Misguiding encryption method capable of correcting pseudorandom sequence

A technology of pseudo-random sequence and encryption method, which is applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as the inability to determine the key, and achieve the effect of avoiding database synchronization and reducing redundancy

Active Publication Date: 2012-02-22
广西创美信息技术有限公司
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(4) You can take the initiative to mislead the other party, the wrong key can get meaningful plaintext to mislead the other party, and use the false key to get various similar and opposite "plaintexts", which have a certain "offsetting" effect compared with the original plaintext, Confused cryptanalysts
When the other party performs ciphertext-only analysis, the real key cannot be determined

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Misguiding encryption method capable of correcting pseudorandom sequence
  • Misguiding encryption method capable of correcting pseudorandom sequence
  • Misguiding encryption method capable of correcting pseudorandom sequence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following are examples of the present invention, however, the present invention is not limited to the examples.

[0036] In the actual implementation, it is stipulated that different parts of the total key are used for inner and outer encryption respectively, and the outer key is a fixed length, which is determined according to the algorithm used in the outer encryption. For example, the outer encryption algorithm adopts 256-bit AES encryption. The first 256 bits of the key are outer keys, and the rest are inner keys. In order to ensure irreversibility in the inner encryption, a stream cipher algorithm is used, for example, a 256-bit stream cipher algorithm can be used. The first 256 bits of the inner key are the keys of the stream cipher algorithm, corresponding to the attached image 3 The key stream generation part, the remaining part of the key is used to modify the key stream, the front part is the position information of the keyword, which is located accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method with a misguiding function, aiming at attacks such as secret key stealing, secret key holder seizing, rubber-hose cryptanalysis, ciphertext-only attack and the like. A pseudo secret key can be easily obtained through encryption with the method disclosed by the invention, thus a password analyzer can be misguided, the misguiding is determined by an internal secret key and comprises information for generating a secret key flow and correction information, and the misguiding effectiveness can be enhanced according to actual demands by using the correction information. For a special processing mode adopted by signs in a document, the specified signs can not be confused when possibly occurring in a text. A keyword database is needed during encrypting, internal encryption is subjected to keyword expansion by using the database, and the traditional encryption method is adopted in external encryption. The invention does not need the support of the database during encrypting so as to avoid the problem of synchronization of the database. The invention has a certain use value in the encryption application of various occasions, especially military.

Description

technical field [0001] The invention belongs to the field of information security and relates to an encryption method, in particular to an encryption method capable of correcting a pseudo-random sequence and having a misleading function. Background technique [0002] The ciphertext obtained by most existing cryptographic algorithms has a very small probability of being decrypted with a wrong key to obtain meaningful plaintext. This kind of wrong key that can obtain meaningful plaintext is called a false key. As the ciphertext increases, the number of pseudo-keys will gradually decrease. The pseudo-keys will be reduced to only one key at the end, which will threaten the security of the cryptographic system. The unique solution distance is when the ciphertext is tried with different keys, and only the length of a meaningful plaintext can be obtained. In fact, the estimation formula of the unique solution distance does not consider that the real ciphertext must exist, and is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F21/60
Inventor 王勇
Owner 广西创美信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products