Sequence cipher encryption system key updating method based on hash function

A key update and hash function technology, applied in the fields of communication information security and cryptography, can solve the problems of suspending decryption operations and troublesome key security transmission, achieving high security, fast key update speed, and avoiding troubles. Effect

Active Publication Date: 2021-04-06
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a key update method for a serial cipher encryption system based on a hash function, which overcomes problems such as troublesome key security transmission and the need to suspend decryption operations in the existing key update method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sequence cipher encryption system key updating method based on hash function
  • Sequence cipher encryption system key updating method based on hash function
  • Sequence cipher encryption system key updating method based on hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0024] Such as image 3 As shown, a hash function-based serial cipher encryption system key update method, in this method both encryption and decryption use the same key stream generator EC, and has four dynamic key generators, through the The hash function calculation is performed on the secret key sequence to generate a new secret key sequence to realize the self-renewal of the sequence password.

[0025] The principle of dynamic key generator 1 is as follows: figure 1 As shown, the other three dynamic key generators are the same. in:

[0026] a. Dynamic secret key generation input signal description: each dynamic secret key generator inputs the current i-th working secret key K i . Key generator 1 has length 2 N long shift register 1; key generator 2 has length 2 N long shift register 2; secret key generator 3 has a length of 2 N lon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sequence cipher encryption system key updating method based on a hash function, and belongs to the field of communication information security. The method comprises the following steps: initializing a key K0, and synchronizing the states of m sequence generators of a transmitting end and a receiving end and an integral shift register; performing encryption and decryption operation on the key Ki; inputting, by the m sequence generator, a 1-bit signal, and performing shift by the whole shift register; compressing the key Ki by adopting a hash function to generate a new key K; and when a key updating condition is triggered, enabling the sending end and the receiving end to perform key updating, and taking K as a new key. According to the invention, the problem of safe and rapid key transmission during key updating and encryption and decryption interruption caused by initialization of the key stream generator are avoided, and seamless connection of a new key stream and an old key stream is realized.

Description

technical field [0001] The invention relates to the fields of cryptography and communication information security, in particular to a hash function-based key update method for a serial cipher encryption system. Background technique [0002] According to the characteristics of the encryption algorithm used, the cryptosystem can be divided into a symmetric cryptosystem (also known as a single-key cryptosystem) and an asymmetric cryptosystem (also known as a dual-key cryptosystem). In a symmetric cryptosystem, the encryption and decryption parties use the same key for encryption and decryption. The symmetric encryption system has fast encryption speed and small amount of calculation, and is suitable for encryption occasions with a large amount of data. The disadvantage of the symmetric cryptosystem is that the key must be transmitted in a safe way, and the key management has become a key factor affecting the security of the system. In the asymmetric cryptosystem, the encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0891H04L9/0643
Inventor 陈宇岳鹏蔡觉平
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products