Encryption and decryption method and device based on zipper type dynamic hash and NLFSR

An encryption and decryption, dynamic hashing technology, applied in the field of information security, can solve the problems of inability to obtain randomness and code distribution uniformity ciphertext, single encryption and decryption method, key stream generator attack and other problems, so as to improve the difficulty of deciphering, Convenient coding implementation, long randomness effect

Active Publication Date: 2019-07-05
ZHUHAI COLLEGE OF JILIN UNIV +1
View PDF17 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, a defect of this mechanism is that the security strength of the stream cipher depends entirely on the security strength of the keystream sequence. However, there have been many attack techniques on the keystream generator
Another defect of this mechanism is that the encryption and decryption method is single, which leads to the fact that for a short key stream sequence, the ciphertext with good randomness and code distribution uniformity cannot be obtained solely by XOR operation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and device based on zipper type dynamic hash and NLFSR
  • Encryption and decryption method and device based on zipper type dynamic hash and NLFSR
  • Encryption and decryption method and device based on zipper type dynamic hash and NLFSR

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The concept, specific structure and technical effects of the present application will be clearly and completely described below in conjunction with the embodiments and drawings, so as to fully understand the purpose, scheme and effect of the present application. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0083] It should be noted that, unless otherwise specified, when a feature is called "fixed" or "connected" to another feature, it can be directly fixed and connected to another feature, or indirectly fixed and connected to another feature. on a feature. In addition, descriptions such as up, down, left, and right used in the application are only relative to the mutual positional relationship of the components of the application in the drawings. As used in this application and the appended claims, the singular forms "a", "the", and "said" are inten...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An encryption and decryption method based on zipper type dynamic hashes and NLFSRs comprises the following steps that a nonlinear feedback function and a bit transformation Boolean function are used for preprocessing a seed secret key to form a secret key stream sequence; changing the bit value of the plaintext sequence according to the bit transformation Boolean function based on the key stream sequence to form a pseudo plaintext sequence; dividing the pseudo-plaintext sequence into a plurality of paths of pseudo-plaintext subsequences according to the key stream sequence; and calculating a dynamic hash address corresponding to the binary bit of each pseudo plaintext sequence according to a hash mapping rule depending on the key stream sequence, and mapping the pseudo plaintext subsequence hashes which are divided into multiple paths into a ciphertext space to form the ciphertext stream sequence. The method has the beneficial effects that the key stream generator not only uses a nonlinear feedback shift register, but also introduces a bit transformation Boolean function, so that the key stream with longer period and better randomness is obtained; and through a plaintext bit transformation rule and a zipper type dynamic hash mapping rule, the decoding difficulty of the ciphertext stream sequence is improved.

Description

technical field [0001] The present application relates to the field of information security, in particular to an encryption and decryption method and device based on zipper dynamic hash and NLFSR (Nonlinear Feedback Shift Register, nonlinear feedback shift register). This application can generally be used for network communication information encryption, aerospace digital remote control instruction and data encryption, drone digital remote control communication data encryption, early warning aircraft digital communication command system information encryption, GPS satellite digital communication data encryption, mobile communication encryption, and big data encryption , graphic image encryption and e-mail encryption, etc. After encryption, military, political and diplomatic documents can be transmitted using civilian communication networks to save on file transfer costs. Background technique [0002] A stream cipher is generally a symmetric key technique. Because of its si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0668
Inventor 冯广慧司玉娟郎六琪
Owner ZHUHAI COLLEGE OF JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products