Efficient cryptographic key stream generation using optimized S-box configurations

Application of a ZUC cryptographic functions in wireless communication includes receiving a data stream at the wireless communication apparatus and applying the ZUC cryptographic function to the data stream. The ZUC cryptographic function includes generating at least one multi-byte pseudo-random num...

Full description

Saved in:
Bibliographic Details
Main Authors WEI JUSTIN Y, DAMBRE ANTOINE, CHHABRA GURVINDER SINGH, AHN CHRISTOPHER
Format Patent
LanguageEnglish
Published 28.06.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Application of a ZUC cryptographic functions in wireless communication includes receiving a data stream at the wireless communication apparatus and applying the ZUC cryptographic function to the data stream. The ZUC cryptographic function includes generating at least one multi-byte pseudo-random number that provides an index to one of a plurality of substitution boxes. Each of the substitution boxes is further based on one or more normative substitution boxes. The ZUC cryptographic function further includes retrieving a value from each of the substitution boxes using each byte of the multi-byte pseudo-random number, assembling the retrieved values into at least one substituted values, and generating at least one key value based on the substituted values, wherein the key value is used in applying the ZUC cryptographic function to the data stream. The method also includes processing the data stream after application of the ZUC cryptographic function.
Bibliography:Application Number: US201314024424