key embedded cipher

An embedded and key technology, applied in the field of information security

Inactive Publication Date: 2011-11-30
ZHEJIANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These two problems are actually the fundamental reasons for the vulnerability of existing passwords (difficult to eliminate security holes), application limitations (poor use flexibility, complex system management) and high operating costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • key embedded cipher
  • key embedded cipher
  • key embedded cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The realization of the present invention includes two parts of work, namely the design of the key embedded algorithm module and the construction of the key embedded network security system with the key embedded algorithm module as the basic unit. The following is attached Figure 1 to 4 , Describe the implementation method of the present invention.

[0061] 1. Design and production of key embedded algorithm module

[0062] Choose the appropriate computer language, such as VB, C#, C++, and compile the key embedded algorithm program. Refer to the basic algorithm flow of the key embedded algorithm module ( figure 1 ), design the generating function module according to the following requirements.

[0063] The mother function module is composed of three independent sub-modules: mother function encoder E, mother function decoder D, initialization function 12, such as figure 1 Shown. The generating function encoder E includes an encryption transformation function 1 and an encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The public key embedded cipher of the present invention includes a key embedded algorithm module and a cryptographic system composed of the algorithm module. The key embedded algorithm module integrates the encoding / decoding function and the key generation function, and the key is configured in asymmetric and symmetric ways in a separate algorithm module. The key algorithm module is divided into a parent function module and a sub-function module. The cryptographic system consists of a management center and multiple user terminals. The management center uses the parent function module to generate sub-function modules with different key settings, and distributes the sub-function modules to users. The key distribution is automatically completed during this process. The key has a uniformly set key number, and the user manipulates the key through the key number. The cryptographic system uses the key algorithm module and its key configuration to establish a hidden key communication mechanism. The effect is that the system provides three information security functions of confidentiality, authenticity and non-repudiation, but neither is transmitted between users. key, and does not directly disclose the key.

Description

technical field [0001] The invention relates to key embedded ciphers and belongs to the technical field of information security. Background technique [0002] Cryptography is the core technology to ensure network information security. The ciphers currently used in practice can be divided into two categories according to the different key forms: symmetric cryptography and asymmetric cryptography (public key cryptography). [0003] In a symmetric cryptosystem, the same key is used for encryption and decryption. The security of this type of cipher mainly depends on the secrecy of the key, and the communication parties generally need to transfer the key through a secure channel. The main advantage of symmetric cryptography is that the algorithm is simple and the operation speed is fast, but the disadvantage is that the key management is complicated, which is also the biggest problem of symmetric cryptography in practical applications. [0004] In a public key cryptography sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/16H04L9/32H04L9/30
Inventor 鲁阳
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products