Supercharge Your Innovation With Domain-Expert AI Agents!

Encryption and decryption method and system based on PCRAM (Phase Change Random Access Memory)

An encryption method and a random phase transition technology, which can be used in instruments, computer security devices, internal/peripheral computer component protection, etc., and can solve the problems of increasing complexity and large amount of calculation.

Pending Publication Date: 2021-05-18
TSINGHUA UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The KSA has a randomness problem. Most of the existing improved algorithms for KSA increase the complexity, which makes the amount of calculation very large, and the weakness of the algorithm can also be ascertained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and system based on PCRAM (Phase Change Random Access Memory)
  • Encryption and decryption method and system based on PCRAM (Phase Change Random Access Memory)
  • Encryption and decryption method and system based on PCRAM (Phase Change Random Access Memory)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Various exemplary embodiments, features, and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. The same reference numbers in the figures indicate functionally identical or similar elements. While various aspects of the embodiments are shown in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.

[0055] The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as superior or better than other embodiments.

[0056] In addition, in order to better illustrate the present disclosure, numerous specific details are given in the following specific implementation manners. It will be understood by those skilled in the art that the present disclosure may be practiced without some of the specific details. In some instances, methods, means, componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption and decryption method and system based on a PCRAM (Phase Change Random Access Memory). The encryption method comprises: acquiring to-be-encrypted data, obtaining a secret key from a PCRAM of a sending end, and encrypting the data to be encrypted by using the key. The key is stored by using the PCRAM of the sending end, so that the key can be changed spontaneously without extra energy, the changed time interval has uncertainty, and the security of the key is greatly improved. In addition, the PCRAM has the characteristic of low power consumption, so that the encryption method can be applied to secure communication exposed in the same environment for a long time; and, moreover, the encryption method can be directly used by the existing encryption system, so that the cost can be reduced while the system security is improved.

Description

technical field [0001] The present disclosure relates to the field of wireless communication security, in particular to an encryption and decryption method and system based on a phase-change random access memory (PCRAM). Background technique [0002] In terms of wireless communication encryption technology, WEP (Wired Equivalent Privacy) is a commonly used encryption technology. The commonly used algorithm for WEP is RC4. RC4 is one of the stream key encryption algorithms. It is composed of KeyScheduling algorithm (KSA) and pseudo-random Algorithm for generating numbers. [0003] The KSA has the problem of randomness. Most of the existing improved algorithms for KSA increase the complexity, resulting in a large amount of calculation, and the weakness of the algorithm can also be found out. Contents of the invention [0004] In view of this, the present disclosure proposes a PCRAM-based encryption and decryption method and system. [0005] According to an aspect of the pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/78
CPCG06F21/602G06F21/78
Inventor 郑弘植林东赫白智硕
Owner TSINGHUA UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More