Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for constructing sequential cipher

A technology of sequence cipher and structure, applied in the field of cipher, it can solve problems such as incomprehension and incomprehension, and achieve the effect of high security strength

Inactive Publication Date: 2005-11-09
侯方勇
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Encryption is the transformation of data so that it is unintelligible or incomprehensible to anyone other than the intended recipient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for constructing sequential cipher
  • Method and device for constructing sequential cipher
  • Method and device for constructing sequential cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] What the present invention considers is a method and device for constructing sequence ciphers; its main content is a method and device for key sequence generation, or more broadly understood as a method and device for generating pseudo-random numbers. In view of well-known reasons, the present invention does not explicitly define or explain certain terms, nouns and expressions used, such as: sender, receiver, encryption, decryption, password, XOR, one-way hash function (One-way hash function), hash function (Hashfunction), bit, bit, number expression, etc. For some specific nouns, follow the meanings described or defined in the present invention, such as: root key space, current root key, current frame key, root key, frame key, seed, step, step size, "Double" or "Multiple" key synthesis methods, etc.

[0019] In the present invention, the basic steps required by the method and device for generating the key sequence are:

[0020] 1) The sender and receiver secretly or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a method for setting up sequence ciphers and a device, the main content is how to generate the cryptographic key sequence including the following steps: appointing a large enough root cryptographic key space to select seeds secretly and appointing steps to determine the current root cryptographic key as the new seed value. A single-way hash transformation is carried out to the current root cryptographic key to get the current frame cryptographic key, the process of generating said key is repeated to get the necessary key sequence and further enhance the randomness of said generated key sequence.

Description

technical field [0001] The present invention relates to ciphers, in particular to a method and device for constructing sequence ciphers. Background technique [0002] Encryption is the transformation of data so that it is unintelligible or incomprehensible to anyone other than the intended recipient. One method of encrypting digitized data is to use a sequence cipher (or stream cipher, stream cipher). Sequence cipher combines data and key sequence (or key stream, keystream; or encrypted bit stream, encryption bit stream); the combination method usually adopts exclusive-or (exclusive-or, XOR) operation. Decryption is the process of generating the same key sequence as the sender and removing the key sequence from the encrypted data. If the XOR operation is performed when the sender encrypts the data, the same XOR operation is also performed when the receiver decrypts the data. For secure data encryption to be implemented by a sequence cipher, the generation of the key seque...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/20
Inventor 侯方勇
Owner 侯方勇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products