Patent classifications
H04L9/001
Data detection mitigation in printed circuit boards
Provided is a method for masking a sensitive signal by injecting noise into planes of a printed circuit board (PCB). The method comprises detecting, by a secondary integrated circuit (IC), a noise signal on a shared plane of a PCB that includes the secondary IC. The noise signal may be analyzed to determine the characteristics of the noise signal. A masking signal may be generated based on the characteristics. The masking signal may then be injected onto the shared plane.
Encryption/identification using array of resonators at transmitter and receiver
A sender and a receiver includes first and second arrays of coupled oscillators, respectively, that are substantially identically constructed so as to exhibit substantially the same dynamical response to excitation. A chaotic waveform generated at the sender is transmitted to the receiver, which generates a second chaotic waveform, and compares the received waveform with the generated second waveform. If the first and second waveforms match the sender is an authorized sender. An integrated circuit includes an array of coupled oscillators that in combination generate a waveform in response to at least one excitation signal. The array of coupled oscillators represents, in response to application of the excitation signals, a multi-dimensional security key that is shared between the sender of the waveform and the receiver of the waveform.
Asymmetrical chaotic encryption
Implementations and techniques for asymmetrical chaotic encryption are generally disclosed. One disclosed method for asymmetrical encryption includes determining a ciphertext control block from data, where the ciphertext control block is based at least in part on one or more Chebyshev polynomials. The method also includes encrypting at least a portion of the data into an encrypted ciphertext block, where the encrypted ciphertext block is based at least in part on Logistic Mapping, and in which a final ciphertext includes the encrypted ciphertext block and the ciphertext control block.
SEQUENCE ENCRYPTION FOR REFACTORING RECONSTRUCTED-KEY
The present invention discloses sequence encryption for refactoring a reconstructed-key: a set of compound logic is used to construct a chaotic computing structure to realize chaotic bit-segment stream sequence encryption. In the present invention, the chaotic computing structure is used to dispatch a bit fetching logic, a bit metabolic logic, a bit reconstruction logic and other computing logic units to pseudo-randomly refactor a construct source and a drive source segment by segment and the drive source is used to pseudo-randomly control the construct source to refactor key bit segments bit by bit so as to construct an infinite non-looping regenerated key bit segment sequence that “a picked construct source bit from staggered positions can be non-metabolized and from duplicated positions must be metabolized”.
NEW METHOD FOR PSEUDO-RANDOM NUMBER GENERATION FOR INFORMATION ENCRYPTION
A method of generating at least one encryption key (130) for encrypting data (142), a method of 5 data transmission between at least two communication systems (136, 138), a method of encrypting data (142) and a method of decrypting encrypted data (144) are disclosed. Further disclosed are an encryption key generating device (110), a system (134), a data encryption system (148) and a data decryption system (150). The method of generating at least one encryption key (130) for encrypting data (142), specifically for data transmission over an insecure channel, comprises: i. blending at least two materials (114) according to at least one item of blending in-formation by using a blending device (112), thereby generating at least one blend (120); ii. detecting at least one material property (124) of the blend (120) by using at least one detector (126); and iii. transforming the material property (124) into the encryption key (130) by using at least one data processing device (132) configured for applying at least one trans-formation algorithm to the material property (124).
Serial transmission having a low level EMI
A method for transmitting data in series includes producing a scrambled signal by applying a scrambling using a pseudo-random sequence to an incoming serial signal conveying the data and producing an outgoing serial signal. The scrambled signal is monitored to detect occurrences of one or more data patterns. In response to the detection of one or more occurrences, one or more actions are taken to protect data in the output signal.
KEY DISTRIBUTION METHOD AND SYSTEM BASED ON SYNCHRONIZED BROADBAND PHYSICAL RANDOM SOURCES
A key distribution method based on broadband physical random sources includes: utilizing a driving semiconductor laser to generate an optical signal, passing the optical signal through a phase modulator driven by a random signal and then equally dividing the phase-modulated optical signal into two identical paths, injecting the two identical paths into slave semiconductor lasers at both communication parties Alice and Bob's sides, respectively, to generate initial synchronized signals, using the generated initial synchronized signals as driving signals to phase-modulate optical signals generated by continuous-wave (CW) light sources, and inputting the modulated optical signals to dispersion modules; wherein after the modulated CW optical signals pass through the dispersion modules, two synchronized broadband noise-like random signals are generated, and then high-speed synchronized keys are generated by a post-processing method.
METHOD AND SYSTEM FOR PROVIDING A WAVEFORM DATASET AND SIGNAL GENERATION DEVICE
The present invention relates to a generation of a signal by executing a waveform dataset comprising waveform descriptive parameters. The execution of the waveform description parameters is limited by target device information specifying one or more specific target devices and time information specifying an execution period of the waveform descriptive parameters. By providing a waveform dataset comprising not only the waveform descriptive parameters, but also further information, in particular time information for limiting the execution period of the waveform descriptive parameters, the generation of the respective waveform signal is controlled.
METHOD OF REAL-TIME HIGH-SPEED QUANTUM RANDOM NUMBER GENERATION BASED ON CHAOS AMPLIFYING QUANTUM NOISE
A bottleneck in the continuous-variable quantum random number generation rate is mainly as follows: low quantum entropy content in actual quantum measurement on quantum entropy source, and low real-time post-processing rate in extraction of true random numbers. Therefore, the present disclosure aims to provide a method of real-time high-speed quantum random number generation based on chaos amplifying quantum noise, to greatly increase the quantum entropy content through the chaos amplifying quantum noise, perform parallel implementation of universal Hash post-processing of multichannel quantum random numbers, and implement real-time high-speed quantum random number generation. The present disclosure provides a cost-effective, highly scalable, and highly integrated entropy-increase scheme for device-independent, semi-device-independent, and device-trusted quantum random number generators that use continuous-variable quantum noise as an entropy source, effectively promoting the application of the continuous-variable quantum random number generators.
Image encryption method and apparatus, sensor and readable storage medium
The present disclosure discloses an image encryption method comprising: acquiring a row encryption sequence and a column encryption sequence, and acquiring, from a pixel array component of a sensor, pixel rows corresponding to the respective elements of the row encryption sequence; encrypting and sorting pixels in each of the pixel rows by using the column encryption sequence to obtain encrypted pixel rows corresponding to the respective pixel rows; and arranging the encrypted pixel rows according to a preset arrangement order to obtain an encrypted image. The method may perform encryption when generating an original image to obtain an encrypted image. In addition, the present disclosure also provides an image encryption apparatus, a sensor, and a computer readable storage medium, which also have the above-mentioned beneficial effects.