Unlock instant, AI-driven research and patent intelligence for your innovation.

Password stream generation method and device

A technology of cipher stream and moving direction, applied in the field of cipher stream generation method and device thereof, can solve problems such as long time consumption, and achieve the effect of shortening time consumption

Active Publication Date: 2020-12-01
HUAWEI TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although the current ZUC-256 algorithm can meet the requirements of the 5G application environment, it has the disadvantage of taking a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password stream generation method and device
  • Password stream generation method and device
  • Password stream generation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Among them, in the description of this application, unless otherwise specified, " / " indicates that the objects associated with each other are an "or" relationship, for example, A / B can indicate A or B; in this application, "and / or "It is just an association relationship describing associated objects, which means that there can be three kinds of relationships, for example, A and / or B, which can mean: A exists alone, A and B exist at the same time, and B exists alone. , B can be singular or plural. And, in the description of the present application, unless otherwise specified, "plurality" means two or more than two. "At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items. For example, at least one item (piece) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a password stream generation method and device. The method comprises the steps: determining M numerical values stored in M register units at the moment t and afirst register unit pointed by a pointer at the moment t; wherein one register unit stores one numerical value, and M is a positive integer; N continuous numerical values are obtained from the M numerical values, N is a positive integer, and M is larger than N; obtaining updating parameters through parallel calculation according to the N continuous numerical values, obtaining N * updating numerical values through calculation according to the updating parameters, N * is a positive integer, and N * is smaller than or equal to N; according to the first register unit, the moving direction of thepointer and the N * numerical values, updating the numerical values of the N * register units in the M register units; and generating and outputting N * password streams according to the M updated numerical values stored in the M register units. By adopting the embodiment of the invention, the time consumption of the ZUC-256 algorithm can be effectively shortened.

Description

technical field [0001] The embodiment of the present application relates to the field of encryption technology in communication technology, and in particular to a method and device for generating a cipher stream. Background technique [0002] The Zu Chongzhi (ZUC) algorithm is a stream cipher algorithm independently developed and designed by the Chinese Academy of Sciences. It is also one of the three security algorithms determined by the longterm evolution (LTE) standard air interface (referred to as the air interface). It can be used for encryption, decryption and / or integrity sexual protection. In the fifth generation (5 th -generation, 5G) mobile communication standards, continue to use the ZUC algorithm as the air interface security algorithm. [0003] The workflow of the ZUC algorithm includes the initialization phase and the key stream generation phase, each phase includes a linear feedback shift register (linear feedback shift register, LFSR), bit reorganization (b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/065H04L9/0861
Inventor 殷新星滕用兴杨思源
Owner HUAWEI TECH CO LTD