CN114679252A - Resource sharing method for MACsec AES algorithm - Google Patents
Resource sharing method for MACsec AES algorithm Download PDFInfo
- Publication number
- CN114679252A CN114679252A CN202210299143.1A CN202210299143A CN114679252A CN 114679252 A CN114679252 A CN 114679252A CN 202210299143 A CN202210299143 A CN 202210299143A CN 114679252 A CN114679252 A CN 114679252A
- Authority
- CN
- China
- Prior art keywords
- macsec
- data
- aes
- value
- aes algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/125—Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a resource sharing method for a MACsec AES algorithm, wherein multiport data share a group of MACsec AES algorithm resources in a time division multiplexing mode, a design method of a pipeline is adopted, and a small part of buffer logic of an intermediate state is added at the same time, so that the sharing of the MACsec AES algorithm resources is realized, and a plurality of groups of MACsec AES algorithm resources are saved.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a resource sharing method for a MACsec AES algorithm.
Background
At present, when MACsec (MACsec is a main protocol for protecting the security of a local area network) data encryption (or decryption) is implemented at the MAC layer according to the 802.1AE protocol, the main steps of the data processing part are:
firstly, data which does not need to be encrypted and needs to be encrypted (or decrypted) in frame data are respectively divided into 128-bit fragments, 0 is supplemented to the data of the part which is less than 128 bits, and meanwhile, 128-bit fragment data (the higher 64 bits are the bit length of the unencrypted data, and the lower 64 bits are the bit length of the encrypted data) is added at the frame tail; then, the 128bit data fragment to be encrypted (or decrypted) is encrypted and decrypted by AES (Advanced Encryption Standard); and finally, performing data integrity processing on the processed data fragments, and calculating an ICV (integrity verification identifier) value by adopting an AES-GCM (Galois count mode advanced encryption Standard) algorithm processing unit.
In order to meet the requirement of time sequence design, 15 clock cycles are required to be delayed maximally when the AES encryption and decryption of one 128-bit sliced data is completed, in order to realize the full-bandwidth processing of the 128-bit sliced data, a pipeline processing method is required, 90 AES encryption and decryption processing units and 2 AES _ GCM algorithms (the encryption and decryption respectively occupy 50% of resources) are instantiated at the same time, and when the MACsec encryption and decryption processing is realized for n port _ ids, 90n AES encryption and decryption processing units and 2n AES _ GCM (Galois count mode advanced encryption Standard) algorithm resources are required.
The scheme has the defects that when MACsec encryption and decryption processing is carried out on multi-port _ id data which is input in serial, the utilization rate of AES algorithm resources (AES encryption and decryption processing and AES _ GCM processing) of the MACsec is low, and the waste of resources is large.
In order to solve the defects of the prior art, the invention provides a resource sharing method for the MACsec AES algorithm, multiport data share a group of MACsec AES algorithm resources in a time division multiplexing mode, a pipeline design method is adopted, and a small number of buffer logics in intermediate states are added at the same time, so that the sharing of the MACsec AES algorithm resources is realized, and a plurality of groups of the MACsec AES algorithm resources are saved.
Disclosure of Invention
In order to solve the defects in the prior art, the invention provides a resource sharing method for a MACsec AES algorithm.
In order to achieve the purpose, the invention adopts the following technical scheme.
In the embodiment of the invention, a resource sharing method for a MACsec AES algorithm is provided, which comprises the following steps:
the S1 MACsec AES Algorithm resource is mainly composed of CIPHkAnd GHASHHA computing unit;
s2 multi-port _ id data shares MACsec AES algorithm resources in a time division multiplexing mode, and a small amount of logic resources are added to cache the middle state data of each port _ id;
s3 sharing and using CIPH by using 128bit fragment data of each port _ id in a pipeline modekAnd 2 GHASHHComputing unit inLine encryption and decryption and integrity check.
Further, the AES basic computation unit CIPHkAs GCTRkThe main module realizes encryption and decryption of AES.
Further, the AES calculation unit GHASHHAnd performing AES _ GCM Galois Hash calculation to realize the integrity check of the data.
Further, caching the intermediate state data of each port _ id through a small amount of logic resources; the intermediate state data includes key information, IV vectors, PN values, integrity check intermediate values, and the like.
Further, the processing flow of sharing the computing resource by the 128-bit fragment data of each port _ id in the step S3 in a pipeline manner includes:
1) using AES basic computation Unit CIPHkCalculating an H value;
2) from the input IV vector, J is calculated0A value;
3) using GCTRkEncrypting or decrypting 128bit sliced data;
4) using GHASHHCalculating a GHASH value S;
5) according to J0And S, using GCTRkAnd calculating an ICV value, and intercepting an ICV high-order bit (tbit) value to be T, wherein the T value is used for integrity check.
The method has the advantages that the method for sharing the resources of the MACsec AES algorithm is provided aiming at the problems in the existing communication system, multiport data share a group of resources of the MACsec AES algorithm in a time division multiplexing mode, a pipeline design method is adopted, and a small part of buffer logic in intermediate states is added at the same time, so that the sharing of the resources of the MACsec AES algorithm is realized, and a plurality of groups of resources of the MACsec AES algorithm are saved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
FIG. 1 is a schematic flow chart of the present invention;
FIG. 2 is a schematic diagram of a GCTR in accordance with a first embodiment of the present inventionkA data processing block;
FIG. 3 is a GHASH according to a first embodiment of the present inventionHA data processing block diagram;
fig. 4 is a block diagram of an ICV calculation process according to a first embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The following embodiments are only used to more clearly illustrate the system method and technical solution of the present invention, and the protection scope of the present application is not limited thereby.
According to the embodiment of the invention, the invention provides a resource sharing method for the MACsec AES algorithm, multiport data share a group of resources of the MACsec AES algorithm in a time division multiplexing mode, a design method of a pipeline is adopted, and a small part of buffer logic of intermediate states is added at the same time, so that the sharing of the resources of the MACsec AES algorithm is realized, and a plurality of groups of resources of the MACsec AES algorithm are saved.
The principles and spirit of the present invention are explained in detail below with reference to several representative embodiments of the invention.
Fig. 1 is a process flow diagram of a resource sharing method of MACsec AES algorithm. As shown in fig. 1, the method comprises the steps of:
the S1 MACsec AES Algorithm resource is mainly composed of CIPHkAnd GHASHHA computing unit;
further, the AES basic computation unit CIPHkAs GCTRkThe main module realizes encryption and decryption of AES.
Further, the AES calculation unit GHASHHAnd performing AES _ GCM Galois Hash calculation to realize the integrity check of the data.
S2 multi-port _ id data shares MACsec AES algorithm resources in a time division multiplexing mode, and a small amount of logic resources are added to cache the middle state data of each port _ id;
in specific implementation, caching the intermediate state data of each port _ id through a small amount of logic resources; the intermediate state data includes key information, IV vectors, PN values, integrity check intermediate values, and the like.
S3 sharing and using CIPH by using 128bit slicing data of each port _ id in a pipeline modekAnd 2 GHASHHThe computing unit performs encryption and decryption and integrity check.
In specific implementation, in step S3, the 128-bit fragment data of each port _ id shares the processing flow of computing resources in a pipeline manner:
1) using AES basic computation units CIPHkCalculating an H value;
2) from the input IV vector, J is calculated0A value;
3) using GCTRkEncrypting or decrypting 128bit sliced data;
4) using GHASHHCalculating a GHASH value S;
5) according to J0And S, using GCTRkAnd calculating an ICV value, and intercepting an ICV high-order (T bit) value as T, wherein the T value is used for integrity check.
It should be noted that although the operations of the method of the present invention have been described in the above embodiments and the accompanying drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the operations shown must be performed, to achieve the desired results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
For a clearer explanation of the resource sharing method of the MACsec AES algorithm, a specific embodiment is described below, however, it should be noted that the embodiment is only for better explaining the present invention and is not to be construed as an undue limitation to the present invention.
The first embodiment is as follows:
a resource sharing method for a MACsec AES algorithm comprises the following specific technical scheme:
in order to save MACsec implementation resources for serially inputting multiport port _ id data and improve the AES algorithm resource utilization rate of MACsec, on the premise of not affecting the data transmission bandwidth, in this embodiment, a system clock is designed to be 600MHz, a data bit width is designed to be 128 bits, and the specific implementation steps are as follows:
the S1 AES encryption and decryption processing is mainly performed through GCTRkCompleted, AES _ GCM processing is mainly through GHASHH、GCTRkAnd a CIPHk(responsible for calculating the H value) is done.
1 piece of 128bit slicing data needs 6 AES basic computing units CIPH for completing AES encryption and decryption and AES _ GCM processingkAnd 2 GHASHHCIPH on the premise of meeting the design requirement of the time sequencek15 clock cycles are needed for finishing the processing of 128-bit fragment data, each CIPHk computing unit is designed to be instantiated for 15 times simultaneously in order to meet the maximum bandwidth requirement, a pipeline is adopted to process each fragment data in real time, and at the moment, 90 CIPHs are needed in totalkAnd a computing unit.
GCTRkThe main computing module in the system is CIPHkResource comparison is mainly performed by CIPHkTo measure, the actual GCTRkJust than CIPHkThe processing module adds an exclusive-or process.
S2 multiport (port _ id) data share MACsec AES algorithm resources in a time division multiplexing mode, and a small amount of logic resources are added to cache the middle state data of each port _ id;
the multiport port _ id data share MACsec AES algorithm resources in a time division multiplexing mode, namely, the 128-bit fragment data of each port _ id share and use 90 CIPHs in a pipeline modekAnd 2 GHASHHThe computing unit performs encryption and decryption and integrity check, and meanwhile adds a small amount of logic resources to cache intermediate state data (such as key information, IV vector, PN value, integrity check intermediate value and the like) of each port _ id, wherein the IV vector is a 96-bit encryption initialization vector, and the PN value is J0Low 32-bit accumulated value (inc32 (J)0))。
S3 sharing and using CIPH by using 128bit fragment data of each port _ id in a pipeline modekAnd 2 GHASHHThe computing unit performs encryption and decryption and integrity check.
In specific implementation, when the data bandwidth is greater than 5G, the 128-bit fragmentation data of each port _ id shares and uses 90 CIPHs in a pipeline mannerkAnd 2 GHASHHThe computing unit performs encryption and decryption and integrity verification, and meanwhile, a small amount of logic resources are added to cache the intermediate state data of each port _ id, and the processing flow of each port _ id data is as follows:
each port _ id adopts a MACsec AES algorithm to carry out data encryption and integrity verification, and the specific processing flow is as follows:
1. encrypting 128bit data by using a Key; using GCM-AES basic computation Unit CIPHkCalculating the hash sub-key H value H ═ CIPHk(0128);
2. Based on the input IV vector (96bit encryption initialization vector), J is calculated0Value (128bit encryption initialization count vector value) J0=IV||031||1;
3. Inc of 128bit using Key pair32(J0) After the data is encrypted, carrying out bitwise XOR on the encrypted data and the corresponding 128-bit data P to be encrypted, and outputting the encrypted data as final encrypted data; encryption or decryption 128bit sliced data C ═ GCTRk(inc32(J0),P);
FIG. 2 shows GCTRkThe data processing block diagram specifically comprises the following calculation flows:
3.1)CIPHkmixing ICB (ICB ═ J)0+1, 128bit initialized count value) and the 1 st fragment data X1(128bit) of the data P to be encrypted are subjected to bitwise XOR output Y1;
3.2)CIPHkcarrying out bitwise exclusive-or on the output result after the CB2(ICB +1) is encrypted and the 2 nd fragment data X2(128bit) of the data P to be encrypted to output Y2, and so on, and calculating Yn;
3.2) encrypted data C | | | Y1| | Y2| | |, a.
As shown in FIG. 2, GCTRkThe main computing module in the system is CIPHkResource comparison is mainly performed by CIPHkTo measure, the actual GCTRkJust than CIPHkThe processing module adds an exclusive-or process. GCTRkIn which CIPH is includedkAnd GHASHHCalculating the required H value, also CIPHkAnd (4) calculating.
4. Calculating the GHASH value S by using a Galois Hash calculation formula:
S=GHASHH(A||0v||C||0u||[LEN(A)]64||[LEN(C)]64);
FIG. 3 is GHASHHAnd (5) a data processing block diagram. GHASHHThe specific calculation flow is as follows.
4.1)GHASHHComputing needs first go through CIPHkCarrying out GCM-AES encryption calculation on the 0 to obtain a Hash key H;
4.2) carrying out Galois Hash multiplication on the 1 st 128bit fragment data X1 to be calculated and H to obtain Y1, carrying out bitwise XOR on the Y1 and the 2 nd 128bit fragment data X2 to be calculated, and then carrying out Galois Hash multiplication on the result and H to obtain Y2;
4.3) repeating the steps until the last piece of fragment data is calculated, and outputting a 128-bit calculation result Yn as GHASHHAnd outputting the result.
5. And (4) integrity verification, wherein the integrity verification identifier ICV intercepts a bit value (T) for integrity verification, and calculates the ICV value T (intercepting the high T bit data of the data X as an output result):
T=MSBt(GCTRk(inc32(J0),S));
the specific flow of ICV calculation is as follows, and fig. 4 is a block diagram of the ICV calculation flow.
5.1) based on IV and data P, GCTR was usedkCalculating encrypted data C;
5.2), carrying out 128-bit fragmentation processing on the data A which does not need to be encrypted, finally supplementing V bit 0 value with less than 128 bits, carrying out 128-bit fragmentation processing on the encrypted data C, finally supplementing M bit 0 value with less than 128 bits, taking the high 64 bits of the lowest 128 bits as the bit length of A and the low 64 bits as the bit length of C, and carrying out the next step on the data A which does not need to be encryptedProcessed data passes through GHASHHCalculating an S value;
5.3), mixing J with0Performing GCTRkCalculated value and J after encryption0And outputting the ICV with a result of 128 bits according to the bitwise XOR, and intercepting the high-order (T bit) value of the ICV as T (integrity verification identifier) according to key negotiation.
Note: the above formula and the meaning of each symbol are referred to standard NIST (NIST national institute of standards and technology) Special Publication 800-38D, and are annotated as follows:
advanced encryption standard of GCM-AES (general packet Access-advanced encryption Standard) Galois count mode
A, data which does not need to be encrypted;
h, Hash sub-key;
IV, encrypting an initialization vector by 96 bits;
J0encrypted initialization count vector value, J0=IV(96bit)||1(32bit);
ICB 128bit initialization count value J0+ 1;
p: data to be encrypted;
c, encrypting the data;
s, Galois Hash calculation result;
ICV, integrity verification mark;
inc32(X): the data X is subjected to low 32bit addition, and the high bit is kept unchanged;
0Ss binary numbers consisting of S bit 0;
[LEN(X)]Ythe bit length of the data X is Y bit;
x is Y, which means that the characters X and Y are spliced according to bit units;
CIPHk: encrypting the 128bit data by using a Key;
GCTRk: inc of 128bit using Key pair32(J0) After the data is encrypted, carrying out bitwise XOR on the encrypted data and the 128-bit data P to be encrypted;
MSBt(X): intercepting the high t bit data of the data X as an output result;
in specific implementation, when the data bandwidth is less than 5G, the CIPH is 15 clock cycleskThe bandwidth requirement can be met only by completing one 128-bit fragment data processing, so that the pipeline processing can be omitted, and the 128-bit fragment data of each port _ id is not subjected to CIPH (common application protocol)kPipelined approach sharing use of 6 CIPHskAnd 2 GHASHHAnd the computing unit performs encryption and decryption and integrity verification, and simultaneously adds a small amount of logic resources to cache the intermediate state data of each port _ id. Design of each CIPHkThe computing unit is instantiated for 1 time only, so that a group of MACsec AES algorithm resources can be composed of 6 CIPHskAnd 2 GHASHHThe computing unit is formed, and the resource sharing of the MACsec AES algorithm is still carried out by adopting time division multiplexing, so that the algorithm resource can be further saved when the data bandwidth is less than 5G.
The encryption and decryption calculation uses the same module for processing, the decryption is only reverse processing, the processing flow is the same as the encryption, and the details are not repeated in the embodiment of the invention.
The invention has the advantages that aiming at the problems in the existing communication system, the resource sharing method of the MACsec AES algorithm is provided, multiport data share a group of resources of the MACsec AES algorithm in a time division multiplexing mode, a pipeline design method is adopted, and a small part of buffer logic in intermediate states is added at the same time, so that the sharing of the resources of the MACsec AES algorithm is realized, and a plurality of groups of resources of the MACsec AES algorithm are saved.
The applicant of the present invention has made detailed description and description of the embodiments of the present invention with reference to the drawings, which are included in the specification, the embodiments of the present invention are merely preferred embodiments of the present invention, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present invention, and not for limiting the scope of the present invention, but rather, any improvement or modification made based on the spirit of the present invention should fall within the scope of the present invention.
Claims (5)
1. A resource sharing method for MACsec AES algorithm is characterized by comprising the following steps:
the S1 MACsec AES Algorithm resource is mainly composed of CIPHkAnd GHASHHA computing unit;
s2 multi-port _ id data shares MACsec AES algorithm resources in a time division multiplexing mode, and a small amount of logic resources are added to cache intermediate state data of each port _ id;
s3 sharing and using CIPH by using 128bit fragment data of each port _ id in a pipeline modekAnd 2 GHASHHThe computing unit performs encryption and decryption and integrity check.
2. The method of claim 1, wherein the resource sharing method of MACsec AES algorithm comprises: the AES basic computation unit CIPHkAs GCTRkThe main module of (3) realizes encryption and decryption of AES and GHASHHCalculation of the required H value.
3. The method of claim 1, wherein the resource sharing method of MACsec AES algorithm comprises: the AES calculation unit GHASHHAnd performing AES _ GCM Galois Hash calculation to realize the integrity check of the data.
4. The method of claim 1, wherein the resource sharing method of MACsec AES algorithm comprises: caching the intermediate state data of each port _ id through a small amount of logic resources; the intermediate state data comprises key information, an IV vector, a PN value and an integrity check intermediate value.
5. The method of claim 1, wherein the resource sharing method for MACsec AES algorithm comprises: in step S3, the processing flow of sharing computing resources by using a pipeline manner for the 128-bit fragment data of each port _ id includes:
1) using AES basic computation units CIPHkCalculating an H value;
2) from the input IV vector, J is calculated0A value;
3) using GCTRkEncrypting or decrypting 128bit sliced data;
4) using GHASHHCalculating a GHASH value S;
5) according to J0And S, adoptGCTRkAnd calculating an ICV value, and intercepting an ICV high-order (T bit) value as T, wherein the T value is used for integrity check.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210299143.1A CN114679252A (en) | 2022-03-25 | 2022-03-25 | Resource sharing method for MACsec AES algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210299143.1A CN114679252A (en) | 2022-03-25 | 2022-03-25 | Resource sharing method for MACsec AES algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114679252A true CN114679252A (en) | 2022-06-28 |
Family
ID=82074751
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210299143.1A Pending CN114679252A (en) | 2022-03-25 | 2022-03-25 | Resource sharing method for MACsec AES algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114679252A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116488795A (en) * | 2023-06-19 | 2023-07-25 | 北京大禹智芯科技有限公司 | GCM-AES processing method and device |
CN117749480A (en) * | 2023-12-19 | 2024-03-22 | 无锡众星微系统技术有限公司 | MACSec-based multichannel data security transmission method and device |
-
2022
- 2022-03-25 CN CN202210299143.1A patent/CN114679252A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116488795A (en) * | 2023-06-19 | 2023-07-25 | 北京大禹智芯科技有限公司 | GCM-AES processing method and device |
CN116488795B (en) * | 2023-06-19 | 2023-09-22 | 北京大禹智芯科技有限公司 | GCM-AES processing method and device |
CN117749480A (en) * | 2023-12-19 | 2024-03-22 | 无锡众星微系统技术有限公司 | MACSec-based multichannel data security transmission method and device |
CN117749480B (en) * | 2023-12-19 | 2024-07-23 | 无锡众星微系统技术有限公司 | MACSec-based multichannel data security transmission method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7200226B2 (en) | Cipher block chaining decryption | |
US8983063B1 (en) | Method and system for high throughput blockwise independent encryption/decryption | |
Henzen et al. | FPGA parallel-pipelined AES-GCM core for 100G Ethernet applications | |
US6879689B2 (en) | Stream-cipher method and apparatus | |
US7574571B2 (en) | Hardware-based encryption/decryption employing dual ported memory and fast table initialization | |
CN114679252A (en) | Resource sharing method for MACsec AES algorithm | |
US20050240764A1 (en) | Apparatus and method for performing RC4 ciphering | |
CN110336661B (en) | AES-GCM data processing method, device, electronic equipment and storage medium | |
CN105007154B (en) | A kind of encrypting and decrypting device based on aes algorithm | |
CN110880967A (en) | Method for parallel encryption and decryption of multiple messages by adopting packet symmetric key algorithm | |
US7433469B2 (en) | Apparatus and method for implementing the KASUMI ciphering process | |
CN107534558A (en) | For the method and data highway system of the information security for protecting the data via data bus transmission | |
El-meligy et al. | 130nm Low power asynchronous AES core | |
Pirzada et al. | The parallel CMAC authenticated encryption algorithm for satellite communication | |
Achkoun et al. | SPF-CA: A new cellular automata based block cipher using key-dependent S-boxes | |
Kapoor et al. | Analysis of symmetric and asymmetric key algorithms | |
CN111614457B (en) | P replacement improvement-based lightweight packet encryption and decryption method, device and storage medium | |
CN101515853B (en) | Information terminal and information safety device thereof | |
Buell | Modern symmetric ciphers—Des and Aes | |
Li et al. | An implementation method for SM4-GCM on FPGA | |
Mohan et al. | Revised aes and its modes of operation | |
Fu et al. | A fast chaos-based colour image encryption algorithm using a hash function | |
CN109951434A (en) | A kind of industrial communication protocol high robust real-time encryption and decryption method | |
Guzmán et al. | FPGA implementation of the AES-128 algorithm in non-feedback modes of operation | |
Mona et al. | A survey on various encryption and decryption algorithms |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |