Encryption method with three-dimensional operation, feedback control and dynamic replacement box design
A feedback control and encryption method technology, applied in the usage of multiple keys/algorithms, etc., can solve the problems of inability to effectively resist brute force attacks, reduced efficiency, and low security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0078] In order to fully understand the purpose, features and technical effects of the present invention, here through the following specific embodiments, in conjunction with the accompanying drawings, the present invention is described in detail, as follows:
[0079] image 3 It is an encryption flowchart of a specific embodiment of the present invention, which contains eleven system keys K in this encryption / decryption system 1 ~K 11 , three dynamic feedback keys a i-1 ,b i-1 , d i-1 , three dynamic keys a i ,b i , d i , one parent replacement box and four dynamic sub-substitution boxes, among the eleven system keys, a 0 =K 9 ,b 0 =K 10 , d 0 =K 11 for the three initial feedback keys. Now divide the plaintext into n blocks of m-bit length, that is, plaintext=p 1 p 2 p 3 ...p n , if the plaintext data is not enough to fill pn , the unfilled bits are filled with 0. Here, the size of the data block is m bits, and the size of all keys in the system is also m bit...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 