Pseudorandom sequence generation method and pseudorandom sequence encryption method

A pseudo-random sequence and generation method technology, applied in the field of information security, can solve the problems of difficulty in success, the weight sequence does not have algebraic equivalence, and the realization efficiency cannot be satisfied, so as to reduce the difficulty and complexity, and achieve a sequence cryptosystem Simple, easy-to-implement effects

Inactive Publication Date: 2010-03-17
THE PLA INFORMATION ENG UNIV
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When e=8, the size of the register must reach 456 bits; when e=16, the size of the register needs 784 bits; when e=32, the size of the register is 1056 bits; therefore, Z/(2 e ) on the primitive sequence is very unsatisfactory
[0006] (2) The weight sequence does not have algebraic equivalence
However, masking weaknesses in sequence sources is always a concern, as is the case with GF(2

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudorandom sequence generation method and pseudorandom sequence encryption method
  • Pseudorandom sequence generation method and pseudorandom sequence encryption method
  • Pseudorandom sequence generation method and pseudorandom sequence encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will provide a pseudo-random sequence generation method with bit-equivalent entropy-preserving output sequence, and at the same time provide a method for constructing a stream cipher system with the sequence generated by this method as the core sequence source, and design a specific stream The cryptographic system is named "Flying-Ring".

[0020] (1) Sequence generation method

[0021] The sequence obtained by the sequence generation method provided by the present invention is referred to as "loop Z / (2 e -1) Upper Primitive Sequence", the specific generation method is as follows:

[0022] (1) The parameters e and n are all positive integers greater than or equal to 2;

[0023] (2) Select polynomial f(x)=x n -(c n-1 x n-1 +c n-2 x n-2 +...+c 0 ), c i ∈{0,1,...,2 e -2}, i=0, 1, ..., n-1, satisfy the following properties: for integer 2 e Any prime number power factor p greater than 1 of -1 w , where p is a prime number, f(x)(mod p w ) The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a pseudorandom sequence generation method, which comprises: acquiring elements from a value range of {1,2,...,2<e>-1}, wherein e is a positive integer greater than 2; and generating a sequence in a linear recurrence mode based on the elements and a primitive polynomial over Z/(2e-1), wherein in the initial state of the sequence, at least one element is relatively prime to 2<e>-1. The method can generate the pseudorandom sequence with equivalent entropy preservability, rich nonlinear structures and quick periodical growth, balances sequence period and the number of sequence inequal circles, greatly reduces the complexity of sequence source processing in algorithm design and makes the sequential cipher system simple and safe. The invention also provides a method for building a stream cipher system, which comprises: generating the pseudorandom sequence with equivalent entropy preservability by the previous method and using the pseudorandom sequence as a core sequence source; and in a key word combination process, evenly distributing key output by using the elements or operation and providing a simple, safe and high-efficiency sequential cipher algorithm for guaranteeing data security.

Description

technical field [0001] The present invention relates to the technical field of information security. Specifically, the present invention provides a pseudo-random sequence generation method and an encryption method that output bit equivalent entropy. Background technique [0002] The selection and design of pseudo-random sequence sources is a core content in the design of sequence ciphers. The sequence source design based on the shift register mostly considers the m-sequence on the binary field GF(2) or the general finite field GF(2 n ) on a linear recursive sequence. However, there are obvious and multiple linear relationships among the bits of such sequences, which makes sequence ciphers based on them vulnerable to correlation attacks. In addition, the method of linear recursion and simple nonlinear transformation method also make it possible to establish low-degree equations by algebraic attack. Therefore, with GF(2 n ) as a sequence source, it will lead to the difficu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/18G09C1/00
Inventor 朱宣勇戚文峰田甜
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products