |
Orobosade et al. | Cloud application security using hybrid encryption | |
CN102025505A (zh) | 一种基于aes算法的加密、解密方法及装置 | |
CN114364062B (zh) | 一种车联网安全接入网关的方法 | |
WO2013056502A1 (zh) | 一种智能家庭系统的分级混合加密方法及装置 | |
Noura et al. | A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach | |
CN102946315B (zh) | 一种采用分组方式构造mac码的方法及系统 | |
Widiasari | Combining advanced encryption standard (AES) and one time pad (OTP) encryption for data security | |
Noura et al. | Lesca: Lightweight stream cipher algorithm for emerging systems | |
Melki et al. | Message authentication algorithm for OFDM communication systems | |
Srivastava et al. | Review on quantum safe algorithms based on Symmetric Key and Asymmetric Key Encryption methods | |
Abujoodeh et al. | Toward lightweight cryptography: A survey | |
Santhanalakshmi et al. | Enhanced AES-256 cipher round algorithm for IoT applications | |
Noura et al. | Efficient and secure message authentication algorithm at the physical layer | |
CN116980194A (zh) | 一种基于云边端协同的安全高效数据传输方法及其系统 | |
Mateescu et al. | A hybrid approach of system security for small and medium enterprises: Combining different cryptography techniques | |
AbuJoodeh | Exploring and Adapting AES Algorithm for Optimal Use as a Lightweight IoT Crypto Algorithm | |
Gaur et al. | A comparative study and analysis of cryptographic algorithms: RSA, DES, AES, BLOWFISH, 3-DES, and TWOFISH | |
Al-Mashhadi et al. | Secure and time efficient hash-based message authentication algorithm for wireless sensor networks | |
CN112367159B (zh) | 一种面向医疗数据安全存储的混合加、解密方法及系统 | |
Goyal et al. | A Cryptographic Approach for Securing IoT Devices | |
Tiwari et al. | A review on conventional and lightweight security techniques in mobile and IoT devices | |
Muthavhine et al. | An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices | |
Arora et al. | Handling Secret Key Compromise by Deriving Multiple Asymmetric Keys based on Diffie-Hellman Algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Wu Kehe Inventor after: Wang Haomin Inventor after: Han Jiajia Inventor after: Sun Xin Inventor after: Li Qinyuan Inventor after: Shao Zhipeng Inventor after: Li Nige Inventor after: Gao Xue Inventor after: Yang Chengchun Inventor after: Xiao Zhuo Inventor after: Zhao Tong Inventor after: Cheng Xiangxin Inventor after: Li Wei Inventor after: Jiang Yuan Inventor after: Fan Qi Inventor before: Wu Kehe Inventor before: Wang Haomin Inventor before: Han Jiajia Inventor before: Sun Xin Inventor before: Li Qinyuan Inventor before: Shao Zhipeng Inventor before: Li Nige Inventor before: Yang Chengchun Inventor before: Gao Xue Inventor before: Xiao Zhuo Inventor before: Zhao Tong Inventor before: Cheng Xiangxin Inventor before: Li Wei Inventor before: Jiang Yuan Inventor before: Fan Qi |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |