Key updating method
A key update and key technology, which is applied in the fields of information security and cryptography, can solve problems such as low security, achieve high security, simple method, and fast implementation speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] The basic idea and specific steps of the present invention are illustrated by taking the stream cipher system as an example.
[0020] In a digital interface content protection system, the sending end and receiving end of the device use stream cipher technology to protect the transmitted content. Assume that the cryptographic system consists of four linear feedback shift registers (LFSRa, LFSRb, LFSRc, LFSRd) and n transformation function blocks, after a series of transformations, the final 64bit key stream is output. The key update adopts the method of odd-even key, and the even-key KE is used in the stream cipher initialization 0 The input of the linear feedback shift register is initialized, and the transformation function block is initialized with a random number sequence generated by a random number generating algorithm. Afterwards, use the key stream output by the stream cipher to update the novelty key KE in turn 1 and even key KE 0 As an updated key, a certain...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 