Invention Grant
US09438416B2 Customizable encryption algorithm based on a sponge construction with authenticated and non-authenticated modes of operation 有权
基于具有认证和非认证操作模式的海绵结构的可定制加密算法

Customizable encryption algorithm based on a sponge construction with authenticated and non-authenticated modes of operation
Abstract:
Systems (100) and methods (600) for generating encrypted data. The methods involve: combining a cryptographic key with state initialization bits to generate first combination bits; producing a first keystream by performing a permutation function ƒ using the first combination bits as inputs thereto; and using the first keystream to encrypt first data (e.g., authentication data or message body data) so as to produce first encrypted data. The permutation function ƒ comprises a round function ƒround that is iterated R times. The round function ƒround consists of (1) a substitution layer in which the first combination bits are substituted with substitute bits, (2) a permutation layer in which the substitute bits are re-arranged, (3) a mixing layer in which multiple of the permutation layer are combined together, and (4) an addition layer in which a constant is added to the output of the mixing layer.
Information query
Patent Agency Ranking
0/0