Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Enciphering method for combining accidental enciphering and exhaust algorithm decipher

A random encryption and exhaustive method technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as respecting people from afar, legitimate users retrieving files, and cracking encryption methods

Inactive Publication Date: 2008-07-23
刘海云
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of information technology, the confidentiality of information in the process of use, storage and transmission is particularly important. However, on the one hand, with the continuous improvement of computer computing speed, the ability of computers to decipher encrypted information is increasing, which makes the existing encryption methods restricted. Severe challenges have even been cracked; on the other hand, the EFS encryption system in the commonly used operating systems Windows XP and Windows Vista cannot allow legitimate users to retrieve the EFS encryption system after the user loses the EFS certificate and private key for some reason. Encrypted files make many users respect the EFS encryption system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enciphering method for combining accidental enciphering and exhaust algorithm decipher
  • Enciphering method for combining accidental enciphering and exhaust algorithm decipher
  • Enciphering method for combining accidental enciphering and exhaust algorithm decipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] For ease of description, the file security system (comprising encryption and decryption program) that has adopted encryption method in the present invention will be abbreviated as FKSS below; The internal passwords, certificates and other important information that adopt the present invention to protect or restore will be referred to as KeyText; The backup file that generates after encrypting with encryption method among the present invention is called ReCome (after generating ReCome, still retains KeyText in FKSS); The file or information that waits for FKSS to encrypt except KeyText is called MessFile; MessFile is encrypted by FKSS The file or information generated after encryption is called BeMF. The backup file ReCome may contain a part of information that is not encrypted by the encryption method of the present invention, and this part of information is specially used for identification when FKSS decrypts, so as to quickly determine whether the existing KeyText in F...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for encrypting, which combines random encryption and exhaustive method decryption. When the invention is used in encryption, a random password or a randomized algorithm are utilized to encrypt information, when the invention is used in decryption, decrypted programs can not guarantee that reduced secret keys or decryption algorithms can be correctly found out in one time, the decrypted programs need adopting an exhaustive method to try to decrypt for many times and to compare with password recognition information for many times, correct reduced secret keys or decryption algorithms can be found out, and the even decryption computational complexity when the information which is decrypted by the invention is decrypted is bigger for many times than that when the information is encrypted. The invention mainly encrypts backups of important information such as internal passwords, certifications and the like and certainly can encrypt information such as common files and the like.

Description

technical field [0001] The invention is an encryption method whose encryption strength can be adjusted automatically or according to needs. This encryption method can deal with various high-performance cracking machines. The invention is mainly used for protecting or recovering internal passwords, certificates and other important information. Background of the invention [0002] With the rapid development of information technology, the confidentiality of information in the process of use, storage and transmission is particularly important. However, on the one hand, with the continuous improvement of computer computing speed, the ability of computers to decipher encrypted information is increasing, which makes the existing encryption methods restricted. Severe challenges have even been cracked; on the other hand, the EFS encryption system in the commonly used operating systems Windows XP and Windows Vista cannot allow legitimate users to retrieve the EFS encryption system af...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/18
CPCH04L9/32
Inventor 刘海云
Owner 刘海云
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products