Magic cube encryption and decryption method

An encryption method, Rubik's cube technology, applied in the direction of digital transmission system, electrical components, transmission system, etc., to achieve the effect of fast decryption speed, high dependence, and strong encryption strength

Active Publication Date: 2014-12-10
武汉迎风聚智科技有限公司
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention proposes an encryption method with unlimited key length and sufficiently high encryption strength, so as to solve the possibility that the encrypted ciphertext is cracked by a computer with extremely fast performance using methods such as exhaustive enumeration and password attack.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Magic cube encryption and decryption method
  • Magic cube encryption and decryption method
  • Magic cube encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0043] Plaintext: abcdefgh

[0044] Key: 12345

[0045] 1) In this example, the plaintext is 8 bytes (that is, 64 bits), and segmentation processing is not required. Plaintext binary such as Figure 4 a means:

[0046] 2) By querying Table 2 and Table 1, the Rubik's Cube transposition rules for the characters "1", "2", "3", "4" and "5" that make up the key are respectively obtained.

[0047] 3) Take the first character "1" of the key from left to right, and transpose the plaintext according to the Rubik's Cube transposition rule for the character "1".

[0048] Specifically, the transposition rules for the character "1" are:

[0049] Such as Figure 4 As shown in b, the first group transposes: the 3rd place is changed to the 34th place, the 34th place is changed to the 52nd place, the 52nd place is changed to the 12th place, and the 12th place is changed to the 3rd place.

[0050] The second set of transpositions: 6th to 31st, 31st to 49th, 49th to 15th, 15th to 6th.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a magic cube encryption method, which belongs to the technical field of computer information security. The method is characterized in that a key is specially defined, each character in a key character string is used for expressing one rotary operation of a magic cube, and the rotary operation corresponds to a transposition rule of a series of magic cube diamond sequence numbers; one character in the key is sequentially obtained from left to right in encryption, a series of transposition is carried out on bit number values of a plaintext according to the transposition rule set by the character, exclusive or operation is performed by utilizing a letter after being circularly moved leftwards or rightwards, and finally a ciphertext is obtained. The invention also provides a decryption method based on the encryption method, and the decryption process is the invert operation of the encryption operation process. Due to the adoption of the rotation concept of the magic cube, the decryption speed is fast, the key length is not restricted, the encryption strength is large, the ciphertex highly depends on the key, so that different decipher methods such as password attack and enumeration attack can be prevented.

Description

technical field [0001] The invention belongs to the technical field of information security in computers, is a general data encryption and decryption method, and is applied in the fields of computer security, communication security, national defense and the like. Background technique [0002] The basic process of data encryption is to process the original plaintext file or data according to a certain algorithm to make it an unreadable piece of code, usually called "ciphertext", so as to protect the data from being illegally stolen and read. The reverse process of this process is decryption, that is, the process of restoring ciphertext information to plaintext. [0003] Encryption methods generally fall into two broad categories: "symmetric" encryption methods and "asymmetric" encryption methods. [0004] Symmetric encryption methods mainly include: DES (Data Encryption Standard), data encryption standard, fast, suitable for the occasion of encrypting a large amount of data;...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/28
Inventor 梁俊杰周雪斌
Owner 武汉迎风聚智科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products