Device and method for encrypting and decrypting a block of data
Device and method for encrypting and decrypting a block of data
 CN 1,795,638 A
 Filed: 05/19/2004
 Published: 06/28/2006
 Est. Priority Date: 05/23/2003
 Status: Active Application
First Claim
1. one kind is the method for data Y based on master key R with the block encryption of data X or deciphering, described method is used at least two primary modules that are connected in series (MOD), each primary module (MOD) uses the subkey (RA) that obtains from described master key (R), may further comprise the steps:
 At least two initial value X0L ofinput and X0R,mix the value X1 that described at least two value X0L and X0R mix with formation,mix and acquisition value X2 with described value X1 by the RAH of first described subkey RA,by being applied to, described value X2 replaces layer and acquisition value X3, and described replacement layer comprises that at least one replaces box (sbox), and each is replaced box and comprises constant table, and for described table, input is as pointer, and constant pointed is as output,acquisition value X4 by the diffusion chamber that uses many arrangement type based on value X3,mix and acquisition value X5 with described value X4 by second portion RAL described subkey RA,pass through described value X5 is used replace block and acquisition value X6,mix and acquisition value X7 with described value X6 by the RAH of first described subkey RA,described value X7 with X0R is mixed to obtain at least two value X8Ls and X8R with described two initial value X0L at least, X8L and X8R represent the output valve X8 of described module,Wherein for each primary module (MOD), new subkey (RA) produces from master key (R), the initial value X0L of described first primary module and X0R are the subclass of described input data X, the output valve X8L and the X8H of described last primary module form described dateout Y, and described method is further comprising the steps of;
before described value X8L and X8R are applied to the input X0R and X0L of next primary module, among described value X8L or the X8R at least one used conformality function.
Chinese PRB Reexamination
Abstract
The object of the invention is to provide a method to encrypt or decrypt blocks of data X to Y, based on a main key R, this method using several serially connected modules, each module using a subkey RA derived from the main key R and comprising the steps of: inputting at least two initial values XOL and XOR, and mixing these values to form a mixed value X1, obtaining a value X2 by mixing a first part RAH of the subkey RA with the value X1, obtaining a value X3 by applying the value X2 to a substitution layer, comprising at least one substitution box (sbox), each of which includes at least a constant table, wherein the input is a point of the talbe and the pointed constanct is the output of the table, obtaining a value X4 by using a diffusion box of multipermutation type based on the value X3, obtaining a value X5 by mixing a second part RAL of the subkey RA with the value X4, obtaining the value X6 by applying to the value X5 a substitution layer, obtaining a value X7 by mixing a first part RAH of the subkey RA with the value X6, mixing the value X7 with the initial at least two values XOL and XOR to obtain the at least two values X8L and X81R, X8L and X8R representing the output value X8 of the module. This method further comprises using at least two modules, wherein for each module, the new subkey RA is generated form the main key R, the initial value X0 of the first module is a part of the input data X, the output data Y is formed from the output value X8L and X8H of the final module, and applying at least one of the value X8L or X8R an orthomorphism function before feeding them to the input X0R and X0L of next module.

1 Citation
Encryption method with threedimensional operation, feedback control and dynamic replacing box design  
Patent #
CN 103,546,282 A
Filed 07/12/2012

Current Assignee

No References
11 Claims

1. one kind is the method for data Y based on master key R with the block encryption of data X or deciphering, described method is used at least two primary modules that are connected in series (MOD), each primary module (MOD) uses the subkey (RA) that obtains from described master key (R), may further comprise the steps:

At least two initial value X0L ofinput and X0R, mix the value X1 that described at least two value X0L and X0R mix with formation, mix and acquisition value X2 with described value X1 by the RAH of first described subkey RA, by being applied to, described value X2 replaces layer and acquisition value X3, and described replacement layer comprises that at least one replaces box (sbox), and each is replaced box and comprises constant table, and for described table, input is as pointer, and constant pointed is as output, acquisition value X4 by the diffusion chamber that uses many arrangement type based on value X3, mix and acquisition value X5 with described value X4 by second portion RAL described subkey RA, pass through described value X5 is used replace block and acquisition value X6, mix and acquisition value X7 with described value X6 by the RAH of first described subkey RA, described value X7 with X0R is mixed to obtain at least two value X8Ls and X8R with described two initial value X0L at least, X8L and X8R represent the output valve X8 of described module, Wherein for each primary module (MOD), new subkey (RA) produces from master key (R), the initial value X0L of described first primary module and X0R are the subclass of described input data X, the output valve X8L and the X8H of described last primary module form described dateout Y, and described method is further comprising the steps of;
before described value X8L and X8R are applied to the input X0R and X0L of next primary module, among described value X8L or the X8R at least one used conformality function.


2. according to the encryption or the decryption method of claim 1, wherein said input data are 64 bit lengths, and described input data X is divided into the initial value X0L and the X0H of two 32 bit lengths, and described two output valve X8L and X8H form described dateout Y.

3. according to the encryption or the decryption method of claim 1, wherein said input data are 128 bit lengths, and described input data X is divided into the initial value X0LL of four 32 bit lengths, X0LR, X0RL and X0RR, and described four output valve X8LL, X8LR, X8RL and X8RR form 128 dateout Y, the X1L of first of described value X1 obtains by described value X0LL is mixed with X0LR, and the second portion X1R of described value X1 obtains by described value X0RL is mixed with X0RR, the X7L of first and described four the initial value X0LL of described value X7, X0LR, two among X0RL and the X0RR are mixed, and second portion X7R and the described initial value X0LL of described value X7, X0LR, two parts in addition among X0RL and the X0RR are mixed.

4. according to the encryption or the decryption method of claim 1, wherein said replacement layer comprises several replacement boxes (sbox), and each box has 8 inputs and 8 outputs, and the input of described replacement layer is divided into the part of 8 bit lengths.

5. according to the encryption or the decryption method of claim 4, the constant table (TA) of wherein said replacement box (sbox) comprises the unique output for given input.

6. according to the encryption or the decryption method of claim 4, it is identical wherein being used for each constant table of replacing box (sbox).

7. according to the encryption or the decryption method of claim 4, it is different wherein being used for each constant table of replacing box (sbox).

8. according to the encryption or the decryption method of claim 4, the constant table of wherein said replacement box (sbox) is in service reformed at each primary module.

9. according to the encryption or the decryption method of claim 1, wherein said data length is 64, and described diffusion chamber is matrix function Y3=M*X4, the addition of described argument M definition 4*4, with the multiplication or the identical element of constant, delegation at least among the described argument M and row comprise three identical elements.

10. according to the encryption or the decryption method of claim 9, the remaining row of wherein said argument M and remaining row comprise two identical elements.

11. encryption or decryption method according to claim 1, wherein said data length is 128, and described diffusion chamber is matrix function Y3=N*X3, the addition of described argument N definition 8*8, with the multiplication or the identical element of constant, delegation at least among the described argument N and row comprise seven identical elements.
Specification(s)