Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pseudo random number generation device

A pseudo-random number and generation device technology, applied in random number generators, secure communication devices, encoding/decoding devices, etc., can solve the problem of high processing speed, etc., and achieve the effect of high speed and high security.

Inactive Publication Date: 2007-09-19
MITSUBISHI ELECTRIC CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In the conventional technology, since the stream is generated in units of 1 byte, the processing speed cannot be said to be high, and there is a demand for higher speed.
In addition, in the prior art, a pseudo-random number is pre-generated from an internal table, and there is a further requirement for security against read attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo random number generation device
  • Pseudo random number generation device
  • Pseudo random number generation device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0049] Embodiment 1 will be described using FIGS. 1 to 23 . Embodiment 1 relates to a pseudo-random number generating device, a pseudo-random number generating method, and a pseudo-random number generating program that generate pseudo-random numbers using two internal tables.

[0050] FIG. 1 is a block diagram of a pseudo-random number generator 100 in Embodiment 1. As shown in FIG. The pseudo-random number generation device 100 includes a storage unit 110 having various memories, an initialization unit 120 , a key scheduling unit 130 , and a stream generation unit 140 .

[0051] The storage unit 110 has:

[0052] (1) The stream length memory 111 storing the stream length L of the random number to be generated,

[0053] (2) The memory 112 for storing fixed values ​​(INI1[0] described later, etc.),

[0054] (3) Key memory 113 for storing key information (K ([0], etc. described later),

[0055] (4) input and store the initial value memory of the initial value (0x01, 0x123456...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A pseudo random number generation device (100) generates a pseudo random number as follows. In C.2, S1[B41] is decided from B41 set in a second internal memory, and S2[B40] is decided from B40. R[J] is generated from S1[I], S1[B41], and S2[B40]. In C.3, S1[I] is newly generated according to S1[B41] and S2[B40]. In C.4, B4 is updated from S2(I). In the aforementioned process, the association of R[J] with S2(I) is cut off and it is difficult to estimate S2(I) from R[J], which increases the safety. Moreover, the S1[I], S1[B41], S2[B40], and the like are four-byte codes and processing speed can be increased.

Description

technical field [0001] The present invention relates to a pseudo-random number generating device for generating pseudo-random numbers, a pseudo-random number generating method, and a pseudo-random number generating program. Background technique [0002] RC4 is mentioned as a representative technique of software-oriented stream encryption. The RC4 algorithm is not officially disclosed. However, currently there are many documents that analyze RC4 and disclose the details of the method (for example, Non-Patent Document 1 (Source: Applied Cryptography, written by Bruce Schneier, John Wiley & Sons, ISBN 0-471-11709-9) ). [0003] Fig. 24 shows the algorithm of RC4. This algorithm consists of "A. Initialization", "B. Key scheduling", and [C. Stream generation]. For example, "%256" in the key schedule in FIG. 24 represents the remainder after division by 256. [0004] in addition, [0005] "swap(S[I], S[B])" means the exchange of S[I] and S[B]. [0006] In addition, FIG. 25 ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G09C1/00G06F7/58H04L9/22
CPCH04L2209/12H04L9/0662H04L2209/24G06F7/582G06F7/586G09C1/00
Inventor 松井充
Owner MITSUBISHI ELECTRIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products