[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110995405B - Chaos-based initial vector generation algorithm and IP core thereof - Google Patents

Chaos-based initial vector generation algorithm and IP core thereof Download PDF

Info

Publication number
CN110995405B
CN110995405B CN201911232173.5A CN201911232173A CN110995405B CN 110995405 B CN110995405 B CN 110995405B CN 201911232173 A CN201911232173 A CN 201911232173A CN 110995405 B CN110995405 B CN 110995405B
Authority
CN
China
Prior art keywords
module
key
initial vector
sequence
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911232173.5A
Other languages
Chinese (zh)
Other versions
CN110995405A (en
Inventor
丁群
冯凯
王传福
李孝友
余龙飞
唐薪玥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heilongjiang University
Original Assignee
Heilongjiang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heilongjiang University filed Critical Heilongjiang University
Priority to CN201911232173.5A priority Critical patent/CN110995405B/en
Publication of CN110995405A publication Critical patent/CN110995405A/en
Application granted granted Critical
Publication of CN110995405B publication Critical patent/CN110995405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a chaos-based initial vector generation algorithm and an IP core thereof, wherein the generation algorithm is based on an initial value x of 32 bits input in a sequence generator of Logistic chaos0Dividing 128-bit initial KEY KEY of ZUC encryption algorithm into 16 32-bit KEYs [ i](ii) a Will key 0]Assigned to 32 bits x0And calculate x1=4x0(1‑x0) (ii) a Will key [ i]Assign a key [ i-1 ]]Then x is added1Assign value to key [15]For all x generated in sequence1The sequence truncates the last 128-bit sequence every 1024 bits as an initial vector. An IP core to generate an algorithm, comprising: the method comprises an initial vector generation module, a ZUC encryption algorithm module, a key stream FIFO module, an operation module, a UART communication module and a controller module. The invention greatly improves the unpredictability of the initial vector by utilizing the good randomness of the chaotic pseudo-random sequence.

Description

Chaos-based initial vector generation algorithm and IP core thereof
The technical field is as follows:
the invention relates to the field of data encryption, in particular to a chaos initial vector generation algorithm and an IP core thereof.
Background art:
ZUC is a synchronous sequence cipher algorithm, the input of which contains two parts, namely Initial Key (Key) with 128 bit width and Initial Vector (IV) with 128 bit width. The ZUC sequence cipher algorithm encrypts digital information using an input 128-bit KEY and a 128-bit initial vector generation KEY stream.
The ZUC sequence cipher algorithm is the third set of international encryption algorithms recommended by the international organization for standardization 3GPP (3rd Generation Partnership Project). According to the ZUC sequence cipher algorithm promulgated by 3GPP, the initial vector is generated in a fixed manner and structure by using the relevant control information in the wireless communication process, and is expressed as: let signal COUNT [0] | COUNT [1] | COUNT [3], COUNT represents a frame counter in the communication process, whose bit width is 32 bits, where COUNT [ i ] (0 ≦ i ≦ 3) is a byte 8 bits long, and an initial vector of 128-bit width is represented by IV [0] | IV [1] | IV [2] | | |.
IV[0]=COUNT[0],IV[1]=COUNT[1],
IV[2]=COUNT[2],IV[3]=COUNT[3],
IV[4]=BEARER||DIRECTION||002,
IV[5]=IV[6]=IV[7]=000000002,
IV[8]=IV[0],IV[9]=IV[1],
IV[10]=IV[2],IV[11]=IV[3],
IV[12]=IV[4],IV[13]=IV[5],
IV[14]=IV[6],IV[15]=IV[7].
The symbol "|" is a bit connection symbol, the bit width of the signal BEARER is 5 bits, the function is a BEARER layer identifier, the bit width of the signal DIRECTION is 1 bit, and the function is a transmission DIRECTION identifier. Since the initial vector is insecure in the communication and can be transmitted in plaintext, and the signal COUNT is set to 0 after each time the KEY is updated and is changed in an incremental manner, and the signal DIRECTION has only two states, i.e., up and down, only 5 bits of the signal BEARER are completely unpredictable in the whole initial vector. Ideally, the number of bits in the unpredictable part of the IV and the number of bits of the KEY should be the same to improve the resistance to TMDTTO (Time-Memory-Data Trade-Off) attacks. This problem is noted in some literature and it is also noted that a shorter number of unpredictable bits in the initial vector reduces the complexity of the alternative type of TMTO attack, while increasing the number of unpredictable bits in the initial vector is beneficial in ameliorating this problem.
The initial vector plays a very important role in the ssc algorithm. In many cases, in a specific encryption process, KEY cannot be changed frequently, and at this time, updating and using different initial vectors avoids the situation that the same ciphertext is generated under the same plaintext and the same KEY, and also avoids the situation that the same KEY stream is used for encryption for many times. Meanwhile, in wireless communication, information in a channel is easily lost, and an encryption communication system is difficult to apply when the encryption communication system can correctly decrypt only under the condition that the information is completely received.
Disclosure of Invention
Based on the defects, the invention provides the chaos initial vector generation algorithm and the IP core thereof, which greatly improves the unpredictability of the initial vector so as to improve the capability of coping with TMTO attacks.
The technology adopted by the invention is as follows: a chaos-based initial vector generation algorithm comprises the following steps:
firstly, inputting an initial value x of 32 bits into a sequence generator based on Logistic chaos0Dividing 128-bit initial KEY KEY of ZUC encryption algorithm into 16 32-bit KEYs [ i](i is not less than 0 and not more than 15), key [ i ≦ 15 ≦ key](i is more than or equal to 0 and less than or equal to 15) are respectively used as the input of Logistic chaotic iterative mapping,
the Logistic chaotic iterative mapping expression is as follows:
xn+1=4xn(1-xn) (1)
wherein x0Is an initial value, n is an overlapGeneration number, and xnThe device is composed of a 32-bit register;
step two, key [0]]Assigned to 32 bits x0And calculate x1=4x0(1-x0);
Step three, key [ i ]]Assign a key [ i-1 ]]Then x is added1Assign value to key [15]For all x generated in sequence1The sequence intercepts the last 128-bit sequence as an initial vector at 1024-bit intervals, and returns to step two.
The invention also has the following features: an IP core based on a chaos initial vector generation algorithm comprises the following steps: such as an initial vector generation module, a ZUC encryption algorithm module, a key stream FIFO module, an operation module, a UART communication module and a controller module which are generated by the method,
the initial vector generation module is responsible for generating an initial vector required by the ZUC encryption algorithm module;
the ZUC encryption algorithm module is responsible for generating a KEY sequence for encryption and decryption according to a KEY KEY and an initial vector;
the key stream FIFO module is used for caching the key stream output by the ZUC encryption algorithm module;
the UART communication module realizes the modulation and demodulation work of the communication process of the IP core and the upper computer;
the arithmetic module carries out XOR operation on the data taken out from the receiver FIFO unit and the key stream FIFO module of the UART communication module to finish the encryption and decryption of the data, and the processed data is delivered to the transmitter FIFO unit of the UART communication module;
the controller module is a main control unit of the whole IP core, all modules work under the scheduling of the controller module, and the controller module controls the flow direction of data and the operation received by the data.
The invention has the following advantages and beneficial effects: the invention utilizes the good randomness of the chaotic pseudo-random sequence to greatly improve the unpredictability of the initial vector so as to improve the capability of coping TMTO attack, and combines the initial vector with the ZUC sequence cryptographic algorithm to form an important component of the IP core of the ZUC encryption algorithm. In addition, the sequence cipher algorithm adds the initial vector and designs the frame structure for data communication, so that even if partial data is damaged or lost, the system can continue to complete the decryption of the correctly received data frame. The initial vector may also be used as the number of information frames in case the transmitted information is sequential.
Drawings
FIG. 1 is a schematic diagram of an FPGA-based ZUC encryption algorithm IP core;
FIG. 2 is a top level design diagram of initial vector generation algorithm module hardware implementation based on Logistic chaos;
FIG. 3 is a flow diagram of an initial vector generation module;
FIG. 4 is a diagram of the FPGA top level architecture.
Detailed Description
The invention is further illustrated by way of example in the accompanying drawings of the specification:
example 1
A chaos-based initial vector generation algorithm comprises the following steps:
firstly, inputting an initial value x of 32 bits into a sequence generator based on Logistic chaos0Dividing 128-bit initial KEY KEY of ZUC encryption algorithm into 16 32-bit KEYs [ i](i is not less than 0 and not more than 15), key [ i ≦ 15 ≦ key](i is more than or equal to 0 and less than or equal to 15) are respectively used as the input of Logistic chaotic iterative mapping,
the Logistic chaotic iterative mapping expression is as follows:
xn+1=4xn(1-xn) (1)
wherein x0Is an initial value, n is the number of iterations, and xnThe device is composed of a 32-bit register;
step two, key [0]]Assigned to 32 bits x0And calculate x1=4x0(1-x0);
Step three, key [ i ]]Assign a key [ i-1 ]]Then x is added1Assign value to key [15]For all x generated in sequence1The sequence intercepts the last 128-bit sequence as an initial vector at 1024-bit intervals, and returns to step two.
The IP core based on the chaos initial vector generation algorithm comprises the following steps: the device comprises an initial vector generation module, a ZUC encryption algorithm module, a key stream FIFO module, an operation module, a UART communication module and a controller module, wherein the initial vector generation module is responsible for generating an initial vector required by the operation of the ZUC encryption algorithm module;
the ZUC encryption algorithm module is responsible for generating a KEY sequence for encryption and decryption according to a KEY KEY and an initial vector;
the key stream FIFO module is used for caching the key stream output by the ZUC encryption algorithm module;
the UART communication module realizes the modulation and demodulation work of the communication process of the IP core and the upper computer;
the arithmetic module carries out XOR operation on the data taken out from the receiver FIFO unit and the key stream FIFO module of the UART communication module to finish the encryption and decryption of the data, and the processed data is delivered to the transmitter FIFO unit of the UART communication module;
the controller module is a main control unit of the whole IP core, all modules work under the scheduling of the controller module, and the controller module controls the flow direction of data and the operation received by the data.
Example 2
IP core FPGA based on chaos initial vector generation algorithm
As shown in fig. 2, the initial vector generation module has 6 input-output signals, the signal definitions of which are listed in table 1.
TABLE 1 Top level Module Signal List
Figure GDA0002387800230000041
Figure GDA0002387800230000051
The initial vector generation module has a control signal "start" in addition to the clock signal and the reset signal, and the main workflow of the initial vector generation module is described here: after the initial vector generation module is powered on, firstly, reset operation is carried out, then the initial vector generation module enters a standby state, when a start signal is valid for the first time, the initial vector generation module downloads a secret key and runs for 1024 clock cycles, then outputs an initial vector, meanwhile, an initial vector valid flag signal IV is valid, the signal on the output signal IV is valid at the moment, the module enters the standby state, if the signal start is valid again, the module runs for 1024 clock cycles again in the immediately previous state and generates a new initial vector, and so on, and an algorithm flow chart is used for expressing a main work flow, as shown in fig. 3.
FIG. 4 is a top level architecture design in which a module with multi-beat latency has its latency (latency) labeled in the figure. The global calculation precision of the initial vector generation module is 32 bits, and the system variable x can be known by the formula (1)nE (0,1), all operations of IVMKAKER are 32-bit unsigned pure decimals, e.g., a 32-bit binary number in the system is represented as Mb=m31m30m29…m1m0Wherein m isiE {0,1} and i ═ 0,1,2, …,31, the decimal number it represents can be represented by equation (2):
Figure GDA0002387800230000052
the control module is a control unit which performs the function of generating the initial value in the formula (1) and controls the functions of enabling each sub-module and selecting signals of the selector module. The delay module delays the input by two clock cycles and outputs the delayed input; the functional expression of the position negation module is as follows:
bn[31:0]=~sel[31:0] (3)
the adder module performs the addition 1 calculation on the input value, and the expression is as follows:
add[31:0]=bn[31:0]+1 (4)
the bitwise negation module and the adder module are cascaded together to complete (1-x) in the formula (1)n) Part (A)The principle of the calculation of the score is similar to the complement, and the following examples are given here: for example, there are unsigned binary numbers a 10000 and B1010, and it is clear that the value of a-B can be obtained by B + 1. This is done because all numbers in the system are 32 unsigned decimal numbers, and 33 bit wide is needed to represent decimal 1, while the method in the design avoids adding one bit wide alone to represent decimal 1, and also avoids using subtraction in the digital circuit, and furthermore, the negation operation is very simple to implement for the digital circuit; the multiplier module completes xn(1-xn) When two data with a bit width of 32 bits are multiplied, a product with a bit width of 64 bits is generated inside the multiplier.
The resource and speed conditions occupied by the realized initial vector generation module are counted, and compared with a circuit which uses a conventional Logistic chaotic sequence generation algorithm to realize the same function, the result is shown in table 2, and the highest operation frequency of the circuit is increased by 2.4 times under the condition that the logic resource Slice consumption of the realized initial vector generation module on an FPGA chip is increased by 16.3%, and good resource consumption and speed level are obtained on the basis that the generated initial vector obtains better unpredictability.
TABLE 2 resource vs. speed
Figure GDA0002387800230000061

Claims (1)

1. An IP core based on a chaos initial vector generation algorithm comprises the following steps: an initial vector generation module, a ZUC encryption algorithm module, a key stream FIFO module, an operation module, a UART communication module and a controller module,
the initial vector generation module is responsible for generating an initial vector required by the ZUC encryption algorithm module;
the ZUC encryption algorithm module is responsible for generating a KEY sequence for encryption and decryption according to a KEY KEY and an initial vector;
the key stream FIFO module is used for caching the key stream output by the ZUC encryption algorithm module;
the UART communication module realizes the modulation and demodulation work of the communication process of the IP core and the upper computer;
the arithmetic module carries out XOR operation on the data taken out from the receiver FIFO unit and the key stream FIFO module of the UART communication module to finish the encryption and decryption of the data, and the processed data is delivered to the transmitter FIFO unit of the UART communication module;
the controller module is a main control unit of the whole IP core, all modules work under the scheduling of the controller module, and the controller module controls the flow direction of data and the operation received by the data;
the method for generating the initial vector module comprises the following steps:
firstly, inputting an initial value x of 32 bits into a sequence generator based on Logistic chaos0Dividing 128-bit initial KEY KEY of ZUC encryption algorithm into 16 32-bit KEYs [ i]I is not less than 0 and not more than 15, so that key [ i ≦]Respectively as the input of Logistic chaotic iterative mapping,
the Logistic chaotic iterative mapping expression is as follows:
xn+1=4xn(1-xn) (1)
wherein x0Is an initial value, n is the number of iterations, and xnThe device is composed of a 32-bit register;
step two, key [0]]Assigned to 32 bits x0And calculate x1=4x0(1-x0);
Step three, key [ i ]]Assign a key [ i-1 ]]Then x is added1Assign value to key [15]For all x generated in sequence1The sequence intercepts the last 128-bit sequence as an initial vector at 1024-bit intervals, and returns to step two.
CN201911232173.5A 2019-12-05 2019-12-05 Chaos-based initial vector generation algorithm and IP core thereof Active CN110995405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911232173.5A CN110995405B (en) 2019-12-05 2019-12-05 Chaos-based initial vector generation algorithm and IP core thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911232173.5A CN110995405B (en) 2019-12-05 2019-12-05 Chaos-based initial vector generation algorithm and IP core thereof

Publications (2)

Publication Number Publication Date
CN110995405A CN110995405A (en) 2020-04-10
CN110995405B true CN110995405B (en) 2022-04-22

Family

ID=70090134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911232173.5A Active CN110995405B (en) 2019-12-05 2019-12-05 Chaos-based initial vector generation algorithm and IP core thereof

Country Status (1)

Country Link
CN (1) CN110995405B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112367155B (en) * 2020-10-13 2022-06-07 黑龙江大学 FPGA-based ZUC encryption system IP core construction method
CN115277977B (en) * 2022-07-25 2023-11-10 重庆邮电大学 Hybrid chaotic image encryption method based on FPGA (field programmable Gate array) configurable floating point precision

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103731822A (en) * 2012-10-15 2014-04-16 中国科学院微电子研究所 System and method for implementing Zuichong algorithm
CN105808207A (en) * 2016-03-22 2016-07-27 中国科学院半导体研究所 Chaotic pseudo random number generator, and circuit and system on chip thereby
CN105916141A (en) * 2016-07-12 2016-08-31 黑龙江大学 Self-synchronizing realization system and self-synchronizing realization method for Zu Chongzhi encryption and decryption algorithm
CN106209358A (en) * 2016-07-12 2016-12-07 黑龙江大学 A kind of SM4 key schedule based on long key realize system and method
CN109508175A (en) * 2018-11-14 2019-03-22 重庆邮电大学 The FPGA design of pseudorandom number generator based on fractional order chaos and Zu Chongzhi's algorithm

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003216037A (en) * 2001-11-16 2003-07-30 Yazaki Corp Cipher key, enciphering device, enciphering/deciphering device, cipher key management device, and deciphering device
US20160234009A1 (en) * 2015-02-08 2016-08-11 Wenhua Li Chaotic Baseband Modulation Hopping Based Post-Quantum Physical-Layer Encryption
CN108377180A (en) * 2018-03-29 2018-08-07 哈尔滨理工大学 A kind of wireless secret communication system based on STM32

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103731822A (en) * 2012-10-15 2014-04-16 中国科学院微电子研究所 System and method for implementing Zuichong algorithm
CN105808207A (en) * 2016-03-22 2016-07-27 中国科学院半导体研究所 Chaotic pseudo random number generator, and circuit and system on chip thereby
CN105916141A (en) * 2016-07-12 2016-08-31 黑龙江大学 Self-synchronizing realization system and self-synchronizing realization method for Zu Chongzhi encryption and decryption algorithm
CN106209358A (en) * 2016-07-12 2016-12-07 黑龙江大学 A kind of SM4 key schedule based on long key realize system and method
CN109508175A (en) * 2018-11-14 2019-03-22 重庆邮电大学 The FPGA design of pseudorandom number generator based on fractional order chaos and Zu Chongzhi's algorithm

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
An Efficient Image Encryption Scheme Based on ZUC Stream Cipher and Chaotic Logistic Map;Hai Cheng ect.;《Intelligent Data analysis and its Applications》;20141231;正文第2-3节 *
Design and Implementation of Pseudo-Random Sequence Generator Based on Logistic Chaotic System and m-Sequence Using FPGA;Kai Feng and Qun Ding;《International Conference on Intelligent Information Hiding and Multimedia Signal Processing》;20170718;全文 *
基于混沌S盒的无线传感器网络分组加密算法;何远等;《计算机应用》;20130401(第04期);全文 *
基于置乱、混淆与掩蔽规则融合3D混沌映射的图像加密算法研究;尹燕等;《科学技术与工程》;20140218(第05期);全文 *
祖冲之算法在数字图像加密中的应用与实现;任高峰等;《科学技术与工程》;20130128(第03期);全文 *

Also Published As

Publication number Publication date
CN110995405A (en) 2020-04-10

Similar Documents

Publication Publication Date Title
Farashahi et al. FPGA based fast and high-throughput 2-slow retiming 128-bit AES encryption algorithm
JP6042820B2 (en) Nonlinear processor, stream cipher encryption apparatus, stream cipher decryption apparatus, mask processing method, stream cipher encryption method, stream cipher decryption method, and program
US20210021405A1 (en) Key sequence generation for cryptographic operations
Kundi et al. A high performance ST-Box based unified AES encryption/decryption architecture on FPGA
Rouvroy et al. Efficient uses of FPGAs for implementations of DES and its experimental linear cryptanalysis
Karthigaikumar et al. Simulation of image encryption using AES algorithm
CN110995405B (en) Chaos-based initial vector generation algorithm and IP core thereof
Singh et al. An efficient hardware design and implementation of advanced encryption standard (AES) algorithm
JP2005215688A (en) Hardware encryption/decryption apparatus using s-box operation, and method for the same
WO2001017152A1 (en) A method for the hardware implementation of the idea cryptographic algorithm - hipcrypto
Chawla et al. FPGA implementation of an optimized 8-bit AES architecture: A masked S-Box and pipelined approach
EP1416664A2 (en) Data encryption method
RU2141729C1 (en) Method for encrypting of binary data units
Rashidi et al. FPGA based a new low power and self-timed AES 128-bit encryption algorithm for encryption audio signal
US20020172355A1 (en) High-performance booth-encoded montgomery module
Basu et al. implementation of AES algorithm in UART module for secured data transfer
Trivedi et al. Development of platform using nios ii soft core processor for image encryption and decryption using aes algorithm
Negi et al. Implementation of AES Employing Systolic Array and Pipelining Approach
Pyrgas et al. An 8-bit compact architecture of lesamnta-LW Hash function for constrained devices
Jain et al. An Inner Round Pipeline Architecture Hardware Core for AES
JP6972593B2 (en) How to operate the feedback shift register circuit and feedback shift register
Parmar et al. High speed architecture implementation of AES using FPGA
Karki et al. Advanced encryption techniques based on S-box and elliptical curve revisited
Lakshmi et al. Design and implementation of FPGA based dual key encryption
Hulle et al. High Performance Architecture for LILI-II Stream Cipher

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant