Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

41 results about "Keystream generator" patented technology

Encryption and decryption method and device based on zipper type dynamic hash and NLFSR

An encryption and decryption method based on zipper type dynamic hashes and NLFSRs comprises the following steps that a nonlinear feedback function and a bit transformation Boolean function are used for preprocessing a seed secret key to form a secret key stream sequence; changing the bit value of the plaintext sequence according to the bit transformation Boolean function based on the key stream sequence to form a pseudo plaintext sequence; dividing the pseudo-plaintext sequence into a plurality of paths of pseudo-plaintext subsequences according to the key stream sequence; and calculating a dynamic hash address corresponding to the binary bit of each pseudo plaintext sequence according to a hash mapping rule depending on the key stream sequence, and mapping the pseudo plaintext subsequence hashes which are divided into multiple paths into a ciphertext space to form the ciphertext stream sequence. The method has the beneficial effects that the key stream generator not only uses a nonlinear feedback shift register, but also introduces a bit transformation Boolean function, so that the key stream with longer period and better randomness is obtained; and through a plaintext bit transformation rule and a zipper type dynamic hash mapping rule, the decoding difficulty of the ciphertext stream sequence is improved.
Owner:ZHUHAI COLLEGE OF JILIN UNIV +1

E-mail data security protection method based on hybrid encryption

The invention relates to an e-mail data security protection method based on hybrid encryption. An existing data encryption method is relatively low in confidentiality or more in memory resources. Thepresent invention includes a data encryption method for e-mail communication between terminals and a data encryption method for communication between terminals and a server. The server generates a pair of public key and private key for asymmetric encryption, and issues the server public key to the client for storage. A client generates a pair of public and private keys for asymmetric encryption, and uploads the public key of the client to the server; the server sets a client public key library, and stores each client public key and the registration ID serving as the identifier in the client public key library; the client is provided with a key stream generator, and generates a symmetric key by setting the number of registers. A symmetric encryption method and an asymmetric encryption method are combined so thatthe advantages of high speed of a symmetric encryption mechanism and higher security of asymmetric encryption are integrated, the occupied resources are few, and the confidentiality is high.
Owner:杭州安司源科技有限公司

Cryptographic checksum apparatus

A cryptographic checksum apparatus is disclosed. This apparatus includes a keystream generator configured to generate a secret keystream according to a common secret key. The apparatus also includes a postfix circuit configured to augment postfix bits after an original message. Further, a demultiplexer is used to direct the postfixed message to one of the output terminals under the control of the secret keystream. A first mixer is connected to one output terminal of the demultiplexer, and a second mixer is connected to the other output terminal of the demultiplexer. Moreover, a first compression circuit is used to receive an output of the first mixer, wherein content of the first compression circuit is used as the first part of the checksum output. Similarly, a second compression circuit is used to receive an output of the second mixer, wherein content of the second compression circuit is used as the second part of the checksum output. Finally, a first transmission gate is connected to the second compression circuit, whose output bit is then transferred to the first mixer through the first transmission gate under control of the postfixed message bit. A second transmission gate is connected to the first compression circuit, whose output bit is then transferred to the second mixer through the second transmission gate under control of the postfixed message bit.
Owner:INSTITUTE FOR INFORMATION INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products