APPARATUS AND METHOD FOR GENERATING CRYPTOGRAPHIC ALGORITHM, APPARATUS AND METHOD FOR ENCRYPTION
First Claim
1. A method of generating a cryptographic algorithm, the method comprising:
- generating one or more key tables on the basis of a seed value;
generating, by using a round tweak bit string and an input bit string that is input to one of input branches of a Feistel structure, a first transformation function that converts the input bit string into a first random bit string having a length that extends beyond a length of the input bit string;
generating a second transformation function that converts a second random bit string generated by referencing the one or more key tables into a third random bit string having a length that is the same as the length of the input bit string; and
generating a block cryptographic algorithm of a Feistel structure which includes a round function to which the one or more key tables, the first transformation function, and the second transformation function are applied.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of generating a cryptographic algorithm includes generating at least one key table on the basis of a seed value; generating, by using a round tweak bit string and an input bit string that is input to one of input branches of a Feistel structure, a first transformation function converting the input bit string into a first random bit string having a length that extends beyond a length of the input bit string, generating a second transformation function converting a second random bit string generated by referencing the one or more key tables into a third random bit string having a length that is the same as the length of the input bit string, and generating a block cryptographic algorithm of a Feistel structure which includes a round function to which the one or more key tables, the first transformation function, and the second transformation function are applied.
-
Citations
18 Claims
-
1. A method of generating a cryptographic algorithm, the method comprising:
-
generating one or more key tables on the basis of a seed value; generating, by using a round tweak bit string and an input bit string that is input to one of input branches of a Feistel structure, a first transformation function that converts the input bit string into a first random bit string having a length that extends beyond a length of the input bit string; generating a second transformation function that converts a second random bit string generated by referencing the one or more key tables into a third random bit string having a length that is the same as the length of the input bit string; and generating a block cryptographic algorithm of a Feistel structure which includes a round function to which the one or more key tables, the first transformation function, and the second transformation function are applied. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus for generating a cryptographic algorithm, comprising:
-
one or more processors; a memory; and one or more programs, wherein the one or more programs are stored in the memory and are configured to be executed by the one or more processors and the one or more programs include commands for generating one or more key tables on the basis of a seed value, generating, by using a round tweak bit string and an input bit string that is input to one of input branches of a Feistel structure, a first transformation function that converts the input bit string into a first random bit string having a length that extends beyond a length of the input bit string, generating a second transformation function that converts a second random bit string generated by referencing the one or more key tables into a third random bit string having a length that is the same as the length of the input bit string, and generating a block cryptographic algorithm of a Feistel structure which includes a round function to which the one or more key tables, the first transformation function, and the second transformation function are applied. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method of encryption, comprising:
-
generating a round tweak bit string; converting, by using a first transformation function, the round tweak bit string and a first input bit string, which is input to one of input branches of a Feistel structure, into a first random bit string having a length that extends beyond a length of the first input bit string; converting the first random bit string into a second random bit string by referencing one or more key tables; converting, by using a second transformation function, the second random bit string into a third random bit string having the same length as the length of the first input bit string; and performing an exclusive OR operation between the third random bit string and a second input bit string that is input to another input branch among the input branches of the Feistel structure. - View Dependent Claims (12, 13, 14)
-
-
15. An apparatus for encryption, comprising:
-
one or more processors; a memory; and one or more programs, wherein the one or more programs are stored in the memory and are configured to be executed by the one or more processors and the one or more programs include commands for generating a round tweak bit string, converting, by using a first transformation function, the round tweak bit string and a first input bit string, which is input to one of input branches of a Feistel structure, into a first random bit string having a length that extends beyond a length of the first input bit string, converting the first random bit string into a second random bit string by referencing one or more key tables, converting, by using a second transformation function, the second random bit string into a third random bit string having the same length as the length of the first input bit string, and performing an exclusive OR operation between the third random bit string and a second input bit string that is input to another input branch among the input branches of the Feistel structure. - View Dependent Claims (16, 17, 18)
-
Specification