Unlock instant, AI-driven research and patent intelligence for your innovation.

Key updating method

A key update and key technology, which is applied in the fields of information security and cryptography, can solve problems such as low security, achieve high security, simple method, and fast implementation speed

Active Publication Date: 2011-06-22
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The cryptographic system calls a special random number generation algorithm to generate a set of random numbers as an initialization vector; every time the key is updated, the random number generation algorithm needs to be called to achieve it. In the case of frequent updates, it will bring a lot to the system. overhead
[0005] 2. The cryptographic system uses a fixed sequence to update the initialization vector. Although this method is simple, the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key updating method
  • Key updating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The basic idea and specific steps of the present invention are illustrated by taking the stream cipher system as an example.

[0020] In a digital interface content protection system, the sending end and receiving end of the device use stream cipher technology to protect the transmitted content. Assume that the cryptographic system consists of four linear feedback shift registers (LFSRa, LFSRb, LFSRc, LFSRd) and n transformation function blocks, after a series of transformations, the final 64bit key stream is output. The key update adopts the method of odd-even key, and the even-key KE is used in the stream cipher initialization 0 The input of the linear feedback shift register is initialized, and the transformation function block is initialized with a random number sequence generated by a random number generating algorithm. Afterwards, use the key stream output by the stream cipher to update the novelty key KE in turn 1 and even key KE 0 As an updated key, a certain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the fields of cryptography and information security. The invention provides a key updating method based on odd and even keys, which is simple and has high security. The key updating method comprises the following steps of: a. reading an even key as an initialization vector and inputting the initialization vector to a password system; b. intercepting a key stream with predetermined length output by the password system for updating an odd key; c. using the even key for data encryption and decryption; d. when reaching a predetermined key updating time, reading the odd keyas the initialization vector and inputting the initialization vector to the password system; e. intercepting a key stream with predetermined length output by the password system for updating the evenkey; f. using the odd key for data encryption and decryption; and g. when reaching the predetermined key updating time, returning to step a. The key updating method can be applied to a digital interface content protection technology in the field of information security, and also can be applied to other information security systems needing frequent and quick key updating.

Description

technical field [0001] The invention relates to the fields of cryptography and information security. Background technique [0002] There are many kinds of ciphers in practical application at present, but according to the point of view of modern cryptography, cipher systems can be divided into two categories: symmetric cryptography (single-key cryptography) and asymmetric cryptography (double-key cryptography). However, no matter what the encryption mechanism is, theoretically there is a possibility that the encryption algorithm and the length of the key can be deciphered. Therefore, in order to ensure the security of the system, it is impossible to use the same password for a long time for encryption, decryption or signature. There is a key update function. In practical applications, almost all cryptographic systems related to information security need to have key update function, especially those systems with high security requirements. In order to make the generated key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L1/00
Inventor 王艳艳刘贤洪康红娟杨金峰
Owner SICHUAN CHANGHONG ELECTRIC CO LTD