Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption method and device based on zipper type dynamic hash and nlfsr

A dynamic hashing, encryption and decryption technology, applied in the field of information security, can solve the problems of inability to obtain randomness and code distribution uniformity ciphertext, single encryption and decryption method, key stream generator attack, etc. Convenient coding implementation, long randomness effect

Active Publication Date: 2020-09-08
ZHUHAI COLLEGE OF JILIN UNIV +1
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, a defect of this mechanism is that the security strength of the stream cipher depends entirely on the security strength of the keystream sequence. However, there have been many attack techniques on the keystream generator
Another defect of this mechanism is that the encryption and decryption method is single, which leads to the fact that for a short key stream sequence, the ciphertext with good randomness and code distribution uniformity cannot be obtained solely by XOR operation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and device based on zipper type dynamic hash and nlfsr
  • Encryption and decryption method and device based on zipper type dynamic hash and nlfsr
  • Encryption and decryption method and device based on zipper type dynamic hash and nlfsr

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The concept, specific structure and technical effects of the present application will be clearly and completely described below in conjunction with the embodiments and drawings, so as to fully understand the purpose, scheme and effect of the present application. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0083] It should be noted that, unless otherwise specified, when a feature is called "fixed" or "connected" to another feature, it can be directly fixed and connected to another feature, or indirectly fixed and connected to another feature. on a feature. In addition, descriptions such as up, down, left, and right used in the application are only relative to the mutual positional relationship of the components of the application in the drawings. As used in this application and the appended claims, the singular forms "a", "the", and "said" are inten...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An encryption and decryption method and device employing zipper-type dynamic hashing and NLFSR techniques. An encryption process comprises the following steps: using a nonlinear feedback function and a bit-manipulation Boolean function to pre-process a seed key, so as to form a keystream sequence; changing, according to the bit-manipulation Boolean function employing the keystream sequence, a bit value of a plaintext sequence, so as to form a pseudo-plaintext sequence; dividing, according to the keystream sequence, the pseudo-plaintext sequence into multiple pseudo-plaintext subsequences; and calculating, according to a hash mapping rule depending on the keystream sequence, a dynamic hash address corresponding to a binary bit of each respective pseudo-plaintext sequence, and mapping, by means of a hash function, the multiple pseudo-plaintext subsequences to a ciphertext space, so as to form a ciphertext stream sequence. The present application has the following beneficial effects: keystream generators, beside using nonlinear feedback shift registers, also use a bit-manipulation Boolean function so as to obtain keystreams having a longer period and improved randomness; moreover, bit-manipulation rules for plaintexts and mapping rules employing zipper-type dynamic hashing are used to increase the difficulty of decoding ciphertext stream sequences.

Description

technical field [0001] The present application relates to the field of information security, in particular to an encryption and decryption method and device based on zipper dynamic hash and NLFSR (Nonlinear Feedback Shift Register, nonlinear feedback shift register). This application can generally be used for network communication information encryption, aerospace digital remote control instruction and data encryption, drone digital remote control communication data encryption, early warning aircraft digital communication command system information encryption, GPS satellite digital communication data encryption, mobile communication encryption, and big data encryption , graphic image encryption and e-mail encryption, etc. After encryption, military, political and diplomatic documents can be transmitted using civilian communication networks to save on file transfer costs. Background technique [0002] A stream cipher is generally a symmetric key technique. Because of its si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L9/0668
Inventor 冯广慧司玉娟郎六琪
Owner ZHUHAI COLLEGE OF JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products