Efficient method for multiplication over galois fields
First Claim
Patent Images
1. An improved method for encryption, comprising:
- receiving original data to be encrypted;
performing cipher steps to process the original data into encrypted data, including;
looking up logs of terms being multiplied over a finite field;
summing the logs to obtain a sum; and
looking up the anti-log of the sum;
outputting the encrypted data.
1 Assignment
0 Petitions
Accused Products
Abstract
The improved AES processing method provides an efficient alternative to both Mips intensive multiplication and to conventional table lookup, used to multiply terms over a Galois field (GF). The improved method takes advantage of the fact that in the GF, any non zero element X can be represented by a power of a primitive element P. The improved method thereby results in a 2 by 256 table. The log base P of the terms being multiplied are looked up and summed, and the anti-log of the sum is looked up in the same table.
-
Citations
21 Claims
-
1. An improved method for encryption, comprising:
-
receiving original data to be encrypted;
performing cipher steps to process the original data into encrypted data, including;
looking up logs of terms being multiplied over a finite field;
summing the logs to obtain a sum; and
looking up the anti-log of the sum;
outputting the encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An encryption system comprising:
a first communications device adapted to receive original data and including;
means for encrypting the original data to generate encrypted data, including;
means for performing a MixColumns transform including;
means for looking up logs of terms being multiplied over a finite field;
means for summing the logs to obtain a sum;
means for looking up the anti-log of the sum; and
means for outputting the encrypted data. - View Dependent Claims (11, 12)
-
13. An inverse encryption system comprising:
a second communications device adapted to receive encrypted data, and including;
means for inverse encrypting the encrypted data to generate original data, including;
means for performing an InvMixColumns transform including;
means for looking up logs of terms being multiplied over a finite field;
means for summing the logs to obtain a sum;
means for looking up the anti-log of the sum; and
means for outputting the original data. - View Dependent Claims (14, 15)
-
16. An improved method for encryption including multiplication over a finite field, the improvement comprising:
obtaining the result of multiplication over the finite field using a primitive power and log table comprising 2 rows. - View Dependent Claims (17, 18, 19, 20, 21)
Specification