Pseudo random sequence generation method based on t semi-order and sequence generator

A pseudo-random sequence and sequence generator technology, applied in the field of sequence cryptography, can solve problems such as inability to guarantee absolute reliability

Inactive Publication Date: 2010-02-10
EAST CHINA JIAOTONG UNIVERSITY
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to ensure that the pseudo-random generator is reliable, it must undergo a large number of tests, but the generator that passes the test can only show that it is partially reliable, and cannot be guaranteed to be absolutely reliable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo random sequence generation method based on t semi-order and sequence generator
  • Pseudo random sequence generation method based on t semi-order and sequence generator
  • Pseudo random sequence generation method based on t semi-order and sequence generator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Below we give a specific example. The space we choose is R 8 , that is, when u=8, set:

[0057] x(n)=(x n,1 , x n,2 , x n,3 , x n,4 , x n,5 , x n,6 , x n,7 , x n,8 ), x n,i ∈R + .

[0058] The following nonlinear operator iteration is established: x(n+1)=A(x(n)), where:

[0059] x n+1,1 =|p.sin 2 (qx n,8 x n,1 -rx n,2 x n,2 )| (1.1)

[0060] x n+1,2 =|p.sin 2 (qx n,1 x n,2 -rx n,3 x n,3 )| (1.2)

[0061] x n+1,3 =|p.sin 2 (qx n,2 x n,3 -rx n,4 x n,4 )| (1.3)

[0062] x n+1,4 =|p.sin 2 (qx n,3 x n,3 -rx n,5 x n,5 )| (1.4)

[0063] x n+1,5 =|p.sin 2 (qx n,4 x n,5 -rx n,6 x n,6 )| (1.5)

[0064] x n+1,6 =|p.sin 2 (qx n,5 x n,6 -rx n,7 x n,7 )| (1.6)

[0065] x n+1,7 =|p.sin 2 (qx n,6 x n,7 -rx n,8 x n,8 )| (1.7)

[0066] x n+1,8 =|p.sin 2 (qx n,7 x n,8 -rx n,1 x n,1 )| (1.8)

[0067] (where p, q, r>0, where q generally takes a larger number)

[0068] Taking this form of operator is mainly to consider that ...

Embodiment 2

[0084] MATLAB Implementation Example of the Algorithm

[0085] According to the method of the present invention, the present embodiment combines a MATLAB example program for generating a binary stream of semi-sequential pseudo-random sequences to illustrate the establishment and work of the algorithm:

[0086] % Program 1: Generate Semi-Order Sequence Cipher Binary Stream Demonstration Program 1.0

[0087] t=[2.5, 3.2, 4, 1.2, 3, 5, 2.5, 4]; % semi-sequence control key

[0088] q = 2137; % parameter q

[0089] p=3.7; % parameter p

[0090] r=7; % parameter r

[0091] m=43; % initial iteration number

[0092] MAXSIZE=512; % length of binary sequence to be generated

[0093] % define initial seed key

[0094] x(1)=0.43;

[0095] x(2)=2.3;

[0096] x(3)=1.52;

[0097] x(4)=3.4;

[0098] x(5)=2.78;

[0099] x(6)=5.34;

[0100] x(7)=7.42;

[0101] x(8)=4.51;

[0102] y=[0, 0, 0, 0, 0, 0, 0, 0]; % define a temporary array to save the iteration result

[0103] z=[0, 0,...

application example 1-

[0146] Application example 1 - sequence cipher program based on semi-ordered random sequence

[0147] It is very simple to use the partial-sequence cipher algorithm, as long as the plaintext is pre-processed and encrypted to obtain the plaintext binary stream, and XOR operation is performed with the partial-sequence cipher binary stream (such as figure 1 shown). The decryption process only needs to perform an XOR operation with the semi-sequence cipher binary stream (such as figure 2 shown). The key of the algorithm is to obtain the semi-ordered pseudo-random sequence binary stream.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a pseudo random sequence generation method based on t semi-order and a sequence generator. The method comprises the following steps: (S1) setting parameters p, q and r; (S2) setting a semi-order control secret key; (S3) setting an initial seed secret key; (S4) setting an initial number of iterations; (S5) establishing non-linear functional semi-order iteration; (S6) encoding in accordance with a compared semi-order result of a front iteration sequence and a back iteration sequence; and (S7) repeating the procedure (S5) to obtain a long enough sequence. The generator comprises a clock generator, a register for parameters p, q and r, a register for m namely the number of iterations, a register for the initial seed secret key and a register for the semi-order control secret key are connected with a non-linear iteration functional circuit by a data bus of the system; the non-linear iteration functional circuit has two outputs, wherein feeds back an intermediate iteration result into the register for the initial seed secret key, the other generates binary output which is input to an xor gate circuit with a binary flow required for encryption, and the xor gate circuit outputs the encrypted binary flow. The sequence of the invention has high degree of randomness, fast speed, relative simple operation, convenient hardware realization, consistent encryption/description devices and relatively low cost.

Description

technical field [0001] The invention belongs to the field of sequence cryptography in information security cryptography. Background technique [0002] Sequence ciphers are also called stream ciphers. The encryption process is to first inject a specific seed key (session key) into the sequence cipher generator, and then use the pseudo-random bit sequence generated by the sequence cipher generator to perform bitwise XOR with the plaintext bit stream to obtain the ciphertext. There is no restriction on the length of the plaintext when using serial ciphers to encrypt, as long as the period of the generated serial ciphers is large enough, files of any length can be encrypted, which is very flexible. Compared with block cipher encryption methods, sequence cipher encryption is the fastest. Therefore, it is especially suitable for encryption occasions with large data volume and high real-time requirements. The security of serial cipher encryption depends on the internal mechanism...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/22
Inventor 左黎明汤鹏志
Owner EAST CHINA JIAOTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products