Block encryption method based on parity cellular automaton

A block encryption and automaton technology, applied in the field of information security, can solve problems such as security and efficiency defects

Inactive Publication Date: 2012-07-04
HOHAI UNIV
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In recent years, researchers have proposed some block encryption algorithms based

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block encryption method based on parity cellular automaton
  • Block encryption method based on parity cellular automaton
  • Block encryption method based on parity cellular automaton

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0034] Such as figure 1Shown, in conjunction with a specific embodiment introduction realizes the technical scheme of the present invention, comprises the following steps:

[0035] Step 1: divide the plaintext data into plaintext groups according to the length of each group of 64 bits;

[0036] Step 2: Set the key, key 1 is an 8-bit binary sequence a 0 a 1 a 2 a 3 here (k=0, 1, 2, 3) represents a k The value of is reversed, the key 2 is a string of 80-bit binary random sequence r 1 r 2 r 3 ,...,r 80 ;

[0037] Step 3: Let the length of the odd-even cellular automaton be 64, the number of iterations of the odd-even cellular automaton be 80, and establish the iteration expression of the odd-even cellular automaton:

[0038] When time t is even, s i t + ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block encryption method based on a parity cellular automaton, belonging to the data encryption technology in the information safety field, comprising the following steps: dividing plaintext data into even plaintext blocks according to M bit length of every block, M being an even number; setting a secret key; setting length and iterations of the parity cellular automaton and building an iteration expression; taking the plaintext block as an original state of the parity cellular automaton, and obtaining a termination state as a ciphertext block after iterating the parity cellular automaton N times according to the iteration rule. In the invention, the cellular automaton theory is applied to data encryption; because the cellular automaton has the advantages of simplicity of primary units, locality among units, high parallelism and complex local characteristic of the information processing, the method is a simple, safe and efficient, therefore, the method can be widely applied in fields such as governments, electronic commerces, militaries, digital banks and the like.

Description

technical field [0001] The invention relates to a packet encryption method based on parity cellular automata, which belongs to the data encryption technology in the field of information security. Background technique [0002] With the rapid development of computer and network technology, the degree of informatization has become a symbol of a country's comprehensive national strength. How to ensure the information security of e-commerce, e-government and e-military affairs in various network activities has become the focus of people's concern. Without the guarantee of information security, there will be no security of the people and the security of the country. As one of the core and key technologies of information security, cryptography has become a hotspot in information security research. [0003] According to different encryption methods, cryptographic techniques are divided into sequence ciphers and block ciphers. Compared with serial ciphers, block ciphers have the ad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28H04L29/06
Inventor 平萍许峰王志坚
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products