Encryption method based on dual cycle queue shift and transposition rule

An encryption method and cyclic queue technology, applied in the traditional encryption field based on the double cyclic queue shift rule and transposition rule, can solve the problems of low speed, poor operability, low encryption strength, etc., and achieve simple transformation, high encryption strength, good safety effect

Inactive Publication Date: 2008-08-06
NORTHWEST A & F UNIV
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose an encryption method based on double-cycle queue shift and transposition rules, which solves the problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method based on dual cycle queue shift and transposition rule

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] An encryption method based on double circular queue shift and transposition rules is as follows:

[0028] Step 1] Input the integers m and n, and fill in the plaintext information to be encrypted into the m×n matrix from left to right and from top to bottom to form the plaintext information matrix A;

[0029] Step 2] Create a sequence of random integers X = {r ∈ N, r ≤ max(m, n)};

[0030] Step 3] The user inputs an integer w as the number of matrix transformations according to the encryption strength requirements;

[0031] Step 4] random number k is randomly selected in random integer sequence X, and operation k=k mod 5;

[0032] When k=0, take 4 random numbers L from the random integer sequence X 1 , L 2 , L 3 , L 4 , requiring L 1 3 ≤m,L 2 4 ≤n; then the Lth 1 line as the starting line, with the Lth 3 line as the end line, with the Lth 2 column as the starting column, with the Lth 4 column as the end column, construct the transformation matrix A', and reco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption method of the shifting rule and the transposition rule of a double circulation queue. The method comprises the following steps: a plaintext information matrix is taken; a random integer sequence is created; a matrix transformation frequency is input by user; a random number is taken out from the random integer sequence and is rounded; circular queue shifting and transposition of one row or one column of the transformation matrix are carried out according to a set remainder rule; a cipher text matrix is obtained after repeated transformations; finally, all transformation operation processes are recorded as sub keys which are arranged in turn to obtain a key. The encryption method, which belongs to a classic permutation encryption, adopts basic shifting operation and realizes quick enciphering process and deciphering process by means of less resource; meanwhile, the method solves the problems of the prior shifting encryption method such as low encryption intensity, low speed and poor operability; moreover, the encryption method which has the advantages of high encryption speed, simple implementation, high encryption intensity, excellent safety and a wide application scope is suitable to be used in software implementation and hardware implementation.

Description

technical field [0001] The present invention relates to a traditional encryption method, in particular to a traditional encryption method based on a double-cycle queue shift rule and a transposition rule. Background technique [0002] Traditional encryption methods mainly realize the hiding of information through substitution and permutation. Typical permutation encryption methods include fence permutation, rotary machine, etc. The replacement method does not hide the characters of the original plaintext, but reorders the characters that make up the plaintext to achieve the purpose of information hiding. [0003] However, the existing permutation and shift encryption methods have low encryption strength and low degree of information scrambling, and some encryption methods such as rotary machines are only suitable for hardware implementation. Contents of the invention [0004] The purpose of the present invention is to propose an encryption method based on double-cycle qu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/18
Inventor 武苏里景旭张阳谢小军
Owner NORTHWEST A & F UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products