Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A Fractional Encryption Method Using Uncertain Encryption Algorithm

A segmented encryption and encryption algorithm technology, which is applied in the field of cryptography, can solve problems affecting the security of the algorithm, and achieve the effect of increased generalized key space, large uncertainty, and comprehensive performance optimization

Active Publication Date: 2016-07-06
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, this affects the security of the algorithm
If the plaintext is divided into small segments smaller than the unique solution distance for encryption, and the algorithm is kept secret, the cryptanalyst will not be able to take advantage of the above defects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fractional Encryption Method Using Uncertain Encryption Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following are embodiments of the invention, For convenience, the example is relatively simple.

[0025] First of all, in terms of the design of the encryption system, a 256-bit stream cipher is used to generate an algorithm-encoded sequence. The stream cipher is used to ensure security. Even if the algorithm used in some previous segments is known, it is impossible to use it to obtain other segmented encryption algorithms. The structure of the generalized key is that the first 256 bits are AK, and the last 512 bits are NK. It is agreed that the encrypted plaintext length of each algorithm is: block cipher algorithm and other block algorithm is a single block length, stream cipher and one-time pad algorithm is 128bit, the purpose of this selection is to make the algorithm change more frequently, and the same algorithm The encryption length of is as small as possible, and try not to exceed the unique solution distance.

[0026] Determination and coding of the alg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to a new type of encryption method, and relates to a segmented encryption method using an uncertain encryption algorithm, which encrypts plaintext in segments, and the algorithm used in each segment encryption is uncertain and confidential, and is defined by a generalized key to make sure. It determines the length of each segment, the encryption algorithm of the segment, and various keys and parameters through the generalized key. Due to the uncertain algorithm, it is impossible for the cryptanalyst to decipher it. Even if some information is obtained, it is difficult to crack other segments. It doesn't make sense either.

Description

technical field [0001] The invention belongs to the field of cryptography, and relates to a novel encryption method, in particular to an encryption method of a segmented transformation algorithm. Background technique [0002] In 1949, C.E. Shannon published the article "Communication Theory of Secrecy Systems", making cryptography a science. This article introduces information theory into cryptography, and uses the statistical point of view to describe and quantitatively analyze the information source, cipher source, and received ciphertext. At the same time, he also puts forward the basic point of view of designing ciphers. Regarding the problem of pseudo-keys, Shannon has a very incisive analysis and research. According to information theory and redundancy-related theories, Shannon defines pseudo-keys, unique solution distance, and ideal secrecy. However, the general reality of cryptographic systems cannot achieve ideal secrecy. , that is, as the length of the ciphertext ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14
Inventor 王勇
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products