Unlock instant, AI-driven research and patent intelligence for your innovation.

rc4 stream cipher generator

A stream cipher and generator technology, applied in the field of information security, can solve the problems of large hardware resource consumption, slow stream cipher generation speed, disadvantages, etc., and achieve the effect of reducing hardware resource consumption

Active Publication Date: 2018-11-09
SHANGHAI ADVANCED RES INST CHINESE ACADEMY OF SCI
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The traditional RC4 encryption / decryption device design method, such as the RC4 encryption / decryption device disclosed in the "RC4 stream cipher principle and hardware implementation" (author: Yangmei Zhang Yaowen) in the sixth issue of "Information and Communication" in 2009, has a slow stream cipher generation speed , and a large-capacity RAM module is required for S-BOX data storage and stream cipher cache, which consumes a lot of hardware resources, which is not conducive to low-cost passive RFID (Radio Frequency Identification, radio frequency identification) tags and other low-cost promotional use in design

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • rc4 stream cipher generator
  • rc4 stream cipher generator
  • rc4 stream cipher generator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] RC4 stream cipher generators such as figure 1 As shown, including K-box module, S-box module, j operation unit, q operation unit, output control logic module, main control logic module;

[0059] Described K-box module is used for storing the original key Key of M*N bit, and each each of the original key of M*N bit is set according to the set rule (setting The rules can be set arbitrarily, as long as the setting rules of the RC4 stream cipher generator in the encryption and decryption process are the same, such as the original key Key of M*N bits can be grouped sequentially, grouped at intervals, etc.) Level secret key vector skey, each group of level secret key vector skey includes 2 N N-bit-wide secondary key vector sskey, and each group of primary secret key vector skey and its secondary key vector sskey are sequentially output; N is a positive integer, M is an integer greater than or equal to 2 and M* N is less than or equal to 256, F is a positive integer and F*2 ...

Embodiment 2

[0085] Based on the RC4 stream cipher generator of Embodiment 1, the original key Key is 32 bits, M is 16, N is 2, and F is 8.

[0086] The K-box module, under the action of the encryption control signal ctrl of the main control logic module, sequentially updates 8 groups of primary secret key vectors skey: and updates the flag of the secondary key vector of the S-box module Under the action, sequentially update and output the next secondary key vector sskey in the current primary key vector skey;

[0087] The setting rules for an interval grouping are as follows:

[0088] skey[0] = {key[0], key[2], ..., key[14]};

[0089] skey[1] = {key[16], key[18], ..., key[30]};

[0090] skey[2] = {key[1], key[3], ..., key[15]};

[0091] skey[3] = {key[17], key[19], ..., key[31]};

[0092] skey[4] = {key[0], key[1], ..., key[7]};

[0093] skey[5] = {key[8], key[9], ..., key[15]};

[0094] skey[6] = {key[16], key[17], ..., key[23]};

[0095] skey[7] = {key[24], key[17], ..., key[31]}; ...

Embodiment 3

[0119] Based on the RC4 stream cipher generator of embodiment two, the S-box module, such as Figure 5 As shown, including S-box registers, RC4 processing logic units, and switching logic units;

[0120] The S-box register includes 4 registers with a width of 2 bits, wherein the values ​​of the 4 registers are respectively represented as S[0], S[1], S[2], S[3];

[0121] The RC4 processing logic unit controls the S-box register to output the values ​​S[i], S[j], S[q] of the corresponding registers according to the values ​​of i, j, and q, the encryption control signal ctrl, and the first clock clk1 ;

[0122] The RC4 processing logic unit works when the encrypted control signal ctrl is binary 0001 to 1000, and stops working when the encrypted control signal ctrl is binary 1001;

[0123] The RC4 processing logic unit, when starting to work, outputs the secondary key vector update flag flag as binary 00, and every time S[q] is output, the secondary key vector update flag flag o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an RC4 (Rivest cipher 4) stream cipher generator. A K-box module combines bits of an M*N-bit original key into F groups of primary key vectors according to set rules; each group of primary key vectors includes 2N N-bit-width secondary key vectors; the groups of primary key vectors and the secondary key vectors are output in order; generated stream ciphers are output under an N-bit-width format; the original key is divided into multiple secondary key vectors; each secondary key vector is short; the output key width used in each RC4 operation is only equal to the width of one secondary key vector, and a conventional 1-bit*256 RAM (random access memory) array is replaced with short registers in an S-box module; each group of primary key vectors outputs short stream ciphers in RC4 operation; temporary storage of the stream ciphers can be achieved with the smaller registers with no need for a high-capacity RAM module, and consumption of hardware resources is greatly decreased.

Description

technical field [0001] The invention relates to information security technology, in particular to an RC4 stream cipher generator. Background technique [0002] In the design of many information products, the security encryption of information transmission has to be considered, and the use of hardware for encryption is an efficient and safe solution. The RC4 stream cipher occupies an important position in current practical applications and can be used to encrypt transmitted information. [0003] RC4 is a group symmetric encryption algorithm, which has the advantages of high security and simple implementation, and is widely used in wireless network security. The basic idea of ​​RC4 encryption is to generate a pseudo-random sequence byte stream called a stream cipher, and then XOR it with plaintext data to generate ciphertext. The decryption algorithm is consistent with the encryption algorithm, and the same stream cipher is used to XOR the ciphertext to obtain the plaintext....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18
Inventor 吴淼张钊锋梅年松
Owner SHANGHAI ADVANCED RES INST CHINESE ACADEMY OF SCI