Symmetric ciphering method having infinite cipher key space

A symmetric encryption, key space technology, applied in the field of information security, can solve the problem of increasing the difficulty of known plaintext analysis attacks, achieve high encryption and decryption efficiency, and protect security.

Inactive Publication Date: 2008-12-31
JIANGSU UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (2) Known plaintext attack
[0011] From the mechanism analysis of known plaintext attacks, we can know that if the correspondence between plaintext and cip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric ciphering method having infinite cipher key space
  • Symmetric ciphering method having infinite cipher key space
  • Symmetric ciphering method having infinite cipher key space

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be described in more detail below with reference to the accompanying drawings.

[0061] 1. Implementation of Encryption

[0062] Such as figure 1 Shown, the operating steps of the present invention are as follows:

[0063] (1) Select N (N≥1, N is a natural number) publicly available computer files, and use the sequence {File_1, File_2, ..., File_N} as the key, where File_i represents the file name of the i-th file.

[0064] (2) For each file in the key, use program automation to count the value of each Byte and record its address offset. Then create a configuration table file Config.ini, which contains 256 data areas numbered from 0 to 255, and each data area stores 256 different Byte values ​​from 0 to 255 according to its number. Starting from the start bit of any data area, the meaning of every five consecutive Bytes is: the first Byte represents the file used for encryption, and the next four Bytes represent the 32-bit address offset. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a symmetric encryption method with an infinite key space, which adopts a group of public computer file sequences as a key; the plaintext of a file to be encrypted takes a fixed-length of m Bits as base unit in a physical layer in which the plaintext is stored; the plaintext is divided into a plurality of plaintext fragments in sequence; when the remaining length is less than m Bits, '0s' are added to cause the length to be m Bits; every file of the key divides a ciphertext into a plurality of key fragments in sequence with the same fixed-length of m Bits as the base unit in a physical layer and gives out an address coding of every key fragment in a form of 'file name/address offset'; if the remaining length of the last key fragment is less than m, '0s' are added to cause the length to be m Bits; the plaintext fragment is presented by any one address of the same key fragment. A code representation is carried out on all plaintext fragments in the plaintext by using the same key fragment so as to obtain the ciphertext.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a method for encrypting and decrypting using symmetric key technology. Background technique [0002] Current cryptographic techniques can be divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption uses the same key during encryption and decryption; asymmetric encryption divides the key into a public key and a private key. The public key is used for encryption and the private key is used for decryption. This characteristic of asymmetric encryption solves a key problem that has plagued the use of ciphers for a long time-the key distribution problem. At present, when transmitting confidential information on the network, an asymmetric encryption method is generally used to transmit the key used in this communication, and then a symmetric encryption method is used for confidential communication. This is because under the same comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28H04L9/30
Inventor 王昌达夏蔚萍
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products