Unlock instant, AI-driven research and patent intelligence for your innovation.

Stream cipher generator, random digit generation method, encrypting system and encryption method

A generator and stream cipher technology, applied in random number generators, digital transmission systems, transmission systems, etc., can solve the problems of untestable illegal equipment and low security of HDCP system, and achieve high security effects

Active Publication Date: 2009-02-04
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In addition, the HDCP system has been proven to be not very secure. An attacker only needs about 40 devices equipped with the HDCP system to obtain some system parameters, and then can make illegal devices arbitrarily without authorization, and these illegal devices Cannot be detected by legitimate equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stream cipher generator, random digit generation method, encrypting system and encryption method
  • Stream cipher generator, random digit generation method, encrypting system and encryption method
  • Stream cipher generator, random digit generation method, encrypting system and encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] The linear feedback shift register LFSRa, which performs shift operation by byte, has 64 bits. The pre-positioned 8-bit numbers are serially output and subjected to XOR operation (that is, these 8-bit serial modulo 2 additions), and the resulting 8-bit τ is fed back to the linear transformation module T1.

[0060] Wherein, T1 is a linear transformation module whose output is 8 bits. The structure of T1 is as Figure 1B Shown: includes three mutually independent parts T1A, T1B, T1C, and a selector switch.

[0061] The T1A component consists of three parts: a read-in unit, an adjustment unit, and an arithmetic unit. In the input process, the read-in unit reads the 8-bit τ fed back by LFSRa from the bus, the output G2 (8-bit), G1 (8-bit), G0 (8-bit) of the output module G and the vector IV3k+2 of the 8-bit input (k=0, 1, ..., 4, five rounds of input); the adjustment unit uses the method of adjusting the order of the data lines to readjust the bit sequence of the data re...

Embodiment 2

[0069] The linear feedback shift register LFSRβ has 35 bits, and its shift operation is triggered by a pulse. In the input process, LFSRβ first reads in a 33-bit key through a pulse. The output 8-bit number is added in binary system) to its left end, and shifted to the right by 1 bit, then K performs XOR operation on the 8 bits at its left end, and then rotates to the right by 8 bits. In the process of closed-loop operation and external output, LFSRβ first XORs the pre-positioned number and feeds it back to its left end, and shifts right by 1 bit, and then shifts 8 bits to the right in a cycle. In the process of closed loop operation and external output: feed back the pre-positioned numbers to the left end after XOR operation (that is, add the 8-bit numbers output by these bits) to the left end, and shift right by 1 bit, and then loop Shift right 8 bits.

[0070] The structure of K is composed of Figure 1CShown: including read-in unit, adjustment unit, arithmetic unit, wri...

Embodiment 3

[0072] The linear feedback shift register LFSRγ has a total of 31 bits, and it operates under pulse triggering. In the read-in process, LFSRγ reads in a 31-bit key through a pulse, and performs an XOR operation on its predetermined digits (such as the numbers of the 1st, 4th, 7th, 8th, and 14th) (that is, the 8 bits output by these bits The number of bits is added in binary system) to its left end, and shifted to the right by 1 bit, and then L performs an XOR operation on the 8 bits at its left end, and then rotates to the right by 8 bits. In the process of closed-loop operation and external output, LFSRγ first XORs the pre-positioned number and feeds it back to its left end, and then shifts right by 1 bit, and then shifts 8 bits to the right in a cycle. In the closed loop operation and external output process: feed back the pre-positioned numbers to the left end after XOR operation (that is, add the 8-bit numbers output by these bits) to the left end, and shift right by 1 bit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The stream cipher generator comprises: three linear feedback shift registers and three linear transforming modules, the three linear transforming modules respectively make configuration for the three linear feedback shift registers; three state reading-out table modules, A, B and C, which respectively read out the data of pre-position in the three linear feedback shift registers; a linear conversion module F for inputting the data outputted from the three sate reading-out table modules, and compressing and scrambling it, and then outputting it; a table looking-up transform module D for compressing and outputting the data outputted from the state reading-out table module; an outputting module for compressing and outputting the data outputted from F, D and C. The stream cipher generator can be allocated at both transmission ends to make synchronized symmetry encryption.

Description

technical field [0001] The present invention relates to data encryption technology in digital transmission, especially symmetric encryption technology, in particular to a stream cipher generator for synchronous encryption of data streams and a synchronous symmetric encryption device using the stream cipher generator systems and methods. This stream cipher generator can also be used to generate random numbers. Background technique [0002] Since the appearance of television, an electronic carrier whose main purpose is entertainment, it has had a profound impact on human daily life. Almost every one of us gets more or less what we expect to know or what we expect to know from TV every day. News, these content national and even world events or trivial matters involving all aspects of life, it is true that TV has become an indispensable part of our lives. [0003] With the advancement of science and technology and the improvement of living standards, since the birth of radio a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/22G06F7/58
Inventor 姜正涛王育民葛建华詹阳李新国田海博谭示崇范欣欣袁素春帅红宇
Owner SICHUAN CHANGHONG ELECTRIC CO LTD