Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

41 results about "Keystream generator" patented technology

Method and apparatus for decrypting a communication

A decryption apparatus (109) comprises a key stream generator (111) generating a local decryption key stream. It furthermore comprises a synchronisation value receiver (201) receiving key stream synchronisation values. A synchronisation processor (203) implements a state machine which may operate in a synchronised state (303) wherein the communication is decrypted using the local key stream, a non-synchronised state (301) wherein the local key stream is not synchronised, or in an uncertain synchronisation state (305) wherein the communication is decrypted using the local key stream and wherein the local key stream is synchronised to each new received synchronisation value. The synchronisation processor (203) furthermore comprises a transition controller (213) operable to transition from the synchronised state to the non-synchronised state in response to a first criterion and to the uncertain synchronisation state in response to a second criterion.
Owner:MOTOROLA SOLUTIONS INC

Encryption and decryption method and device based on zipper type dynamic hash and NLFSR

An encryption and decryption method based on zipper type dynamic hashes and NLFSRs comprises the following steps that a nonlinear feedback function and a bit transformation Boolean function are used for preprocessing a seed secret key to form a secret key stream sequence; changing the bit value of the plaintext sequence according to the bit transformation Boolean function based on the key stream sequence to form a pseudo plaintext sequence; dividing the pseudo-plaintext sequence into a plurality of paths of pseudo-plaintext subsequences according to the key stream sequence; and calculating a dynamic hash address corresponding to the binary bit of each pseudo plaintext sequence according to a hash mapping rule depending on the key stream sequence, and mapping the pseudo plaintext subsequence hashes which are divided into multiple paths into a ciphertext space to form the ciphertext stream sequence. The method has the beneficial effects that the key stream generator not only uses a nonlinear feedback shift register, but also introduces a bit transformation Boolean function, so that the key stream with longer period and better randomness is obtained; and through a plaintext bit transformation rule and a zipper type dynamic hash mapping rule, the decoding difficulty of the ciphertext stream sequence is improved.
Owner:ZHUHAI COLLEGE OF JILIN UNIV +1

E-mail data security protection method based on hybrid encryption

The invention relates to an e-mail data security protection method based on hybrid encryption. An existing data encryption method is relatively low in confidentiality or more in memory resources. Thepresent invention includes a data encryption method for e-mail communication between terminals and a data encryption method for communication between terminals and a server. The server generates a pair of public key and private key for asymmetric encryption, and issues the server public key to the client for storage. A client generates a pair of public and private keys for asymmetric encryption, and uploads the public key of the client to the server; the server sets a client public key library, and stores each client public key and the registration ID serving as the identifier in the client public key library; the client is provided with a key stream generator, and generates a symmetric key by setting the number of registers. A symmetric encryption method and an asymmetric encryption method are combined so thatthe advantages of high speed of a symmetric encryption mechanism and higher security of asymmetric encryption are integrated, the occupied resources are few, and the confidentiality is high.
Owner:杭州安司源科技有限公司

Cryptographic checksum apparatus

A cryptographic checksum apparatus is disclosed. This apparatus includes a keystream generator configured to generate a secret keystream according to a common secret key. The apparatus also includes a postfix circuit configured to augment postfix bits after an original message. Further, a demultiplexer is used to direct the postfixed message to one of the output terminals under the control of the secret keystream. A first mixer is connected to one output terminal of the demultiplexer, and a second mixer is connected to the other output terminal of the demultiplexer. Moreover, a first compression circuit is used to receive an output of the first mixer, wherein content of the first compression circuit is used as the first part of the checksum output. Similarly, a second compression circuit is used to receive an output of the second mixer, wherein content of the second compression circuit is used as the second part of the checksum output. Finally, a first transmission gate is connected to the second compression circuit, whose output bit is then transferred to the first mixer through the first transmission gate under control of the postfixed message bit. A second transmission gate is connected to the first compression circuit, whose output bit is then transferred to the second mixer through the second transmission gate under control of the postfixed message bit.
Owner:INSTITUTE FOR INFORMATION INDUSTRY

Method and apparatus for synchronous stream cipher encryption with reserved codes

A method and apparatus for a signal encryption device constructed to perform synchronous stream cipher encryption for a sequence of input words with restricted codes. The encryption device includes a keystream generator for producing a sequence of pseudorandom words from a key, and an adder that is used to sum the output of the keystream generator and the input words. A lookup table of size substantially twice the number of possible input words provides encrypted codes excluding restricted codes from the summed signal. A signal encryption and decryption system is constructed by including a second keystream generator for producing a second sequence of pseudorandom words from the key, and a second adder to produce a second summed signal from the output of the second keystream generator and the encrypted codes. A corresponding lookup table provides decrypted codes excluding restricted codes from the second summed signal.
Owner:TEXAS INSTR INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products