Encryption method based on cycle queue shift rule

An encryption method and circular queue technology, applied to the usage of multiple keys/algorithms, etc., can solve the problems of low encryption strength, low speed, and poor operability, and achieve high encryption strength, simple transformation, and fast encryption and decryption speed

Inactive Publication Date: 2008-08-06
NORTHWEST A & F UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose an encryption method based on circular queue shift rules, which solves the problems of low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method based on cycle queue shift rule

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] An encryption method based on circular queue shifting rules is as follows:

[0028] Step 1] The user inputs integers m and n, and fills the plaintext information to be encrypted into the m×n matrix from left to right and from top to bottom to form a plaintext information matrix A;

[0029] Step 2] Create a sequence of random integers X = {r ∈ N, r ≤ max(m, n)};

[0030] Step 3] The user inputs an integer w as the number of matrix transformations according to the encryption strength requirements;

[0031] Step 4] random number k is randomly selected in random integer sequence X, and operation k=k mod 5;

[0032] When k=0, take 4 random numbers L from the random integer sequence X 1 , L 2 , L 3 , L 4 , requiring L 1 3 ≤m,L 2 4 ≤n; then the Lth 1 line as the starting line, with the Lth 3 line as the end line, with the Lth 2 column as the starting column, with the Lth 4 column as the end column, construct the transformation matrix A', record the operation process...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption method based on circular queue shifting rule. The method comprises the following steps: a plaintext information matrix is taken; a random integer sequence is created; a matrix transformation frequency is input by a user; a random number is taken out from the random integer sequence and is rounded; circular queue shifting of one row or one column of the transformation matrix is carried out according to a set remainder rule; a cipher text matrix is obtained after repeated transformations; finally, all transformation operation processes are recorded as sub keys which are arranged in turn to obtain a key. The encryption method, which belongs to a classic permutation encryption, adopts basic shifting operation and realizes quick enciphering process and deciphering process by means of less resource; meanwhile, the method solves the problems of the prior shifting encryption method such as low encryption intensity, low speed and poor operability; moreover, the encryption method which has the advantages of high encryption speed, simple implementation, high encryption intensity, excellent safety and a wide application scope is suitable to be used in software implementation and hardware implementation.

Description

technical field [0001] The present invention relates to a traditional encryption method, in particular to a traditional encryption method based on circular queue shift rules. Background technique [0002] Traditional encryption methods mainly realize the hiding of information through substitution and permutation. Typical permutation encryption methods include fence permutation, rotary machine, etc. The replacement method does not hide the information of the original plaintext, but uses the reordering of the information that makes up the plaintext to achieve the purpose of information hiding. [0003] However, the existing permutation and shift encryption methods have low encryption strength and low degree of information scrambling, and some encryption methods such as rotary machines are only suitable for hardware implementation. Contents of the invention [0004] The purpose of the present invention is to propose an encryption method based on circular queue shift rules, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/16
Inventor 武苏里景旭张阳谢小军
Owner NORTHWEST A & F UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products