Encrypting method
An encryption method and ciphertext technology, applied in the field of information technology security of communications, can solve problems such as easy cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0041] An encryption method comprising the steps of:
[0042] The original text is represented by a 32-bit number, and it is expressed as X; X is any number in the original text; X is encrypted.
[0043] Define a nonlinear function, the nonlinear function has 5 parameters, the expression is: F(NLF1, NLF2, NLF3, NLF4, NLF5);
[0044] In the 32-bit number, take 5 numbers: I0, I1, I2, I3, I4; these 5 numbers have uniform characteristics;
[0045] The uniform characteristic mentioned here means that the ratio of code 1 to code 0 is 1:1 when expressed in binary.
[0046] Example 0x3A5C742E as an example
[0047] 0x3A=001110101 and 0 account for 50%
[0048] 0x5C=010111001 and 0 account for 50%
[0049] 0x74=011101001 and 0 account for 50%
[0050] 0x2E=001011101 and 0 account for 50%
[0051] So 0x3A5C742E has uniformity.
[0052] Set the 64-bit key, key;
[0053] Set the cycle initial value N and initial value B; where 1≦B≦63;
[0054] Set loop variable i; 0≦i
[...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More