CN107733642A - Embedded encryption method based on high order second order logistic mappings - Google Patents

Embedded encryption method based on high order second order logistic mappings Download PDF

Info

Publication number
CN107733642A
CN107733642A CN201710919542.2A CN201710919542A CN107733642A CN 107733642 A CN107733642 A CN 107733642A CN 201710919542 A CN201710919542 A CN 201710919542A CN 107733642 A CN107733642 A CN 107733642A
Authority
CN
China
Prior art keywords
mrow
plaintext
logistic
block
mapping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710919542.2A
Other languages
Chinese (zh)
Inventor
吴世贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710919542.2A priority Critical patent/CN107733642A/en
Publication of CN107733642A publication Critical patent/CN107733642A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a kind of embedded encryption method based on logistic mappings, based on the embedded encryption method of logistic mappings, comprises the following steps:Step 1, producing method of the logistic mapping as sub-key system is selected, and the certain number of iteration is distinguished into each mapping in logistic mappings, step 2, plaintext is then divided into some pieces with binary system;Step 3, on the basis of the iteration obtained by step 1, then A and D two parts are obtained to the iteration of the certain number of each mapping progress in logistic mappings;Step 4, after entering shiftrows respectively to each Plaintext block obtained by step 2, corresponding intermediate ciphertext is obtained.The present invention maps core with logistic, carries out high order second order encryption embedded mode, realizes that the high order processing of encryption successive ignition produces complicated changeable key, the device can be embedded into various electronic products, improve the safety of electronic product.

Description

Embedded encryption method based on high order second order logistic mappings
It is on 02 09th, 2015, the entitled " insertion based on high order second order logistic mappings the applying date that the application, which is, Formula encryption method and device ", Application No. 201510066179.5 application for a patent for invention divisional application.
Technical field
The present invention relates to field of encryption, more particularly to the embedded encryption side mapped based on high order second order logistic Method.
Background technology
In general logistic mapping encryptings method is mainly to be produced by the initial value x0 and u (algorithm secret key) of mapping Raw two binary system series AsjAnd Dj, and by the two binary system series AsjAnd DjRegard the sub-key of this cryptographic system as to realize Encryption.However, the analysis of logistic mapping encryptings method and discovery series AjAnd DjIt is completely true by logistic mappings It is fixed, and in plain text and the factor such as ciphertext is unrelated.So, when attacker obtains the A of any plaintextjAnd DjAfterwards, it is possible to use this AjAnd DjDirectly attack has used the ciphertext that same key is encrypted, and this not only can make information security hidden danger be present, will also turn into Security breaches.It can be seen that only it is it cannot be guaranteed that information security by the simple logistic encryption methods mapped.
In order to improve information security, currently used increasingly complex logistic mapping encryptings method includes free Between the stream encryption, the stream encryption and second order logistic mapping encryptings etc. of multiple logistic mappings that divide.However, these are multiple Miscellaneous logistic mapping encrypting methods, although more iterations can ensure information security to a certain extent, When realizing information transfer, key more preferably can not change at any time, and reliability reduces, and not reach the effect of safe information transmission still Fruit.
The content of the invention
The technical problems to be solved by the invention are that the key in the presence of existing logistic mapping encryptings method is simple With key it is immutable the deficiencies of, there is provided it is a kind of based on high order second order logistic mapping embedded encryption method method and dress Put.
The present invention solves the above problems by the following technical programs:
Based on the embedded encryption method of high order second order logistic mappings, comprise the following steps:
Step 1, producing method of the logistic mapping as sub-key system is selected, and the logistic is reflected The certain number of iteration is distinguished in each mapping hit,
Selected logistic is mapped as
In formula,Ith mapping n follow-up value of iteration is represented, i=1,2,3....b-1, a-1, b, a, u is setting Value, and u ∈ (1.64,2),It is the numerical value of type double precision with u, a=1,2,3......, b=1,2,3......, and A, the complexity and processor computing capability that b value uses according to user are chosen;
Step 2, plaintext is then divided into some pieces with binary system;
Step 3, on the basis of the iteration obtained by step 1, then certain number is carried out to each mapping in logistic mappings Iteration obtain A and D two parts;
Step 4, after entering shiftrows respectively to each Plaintext block obtained by step 2, corresponding intermediate ciphertext is obtained;
Step 4.1, Plaintext block is divided into m plaintext sub-block;Wherein m is the positive integer more than 1;
Step 4.2, each plaintext sub-block ring shift left or after moving to right S positions simultaneously is obtained into each plaintext sub-block respectively Displacement plaintext sub-block;
Step 4.3, the order of the plaintext sub-block by each displacement plaintext sub-block as corresponding to it merges to obtain displacement in plain text Block;
Step 4.4, after Plaintext block ring shift left will be shifted or move to right m × S positions, intermediate ciphertext is obtained;
In above-mentioned steps 4.2 and step 4.4, the direction of displacement of each plaintext sub-block is consistent, and plaintext sub-block and Plaintext block Direction of displacement it is also consistent;
Step 5, the intermediate ciphertext obtained by step 3 gained A and step 4 is subjected to XOR;
Step 6, judge whether that all Plaintext blocks have been encrypted to finish;If finishing, terminate;Otherwise, return to step 3 Continue to encrypt.
In such scheme, each mapping in being mapped preferably in step 1 logistic carries out the number of iteration first More than the number that each mapping in being mapped in step 3 logistic carries out iteration again.
Advantages of the present invention is with effect:
Instant invention overcomes key in traditional logistic mapping encryptings method is simple and the shortcomings of key is immutable, with Logistic maps core, carries out high order second order encryption embedded mode using stm32F407, realizes encryption successive ignition high order Processing produces complicated changeable key, and the device can be embedded into various electronic products, improve the safety of electronic product.
Brief description of the drawings
Fig. 1 is the encryption flow figure of the present invention;
Fig. 2 is the logistic mapping bifurcation graphs of the present invention;
Fig. 3 is the second order High Degree Logistic-Like Map figure of the present invention.
Embodiment
The invention will be further described with reference to embodiments.
A kind of embedded encryption method method based on high order second order logistic mappings, as shown in figure 1, including as follows Step:
Step 1, producing method of the logistic mapping as sub-key series is selected:
In formula:Represent ith mapping n follow-up value of iteration.U is setting value, and u ∈ (1.64,2).It is equal with u For the numerical value of type double precision, a=1,2,3......, b=1,2, the 3...... (complexity that a, b value use according to user Degree and processor computing capability are chosen).In order to eliminate the influence of instantaneous value, in a preferred embodiment of the invention, by formula (1) Mapping difference iteration 200 times, it is the starting point for producing key to obtain x200.
Step 2, a series of packet that length are 256 bits will be divided into plain text, last packet is if curtailment Zero padding.
Step 3, each mapping in formula (1) is distinguished into iteration 40 times again.If the iteration j value of ith mapping is(two enter Form processed is:WhereinN-th binary system represented).From The middle numerical value extracted in the 2nd, 3 binary digit, obtains the series of 18 bitBy The serial D of series A and 32 bits that 20 iteration and extraction obtain 256 bits distinguishes as follows:
A=H1,2H1,3H2,2H2,3H3,2H3,3......H16,2H16,3
D=H17,2H17,3H18,2H18,3H19,2H19,3H20,2H20,3
Wherein, in formula
Step 4, shiftrows are entered to Plaintext block.
First, by Plaintext block pk(k=1,2 ...) is divided into four pieces of 64 bits:Pk1、Pk2、 Pk3And Pk4Circulate respectively Move to left S1、S2、S3And S4Position, wherein S1=(H17,2H17,3)mod64,S2=(H18,2H18,3)mod64,S3=(H19,2H19,3) Mod64 and S4=(H20,2H20,3)mod64。
Then, by Pk1、Pk2、Pk3And Pk4Merging obtains Pk, then by Pk, ring shift left S positions, obtain intermediate ciphertext C, k. Wherein,
S=(H17,2H17,3+H18,2H18,3+H19,2H19,3+H20,2H20,3) mod64.
Step 5, A and C, k are carried out xor operation, obtains encrypted cipher text:
Step 6, if Ck (i) is the value of i-th of byte in ciphertext Ck, it is as follows to calculate E1~E4:
Step 7, if all encryption finishes Plaintext block, terminate;Otherwise iteration E1~E4 is distinguished to various in formula (1), so After go to step 3 iteration 40 times.
This encryption method reaches the complexity of key first by initial key high order iteration 200 times;Then will be in plain text with two System is divided into some pieces, is prepared for encryption below;By the key of iteration before, further iteration obtains A and D two again Point, then carry out XOR by a portion and the plaintext Jing Guo shift operation.Such as Fig. 1, E1~E4 encryptions are basically completed Module, then further judge whether that all plaintexts are encrypted complete, continue to encrypt if do not returned again to.Each The key of secondary iteration be all it is different reach time variation, reach encryption information security purpose.
As shown in figure 3, it is the logistic mapping bifurcation graphs of the present invention, when taking parameter a=2, b=3, this figure is The bifurcation graphs that parameter u changes from 0 to 2.0, it is as seen from the figure, in the range of 1.64-2.0 chaotic motion, can be used for encrypting.When Determine u value and change a, b value, can all produce different value, so that encryption is better.
It is the second order High Degree Logistic-Like Map figure of the present invention, is the iteration evolution diagram that u takes 1.649 in figure.Can from figure To find out that the data that interative computation comes out are chaos, when we can change u value in the full mapping ranges of Fig. 3, to adding It is close to have more selectivity, preferably improve security.
The preferred embodiment to the invention is illustrated above, but the present invention is not limited to embodiment, Those skilled in the art can also be made on the premise of without prejudice to the invention spirit a variety of equivalent modifications or Replace, these equivalent modifications or replacement are all contained in scope of the present application.

Claims (2)

1. the embedded encryption method based on high order second order logistic mappings, it is characterised in that comprise the following steps:
Step 1, producing method of the logistic mapping as sub-key system is selected, and by logistic mappings The certain number of each mapping difference iteration,
Selected logistic is mapped as
<mrow> <msub> <mi>x</mi> <mrow> <mi>n</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mo>&amp;lsqb;</mo> <mn>1</mn> <mo>-</mo> <mn>4</mn> <mi>u</mi> <mrow> <mo>(</mo> <msubsup> <mi>x</mi> <mi>n</mi> <mi>a</mi> </msubsup> <mo>-</mo> <msubsup> <mi>x</mi> <mi>n</mi> <mi>b</mi> </msubsup> <mo>)</mo> </mrow> <mo>&amp;rsqb;</mo> <mo>&amp;lsqb;</mo> <mn>1</mn> <mo>-</mo> <mn>4</mn> <mi>u</mi> <mrow> <mo>(</mo> <msubsup> <mi>x</mi> <mrow> <mi>n</mi> <mo>-</mo> <mn>1</mn> </mrow> <mrow> <mi>a</mi> <mo>-</mo> <mn>1</mn> </mrow> </msubsup> <mo>-</mo> <msubsup> <mi>x</mi> <mrow> <mi>n</mi> <mo>-</mo> <mn>1</mn> </mrow> <mrow> <mi>b</mi> <mo>-</mo> <mn>1</mn> </mrow> </msubsup> <mo>)</mo> </mrow> <mo>&amp;rsqb;</mo> </mrow>
In formula,Ith mapping n follow-up value of iteration is represented, i=1,2,3....b-1, a-1, b, a, u is setting value, and u ∈ (1.64,2),With u it is the numerical value of type double precision, a=1,2,3......, b=1,2,3......, and a, b take The complexity and processor computing capability that value uses according to user are chosen;
Step 2, plaintext is then divided into some pieces with binary system;
Step 3, on the basis of the iteration obtained by step 1, then changing for certain number is carried out to each mapping in logistic mappings In generation, obtains A and D two parts;
Step 4, after entering shiftrows respectively to each Plaintext block obtained by step 2, corresponding intermediate ciphertext is obtained;
Step 4.1, Plaintext block is divided into m plaintext sub-block;Wherein m is the positive integer more than 1;
Step 4.2, each plaintext sub-block ring shift left or after moving to right S positions simultaneously is obtained into the shifting of each plaintext sub-block respectively Position plaintext sub-block;
Step 4.3, the order of the plaintext sub-block by each displacement plaintext sub-block as corresponding to it merges to obtain displacement Plaintext block;
Step 4.4, after Plaintext block ring shift left will be shifted or move to right m × S positions, intermediate ciphertext is obtained;
In above-mentioned steps 4.2 and step 4.4, the direction of displacement of each plaintext sub-block is consistent, and the shifting of plaintext sub-block and Plaintext block Position direction is also consistent;
Step 5, the intermediate ciphertext obtained by step 3 gained A and step 4 is subjected to XOR;
Step 6, judge whether that all Plaintext blocks have been encrypted to finish;If finishing, terminate;Otherwise, return to step 3 continues to add It is close.
2. the embedded encryption method according to claim 1 based on high order second order logistic mappings, it is characterised in that: The number that each mapping in being mapped in step 1 logistic carries out iteration first is more than in step 3 in logistic mappings Each mapping carry out the number of iteration again.
CN201710919542.2A 2015-02-09 2015-02-09 Embedded encryption method based on high order second order logistic mappings Pending CN107733642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710919542.2A CN107733642A (en) 2015-02-09 2015-02-09 Embedded encryption method based on high order second order logistic mappings

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510066179.5A CN104579693B (en) 2015-02-09 2015-02-09 Based on the high order second order logistic embedded encryption methods mapped and device
CN201710919542.2A CN107733642A (en) 2015-02-09 2015-02-09 Embedded encryption method based on high order second order logistic mappings

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510066179.5A Division CN104579693B (en) 2015-02-09 2015-02-09 Based on the high order second order logistic embedded encryption methods mapped and device

Publications (1)

Publication Number Publication Date
CN107733642A true CN107733642A (en) 2018-02-23

Family

ID=53094972

Family Applications (5)

Application Number Title Priority Date Filing Date
CN201710919612.4A Active CN107707352B (en) 2015-02-09 2015-02-09 A kind of embedded encryption method
CN201710919545.6A Pending CN107707351A (en) 2015-02-09 2015-02-09 Embedded encryption method based on logistic mappings
CN201510066179.5A Expired - Fee Related CN104579693B (en) 2015-02-09 2015-02-09 Based on the high order second order logistic embedded encryption methods mapped and device
CN201710919542.2A Pending CN107733642A (en) 2015-02-09 2015-02-09 Embedded encryption method based on high order second order logistic mappings
CN201710917058.6A Active CN107835070B (en) 2015-02-09 2015-02-09 Simple embedded encryption method

Family Applications Before (3)

Application Number Title Priority Date Filing Date
CN201710919612.4A Active CN107707352B (en) 2015-02-09 2015-02-09 A kind of embedded encryption method
CN201710919545.6A Pending CN107707351A (en) 2015-02-09 2015-02-09 Embedded encryption method based on logistic mappings
CN201510066179.5A Expired - Fee Related CN104579693B (en) 2015-02-09 2015-02-09 Based on the high order second order logistic embedded encryption methods mapped and device

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201710917058.6A Active CN107835070B (en) 2015-02-09 2015-02-09 Simple embedded encryption method

Country Status (1)

Country Link
CN (5) CN107707352B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110415075A (en) * 2019-07-11 2019-11-05 梧州市众恒商贸有限公司 One kind, which has, exempts from unifunctional merchandise system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889477A (en) * 2018-08-15 2020-03-17 齐爱民 Commodity anti-counterfeiting code generation method based on block chain
CN110650006B (en) * 2019-09-17 2021-11-12 南通大学 Encryption and decryption method for Chinese and English character strings

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6442445B1 (en) * 1999-03-19 2002-08-27 International Business Machines Corporation, User configurable multivariate time series reduction tool control method
CN100369404C (en) * 2002-01-10 2008-02-13 张红雨 Chaotic encipher series generator
US7848516B2 (en) * 2006-01-20 2010-12-07 Chiou-Haun Lee Diffused symmetric encryption/decryption method with asymmetric keys
CN101217360A (en) * 2007-12-28 2008-07-09 中南大学 A method to obtain uniform distributed pseudo random sequence in random chaos system
CN101222318B (en) * 2008-01-23 2010-08-18 黑龙江大学 Chaotic sequence generation method and sequence generator of high speed high-precision chaotic function
CN101232367B (en) * 2008-01-23 2010-06-30 黑龙江大学 Chaos encrypting and decrypting method without multiply and divide of chaos function and circuit thereof
CN101714917A (en) * 2009-08-24 2010-05-26 黑龙江大学 Chaotic key-based data encryption transmission card
KR20130064989A (en) * 2011-12-09 2013-06-19 연세대학교 산학협력단 Image transmission method and apparatus, and image reception method and apparatus for image tamper detection
CN102571330B (en) * 2012-02-01 2014-07-30 桂林电子科技大学 Method for constructing block encryption algorithm based on random function
CN102708534B (en) * 2012-04-12 2014-10-15 江苏理工学院 Generating method of variable-parameter multistage chaotic pseudorandom sequence
CN103560876B (en) * 2013-11-22 2016-06-22 北京航空航天大学 A kind of encryption method using the random clock based on chaos and device
CN103716502B (en) * 2013-12-25 2017-02-01 西安理工大学 Encryption method based on iteration FrFT and chaotic single-channel color images
CN104065422B (en) * 2014-07-01 2016-06-22 电子科技大学 The noise secondary encryption of a kind of broadband access network and signal recovery method
CN104144343B (en) * 2014-07-11 2017-06-30 东北大学 A kind of digital image compression encrypts joint coding method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110415075A (en) * 2019-07-11 2019-11-05 梧州市众恒商贸有限公司 One kind, which has, exempts from unifunctional merchandise system

Also Published As

Publication number Publication date
CN107707351A (en) 2018-02-16
CN107707352B (en) 2019-07-02
CN104579693B (en) 2017-11-03
CN104579693A (en) 2015-04-29
CN107835070B (en) 2020-09-04
CN107707352A (en) 2018-02-16
CN107835070A (en) 2018-03-23

Similar Documents

Publication Publication Date Title
CN105530263B (en) A kind of extra lightweight RFID mutual authentication methods based on tag ID
CN107147484A (en) A kind of full homomorphic cryptography method of floating number towards secret protection
CN106301759B (en) A kind of method of data encryption, the method and device of decryption
CN105656619B (en) A kind of AES encryption method and the anti-power consumption attack method based on it
CN104333446B (en) A kind of novel ultra-light magnitude QTL block cipher implementation method
CN108809626A (en) A kind of whitepack SM4 cryptographic algorithms scheme and system
CN101814985B (en) Block cipher system using multi-chaotic mapping multi-dynamic S-box
CN110474761A (en) One kind 16 takes turns SM4-256 whitepack password implementation method
CN104751065A (en) Encryption method for geographic information product file
CN103634102A (en) Protection method for side channel attack and fault attack
CN107733642A (en) Embedded encryption method based on high order second order logistic mappings
CN104917608A (en) Key anti-power attack method
CN103746805B (en) The generation method and system of external authentication key
CN104092535B (en) A kind of method for realizing DES password encryptions
CN104219045B (en) RC4 stream cipher generators
CN103812658B (en) A kind of secure communication protocols based on stream cipher
CN109218008A (en) A kind of template attack method for SM4 key schedule
CN104618092A (en) Information encryption method and system
CN101582170A (en) Remote sensing image encryption method based on elliptic curve cryptosystem
CN103684748B (en) Symmetric encryption and decryption method, and symmetric encryption and decryption system
CN103546277B (en) The DPA of a kind of smart card SM4 algorithm attacks and key recovery method and system
CN105187198B (en) A kind of aes algorithm hardware realization apparatus under ipsec protocol
CN101938739B (en) Encryption method for wireless local area network
CN103051443B (en) AES (Advanced Encryption Standard) key expansion method
CN106788971A (en) A kind of sub-key generation method based on stream cipher arithmetic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180223

WD01 Invention patent application deemed withdrawn after publication