Invention Grant
- Patent Title: Accelerated throughput synchronized word stream cipher, message authenticator and zero-knowledge output random number generator
- Patent Title (中): 加速吞吐量同步字流密码,消息认证器和零知识输出随机数发生器
-
Application No.: US11578909Application Date: 2005-04-21
-
Publication No.: US07827223B2Publication Date: 2010-11-02
- Inventor: Carmi David Gressel , Michael Slobodkin , Ran Granot , Roy Krotman , Yehonatan Bick , Mark Fiterman , Gabriel Vago , Amir Ingher , Uzi Apple
- Applicant: Carmi David Gressel , Michael Slobodkin , Ran Granot , Roy Krotman , Yehonatan Bick , Mark Fiterman , Gabriel Vago , Amir Ingher , Uzi Apple
- Applicant Address: GB London
- Assignee: Fortress GB Ltd.
- Current Assignee: Fortress GB Ltd.
- Current Assignee Address: GB London
- Agency: Kinney & Lange, P.A.
- International Application: PCT/IL2005/000429 WO 20050421
- International Announcement: WO2005/101975 WO 20051103
- Main IPC: G06F7/58
- IPC: G06F7/58 ; H04L9/00

Abstract:
Systems and methods are disclosed, especially designed for very compact hardware implementations, to generate random number strings with a high level of entropy at maximum speed. For immediate deployment of software implementations, certain permutations have been introduced to maintain the same level of unpredictability which is more amenable to hi-level software programming, with a small time loss on hardware execution; typically when hardware devices communicate with software implementations. Particular attention has been paid to maintain maximum correlation immunity, and to maximize non-linearity of the output sequence. Good stream ciphers are based on random generators which have a large number of secured internal binary variables, which lead to the page synchronized stream ciphering. The method for parsed page synchronization which is presented is especially valuable for Internet applications, where occasionally frame sequences are often mixed. The large number of internal variables with fast diffusion of individual bits wherein the masked message is fed back into the machine variables is potentially ideal for message authentication procedures.
Public/Granted literature
Information query