Stream cipher based secure communication protocol

A technology of secure communication and stream cipher, which is applied in the field of secure communication protocol and secure communication protocol based on stream cipher, which can solve the problems of low encryption speed, large packet length, high cost of key operation, etc., and achieve fast encryption and strong parallel computing The effect of large capacity and key space

Active Publication Date: 2014-05-21
江苏参互延信息科技有限公司
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the block length is too large, the calculation cost of key generation will be very high, result...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stream cipher based secure communication protocol
  • Stream cipher based secure communication protocol
  • Stream cipher based secure communication protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Below in conjunction with specific embodiment, the present invention will be further described:

[0052] In the stream cipher system, there are two ways to generate keys: one is a true random number generator based on physical information, and the other is a pseudo-random number generator based on mathematical functions. The present invention uses a pseudo-random number generator to generate non-subjective keys. Depending on the nature of pseudo-random numbers, different seeds will generate different random sequences. Traditional cryptography changes the position by means of replacement, which cannot fundamentally solve the problem of data security. However, using GF(2 8 ) can provide a higher level of security guarantees. At the same time, in terms of data processing, MD5 is added, which doubles the data volume and has fault tolerance.

[0053] A secure communication protocol based on stream ciphers, characterized in that the communication is encrypted once, the key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a stream cipher based secure communication protocol. The communication is one-time pad, keys are owned by both parties and are synchronous, the generation speed is fast, the fault-tolerant capacity is achieved, a 128-bit original text is processed every time, digital signature and data encryption are performed on the original text, and subsequently, 256-bit processed data are sent; firstly, original text grouping and hashed value calculation are performed, secondly, the data are encrypted, and finally, data decryption is achieved. According to the stream cipher based secure communication protocol, a method is designed on the basis of a stream cipher system, a grouping encryption processing structure is used for reference, the 256-bit data can be processed every time, high encryption and decryption efficiency is achieved, a random number generator is used for generating the keys which are owned by both communication parties and are synchronous, and the occupation space of the keys is small.

Description

Technical field: [0001] The invention relates to a secure communication protocol, in particular to a stream cipher-based secure communication protocol, and belongs to the technical fields of stream cipher, finite field calculation, data verification and the like. Background technique: [0002] Cryptography is the core of information security technology, and it mainly consists of two branches: cryptography and cryptanalysis. Cryptography is gradually developed in the practice of struggle between encoding and deciphering, and with the application of advanced science and technology, it has become a comprehensive and cutting-edge technical science. It is an interdisciplinary subject integrating linguistics, mathematics, electronics, acoustics, information theory, computer science, and communication and information systems, and covers a wide range of subjects. Password is an important means of confidentiality for the two parties in communication to carry out special transformati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 张志佳舒景辰张丹
Owner 江苏参互延信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products