Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of utilizing special equipment with A/D converter in generatnig message cipher key

A technology of special equipment and message key, applied in the field of security technology

Inactive Publication Date: 2008-01-16
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the use of more hardware, the circuit of the above scheme must be debugged before it can be used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of utilizing special equipment with A/D converter in generatnig message cipher key
  • Method of utilizing special equipment with A/D converter in generatnig message cipher key
  • Method of utilizing special equipment with A/D converter in generatnig message cipher key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] It can be seen from Fig. 4 that a certain type of digital security machine for encrypting and decrypting wireless channels has applied the scheme of the present invention to realize the generation of message keys. The hardware part of this product is mainly composed of ADDA analog-to-digital and digital-to-analog devices and digital signal processor DSP devices. Due to the wireless channel and various local thermal noises generated inside the device, the low bits of the analog-to-digital conversion device change irregularly, especially the lowest bit changes irregularly every time it is sampled. For example, this product During work, 16,000 samples per second are performed, and the lowest bit changes completely irregularly during the entire working process. Therefore, in the software of the DSP processor (TMS320VC33), the device adds a timer interrupt module TMER_INT and a software module MS_PRO to calculate the collection length of the collected data and check and stor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention belongs to the field of secret technology in information security. In available digital crypto or analog channel processing equipment, the A / D conversion device is one essential part. The technological scheme of the present invention is that the lower bits with irregular change in A / D conversion device are utilized via increasing one software module in the processing software of CPU or DSP to collect, verify and store the lower bits of A / D conversion device. The message cipher key meeting the requirement is maintained for the other modules in the program to use. The present invention produces message cipher key without increasing any hardware equipment and this lowers the cost of the system and raises the reliability of the equipment.

Description

1. Technical field [0001] The invention relates to a method for generating a message key by using a special device of a modulus device, which belongs to the security technology in the field of information security; in particular, it relates to the generation of true random sequences and numbers in the cryptographic technology required for security. 2. Background technology [0002] Cryptography, the core technology in the field of information security, is a very important means to achieve information confidentiality. In cryptography, especially in cryptographic protocols, truly random sequences or numbers are often required. At present, the commonly used generation methods are as follows: use RAND table, use computer clock, use keyboard waiting time, use random noise, etc. Both of these techniques generate non-repetitive sequences. Most of the security devices currently in use need to generate message keys. There are mainly two methods currently used, one is to use a dedi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04K1/00H04L9/00
Inventor 邹盛唐周治中
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP