Method and device for security system

A security, algorithmic technology, applied in the field of security systems, that can solve problems such as large computational complexity and storage, increased wireless device cost, size or power consumption

Inactive Publication Date: 2006-07-05
TATA CONSULTANCY SERVICES LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By block, a cipher such as AES can provide a significant level of security against major attacks, at the expense of greater computational complexity and storage, which in turn can increase the cost of the wireless device , size or power consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for security system
  • Method and device for security system
  • Method and device for security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Referring to the drawings, the reference numerals in the drawings are clear.

[0042] traditional stream cipher system

[0043] Attached figure 1 A high-level block diagram of the physical (PHY) and media access control (MAC) layers for a stream cipher system is shown in . The input to the MAC layer is the data the user wants to send, also known as plaintext. The encryption process takes place at the MAC layer, and the output of the MAC is encrypted data, also known as ciphertext, which is passed to the PHY layer for transmission. At the receiver end, data is processed by the PHY and an estimate of the transmitted data (ciphertext) is obtained. The PHY performs a parity check on the decrypted data, and if there is a mismatch, the packet is discarded. The ciphertext continues to be passed to the MAC. The MAC decrypts the data and passes it to higher layers.

[0044] If the input to the MAC is denoted as m(n) (n is the number of samples). After passing through the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses technique includes encrpytion and decrpytion at physical layer. The invention also develops guidelines for specific implement case to select method of encrpytion / decrpytion. The said implement case is in use for communication system of using typical viterbi decoder. The invention also discloses how to implement characteristic of viterbi decoder difficult to be reversed in order to provide security for preventing known-plain text attack. The invention also discusses candidate method of encrpytion / decrpytion of satisfying the said guidelines of development.

Description

technical field [0001] The present invention relates to a method and a device for a security system. [0002] In particular, the present invention relates to a method and arrangement for a security system in a wired or wireless communication network. [0003] More particularly, the present invention relates to a method and apparatus for an encryption system in a security system for a wired or wireless communication network. [0004] In particular, the present invention relates to a novel method of increasing network security. More particularly, the present invention relates to network security, and in particular to methods for increasing the security of wired or wireless networks. Background technique [0005] The primary security mechanism for wireless networks using stream ciphers is based primarily on the encryption of actual data (called plaintext) in a stream generated from a set of keys (called ciphers). The basic encryption method is based on the so-called "Vernam ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor A・帕尔B・普尔肖特曼G・维斯瓦纳特H・T・雷迪
Owner TATA CONSULTANCY SERVICES LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products