Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Secure Communication Protocol Based on Stream Cipher

A secure communication and stream cipher technology, applied in the fields of stream cipher, data verification, and finite field calculation, can solve the problems of high key operation cost, large packet length, and low encryption speed, and achieve large and fast key space. The effect of encryption and calculation is simple

Active Publication Date: 2018-01-16
江苏参互延信息科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the block length is too large, the calculation cost of key generation will be very high, resulting in much lower encryption speed than traditional ciphers such as DES, so RSA is only suitable for smaller files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Secure Communication Protocol Based on Stream Cipher
  • A Secure Communication Protocol Based on Stream Cipher
  • A Secure Communication Protocol Based on Stream Cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Below in conjunction with specific embodiment, the present invention will be further described:

[0052] In the stream cipher system, there are two ways to generate keys: one is a true random number generator based on physical information, and the other is a pseudo-random number generator based on mathematical functions. The present invention uses a pseudo-random number generator to generate non-subjective keys. Depending on the nature of pseudo-random numbers, different seeds will generate different random sequences. Traditional cryptography changes the position by means of replacement, which cannot fundamentally solve the problem of data security. However, using GF(2 8 ) can provide a higher level of security guarantees. At the same time, in terms of data processing, MD5 is added, which doubles the data volume and has fault tolerance.

[0053] A secure communication protocol based on stream ciphers, characterized in that the communication is encrypted once, the key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a stream cipher based secure communication protocol. The communication is one-time pad, keys are owned by both parties and are synchronous, the generation speed is fast, the fault-tolerant capacity is achieved, a 128-bit original text is processed every time, digital signature and data encryption are performed on the original text, and subsequently, 256-bit processed data are sent; firstly, original text grouping and hashed value calculation are performed, secondly, the data are encrypted, and finally, data decryption is achieved. According to the stream cipher based secure communication protocol, a method is designed on the basis of a stream cipher system, a grouping encryption processing structure is used for reference, the 256-bit data can be processed every time, high encryption and decryption efficiency is achieved, a random number generator is used for generating the keys which are owned by both communication parties and are synchronous, and the occupation space of the keys is small.

Description

Technical field: [0001] The invention relates to a secure communication protocol, in particular to a stream cipher-based secure communication protocol, and belongs to the technical fields of stream cipher, finite field calculation, data verification and the like. Background technique: [0002] Cryptography is the core of information security technology, and it mainly consists of two branches: cryptography and cryptanalysis. Cryptography is gradually developed in the practice of struggle between encoding and deciphering, and with the application of advanced science and technology, it has become a comprehensive and cutting-edge technical science. It is an interdisciplinary subject integrating linguistics, mathematics, electronics, acoustics, information theory, computer science, and communication and information systems, and covers a wide range of subjects. Password is an important means of confidentiality for the two parties in communication to carry out special transformati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 张志佳舒景辰张丹
Owner 江苏参互延信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products