Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Serial cipher realization device and its serial cipher realization method

A serial cipher and implementation method technology, applied in the field of cryptography, can solve the problems of high hardware overhead, large power consumption and communication speed limitations, etc., and achieve the effect of strong environmental applicability, low hardware cost, and security strength

Active Publication Date: 2019-03-26
THE PLA INFORMATION ENG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to resist the existing password attack technology and ensure the corresponding security strength of the algorithm, Zu Chongzhi's password uses a more complex nonlinear filtering device, and its hardware overhead is relatively high, exceeding 10,000 circuits
Facing the characteristics of the future 5G mobile communication network, Zu Chongzhi's cipher is no longer very suitable, especially in some resource-constrained, lightweight application environments and devices, which have great restrictions on power consumption and communication speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Serial cipher realization device and its serial cipher realization method
  • Serial cipher realization device and its serial cipher realization method
  • Serial cipher realization device and its serial cipher realization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Embodiment one, see figure 1 As shown, a column cipher implementation device includes: a sequence source driver module, a confusion diffusion module, and a key stream sequence output module;

[0036]The sequence source driving module generates a sequence source through a non-linear feedback shift register of Galois structure, wherein the non-linear feedback shift register includes k shift registers, and each time a beat is performed, the feedback terminals of the k shift registers simultaneously Update, each feedback terminal is connected to the confusion diffusion module, k is an integer greater than 1;

[0037] The confusion diffusion module includes a confusion unit and a diffusion unit, and the confusion unit includes an S-transform, wherein the S-transform is a nonlinear Boolean function of k-bit input and k-bit output, and a double-layer structure combination is performed by S-box and P replacement Confusion; the diffusion unit contains k linear functions; the in...

Embodiment 2

[0040] Embodiment 2 is basically the same as Embodiment 1, except that k is an integer greater than or equal to 8.

[0041] According to actual usage requirements, k is set to 8, and the S-box is 4 different non-linear Boolean functions with 4-bit input and 4-bit output. The distance between the taps of the nonlinear feedback shift register and the distance between each tap and the corresponding feedback terminal are different.

Embodiment 3

[0042] Embodiment three, see Figure 1~4 As shown, a serial cipher implementation method, based on the serial cipher implementation device described in Embodiment 1, specifically includes the following steps:

[0043] Step 1. Use the nonlinear feedback shift register of Galois structure to generate the sequence source, wherein the total length of the nonlinear feedback shift register is n levels, and the n-level nonlinear feedback shift register is divided into k shift registers to form k feedback end, the lengths of the k shift registers are respectively {i 1 ,i 2 ,...,i k-1 ,i k}, and i 1 + i 2 +...+i k-1 + i k =n, according to the number of feedback terminals k, determine the set of feedback terminal positions: {j 1 ,j 2 ,...,j k-1 ,j k}, where j k =n-1,0≤j 1 2 k-1 ≤n-2, 2≤k≤n;

[0044] Step 2, initialization, the shift register is loaded with the key Key, the initialization vector IV and constant parameters, and performs m idling, and m is determined through ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a sequence cipher realization device and a sequence cipher realization method thereof. The method comprises the following steps: firstly, generating a sequence source by adopting Galois-structure nonlinear feedback shift registers designed based on mixing and diffusion parts as a sequence source drive; and then, after the registers load keys, initialization vectors and constant parameters completely, carrying out idle operation for a certain number of beats, carrying out nonlinear operation on an output of the diffusion unit so that the output is taken as a key stream sequence, and carrying out exclusive or operation on the key stream sequence together with a plaintext sequence to form a ciphertext. According to the sequence cipher realization device and the sequence cipher realization method thereof disclosed by the invention, relatively less operation and hardware cost can be used; through combined use of the mixing unit and the diffusion unit, after multiple times of iterations, a pseudorandom sequence is output; according to hardware resource and speed requirements, the deployment and the implementation are flexible; and the requirements of communication for diverse networks and devices are met.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and in particular relates to a sequence cipher realization device and a sequence cipher realization method thereof. Background technique [0002] Sequence cipher is often used for data encryption in secure communication. The encryption and decryption method is simple. The sequence cipher algorithm generates a pseudo-random sequence, which is XORed bit by bit with the plaintext sequence to generate ciphertext. The decryptor uses the same algorithm to generate pseudo-random sequence and ciphertext. The plaintext is obtained by bit-by-bit XOR addition and decryption. With the development of network and communication technology, especially the future mobile communication 5G network, the requirements for encryption algorithms are becoming more and more diverse. The 5G communication network has the characteristics of ultra-high bandwidth, low latency, flexible access to massive devices, rich appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L9/0656H04L9/0668
Inventor 谭林朱宣勇戚文峰杨东郑群雄徐洪田甜陈华瑾
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products