Check patentability & draft patents in minutes with Patsnap Eureka AI!

Cryptosystem based on random sequence database

A random sequence and cryptographic system technology, applied in the field of information security, can solve problems such as application restrictions, distribution and management difficulties, and key generation

Inactive Publication Date: 2013-05-22
SOUTH CHINA BOTANICAL GARDEN CHINESE ACADEMY OF SCI
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the extremely difficult problems of key generation, distribution and management in the "one-time pad" cryptographic system, its application is limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptosystem based on random sequence database
  • Cryptosystem based on random sequence database
  • Cryptosystem based on random sequence database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] First, construct the 8-bit binary database D. Such as figure 1 As shown, A(i) represents an 8-bit binary number from 0 to 255; B(i) represents a random sequence corresponding to it. The random sequence B(i) can consist of any characters, figure 1 In we assume that the random sequence consists of 0 and 1. The setting of the sequence length is based on sufficient guarantee of the uniqueness of the random sequence ki and the operation speed of the sequence search. Since 2 16 =65536, corresponding to 256 pieces of binary data, each binary data can theoretically find 256 16-bit binary random sequences corresponding to it. It is sufficient to set the length of each random sequence between 30-100 characters.

[0027] If you need to encrypt a plaintext message M, first convert it to binary, and then automatically divide each byte into several units, such as m 1 , m 2 , m 3,..., m n . Then, search in the database D in turn, find the corresponding random sequence B(i) a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cryptosystem based on a random sequence database. The cryptosystem based on the random sequence database transforms a binary bit stream into a random sequence bit stream through an eight-bit binary number composed of 256 strip data and a random sequence database D which corresponds to the eight-bit binary number. The random sequence database D realizes transformation to the binary bit stream through character string search. The random sequence database D can realize encrypting or decrypting one byte each time and dynamic update and synchronization. The cryptosystem based on the random sequence database is an authentic one-time pad perfect cryptosystem and cannot be decoded completely.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a password system based on a random sequence database. Background technique [0002] Cryptography system is the core and key technology of information security. Although there are many kinds of cryptographic systems in practical application at present, their cryptosystems can be divided into two categories: symmetric cryptosystems and asymmetric cryptosystems. In 1949, Shannon published an important paper on "Communication theory of secrecy system", proving that only the "one-time pad" cryptographic system is theoretically undecipherable and absolutely secure. However, due to the extremely difficult problems of key generation, distribution and management in the "one-time pad" cryptographic system, its application is limited. In order to achieve the security similar to "one-time pad", cryptosystems imitating "one-time pad" such as block cipher and stream cipher are applied. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/18H04L9/08
Inventor 曾纪晴张明永
Owner SOUTH CHINA BOTANICAL GARDEN CHINESE ACADEMY OF SCI
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More