Dynamic encrypting method realizing one secrete key for one file

A dynamic encryption and key technology, applied in key distribution, can solve the problems of increasing encryption complexity, increasing key length, and taking less time to achieve the effect of increasing encryption complexity, fast encryption and fast speed.

Inactive Publication Date: 2009-09-16
北京乾坤化物数字技术有限公司
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Take the banking system as an example. At present, when people conduct transactions in online banking, their information is relatively safe. It takes a long time to decrypt the intercepted information. From the perspective of decryption cost, it is not worth decrypting. However, when quantum When computers appear, all this becomes very dangerous, because according to the most complex encryption technology currently used by people, the time it takes for quantum computers to decrypt is also relatively small, and when the complexity of encryption technology increases , the time it takes to encrypt increases in series
[0005] At this stage, although a lot of information encryption technologies have been invented, they basically increase the length of the key or increase the complexity of the encryption. Although quantum encryption can meet the encryption requirements of one text and one encryption, due to cost and other technical problems, There is still a long way to go to the actual application, and there are still many technical difficulties that need to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic encrypting method realizing one secrete key for one file
  • Dynamic encrypting method realizing one secrete key for one file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] This one-text-one-cipher dynamic encryption method can be realized by computer software, computer hardware, or a combination of computer software and hardware. combined process box figure 1 and concrete examples figure 2 , explained below.

[0027] This invention cites a Chinese patent titled "Method for Extracting Characteristic Values ​​of Fixed-Length Spatial Positions from Information", which was applied for by the inventor Zhao Wenyin on February 1, 2008, and the patent application number is 200810057400.0. This method describes Concrete steps for extracting spatial location from textual information.

[0028] On the encryption side, the flowchart is as follows figure 1 shown. At the beginning of the process, the files to be encrypted are specified by the user. figure 1 Other steps in are carried out automatically by the computer system according to the present invention.

[0029] 1) Select any file that needs to be encrypted.

[0030] 2) Connect the encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention pertains to the technical field of computer encryption, more particularly relates to a dynamic encrypting method realizing one secret key for one file. The encrypting method comprises the following steps: (1) according to the agreement of the information encrypting party and the information decrypting party, an encryption factor program module establishes a secret key tunnel; an encryption factor is obtained by extracting the state information of the information encrypting party and the information decrypting party and the agreement between the two parties, and then the encryption factor is respectively mapped in 8D space and 64D space, thus obtaining two spatial positions; and the coordinate values corresponding to the two spatial positions are the extracted secret key; (2) in a system, a spatial switching program module maps a computer file to space specified by a first secret key group, thus obtaining a new mapping file; (3) in the system, a decimal conversion program module processes the mapping file according to the way specified by a second secret key group.

Description

technical field [0001] The invention belongs to the technical field of computer encryption, and in particular relates to a dynamic encryption method with one text and one encryption. Background technique [0002] Before computers appeared, information encryption had already appeared, and the earliest application was in the process of transmitting military intelligence. [0003] After the emergence of computers, especially the rapid development of Internet technology, the technology of information encryption has become more and more important. People need to quickly transmit various types of computer file information through the network. In the process of information transmission, due to various reasons, the information will be intercepted. With the continuous improvement of computer computing speed, the time and cost of decrypting the intercepted information will become less and less, and a large amount of important information is insecure. status. [0004] In the current...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/18H04L9/08
Inventor 赵文银
Owner 北京乾坤化物数字技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products