Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic deficiency encryption system

An encryption system and dynamic technology, applied in the direction of user identity/authority verification, etc., can solve the problems that cannot prevent direct cryptanalysis

Inactive Publication Date: 2014-03-26
BEIJING HUFU TECH
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention solves the shortcoming that the traditional communication encryption system cannot prevent direct cryptanalysis, and provides a dynamic missing encryption encryption system, which is characterized in that, firstly, fixed-length group processing is performed on the communication original text to be encrypted, and for the last group, if If the length is not enough, padding bytes of the corresponding length are added, and then the following operation is performed on each group:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] Embodiment 1 (high security protection reinforcement system)

[0024] The high-security protection reinforcement system of the present invention is characterized in that the dynamic missing system is used to carry out communication protection through identification authentication, environment locking, dynamic missing, regular activation and random scrambling.

[0025] When the sender sends data, it will automatically attach the parameters and status of the operating environment (CPU-ID, MAC, system time, validity period status).

[0026] After the receiver successfully parses the sender's environmental parameters and operating status, it will use the scrambling calculation involving the environmental parameters when performing secure communication to ensure that only the receiver's system running in the specified environment can analyze it.

[0027] The data sent by the sender adopts scrambling protection of identification, environmental parameters, validity period, sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a dynamic deficiency encryption system. The system is characterized in that ciphertext data transferred during communication randomly loses part of valid data and is rearranged, so that information is not complete, ciphertext can not be directly conducted to cryptanalysis and cracking, interception is prevented, and secure communication channels are reinforce. The system adopting verification codes can find lost ciphertext through multiple trial operation, further performs decryption recovery to complete ciphertext. The invention also discloses a high-security protection reinforcement system adopting dynamic deficiency, identification certification, environment locking, periodical activation and random scrambling.

Description

technical field [0001] The invention relates to a communication encryption system in which part of ciphertext data is randomly and dynamically lost, so that cryptanalysis and eavesdropping cannot be performed directly. Background technique [0002] Identification authentication is a difficult problem that has not been solved in the security industry. Using the combination key system to define intelligent security identification, through a very small storage space, the feature that the name is the key can be realized, that is, the direct identification authentication can be realized. This will be A great leap forward in the security certification industry, which solves the shortcomings of the PKI system that cannot provide massive certification services. However, as a communication system, if dynamic missing encryption is adopted and the operating environment is locked, the ideal effect of preventing information theft can be achieved. Contents of the invention [0003] The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 许丰
Owner BEIJING HUFU TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products