Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ciphering method for generating cipher code recognition information

A technology for identifying information and passwords, applied in the field of random encryption, which can solve problems such as user identity information and random keys cannot withstand attacks

Inactive Publication Date: 2009-07-22
刘海云
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This encryption method for user identity information and random keys is often vulnerable to attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0142] The invention utilizes the user identity information and the random key to encrypt together, locks the random key and the user identity information in the password identification information, and adopts the measure of anti-cryptanalysis method when generating the password identification information. According to the encrypted ciphertext of the present invention, no matter how the cracker writes the decryption program, except for using the exhaustive method or the method combining the exhaustive method and the cryptanalysis technique, other cryptanalysis methods cannot be effectively used to decipher the ciphertext, even if In the case that the user identity information provided is correct, any decryption program for the present invention still needs to adopt the exhaustive method or the method combining the exhaustive method and the cryptanalysis technique to find the random key, so as to ensure the successful decryption of the ciphertext . The encryption method in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provide a ciphering method for generating cipher recognition information, the ciphering method is designed based on increasing the user identification information and ciphering strength of the random cipher key, the ciphering method is mainly used for adjusting the ciphering strength of the cipher recognition information composed of the user identification information and the random cipher key after being ciphered. The ciphering process flow comprises: inputting the user identification information and the ciphering strength; calculating the length of the random cipher key and generating the random cipher key of the length, according to the relationships among the length of the random cipher key, the ciphering strength and the prescribed deciphering program speed; obtaining the cipher recognition information composed of the user identification information and the random cipher key after being ciphered according to the ciphering algorithm user identification information and the random cipher key determined by the program by utilizing the user identification information and the random cipher key. According to the backup generated by the ciphering method, anyhow the deciphering program is written, even the user identification information is inputted correctly, the deciphering is performed by using the exhaustion method, not only the identification information are compared, but also the random cipher keys are also compared.

Description

technical field [0001] The invention relates to a random encryption method. The ciphertext encrypted by the encryption method needs to be decrypted by exhaustive method no matter how the decryption program is written. Background technique [0002] Although there are many kinds of random encryption algorithms in current computers, the user identity information and random keys in all these encryption algorithms are the relationship between the upper-level key and the lower-level key in the key chain, and the two do not appear in the same place. Level phenomenon, as long as the user identity information is obtained, the random key can be calculated from the ciphertext at one time by using the information, and the calculation amount of decryption and the amount of encryption will not differ greatly. This encryption method for user identity information and random keys is often vulnerable to attacks. Contents of the invention [0003] The present invention is designed on the ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06F21/00
CPCH04L9/32
Inventor 刘海云
Owner 刘海云
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products