Perturbation method and encryption method for character-oriented sequence with memory
A perturbation method and sequence technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as poor balance, sequence safety defects, uneven distribution, etc., to achieve improved implementation speed, strong security, and improved The effect of sequence imbalance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] When implementing the technical solution of the present invention, firstly, appropriate n and m should be selected. Generally, n is an even number, and m is n / 2. Secondly, positive-shaped permutations with good algebraic, differential, and linear properties should be selected as S-boxes. The S box can be regarded as a system key, and it can also be kept secret.
[0052] Implementation can be broken down into two basic steps:
[0053] Step A, for 2 m the contents of memory cells Assign initial value. Depending on the specific application method, it can be provided by the basic key or initial vector of the cryptographic algorithm, or it can be preset with random numbers or a certain set of constants.
[0054] Step B, for the input word sequence x =(x 0 , x 1 , ...) for each word x in i , do the following:
[0055] a) h=x i >>(n-m);
[0056] b) output z i = x i ⊕ ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


