H04L9/001

Sequence encryption method accompanying adjustable random reconfiguration of key
10855458 · 2020-12-01 · ·

Disclosed is a random binary sequence-based sequence encryption method accompanied with random reconfiguration of a key. The method is mainly characterized in that (1) an existing random sequence is used to dynamically configure a seed random sequence at the beginning of each encryption operation, (2) the seed random sequence is used to pseudo-randomly configure a random key with a fixed-length or variable-length bit field, (3) the pseudo-random configuration of the random key accompanies an encryption process, (4) a transitive property of an exclusive-or operation is used to realize a variable-frequency nonlinear exclusive-or operation on a plaintext using the key, (5) adjustment of key configuration is realized by adjusting a characteristic vector, other operation vectors and a pseudo-random configuration function, such that adjustment of an encryption density can be realized without increasing time complexity, and (6) the characteristic vector are unable to be reversely inducted in polynomial time complexity.

Systems and methods for quantum session authentication
10855454 · 2020-12-01 · ·

Systems, apparatuses, methods, and computer program products are disclosed for session authentication. An example method includes receiving, by decoding circuitry and over a quantum line, a set of qbits generated based on a first set of quantum bases. The example method further includes decoding, by the decoding circuitry and based on a second set of quantum bases, the set of qbits to generate a decoded set of bits comprising at least one wildcard bit. The example method further includes generating, by session authentication circuitry, a session key based on the decoded set of bits, wherein the session key is generated based at least in part on the at least one wildcard bit.

Non-Entanglement Physical Shared Ad-Hoc Randomness (NEPSAR)
20240015002 · 2024-01-11 ·

A stack of rotating discs drilled with randomized holes allow a light fluid L to rise into a chamber filled with heavier fluid H, as a randomized stream of bubbles. The two fluids are mutually non-soluble, and of different electric conductivity, hence the randomized stream of bubbles generates a randomized curve of electrical resistance within the chamber, over time; this output resistance curve is shared by all parties that have a duplicate of the contraption and apply the same activation settings. The physical complexity of the contraptions keeps the randomness secure against all parties not in possession of the contraption. Unlike Entanglement and BB84 solutions, this invention generates shared randomness without communicating the same between the parties.

Color Image Encryption Method Based on DNA Strand Displacement Analog Circuit
20200287704 · 2020-09-10 ·

The invention relates to the field of strand displacement, and provides a color image encryption method based on a DNA strand displacement analog circuit. Firstly, a reaction module with a light-emitting group and a quenching group is designed through Visual DSD software, and by utilizing the equivalence of a DNA strand displacement reaction module and an ideal reaction module, an analog circuit formed by the DNA strand displacement reaction module can perform analog on the dynamics characteristics of an ideal reaction network formed by the ideal reaction module, wherein the Rssler chaotic system can be described by the idealized reaction network. Secondly, data generated by the DNA strand displacement analog circuit is converted into a chaotic sequence matched with a plaintext image in size after being extended, and finally, the color image encryption effect is achieved through scrambling and diffusion operations.

Key Generation Device and Method
20200266978 · 2020-08-20 ·

A key generation method includes modulating a first key to a first light source signal, to obtain a modulated optical signal, splitting the modulated optical signal, to obtain a first sub modulated optical signal and a second sub modulated optical signal, attenuating the first sub modulated optical signal such that a quantity of photons included in each period of the first sub modulated optical signal is less than a preset value, and sending an attenuated first sub modulated optical signal to a receive-end device, and obtaining a second key carried in the second sub modulated optical signal, and storing the second key.

Wireless communication method for secure side-channel signaling and authentication at the physical layer

A method for wireless communication using a service side-channel signaling and authentication at the physical level. This method comprising the steps of creating at least one transmitting node and one receiving node within a wireless communication channel. Then choosing primary message and a secondary message and generating a valid transmission tag. Then superimposing the valid transmission tag and creating a set of secret codebooks in order to form a side-channel. Then applying key equivocation metric to measure key information leakage to an eavesdropper. Then transmitting said primary message and said secondary message. Then a receiver receiving said primary and said secondary messages detecting fingerprint estimating data combining a key set with the estimated data sending data and key set to a matrix to generate a secret codebook searching for valid tags authenticating and recovering side information.

METHOD FOR SEQUENTIALLY ENCRYPTING AND DECRYPTING DOUBLY LINKED LISTS BASED ON DOUBLE KEY STREAM CIPHERS

A method for sequentially encrypting and decrypting doubly linked lists based on double key stream ciphers comprises: establishing a plaintext set M according to a plaintext file; using the plaintext set M as an initial value and performing iterative decryption to obtain a ciphertext set C, wherein a key set P and an algorithm set A are used during the iterative decryption; for the ciphertext set C, performing multiple decryptions by calling the key set P and keys in the key set P, wherein a key set P and an algorithm set A are used during the decryptions; and, converting the obtained result of decryption into a plaintext file.

DEVICE AND METHOD FOR GENERATING A KEY
20200201134 · 2020-06-25 ·

A device for generating a key has a multimode interferometer which can be coupled to a light source and has a light path having an electro-optical material, the light path being configured to obtain light at an input side, influence the light under the influence of a locally varying refraction index of the electro-optical material and provide influenced light at an output side. The device has a receiver configured to receive the influenced light at the output side, and has an evaluator configured to perform an evaluation based on the influenced light and to generate the key based on the evaluation.

SEQUENCE ENCRYPTION METHOD ACCOMPANYING ADJUSTABLE RANDOM RECONFIGURATION OF KEY
20200195430 · 2020-06-18 ·

Disclosed is a random binary sequence-based sequence encryption method accompanied with random reconfiguration of a key. The method is mainly characterized in that (1) an existing random sequence is used to dynamically configure a seed random sequence at the beginning of each encryption operation, (2) the seed random sequence is used to pseudo-randomly configure a random key with a fixed-length or variable-length bit field, (3) the pseudo-random configuration of the random key accompanies an encryption process, (4) a transitive property of an exclusive-or operation is used to realize a variable-frequency nonlinear exclusive-or operation on a plaintext using the key, (5) adjustment of key configuration is realized by adjusting a characteristic vector, other operation vectors and a pseudo-random configuration function, such that adjustment of an encryption density can be realized without increasing time complexity, and (6) the characteristic vector are unable to be reversely inducted in polynomial time complexity.

ELECTRONIC DEVICE AND CONTROL METHOD THEREOF
20200178067 · 2020-06-04 ·

Disclosed is an electronic device. The electronic device includes a communicator comprising communication circuitry and a processor, the processor is configured to control the communicator to perform communication with an external device based on identifying that a strength of a signal received from an external device is equal to or greater than a predetermined threshold value, and after converting an electronic device to a low power mode, based on identifying that a strength of a signal received from an external device being within a first range, to control the electronic device to perform a secure pairing operation.