Symmetric stream cipher
First Claim
Patent Images
1. An apparatus, comprising:
- a memory; and
a processor coupled to the memory and configured to;
obtain an encryption chain from a real random number generator (RRNG);
store the encryption chain in the memory;
identify at least one vector key using bits obtained from a pseudo random number generator (PRNG);
select a plurality of encryption keys from the encryption chain using the at least one vector key; and
encrypt strings of clear text using the plurality of encryption keys;
the apparatus, wherein the processor is further configured to;
select a different combination of the at least one vector key in response to each of the plurality of encryption keys being used to encrypt the clear text;
obtain a new plurality of encryption keys from the encryption chain based on the different combination of the at least one vector key; and
encrypt additional strings of clear text using the new plurality of encryption keys.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, an apparatus, and a computer program product for symmetric stream encryption are provided. An encryption chain is obtained from a real random number generator (RRNG) and stored in memory. A vector key is identified based on numbers obtained from a fast, large period pseudo-random number generator. A set of encryption keys are identified from the encryption chain using the vector key. Strings of clear text are encrypted using the encryption keys.
7 Citations
14 Claims
-
1. An apparatus, comprising:
- a memory; and
a processor coupled to the memory and configured to; obtain an encryption chain from a real random number generator (RRNG);
store the encryption chain in the memory;identify at least one vector key using bits obtained from a pseudo random number generator (PRNG); select a plurality of encryption keys from the encryption chain using the at least one vector key; and encrypt strings of clear text using the plurality of encryption keys; the apparatus, wherein the processor is further configured to;
select a different combination of the at least one vector key in response to each of the plurality of encryption keys being used to encrypt the clear text;obtain a new plurality of encryption keys from the encryption chain based on the different combination of the at least one vector key; and encrypt additional strings of clear text using the new plurality of encryption keys. - View Dependent Claims (2, 3, 4, 5)
- a memory; and
-
6. An apparatus, comprising:
- a memory;
a processing system coupled to the memory and configured to; obtain an encryption chain from a real random number generator (RRNG);
store the encryption chain in the memory;obtain a vector key from a pseudo random number generator (PRNG);
select a plurality of encryption keys from the encryption chain using coordinates from the vector key; andencrypt strings of clear text using the plurality of encryption keys; the apparatus, wherein the processing system is further configured to; select a different combination of the vector key once each of the pluraity of encryption keys are used to encrypt the strings of clear text; obtain a new pluraity of encryption keys from the encryption chain based on the different combination of the vector key; and encrypt additional strings of clear text using the new plurality of encryption keys. - View Dependent Claims (7, 8, 9)
- a memory;
-
10. A computer program product comprising a non-transitory computer-readable medium having computer executable code stored in a memory which code, when executed by a processor coupled to the memory. performs a process for:
-
obtaining an encryption chain from a real random number generator (RRNG);
identifying at least one vector key using bits obtained from a pseudo random number generator (PRNG);selecting a plurality of encryption keys from the encryption chain using the at least one vector key; and encrypting strings of clear text using the plurality of encryption keys; the computer program product, further comprising code for;
selecting a different combination of the at least one vector key in response to each of the plurality of encryption keys being used to encrypt the clear text;obtaining a new plurality of encryption keys from the encryption chain based on the different combination of the at least one vector key; and encrypting additional strings of clear text using the new plurality of encryption keys. - View Dependent Claims (11, 12, 13, 14)
-
Specification