Word-oriented key stream generating method and encrypting method

A key stream and message word technology, applied in the field of information security transmission, can solve problems such as the inability to meet the needs of implementation speed, and achieve the effects of good security, good randomness and non-linearity

Inactive Publication Date: 2010-09-22
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the rapid development of communication networks and computer networks, the traditional key stream generation method that g

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Word-oriented key stream generating method and encrypting method
  • Word-oriented key stream generating method and encrypting method
  • Word-oriented key stream generating method and encrypting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0050] figure 1 It is a schematic diagram of the basic steps of the key stream generation method of the present invention, including each step and the input-output relationship between each step. Among them, the generation step generates a source sequence with good randomness and long period, which is input to the selection step. The selection step selects bits in the source sequence to form four outputs. Three of them are input to the obfuscation step and one is input to the output step. The obfuscation step performs a non-linear compressive transformation on three inputs to produce one output. The output step receives an output of the selection step and an output of the obfuscation step, and combines and compresses to obtain a key stream output.

[0051] figure 2 is a schematic diagram of the detailed steps of the key stream generation m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a word-oriented key stream generating method and an encrypting method. The key stream generating method comprises the steps of: generating, namely generating a source sequence and outputting the source sequence to a selecting step; selecting, namely selecting some bits in the source sequence to form four outputs, wherein three outputs are inputted to a mixing step, and another output is outputted to an outputting step; mixing, namely performing non-linear compression transformation on the three inputs to form an output; and outputting, namely receiving the output of the selecting step and the output of the mixing step and performing combined compression to obtain the key stream for outputting. The key stream sequence generated by the method has quite high randomness and non-linearity, and is much suitable to be quickly realized by software and hardware; and the encrypting method by using the key stream generated in the invention has higher security.

Description

technical field [0001] The invention is mainly applied to the field of information security transmission, and specifically relates to a key stream generation method and an encryption method for generating a key stream sequence for encryption. Background technique [0002] Cryptography has a long history and was originally used to secure military and diplomatic communications. However, with the popularization of communication networks and computer networks, the application of modern cryptography is no longer limited to politics, military and diplomacy, and its commercial and social values ​​have been widely recognized. Secrecy is at the heart of cryptography, and encryption is a practical tool for obtaining the secrecy of information. Modern encryption technology is some mathematical transformation (algorithm). Under the control of the secret information (encryption key) owned by the encryptor, the information to be encrypted (plaintext) is transformed into information (ciph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/18H04L9/06
Inventor 冯登国戚文峰胡予濮
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products