SYMMETRIC STREAM CIPHER
First Claim
Patent Images
1. An apparatus, comprising:
- a memory; and
a processor coupled to the memory and configured to;
obtain an encryption chain from a real random number generator (RRNG);
store the encryption chain in the memory;
identify at least one vector key;
select a plurality of encryption keys from the encryption chain using the at least one vector key; and
encrypt strings of clear text using the plurality of encryption keys.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, an apparatus, and a computer program product for symmetric stream encryption are provided. An encryption chain is obtained from a real random number generator (RRNG) and stored in memory. A vector key is identified based on numbers obtained from a fast, large period pseudo-random number generator. A set of encryption keys are identified from the encryption chain using the vector key. Strings of clear text are encrypted using the encryption keys.
4 Citations
19 Claims
-
1. An apparatus, comprising:
-
a memory; and a processor coupled to the memory and configured to; obtain an encryption chain from a real random number generator (RRNG); store the encryption chain in the memory; identify at least one vector key; select a plurality of encryption keys from the encryption chain using the at least one vector key; and encrypt strings of clear text using the plurality of encryption keys. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
a processing system configured to; obtain an encryption chain from a real random number generator (RRNG); obtain a vector key from a pseudo random number generator (PRNG); select a plurality of encryption keys from the encryption chain using coordinates from the vector key; and encrypt strings of clear text using the plurality of encryption keys. - View Dependent Claims (9, 10, 11, 12)
-
13. A computer program product comprising a non-transitory computer-readable medium having computer executable code for:
-
obtaining an encryption chain from a real random number generator (RRNG); identifying at least one vector key; selecting a plurality of encryption keys from the encryption chain using the at least one vector key; and encrypting strings of clear text using the plurality of encryption keys. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification