Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Stream cipher system generation method and apparatus, and terminal device

A technology of stream cipher and applied cipher, which is applied in the field of computer-readable storage medium and generation of stream cipher system, and can solve the problem of low security of stream cipher system

Active Publication Date: 2020-06-26
SHENZHEN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of this application provides the generation method, device, terminal equipment and computer-readable storage medium of the stream cipher system, which can solve the security of the existing stream cipher system lower problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stream cipher system generation method and apparatus, and terminal device
  • Stream cipher system generation method and apparatus, and terminal device
  • Stream cipher system generation method and apparatus, and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] The applicant is aware, after an analysis of the prior art, that although the current figure 1 Some block cipher algorithm design methods are gradually integrated in the module 1 of , but the existing stream cipher algorithms are essentially based on the theoretical model of Shannon's perfect security system. That is, the prior art mainly has the following problems:

[0034](1) The application conditions of the theoretical model are limited: according to the existing cryptosystem theory, the theoretical basis of the existing stream cipher system is the perfect security system model proposed by Shannon. Moreover, the theoretical model requires that the number of keys should not be less than the number of plaintexts. Among them, the most perfect and most commonly used form of application is to design the number of basic keys equal to the number of basic plaintexts, and then use them evenly. In this way, in the design of computer security communication system, the theoret...

Embodiment 2

[0133] Corresponding to the generation method of the stream cipher system described in the above embodiments, Figure 4 A structural block diagram of the device for generating a stream cipher system provided by the embodiment of the present application is shown, and for convenience of description, only parts related to the embodiment of the present application are shown.

[0134] refer to Figure 4 , the generating device 4 of the stream cipher system includes: a closed orthogonal Latin square group construction unit 41, a basic key number determination unit 42, a key stream sequence acquisition unit 43, and a stream cipher system determination unit 44, wherein:

[0135]A closed orthogonal Latin square group construction unit 41 is used to construct a closed orthogonal Latin square group, wherein one closed orthogonal Latin square group is the largest closed reversible transformation group including transformation and its inverse transformation, An orthogonal Latin square gro...

Embodiment 3

[0164] Figure 5 It is a schematic structural diagram of a terminal device provided in Embodiment 3 of the present application. Such as Figure 5 As shown, the terminal device 5 of this embodiment includes: at least one processor 50 ( Figure 5 Only one processor is shown in ), a memory 51 and a computer program 52 stored in the memory 51 and operable on the at least one processor 50. When the processor 50 executes the computer program 52, the above-mentioned Steps in any of the various method embodiments:

[0165] Construct a closed orthogonal Latin square group, wherein, a closed orthogonal Latin square group is the largest closed reversible transformation group containing transformation and its inverse transformation, an orthogonal Latin square group includes at least one Latin square, a The Latin square is used as a minimum closed reversible transformation subgroup of the closed reversible transformation group, and the orders of all the Latin squares are equal, and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of information safety, and provides a stream cipher system generation method and device, and terminal equipment. The method comprises the steps: constructing a closed orthogonal Latin square group; determining the number of different basic keys contained in a 2i-element basic key space according to the number of the closed reversible transformationsubsets; obtaining a 2i-element key stream sequence; determining a corresponding application encryption function and a corresponding application decryption function according to the 2i-element basickey space, the basic encryption transformation and the decryption transformation; and determining an application encryption function, an application decryption function and a source key space according to the 2i-element key stream sequence and the main key space of the 2i-element key stream sequence so as to determine an application cryptosystem, and determining a stream cryptosystem according toa basic cryptosystem and the application cryptosystem. Through the method, the safety of the stream cipher system can be improved.

Description

technical field [0001] The present application belongs to the technical field of information security, and in particular relates to a generation method, device, terminal equipment and computer-readable storage medium of a stream cipher system. Background technique [0002] At present, the stream cipher algorithm is a technology often used in the field of information security. In the field of information security, a variety of stream cipher algorithm standards have been formed, such as RC4, A5 and Zu Chongzhi. The common feature of these algorithms is to use the simplest modulo 2 addition linear operation to design the basic cryptosystem, and then combine the 2-element key stream sequence space to design the entire stream cipher algorithm. The design principles of the current popular stream cipher algorithms are available figure 1 It means that the current various stream cipher algorithms only need to consider the design of module 1, because module 2 is fixed (determined by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/065H04L9/0863
Inventor 田传俊李斌全智
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products