Encryption and decryption of a dataset in at least two dimensions
A data set and encrypted technology, which is applied in the field of cryptography, can solve the problems of increased memory read operations, disrupting the timing of the work platform, and difficult memory encryption, etc., to achieve the effect of fast access
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] The illustrations in the illustrations are outlines. It should be noted that in the different drawings, reference signs provided for similar or identical elements differ from the corresponding reference signs only in the first digit.
[0053] The embodiments of the invention described below essentially provide a new form of stream cipher. Therefore, to facilitate understanding of these embodiments, some background information on known stream cipher encryption and stream cipher decryption will first be given.
[0054] Stream ciphers are usually based on linear feedback shift registers and nonlinear Boolean elements. It is designed to be simple and easy to implement in hardware. Assuming a key k and an initialization vector IV, a bit stream is generated from the internal state s of the internal cryptographic registers.
[0055] Here f is the stream cipher update function, and S i is the internal register structure of the stream cipher after encrypting the bit i of the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 