Stream cipher generator

A generator and stream cipher technology, applied in the field of information security transmission, which can solve the problems of unsatisfactory key stream test results and insufficient randomness of the key stream.

Inactive Publication Date: 2011-08-03
SICHUAN PANOVASIC TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Generally speaking, the randomness of the key stream output by the stream cipher generator proposed in the above-mentioned CN1835586A patent application is not enough, especially for the military standard inspection, the test result of the key stream is extremely unsatisfactory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stream cipher generator
  • Stream cipher generator
  • Stream cipher generator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to better understand the present invention, the present invention will be described in more detail below in conjunction with specific embodiments. It is to be noted that similar components are given similar reference numerals even though they appear in different drawings. In the following description, when a detailed description of known functions and designs employed may obscure the subject matter of the present invention, these descriptions will be omitted here.

[0028] Fig. 1 is a functional block diagram of a specific embodiment of the stream cipher generator of the present invention. In the figure, the stream cipher generator includes three linear feedback shift registers LFSRα, LFSRβ and LFSRγ, and three linear transformation modules T, K and L, wherein the linear transformation module T performs feedback setting for the key of the linear feedback shift register LFSRα The linear transformation module K scrambles the key of the linear feedback shift regi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a stream cipher generator; wherein, in the present framework, a first module of a linear transformation module F is used for compression transformation of numbers read by a state reading list module A, B and C and output numbers of the linear transformation module F and outputting the numbers which are suitable for input by a second module; the second module comprises a non-reversible linear transformation module and two S boxes which are connected in parallel and the numbers input from the first module is output after being transformed in the non-reversible linear transformation module; the location of the numbers input from the first module is selected as the input of the two S boxes, in which table search transformation is carried out, and the output thereof is combined with the output of the non-reversible linear transformation module as the output of the linear transformation module F; the S boxes randomly generate an S box pool and the S box pool is obtained by optimal selecting by analyzing the cipher characteristics with an evolutionary algorithm. The cipher characteristics of the S boxes of the invention are greatly improved, and the S boxes with high security intensity are obtained so as to improve the security intensity of the stream cipher generator.

Description

technical field [0001] The invention relates to the field of information security transmission, in particular to a stream cipher generator used for exchanging authentication information in security identity authentication. Background technique [0002] In the digital information age, information security has always been the focus of attention. In various information transmission systems, in order to ensure that the entities participating in the information exchange are legal and valid, it is necessary to carry out security authentication on the identities of the participating entities. For example, in military communications, it is necessary to authenticate the identity of the other party to prevent the leakage of military intelligence information; in Internet environments such as e-commerce, it is necessary to identify the identity of the other party to prevent malicious attacks and damages by illegal elements; In the environment, the legal validity of the access device ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18H04L9/08H04H60/23
Inventor 朱正美樊鹏陈奕冲王志辉余有勇陈勇刘律宏
Owner SICHUAN PANOVASIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products