Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Stream cipher design with revolving buffers

A cryptographic and streaming technology, applied in the field of cryptography, which can solve the problem of encryption/decryption of secure data that cannot be streamed cryptographically

Inactive Publication Date: 2005-10-05
MICROSOFT CORP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Therefore, current solutions fail to provide an efficient method for fast and secure data encryption / decryption using stream ciphers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stream cipher design with revolving buffers
  • Stream cipher design with revolving buffers
  • Stream cipher design with revolving buffers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following discussion assumes the reader is familiar with cryptography. For a basic introduction to cryptography, the reader is referred to A. Menezes, P. van Oorschot and S. Vanstone, entitled Handbook of Applied Cryptography (Handbook of Applied Cryptography))) 5th Edition, published by CRC Issued by the company.

[0020] The following disclosure describes efficient techniques for limiting the local (or short-term) dependencies associated with stream cipher keystream generator outputs. These techniques are all based on pairing generator output values ​​that are far enough apart that they can be considered uncorrelated. In one implementation, the absence of short periods in the pairing graph greatly limits linear and algebraic attacks, in part because an attacker cannot separate relatively short equations containing only a few variables.

[0021] In one implementation, relatively simple updates (discussed further below in the section entitled "Update Rules") are c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Techniques are disclosed to limit short-term correlations associated with outputs of stream cipher keystream generators. Output values of a generator are paired such that the paired outputs are sufficiently far apart to be considered independent. In one described implementation, a method includes sequentially storing a plurality of results provided by a stream cipher output rule in a first, second, and third storage units. A pairing function pairs individual values from the first and third storage units that are at least a threshold value apart. Upon reaching the threshold value of the output rule results, the contents of the first, second, and third storage units are rotated serially.

Description

technical field [0001] The present invention relates generally to cryptography, and more particularly to the use of circular (or rotational) buffering in stream ciphers. Background technique [0002] Due to the proliferation of digital communications, the need to protect the communication channels associated with it has become increasingly important. For example, existing technologies allow users to remotely access bank accounts, medical data, and other private and sensitive information. [0003] Cryptography is widely used to provide secure digital communications. Cryptography generally involves loading codes (encryption) and deciphering codes (decryption) of information. Encryption and decryption will use some secret information (such as keys). In different encoding methods, a single key or multiple keys can be used for encryption and decryption. [0004] Currently, two types of ciphers are commonly used. Block ciphers are used for large blocks of data. Stream cipher...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/22H04L9/18
CPCH04L9/0894H04L2209/80H04L9/065H04L2209/08H04L2209/12B65G39/08
Inventor I·米罗诺夫R·凡卡特杉
Owner MICROSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products