首页>
外国专利>
CUSTOMIZABLE ENCRYPTION ALGORITHM BASED ON A SPONGE CONSTRUCTION WITH AUTHENTICATED AND NON-AUTHENTICATED MODES OF OPERATION
CUSTOMIZABLE ENCRYPTION ALGORITHM BASED ON A SPONGE CONSTRUCTION WITH AUTHENTICATED AND NON-AUTHENTICATED MODES OF OPERATION
展开▼
机译:基于具有授权和非授权操作模式的海绵构造的可定制加密算法
展开▼
页面导航
摘要
著录项
相似文献
摘要
Systems (100) and methods (600) for generating encrypted data. The methods involve: combining a cryptographic key with state initialization bits to generate first combination bits; producing a first keystream by performing a permutation function f using the first combination bits as inputs thereto; and using the first keystream to encrypt first data (e.g., authentication data or message body data) so as to produce first encrypted data. The permutation function f comprises a round function f round that is iterated R times. The round function f round consists of (1) a substitution layer in which the first combination bits are substituted with substitute bits, (2) a permutation layer in which the substitute bits are re-arranged, (3) a mixing layer in which multiple of the permutation layer are combined together, and (4) an addition layer in which a constant is added to the output of the mixing layer.
展开▼