Unlock instant, AI-driven research and patent intelligence for your innovation.

Circle scattering migration code-transfer ciphering method

An encryption method and cipher technology, applied in encoding/decoding devices, instruments, electrical digital data processing, etc., can solve problems such as being easily cracked, achieve good performance of key attacks, protect security, and resist key attacks performance effect

Inactive Publication Date: 2009-11-18
HEJIAN TECH SUZHOU
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the rapid development of computer technology, the ability to break secrets has also developed surprisingly, which makes secret technology face severe challenges. Traditional encryption methods such as substitution encryption (substitution) or transposition encryption (transiposition) methods are easy to Therefore, there is an urgent need for a more reliable encryption method to safely store or transmit some sensitive and confidential information on unprotected media

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Circle scattering migration code-transfer ciphering method
  • Circle scattering migration code-transfer ciphering method
  • Circle scattering migration code-transfer ciphering method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The combination of the cyclic diffusion offset transcoding encryption method of the present invention is illustrated below, and finally a specific implementation will be given for further detailed description:

[0015] If the original plaintext password to be encrypted is:

[0016]

[0017] Now encrypt the above original plaintext password, the steps are as follows:

[0018] (a), transcoding step: ASCII code conversion is carried out to the first original plaintext password character, and the conversion into decimal characters is:

[0019]

[0020] (b), Diffusion step: Multiply the converted decimal characters of the first original plaintext password, the multiplier is K, K is the diffusion variable, and the diffusion variable K and the original plaintext password characters are in the original plaintext password string The position constants are in a linear relationship, and the characters after diffusion become:

[0021] (c), offset step: add (+M), subtract ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an enciphering method with recycling diffusion, offsetting and transcoding, which comprises the steps of (a) transcoding, namely transiting cipher characters of original plaintext password into ASCII codes one after another, transiting into decimal characters, (b) diffusion, namely multiplying the decimal characters transited from cipher character string, and a multiplier K is formed in linear relationship with positional constant of each original cipher character, (c) offsetting, namely carrying out mathematic processing with a offsetting constant M to the overall diffused decimal characters, (d) reoffsetting, namely carrying out mathematic processing with a offsetting constant N to individuals of the offset decimal characters, (e) character transiting, namely transiting offset decimal characters into corresponding ASCII codes to obtain enciphered password. The invention combines data recycling diffusion, offset and transcoding technique, employs two times of offsetting and transcoding, and produces dynamic extension enciphered password, thereby having good key attack resistant property and achieves the purpose of safeguarding information material.

Description

technical field [0001] The invention relates to the technical field of software information industry data encryption and decryption. Background technique [0002] The 21st century is an era of informatization. With the rapid development and wide application of computer and data communication technology, the society relies more and more on the safe storage, safe transmission and safe processing of information materials. Information security protection issues becomes more important. At present, information is increasingly networked, e-commerce, financial electronics, office paperless, automation and other technologies are booming, and the security and confidentiality of information that follow are increasingly concerned and paid more attention to. With the rapid development of computer technology, the ability to break secrets has also developed surprisingly, which makes secret technology face severe challenges. Traditional encryption methods such as substitution encryption (s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G09C1/00G09C1/04G06F21/24H04L9/00
Inventor 李华伟吴晓峰
Owner HEJIAN TECH SUZHOU