Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method based on virtual optics and device therefor

An encryption method and optical technology, applied in the field of information security, can solve problems such as the inability to apply PKI, the inability to effectively prevent data forgery and tampering, and the inability to achieve data integrity authentication

Active Publication Date: 2012-05-02
SHENZHEN ESUN DISPLAY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the reversibility of the optical path, all kinds of optical cryptographic algorithms are limited to the scope of symmetric cryptography, and cannot be applied to the widely used PKI at present, and cannot achieve data integrity authentication, nor can it effectively prevent data forgery and tampering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method based on virtual optics and device therefor
  • Encryption method based on virtual optics and device therefor
  • Encryption method based on virtual optics and device therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Attached below Figures 1 to 4 Embodiments of the present invention will be described in detail.

[0072] figure 1 The flow principle of the method of the present invention is shown. Proceed as follows:

[0073] 1) if figure 2 As shown, construct the digital information plane Info: Divide the digital information to be processed into 128bit integers, and finally fill all the data blocks less than 128bit with 1, construct an even number of data blocks, or construct an odd number of data blocks and then add a full The 128bit data blocks of 1 form an even number of data blocks; then the even number of data blocks are divided into two rows to finally construct two rows of 4×4×N numerical matrices, where the value of N depends on the length of the digitized information, and each data The block is 128bit, and a 4×4 numerical matrix matrix is ​​formed with an 8bit "unsigned word" as the minimum unit.

[0074] Taking the processing of 1024bit data (the last 104bits are all...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method. An optical imaging process is simulated in a digital region by using an algorithm and an electronic device; a series of irreversible operations of phase replacement are added on an object plane and an image plane; and various digital information (including images, voice, texts, and the like) is calculated so as to obtain Hash values. The invention alsoprovides a device for realizing the method. The method and the device realize the asymmetrical encryption in the field of optical information safety for the first time, not only provide an authentication function for data completeness, but also provide a theoretical support for the entrance of an optical data encryption method into a public key infrastructure (PKI). The method and the device havestrong adaptability, flexibility and expandability. A system of the invention utilizes an electronic processor to construct an optical Hash function in the digital region so that physical restrictions caused by optical elements can be completely eliminated and operability enhancement and easy realization can be achieved. The method and the device have good universality. An embedded system can be formed to finish the authentication of the data completeness on time and in real time.

Description

【Technical field】 [0001] The invention relates to information security technology, in particular to an encryption method and device based on virtual optics. 【Background technique】 [0002] In the context of the popularization of today's digital networks, the issue of information security is becoming more and more prominent. In general, there are two aspects to consider: on the one hand, use various encryption algorithms to protect the information to be transmitted, so that it can resist passive attacks; On the other hand, it is necessary to be able to prevent the opponent from actively attacking the system, such as forging and tampering with information. Authentication (Authentication) is the main means against active attacks, and it plays an important role in the security of various information systems in open networks. The construction of the Hash function is an indispensable step to realize various authentication schemes, and it is also a key factor to determine whether ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/30
Inventor 彭翔何文奇祁永坤
Owner SHENZHEN ESUN DISPLAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products