Method for encrypting four non-linear driven light-weight stream ciphers

An encryption method and a lightweight technology, applied in the field of information security, can solve the problems of poor internal scrambling effect, vulnerability to attacks, and difficulty in implementing internal operations of stream cipher encryption algorithms, achieving the effect of easy internal operations.

Active Publication Date: 2013-06-19
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, the message sender and receiver share a seed key k through a secure channel. For each bit of plaintext xi, the sender uses a stream cipher encryption algorithm to generate a corresponding one-bit key stream zi, and then uses zi and The ciphertext yi is obtained by XORing the plaintext with xi, that is, After receiving yi, the receiver of the message uses the same method and the same key to generate the same key stream bit zi, and the plaintext xi can be recovered after XORing zi and yi, namely However, the internal operation of the traditional stream cipher encryption algorithm is not easy to realize, the internal scrambling effect is not good, and it is vulnerable to attacks. Therefore, the traditional stream cipher encryption algorithm needs to be further improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting four non-linear driven light-weight stream ciphers
  • Method for encrypting four non-linear driven light-weight stream ciphers
  • Method for encrypting four non-linear driven light-weight stream ciphers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] A light-weight stream cipher encryption method with four non-linear drivers, comprising the following steps:

[0048] The first stage is the internal state initialization stage.

[0049] (1.1) Randomly select a variable 88-bit seed key K=(k1, k2,...,k88), a variable 88-bit initial vector V=(v1, v2,...,v80 ), a fixed 80-bit constant value C=(c1, c2, ..., c80). In the present invention, the seed key K is always kept secret. The initial vector V is an arbitrary value agreed upon by both the sender and the receiver. The initial vector V can be kept secret or made public. In this embodiment, the constant value C is specifically (1, 0, 1, 0, . . . , 1, 0).

[0050] (1.2) Inject the above 88-bit seed key K, 88-bit initial vector V and 80-bit constant value C into a 256-bit long register (s1, s2, ..., s256). in

[0051] The state of registers (s1, s2, ..., s64) is injected by bits (k1, k2, ..., k22, v1, v2, ..., v22, c1, c2, ..., c20),

[0052] The state of registers (s6...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for encrypting four non-linear driven light-weight stream ciphers. Bit oriented exclusive OR and AND operation is adopted for operation, and internal operation is easy to realize; initialized internal vectors are subjected to multiple loops of bit mixing scrambling operation by using the multi-loop iterative algorithm of block ciphers, so that a scrambling effect can be quickly achieved; the effects of mixing and diffusing seed key bits can be quickly achieved by newly introducing partitioning alternative diffusion and multi-layer mixing technologies; four selected non-linear driven components have the stable cryptographic properties to resist multiple kinds of attacks; a biquadratic item is newly introduced at the key generation stage for non-linear scrambling, so that the conventional internal state recovery attack can be effectively resisted; a seed key has the length of 88 bits to ensure high safety intensity; the algorithm is simple, software and hardware can be easily implemented in parallel, and the method is particularly suitable to be used under the environment that resources are limited, such as a wireless sensor network; and the storage cost for implementation is low.

Description

technical field [0001] The invention relates to the field of information security, in particular to a four-nonlinear-driven lightweight stream cipher encryption method. Background technique [0002] In the process of data transmission, some sensitive data needs to be encrypted to prevent the attacker from eavesdropping, so that the attacker can only eavesdrop on the ciphertext but cannot obtain any useful information, and only the legitimate receiver who has the key can decrypt and restore the real news. In data encryption algorithms, there are two types of encryption algorithms. One is the block encryption algorithm, and the other is the stream cipher encryption algorithm (also known as the sequence cipher). The encrypted data of the block encryption algorithm is of fixed length (divided into groups), while the encryption length of the stream cipher encryption algorithm is a value with a large variable range. The block cipher uses a certain size as the basic unit of each...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 丁勇韦永壮丁继强官秀国李新国
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products