Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Random sequence based encryption method with misleading function

An encryption method and function technology, applied in the field of information security, can solve the problem of inability to determine the key, and achieve the effect of avoiding database synchronization and reducing redundancy

Active Publication Date: 2012-04-11
GUILIN UNIV OF ELECTRONIC TECH
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(4) You can take the initiative to mislead the other party, the wrong key can get meaningful plaintext to mislead the other party, and use the false key to get various similar and opposite "plaintexts", which have a certain "offsetting" effect compared with the original plaintext, Confused cryptanalysts
When the other party performs ciphertext-only analysis, the real key cannot be determined

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random sequence based encryption method with misleading function
  • Random sequence based encryption method with misleading function
  • Random sequence based encryption method with misleading function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following are examples of the present invention, however, the present invention is not limited to the examples.

[0037] In the actual implementation, it is stipulated that different parts of the total key are used for inner and outer encryption respectively, and the outer key is a fixed length, which is determined according to the algorithm used in the outer encryption. For example, the outer encryption algorithm adopts 256-bit AES encryption. The first 256 bits of the key are outer keys, and the rest are inner keys. In order to ensure irreversibility in the inner layer encryption, a stream cipher algorithm is used. For example, a 256-bit stream cipher algorithm can be used. The first 256 bits of the inner key are the keys of the stream cipher algorithm, which corresponds to the key stream generation part in Figure 3 , the remaining part of the key is used to modify the key stream, the front part is the position information of the keyword, which is located accordi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption method with a misleading function, which is used for the stealing of keys, and the seizing, rubber-hose cryptanalysis and ciphertext only attacks to a key holder. When the encryption is performed by using the method disclosed by the invention, a false key can be obtained easily so as to mislead a password analyst, and the misleading is decided by an inner key, for carrying out any misleading, a sub-key is generated by using a long random sequence, and the long random sequence can be generated through quantum key distribution. Tags in a document are processed in a special processing mode, so that even a specified tag appears in a text, a confusion phenomenon does not occur. In the process of encryption, a key word database is required, so that in the process of inner encryption, the expansion on key words is performed by using the database, and the outer encryption is performed by using the conventional encryption method. In the method, in the process of decryption, the support of the database is not required, thereby avoiding the occurrence of a database synchronization problem. The method disclosed by the invention has a certain application value in encryption applications in various occasions, especially in the military field.

Description

technical field [0001] The invention belongs to the field of information security and relates to an encryption method, in particular to an encryption method with a misleading function. Background technique [0002] The probability of obtaining meaningful plaintext by decrypting the plaintext obtained by most existing cryptographic algorithms with a wrong key is very small. This kind of wrong key that can obtain meaningful ciphertext is called a false key. As the ciphertext increases, the number of pseudo-keys will gradually decrease. The pseudo-keys will be reduced to only one key at the end, which will threaten the security of the cryptographic system. The unique solution distance is when the ciphertext is tried with different keys, and only the length of a meaningful plaintext can be obtained. In fact, the estimation formula of the unique solution distance does not consider that the real ciphertext must exist, and is not affected by The impact of plaintext redundancy has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/22G06F21/00G06F21/46
Inventor 王勇林华汪华登
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products