期刊文献+

一种流密码密钥流生成器的模块化设计与实现 被引量:1

Modular Design and Implementation of Key Stream Generator based on Stream Cipher
下载PDF
导出
摘要 在高保密强度的通信系统中,流密码是一种广泛采用的重要技术手段。针对流密码初始密钥生成、初始密钥滚动、摘要生成、密钥流产生等多个功能模块,提出了一种模块化复用的设计方法,在多个功能模块间实现了程序共用、分时复用,达到了精简程序、节省硬件资源、降低功耗、控制成本的目的。 In the high security communication system, stream cipher as an important technique is widely used. In this paper, a modular multiplexed design is presented for the initial key generation, initial key rolling, summary generation, and key stream generation. These functional modules have achieved pro- cedures shared and time - multiplexing, which reached the procedures simplified, hardware resources saved, power consumption reduced and cost controlled.
作者 邓健 郑林华
出处 《微处理机》 2010年第3期65-67,71,共4页 Microprocessors
关键词 流密码 加解密系统 密钥流发生器 Stream cipher Encryption system Key stream generator
  • 相关文献

参考文献6

  • 1丁存生 肖国镇.流密码及其应用[M].北京:国防工业出版社,1994..
  • 2罗启彬,张健.流密码的现状和发展[J].信息与电子工程,2006,4(1):75-80. 被引量:18
  • 3Rueppel R A. Good Stream Cipher Are Hard To Design [ A ]. Proceedings of International Carnahan Conference on Security Technology[ C ]. 1989 : 163 - 174.
  • 4雷彦云,林嘉宇.基于流密码的数据加解密系统设计[J].科技信息,2008(27). 被引量:1
  • 5Thiegenthaler T. Decrypting a class ofstream ciphers using ciphertext only [ J ]. IEEE Trand. Computers, 1985, C - 34 (1) :81 -85.
  • 6GUNOK J, PEREPELITSA V, SOBELMAN GE. Time borrowing in High - speed functional units using skew - tolerant domino circuits [ A ]. The 2000 IEEE International Symposium on Circuits and Sys-terns,ISCAS 2000[C]. Geneva,2001.

二级参考文献22

  • 1周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97. 被引量:99
  • 2[3]C E Shannon.A Mathematical Theory of Communication[J].Bell System Technical Journal,1948,27(4):379-423,623-656.
  • 3[4]C E Shannon.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4):656-715.
  • 4[7]Rueppel,R A.Good Stream Cipher Are Hard To Design[A].Proceedings of International Camahan Conference on Security Technology[C].1989.163-174.
  • 5[8]Fuster-Sabater.A family ofkeystream generator with large linear complexity[J].Applied Mathematics Letters,2004,17(6):739-740.
  • 6[9]Z D Dai.ProofofRueppel's Linear Complexity Conjecture[J].IEEE Transactions on Information Theory,1986,It-32(3):440-443.
  • 7[10]H Niederreiter.The Linear Complexity Profile and the Jump Complexity of Keystream Sequences[A].Advances in Cryptology EURO -CRYPT' 90 Proceedings[C].New York:Springer-Verlag,1991.174-188.
  • 8[11]S W Golomb.Shift Register Sequences[M].San Francisco:Holden-Day,1967.
  • 9[12]H Beker,F Piper.Cipher Systems:The Protection of Communications[M].London:Northwood Books,1982.
  • 10[13]R A Rueppel.Analysis and Design of Stream Ciphers[M].New York :Springer-Verlag,1986.

共引文献21

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部