US 12,463,795 B1
Advanced encryption standard with frequent S-box update and fusion function application
Srinivas Lakshman Sekhar, Bangalore (IN)
Assigned to Pantherun Technologies Private Limited, Bangalore (IN)
Filed by Pantherun Technologies Private Limited, Bangalore (IN)
Filed on Mar. 11, 2025, as Appl. No. 19/076,729.
Claims priority of application No. 202441058404 (IN), filed on Aug. 1, 2024.
Int. Cl. H04L 29/06 (2006.01); G06F 21/00 (2013.01); H04L 9/06 (2006.01); H04L 9/16 (2006.01)
CPC H04L 9/0631 (2013.01) [H04L 9/16 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method comprising:
obtaining a first fusion function input based on performance of an XOR operation on an input plaintext and a first cryptographic key;
executing a set of encryption rounds for generating a state output, wherein an execution of each encryption round comprises:
applying a fusion function on a fusion function input for generating a fusion function output, wherein the obtained first fusion function input is the fusion function input for a first encryption round of the set of encryption rounds, and wherein the fusion function generates the fusion function output based on a S-box of a set of S-boxes, a mix-column matrix of a set of mix-column matrices, and a fusion table, wherein the fusion table is obtained based on the S-box and the mix-column matrix, and
performing an XOR operation on the fusion function output and a second cryptographic key for obtaining an encryption output, wherein the encryption output is the fusion function input for a following encryption round, wherein the encryption output obtained after execution of a last encryption round is the state output, wherein the second cryptographic key is different for each encryption round and is generated based on the first cryptographic key;
obtaining a ciphertext by executing an Advanced Encryption Standard (AES) encryption based on the state output, the S-box, and a third cryptographic key, wherein the third cryptographic key is generated based on the first cryptographic key, wherein the method further comprises generating the set of S-boxes, wherein the generation of each S-box of the set of S-boxes complies with predefined security criteria, wherein an interval between selection of each pair of S-boxes of the set of S-boxes is less than a first predefined interval, and wherein at least two ciphertexts are generated within the first predefined interval.