Unlock instant, AI-driven research and patent intelligence for your innovation.

Perturbation method and encryption method for character-oriented sequence with memory

A perturbation method and sequence technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as poor balance, sequence safety defects, uneven distribution, etc., to achieve improved implementation speed, strong security, and improved The effect of sequence imbalance

Inactive Publication Date: 2013-02-06
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] However, the sequence generated by the above sequence perturbation method is not well balanced, that is, the value of each element in the sequence generated by the random sequence after perturbation is unevenly distributed in the element value space
This will make the output sequence have a large security flaw

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Perturbation method and encryption method for character-oriented sequence with memory
  • Perturbation method and encryption method for character-oriented sequence with memory
  • Perturbation method and encryption method for character-oriented sequence with memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] When implementing the technical solution of the present invention, firstly, appropriate n and m should be selected. Generally, n is an even number, and m is n / 2. Secondly, positive-shaped permutations with good algebraic, differential, and linear properties should be selected as S-boxes. The S box can be regarded as a system key, and it can also be kept secret.

[0052] Implementation can be broken down into two basic steps:

[0053] Step A, for 2 m the contents of memory cells Assign initial value. Depending on the specific application method, it can be provided by the basic key or initial vector of the cryptographic algorithm, or it can be preset with random numbers or a certain set of constants.

[0054] Step B, for the input word sequence x =(x 0 , x 1 , ...) for each word x in i , do the following:

[0055] a) h=x i >>(n-m);

[0056] b) output z i = x i ⊕ ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a perturbation method and an encryption method for a character-oriented sequence with memory and belongs to the field of information processing and transmission. The perturbation method comprises the following steps of: (1) presetting 2m memory units and assigning initial values for the 2m memory units; (2) carrying out the following operations on each input character xi: (a) taking a high m-bit value h of the xi and setting a content yh of a hth unit and outputting a character; and (b) taking a low m-bit value t of the xi, carrying out xor on a value of the xi converted by an S box and a content yt of a tth unit, updating yh in a result, carrying out xor on a value of the updated yt converted by the S box and the yh and updating yh in a result; and (3) using characters zi which are output sequentially as a perturbed key stream sequence. The encryption method comprises that: (1) a message sending party generates a key stream, then carries out bitwise xor on the key stream and an original message, encrypts the original message and sends the encrypted original message to a message receiving party; and (2) the message receiving party generates the key stream, then carries out bitwise xor on the encrypted message received by the message receiving party and decrypts the encrypted message to obtain the original message. The perturbation method and the encryption method for the character-oriented sequence with the memory improve implement speed of encryption software and have strong safety.

Description

technical field [0001] The present invention relates to a method for information transmission and processing, more precisely, relates to a word-oriented, memory-carrying sequence perturbation method and encryption method. The mixed-type logic with memory based on the whole word operation is used to enhance the anti-analysis strength of the sequence cipher algorithm. Background technique [0002] Cryptography technology has a long history and was originally used to protect the security of military and diplomatic communications. However, with the popularization of communication networks and computer networks, the application of modern cryptography is no longer limited to politics, military affairs and diplomacy, and its commercial and social value has been greatly improved. widely recognized. Secrecy is at the heart of cryptography, and encryption is a practical tool for obtaining the secrecy of information. [0003] Cryptographic algorithms are divided into public key crypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 冯秀涛周春芳冯登国
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI