rc4 stream cipher generator
A stream cipher and generator technology, applied in the field of information security, can solve the problems of large hardware resource consumption, slow stream cipher generation speed, disadvantages, etc., and achieve the effect of reducing hardware resource consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] RC4 stream cipher generators such as figure 1 As shown, including K-box module, S-box module, j operation unit, q operation unit, output control logic module, main control logic module;
[0059] Described K-box module is used for storing the original key Key of M*N bit, and each each of the original key of M*N bit is set according to the set rule (setting The rules can be set arbitrarily, as long as the setting rules of the RC4 stream cipher generator in the encryption and decryption process are the same, such as the original key Key of M*N bits can be grouped sequentially, grouped at intervals, etc.) Level secret key vector skey, each group of level secret key vector skey includes 2 N N-bit-wide secondary key vector sskey, and each group of primary secret key vector skey and its secondary key vector sskey are sequentially output; N is a positive integer, M is an integer greater than or equal to 2 and M* N is less than or equal to 256, F is a positive integer and F*2 ...
Embodiment 2
[0085] Based on the RC4 stream cipher generator of Embodiment 1, the original key Key is 32 bits, M is 16, N is 2, and F is 8.
[0086] The K-box module, under the action of the encryption control signal ctrl of the main control logic module, sequentially updates 8 groups of primary secret key vectors skey: and updates the flag of the secondary key vector of the S-box module Under the action, sequentially update and output the next secondary key vector sskey in the current primary key vector skey;
[0087] The setting rules for an interval grouping are as follows:
[0088] skey[0] = {key[0], key[2], ..., key[14]};
[0089] skey[1] = {key[16], key[18], ..., key[30]};
[0090] skey[2] = {key[1], key[3], ..., key[15]};
[0091] skey[3] = {key[17], key[19], ..., key[31]};
[0092] skey[4] = {key[0], key[1], ..., key[7]};
[0093] skey[5] = {key[8], key[9], ..., key[15]};
[0094] skey[6] = {key[16], key[17], ..., key[23]};
[0095] skey[7] = {key[24], key[17], ..., key[31]}; ...
Embodiment 3
[0119] Based on the RC4 stream cipher generator of embodiment two, the S-box module, such as Figure 5 As shown, including S-box registers, RC4 processing logic units, and switching logic units;
[0120] The S-box register includes 4 registers with a width of 2 bits, wherein the values of the 4 registers are respectively represented as S[0], S[1], S[2], S[3];
[0121] The RC4 processing logic unit controls the S-box register to output the values S[i], S[j], S[q] of the corresponding registers according to the values of i, j, and q, the encryption control signal ctrl, and the first clock clk1 ;
[0122] The RC4 processing logic unit works when the encrypted control signal ctrl is binary 0001 to 1000, and stops working when the encrypted control signal ctrl is binary 1001;
[0123] The RC4 processing logic unit, when starting to work, outputs the secondary key vector update flag flag as binary 00, and every time S[q] is output, the secondary key vector update flag flag o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


