Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method with three-dimensional operation, feedback control and dynamic replacement box design

A feedback control and encryption method technology, applied in the usage of multiple keys/algorithms, etc., can solve the problems of inability to effectively resist brute force attacks, reduced efficiency, and low security.

Inactive Publication Date: 2016-10-05
黄宜豊 +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1. The ciphertext output by the combination logic encryption method is completely determined by the plaintext input at that time. This encryption method cannot effectively resist brute force attacks, such as known plaintext / ciphertext pair attacks and difference attacks (Difference Attack), etc.
Since DES is a 64-bit data block encryption method, it has been cracked by the "DES Cracker" special machine established by the Electronic Frontier Foundation (EFF). will face the crisis of being cracked
[0009] 2. Both DES and AES are fixed-size data block encryption, and its disadvantage is that it limits the flexibility of the encryption system
[0010] 3. Since both DES and AES encryption methods repeat specific core operations multiple times, for example, DES repeats 16 times and AES repeats 10 times. Although a new key value is added to each repeated calculation, the same formula is repeated. It is inevitable that there will be concerns about lower security, and multiple repeated calculations will greatly reduce the performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method with three-dimensional operation, feedback control and dynamic replacement box design
  • Encryption method with three-dimensional operation, feedback control and dynamic replacement box design
  • Encryption method with three-dimensional operation, feedback control and dynamic replacement box design

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In order to fully understand the purpose, features and technical effects of the present invention, here through the following specific embodiments, in conjunction with the accompanying drawings, the present invention is described in detail, as follows:

[0079] image 3 It is an encryption flowchart of a specific embodiment of the present invention, which contains eleven system keys K in this encryption / decryption system 1 ~K 11 , three dynamic feedback keys a i-1 ,b i-1 , d i-1 , three dynamic keys a i ,b i , d i , one parent replacement box and four dynamic sub-substitution boxes, among the eleven system keys, a 0 =K 9 ,b 0 =K 10 , d 0 =K 11 for the three initial feedback keys. Now divide the plaintext into n blocks of m-bit length, that is, plaintext=p 1 p 2 p 3 ...p n , if the plaintext data is not enough to fill pn , the unfilled bits are filled with 0. Here, the size of the data block is m bits, and the size of all keys in the system is also m bit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method with three-dimensional operation, feedback control and dynamic replacing box design. A sequential logical encryption mode is adopted, and after being replaced non-linearly by using a secondary dynamic replacing box, a plaintext data unit pi is in three-dimensional operation with a system secret key group K1, a system secret key group K2, a system secret key group K3, a system secret key group K4, a system secret key group K5, a dynamic feedback secret key group ai-1, a dynamic feedback secret key group bi-1 and a dynamic feedback secret key group di-1, so that a dynamic secret key group ai, a dynamic secret key group bi and a dynamic secret key group di are formed; after the dynamic secret key group ai, the dynamic secret key group bi and the dynamic secret key group di are non-linearly replaced by different secondary dynamic replacing boxes respectively, a dynamic secret key concealed in a system is formed and is used for encrypting a dynamic feedback secret key for the next time; and an encryption secret key ae, a dynamic feedback secret key bi-1, a dynamic feedback secret key di-1, a system secret key group K6, a system secret key group K7 and a system secret key group K8 are in three-dimensional operation to generate a ciphertext data unit ci. By using the encryption method, the dynamic secret key group ai, the dynamic secret key group bi, the dynamic secret key group di and ciphertext data are difficult to break, and difference attack, known plaintext / ciphertext pair attack, brute-force attack and the like can be effectively resisted.

Description

technical field [0001] The present invention relates to a method principle of data encryption / decryption, in particular to a method using a sequential logic (Sequential Logic) encryption method with feedback control. Background technique [0002] The methods of data encryption widely used in the industry and academia are Data Encryption Standard (Data Encryption Standard, hereinafter referred to as: DES) and Advanced Encryption Standard (Advanced Encryption Standard, hereinafter referred to as: AES). The same characteristics are described here as follows: [0003] 1. They are all encryption methods of combinatorial logic, which is an encryption method in which the output ciphertext is completely determined by the plaintext input at that time, and has nothing to do with the previous input plaintext. [0004] 2. They are all fixed-size data block encryption, wherein the encrypted data block size of DES is 64 bits, and the encrypted data block size of AES is 128 bits. [0005...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14
Inventor 黄宜豊吕芳怿林正基
Owner 黄宜豊