Method for improving unpredictability of output of pseudo-random number generators

A counter, digital technology, applied in the field of nonlinear functions

Inactive Publication Date: 2005-09-14
克瑞迪科公司
View PDF5 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0033] The book further states that no single generator can satisfy all of these criteria

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving unpredictability of output of pseudo-random number generators
  • Method for improving unpredictability of output of pseudo-random number generators
  • Method for improving unpredictability of output of pseudo-random number generators

Examples

Experimental program
Comparison scheme
Effect test

example I

[0737] The following pseudocode program shows an example program for encrypting and decrypting data, one byte at a time. The program is based on Figure 20-27 flow chart to work. The program works with 32-bit registers. Figure 20 A method of encrypting a file containing data is shown. Figure 21-27 Corresponding to the functions appearing in the following pseudocode, they are related to the checking of periodic solutions and stream ciphers using the Lorenz system.

[0738] Pseudocode for the fixed-point library

[0739] FloatToFixedPoint: Convert a floating-point number X to a fixed-point number. The result of this function has the format S(a.b) or U(a.b).

[0740] fixedpoint FloatToFixedPoint(float X)

[0741] {

[0742] return X*2 b ; / / b is the number of bits after the decimal

[0743] / / separator in the fixed-point

[0744] / / representation of the result

[0745] }

[0746] FixedPointToFloat: Converts ...

example II

[0831] Table V shows one method disclosed herein (see Figure 1-5 ), and the encryption speeds of various existing encryption methods. The encryption speed provided by the method of the present invention is jointly published in Proceedings of Fast Software Encryption (FSE) 2003, Springer, Berlin, (2003) according to M.Boesgaard, M.Vesterager, T.Pedersen, J.Christiansen and O.Scavenius Measured by the algorithm described in the article "Rabbit: A New High-Performance Stream Cipher (Rabbit: A New High-Performance Stream Cipher)". The algorithm utilizes the MMX TM Instructions, implemented in assembly language.

[0832] Based on the measurements, the speeds were converted to an equivalent encryption / decryption speed of 947Mbit / sec on a 450MHz Pentium III processor.

[0833]

name

Appeared year

share

type

key

length

[bit]

Block

length

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for performing computations in a mathematical system which exhibits a positive lyapunov exponent, or exhibits chaotic behavior, comprises varying a parameter of the system. When employed in cryptography, such as, e.g., in a pseudo-random number generator of a stream-cipher algorithm, in a block-cipher system or a HASH/MAC system, unpredictability may be improved. In a similar system, a computational method comprises multiphying two numbers and manipulating at least one of the most significant bits of the number resulting from the multiplication to produce an output. A number derived from a division of two numbers may be used for deriving an output. In a system for generating a sequence of numbers, an array of counters is updated at each computational step, whereby a carry value is added to each counter. Fixed-point arithmetic may be employed. A method of determining an identification value and for concurrently encrypting and/or decrypting a set of data is disclosed.

Description

technical field [0001] The present invention relates to improving the unpredictability of pseudo-random numbers generated from numerical calculations in a mathematical system comprising at least one function, in particular a non-linear function. The mathematical system may be a non-linear system of difference equations characterized by chaotic behavior. The present invention is applicable, for example, to encryption and decryption in electronic equipment. Background technique [0002] Cryptography (art) is a commonly used technical term, which covers the science and technology related to data transformation. The purpose of this kind of data transformation is to prevent unauthorized access to data while storing and transmitting data. With the help of cryptography, it is possible to render data incomprehensible to anyone other than the intended recipient or recipients of the data. As technological advances require the secure transmission and preservation of large amounts of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F7/00G06F7/58G06F17/10G06N7/08G09C1/00H04L9/00H04L9/22H04L9/28
CPCG06N7/08G06F7/582H04L9/0668H04L9/001G06F7/586
Inventor 迈特·V.·彼得森汉斯·M·B·索恩森
Owner 克瑞迪科公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products