Encryption method using random sequence on-demand and having misleading function

An encryption method and function technology, applied in the field of information security, can solve the problems of not really random, short keys, etc., to reduce redundancy and avoid synchronization.

Active Publication Date: 2012-05-09
广西创美信息技术有限公司
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(4) You can take the initiative to mislead the other party, the wrong key can get meaningful plaintext to mislead the other party, and use the false key to get various similar and opposite "plaintexts", which have a certain "offsetting" effect compared with the original plaintext, Confused cryptanalysts
Some algorithms decide to mislead k...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method using random sequence on-demand and having misleading function
  • Encryption method using random sequence on-demand and having misleading function
  • Encryption method using random sequence on-demand and having misleading function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following are examples of the present invention, however, the present invention is not limited to the examples.

[0033] In the actual implementation, it is stipulated that different parts of the total key are used for inner and outer encryption respectively, and the outer key is a fixed length, which is determined according to the algorithm used in the outer encryption. For example, the outer encryption algorithm adopts 256-bit AES encryption. The first 256 bits of the key are outer keys, and the rest are inner keys. The inner key is intercepted with equal length. The interception length is determined according to the number N of keywords in the same group of keywords in the keyword database. The value should be greater than or equal to log 2 N.

[0034] Before encryption, the two parties share a random key sequence in a way such as QKD. The file encryption process is as follows:

[0035] 1) During the encryption process, according to the type of the file, use c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Aiming at various attacks possibly existing in reality, the invention discloses an encryption method with a misleading function. A pseudo key can be easily obtained after using the encryption method, thus, a cryptanalyst can be misled, the misleading is dependent on an inlayer key, for performing any misleading, a sub-key is generated by long random sequences, and the long random sequences can be generated by quantum key distribution. For saving keys, the shortest key length is intercepted as needed, in decryption, corresponding information is obtained, and the key length intercepted in encryption also can be determined so as to keep synchronous. A keyword database is needed for encryption, keyword expansion for inlayer encryption of the encryption process is executed based on the database, and the outer layer encryption uses a conventional encryption method. The method has certain use value in the encryption in various occasions, particularly in the aspect of military affairs.

Description

technical field [0001] The invention belongs to the field of information security and relates to an encryption method, in particular to an encryption method with a misleading function, which uses a random sequence as a key to determine plaintext in an economical manner. Background technique [0002] The ciphertext obtained by most existing cryptographic algorithms has a very small probability of being decrypted with a wrong key to obtain meaningful plaintext. This kind of wrong key that can obtain meaningful plaintext is called a false key. As the ciphertext increases, the number of pseudo-keys will gradually decrease. The pseudo-keys will be reduced to only one key at the end, which will threaten the security of the cryptographic system. The unique solution distance is when the ciphertext is tried with different keys, and only the length of a meaningful plaintext can be obtained. In fact, the estimation formula of the unique solution distance does not consider that the rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 王勇
Owner 广西创美信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products