Encryption method based on algorithm transformation

An encryption method and algorithm transformation technology, applied in the field of information security, can solve problems such as increasing the amount of calculation, increasing the complexity and difficulty of deciphering, increasing the amount of encryption and decryption calculations, etc.

Inactive Publication Date: 2012-04-04
王勇
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2) The use of algorithm transformation increases the complexity of the algorithm, but it does not directly increase the amount of computation, while the traditional method often increases the amount of computation for encryption and decryption while increasing the complexity and difficulty of deciphering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following is an example of a block cipher. For convenience and concise description, a relatively short algorithm is adopted and the structure and specific encryption components of the AES algorithm that are already well known to the public are imitated. This algorithm adopts a triple transformation algorithm, which respectively adopts representative transformations, including selecting a function from multiple functions according to a part of the key, determining the order of the function components of the operation according to a part of the key, and One part determines the structure.

[0019] This embodiment is based on a cipher algorithm with 128 bits for both the packet length and the key length. The number of iterations is 10. In the original AES algorithm, except for the initial round and the end round, each round includes byte substitution and row Four steps: shift, column mixing and key addition. The end round consists of three steps: byte substitution, row sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the information safety field, which relates to an encryption method based on algorithm transformation. The password (encryption) algorithm is uncertain and changeable, some calculation components in the password algorithm are random and one of n functions or calculation methods, some structures of the algorithm are uncertain, or the order of some calculation components is changeable, and all the uncertainties are determined by one part of data in the key. The encryption method has the following advantages: because the uncertain algorithm, the password analysis is very difficult, which caused by leakage of the algorithm information; the current password analysis aims at the certain algorithm, so when the algorithm is uncertain, the password analysis is difficult to execute, simultaneously the types of the algorithm are diversified; and the calculation quantity is not greatly increased, so the key space is greatly improved under the condition that the calculation quantity is not obviously increased, and the uncertainty and the complexity of the password system are improved to improve the safety.

Description

Technical field [0001] The invention belongs to the field of information security and relates to a new type of encryption method. Background technique [0002] Existing encryption algorithms have a very clear and fixed structure. Only the plaintext, key and some parameters are transformed. They are all involved in the operation under the fixed algorithm framework to obtain the ciphertext. Because of the definite structure, cryptanalysis will be easier to start, and many mathematical methods can be used to decipher the password. The present invention is based on the following viewpoints: 1) The change of the key as a variable in the operation has a limited impact on the complexity of the algorithm, which is not as significant as the change of the algorithm itself. The analysis is based on a cryptographic algorithm with a fixed structure. The transformation of the algorithm makes the clues of the cryptanalysis much less, thereby enhancing the security of the cryptographic algorith...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/28
Inventor 王勇
Owner 王勇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products