摘要:
A method for advancing or stepping back a chaotic sequence generation. The method involves selecting a plurality of polynomial equations. The method also involves selecting a value for the acc-dec variable v for advancing or stepping back a chaotic sequence generation by at least one cycle at a given time. The method further involves using residue arithmetic operations to respectively determine solutions for the polynomial equations using the acc-dec variable v. The solutions are iteratively computed and expressed as residue values. The method involves determining a series of digits in a weighted number system based on the residue values.
摘要:
A method of performing numerical computations in a mathematical system comprises expressing the mathematical system in discrete terms, using fixed-point variables in the computations, and extracting a sub-set of digits of a number. The sub-set of digits may represent a random or pseudo-random number. The mathematical system may be a system of non-linear differential equations, such as a chaotic system, for example a system with a positive Lyapunov exponent, or a discrete mapping, such as a logistic map, an Anosov or a Hénon map. The method is applicable to encryption and decryption algorithms, including stream ciphers and block ciphers, systems for generating a digital signature, Hash functions, and MAC (Message Authentication Code) functions. A test for periodical behaviour of a solution to the mathematical system is provided.
摘要:
A pseudo-random number generator (10), and an associated method, generates a pseudo-random number. The pseudo-random number is a complex, linear combination of values of input sequences provided to the generator (10) and exhibits little correlation with such input values. The generator includes a summation combiner (12) and an IIR (infinite impulse response) filter (18) connected in a feedback connection with the summation combiner (12). Because of the low correlation of the pseudo-random number and input values provided to the generator (10), the pseudo-random number is less susceptible to cryptanalysis by an unauthorized party.
摘要:
Methodology and concomitant circuitry to generate cryptographically strong pseudo-random bit streams utilize secure block cypher encoders. Each block cypher encoder (550) has a random key (540) and a first seed (510) as an input, and the output of each encoder is fed back to connect to its input. The first seed serves as the initial input, and each subsequent input is the immediate output of the block cypher encoder. Each bit in the cryptographically strong pseudo-random bit stream is related to a first inner product between input to the block cypher encoder and a second seed (520) and a second inner product (560) between the random key and a third seed (570).
摘要:
In a parallel computer system comprising a plurality of processor elements, a parent processor element (1) generates random-number initial values, and distributes the random-number initial values to child processor elements (2-1, ... 2-i, ... 2-k) using a communication mechanism (4) or a shared memory (5); and the child processor elements (5) conduct processing to generate random-number sequences in accordance with a maximum length shift register sequence (M-sequence) method using the distributed random-number initial values as seeds. Long-period random-number sequences can be generated which are not correlated with each other.
摘要:
A method for managing virtual objects (O) corresponding to real objects (R), said virtual objects (O) comprising a set (OP) of information or data representing said real object (R), said virtual objects (0) residing in a management system (20), which comprises a computer system (21) accessible by user terminals (13) through a telecommunication network to enable operations to be carried out on said virtual objects (O) in a database (22a) in said computer system (21), said method comprising the operations of: generating (100), in response to a request of a requesting subject (C) to create one or more virtual objects (O) that represent respective real objects (R), corresponding unique identifier codes (Z, zx, c, i) that enable a user terminal (13) to carry out operations on the respective virtual object (O). According to the invention, said unique identifier codes (zx, c, i) enable a user terminal (13) to carry out a procedure of activation of the respective virtual object (O) by associating in the database (22a) comprised in said computer system (21) a unique identifier code (Z, (Z, zx, c, i) to a first basic set (BP) of information supplied by said owning subject (C) at the moment of the request, said identifier code (zx, c, i) being calculated on the basis of: a first value (X) identifying a class to which the virtual object belongs (O); a second value (C) identifying said requesting subject; and a third value (i) representing a label that identifies said virtual object (0) in said class (X).
摘要:
One feature pertains to a method that reduces the computational delay associated with generating prime numbers. The method includes generating a first random number having a plurality of bits. A first primality test is then executed on the first random number. Then, it is determined whether the first random number generated fails or passes the first primality test. If the first random number fails the primality test then a portion but not all of the plurality of bits of the first random number are replaced with an equal number of randomly generated bits to generate a second random number. Next, a primality test is again executed on the second random number. This process is repeated until a prime number is detected.