Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for encrypting in sections by using uncertain encryption algorithm

A technology of segmented encryption and encryption algorithm, applied in the field of cryptography, can solve the problems affecting the security of the algorithm, and achieve the effect of increasing the generalized key space, optimizing the comprehensive performance and enhancing the security.

Active Publication Date: 2012-04-04
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, this affects the security of the algorithm
If the plaintext is divided into small segments smaller than the unique solution distance for encryption, and the algorithm is kept secret, the cryptanalyst will not be able to take advantage of the above defects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting in sections by using uncertain encryption algorithm
  • Method for encrypting in sections by using uncertain encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following are embodiments of the invention, For convenience, the example is relatively simple.

[0025] First of all, in terms of the design of the encryption system, a 256-bit stream cipher is used to generate an algorithm-encoded sequence. The stream cipher is used to ensure security. Even if the algorithm used in some previous segments is known, it is impossible to use it to obtain other segmented encryption algorithms. The structure of the generalized key is that the first 256 bits are AK, and the last 512 bits are NK. It is agreed that the encrypted plaintext length of each algorithm is: block cipher algorithm and other block algorithm is a single block length, stream cipher and one-time pad algorithm is 128bit, the purpose of this selection is to make the algorithm change more frequently, and the same algorithm The encryption length of is as small as possible, and try not to exceed the unique solution distance.

[0026] Determination and coding of the alg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to a novel encrypting method, in particular relates to a method for encrypting in sections by using an uncertain encryption algorithm. The method is used for encrypting the plain text in sections; and the algorithm for encrypting each section is uncertain and secret and determined by generalized keys. The method adopts the generalized keys to determine the length of each section, the encrypting algorithm of each section, various keys and parameters. Because the algorithm is uncertain, password analyzers do not know where to decrypt, though the analyzers get some information, the information means nothing to decrypt other sections.

Description

technical field [0001] The invention belongs to the field of cryptography, and relates to a novel encryption method, in particular to an encryption method of a segmented transformation algorithm. Background technique [0002] In 1949, C.E. Shannon published the article "Communication Theory of Secrecy Systems", making cryptography a science. This article introduces information theory into cryptography, and uses the statistical point of view to describe and quantitatively analyze the information source, cipher source, and received ciphertext. At the same time, he also puts forward the basic point of view of designing ciphers. Regarding the problem of pseudo-keys, Shannon has a very incisive analysis and research. According to information theory and redundancy-related theories, Shannon defines pseudo-keys, unique solution distance, and ideal secrecy. However, the general reality of cryptographic systems cannot achieve ideal secrecy. , that is, as the length of the ciphertext ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/14
Inventor 王勇
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products