Stream ciphering technique

A technology of key stream and data stream, which is applied in encryption devices with shift registers/memory, digital transmission systems, electrical components, etc., and can solve problems such as bottlenecks

Active Publication Date: 2017-08-29
TELEFON AB LM ERICSSON (PUBL)
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at encrypted data rates below 1Gbps, existing ciphers will create a bottleneck in the most demanding LTE-Advanced and 5G applications for this data rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stream ciphering technique
  • Stream ciphering technique
  • Stream ciphering technique

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In the following description, for purposes of explanation and not limitation, specific details are set forth (eg, specific device contexts) in order to provide a thorough understanding of the technology disclosed herein. It will be apparent, however, to one skilled in the art that the technology may be practiced in other embodiments that depart from these specific details. Furthermore, although the following embodiments are described primarily with respect to wireless communication networks such as the successors of Long Term Evolution (LTE), it will be apparent that the techniques described herein may also be used in networks including 3rd Generation Partnership Project (3GPP) networks, non- Implemented in 3GPP networks (eg according to the IEEE 802.3 or IEEE 802.11 series of standards) and other mobile and fixed communication networks, wireless or wireline, and combinations thereof. Furthermore, the described techniques can be implemented at one or more layers of a pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A technique for generating a keystream (128) for ciphering or deciphering a data stream (122) is provided. As to a method aspect of the technique, a nonlinear feedback shift register, NLFSR (112), including n register stages implemented in a Galois configuration is operated. At least one register stage of the implemented n register stages is representable by at least one register stage of a linear feedback shift register, LFSR. A first subset of the implemented n register stages is representable by a second subset of a second NLFSR. A number of register stages receiving a nonlinear feedback in the second NLFSR is greater than one and less than a number of register stages receiving a nonlinear feedback in the implemented NLFSR. The keystream (128) is outputted from a nonlinear output function (118). An input of the nonlinear output function (118) is coupled to at least two of the implemented n register stages of the NLFSR (112).

Description

technical field [0001] The present disclosure generally relates to encryption and / or decryption. More specifically and without limitation, a method and apparatus for generating a keystream for encrypting or decrypting a data stream is provided. Furthermore, a system for encrypting or decrypting a data stream is provided. Background technique [0002] Wireless communication requires effective and secure encryption, also known as cipher. The need for more efficient encryption techniques (also known as ciphers) is expected to increase with new generations of wireless communications (for example, in 5G systems) due to the expected significant increase in required data rates. Furthermore, services that are critical to society, such as transportation, e-health, smart city management, and environmental monitoring, require security mechanisms that provide a high level of assurance. [0003] For encryption purposes, there are two types of ciphers, namely block ciphers and stream c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0668H04L2209/122H04L2209/125H04L9/0631H04L9/0861H04L2209/12
Inventor 马茨·尼斯伦埃琳娜·杜波罗瓦马丁·黑尔伯纳德·斯密茨
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products