Unlock instant, AI-driven research and patent intelligence for your innovation.
Pseudo random sequence generation method based on t semi-order and sequence generator
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A pseudo-random sequence and sequence generator technology, applied in the field of sequence cryptography, can solve problems such as inability to guarantee absolute reliability
Inactive Publication Date: 2010-02-10
EAST CHINA JIAOTONG UNIVERSITY
View PDF0 Cites 6 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
In order to ensure that the pseudo-random generator is reliable, it must undergo a large number of tests, but the generator that passes the test can only show that it is partially reliable, and cannot be guaranteed to be absolutely reliable
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0056] Below we give a specific example. The space we choose is R 8 , that is, when u=8, set:
[0057] x(n)=(x n,1 , x n,2 , x n,3 , x n,4 , x n,5 , x n,6 , x n,7 , x n,8 ), x n,i ∈R + .
[0058] The following nonlinear operator iteration is established: x(n+1)=A(x(n)), where:
[0059] x n+1,1 =|p.sin 2 (qx n,8 x n,1 -rx n,2 x n,2 )| (1.1)
[0060] x n+1,2 =|p.sin 2 (qx n,1 x n,2 -rx n,3 x n,3 )| (1.2)
[0061] x n+1,3 =|p.sin 2 (qx n,2 x n,3 -rx n,4 x n,4 )| (1.3)
[0062] x n+1,4 =|p.sin 2 (qx n,3 x n,3 -rx n,5 x n,5 )| (1.4)
[0063] x n+1,5 =|p.sin 2 (qx n,4 x n,5 -rx n,6 x n,6 )| (1.5)
[0064] x n+1,6 =|p.sin 2 (qx n,5 x n,6 -rx n,7 x n,7 )| (1.6)
[0065] x n+1,7 =|p.sin 2 (qx n,6 x n,7 -rx n,8 x n,8 )| (1.7)
[0066] x n+1,8 =|p.sin 2 (qx n,7 x n,8 -rx n,1 x n,1 )| (1.8)
[0067] (where p, q, r>0, where q generally takes a larger number)
[0068] Taking this form of operator is mainly to consider that ...
[0085] According to the method of the present invention, the present embodiment combines a MATLAB example program for generating a binary stream of semi-sequential pseudo-random sequences to illustrate the establishment and work of the algorithm:
[0086] % Program 1: Generate Semi-Order Sequence Cipher Binary Stream Demonstration Program 1.0
[0092] MAXSIZE=512; % length of binary sequence to be generated
[0093] % define initial seed key
[0094] x(1)=0.43;
[0095] x(2)=2.3;
[0096] x(3)=1.52;
[0097] x(4)=3.4;
[0098] x(5)=2.78;
[0099] x(6)=5.34;
[0100] x(7)=7.42;
[0101] x(8)=4.51;
[0102] y=[0, 0, 0, 0, 0, 0, 0, 0]; % define a temporary array to save the iteration result
[0103] z=[0, 0,...
application example 1-
[0146] Application example 1 - sequence cipher program based on semi-ordered random sequence
[0147] It is very simple to use the partial-sequence cipher algorithm, as long as the plaintext is pre-processed and encrypted to obtain the plaintext binary stream, and XOR operation is performed with the partial-sequence cipher binary stream (such as figure 1 shown). The decryption process only needs to perform an XOR operation with the semi-sequence cipher binary stream (such as figure 2 shown). The key of the algorithm is to obtain the semi-ordered pseudo-random sequence binary stream.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a pseudo random sequence generation method based on t semi-order and a sequence generator. The method comprises the following steps: (S1) setting parameters p, q and r; (S2) setting a semi-order control secret key; (S3) setting an initial seed secret key; (S4) setting an initial number of iterations; (S5) establishing non-linear functional semi-order iteration; (S6) encoding in accordance with a compared semi-order result of a front iteration sequence and a back iteration sequence; and (S7) repeating the procedure (S5) to obtain a long enough sequence. The generator comprises a clock generator, a register for parameters p, q and r, a register for m namely the number of iterations, a register for the initial seed secret key and a register for the semi-order control secret key are connected with a non-linear iteration functional circuit by a data bus of the system; the non-linear iteration functional circuit has two outputs, wherein feeds back an intermediate iteration result into the register for the initial seed secret key, the other generates binary output which is input to an xor gate circuit with a binary flow required for encryption, and the xor gate circuit outputs the encrypted binary flow. The sequence of the invention has high degree of randomness, fast speed, relative simple operation, convenient hardware realization, consistent encryption / description devices and relatively low cost.
Description
technical field [0001] The invention belongs to the field of sequence cryptography in information securitycryptography. Background technique [0002] Sequence ciphers are also called stream ciphers. The encryption process is to first inject a specific seed key (session key) into the sequence cipher generator, and then use the pseudo-random bit sequence generated by the sequence cipher generator to perform bitwise XOR with the plaintext bit stream to obtain the ciphertext. There is no restriction on the length of the plaintext when using serial ciphers to encrypt, as long as the period of the generated serial ciphers is large enough, files of any length can be encrypted, which is very flexible. Compared with block cipher encryption methods, sequence cipher encryption is the fastest. Therefore, it is especially suitable for encryption occasions with large data volume and high real-time requirements. The security of serial cipher encryption depends on the internal mechanism...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.