Unlock instant, AI-driven research and patent intelligence for your innovation.

Encrypting method

An encryption method and ciphertext technology, applied in the field of information technology security of communications, can solve problems such as easy cracking

Inactive Publication Date: 2014-07-02
苏州赛格能源股份有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the Chinese invention patent with application number 200780003386.X is named: cryptographic processing device, cryptographic processing device manufacturing device and method, and computer program. In this patent application, the method adopted is: execute the SP-type F function and repeat the cycle many times The cryptographic processing steps of the Feistel-type shared key block cipher processing, the cryptographic processing that utilizes the basic unit of cryptographic processing is performed, wherein the SP-type F function performs data transformation processing including nonlinear transformation processing and linear transformation processing; it is mainly through multiple However, this kind of encryption is relatively easy to crack when part of the original text is obtained and the composition of the key is understood.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0041] An encryption method comprising the steps of:

[0042] The original text is represented by a 32-bit number, and it is expressed as X; X is any number in the original text; X is encrypted.

[0043] Define a nonlinear function, the nonlinear function has 5 parameters, the expression is: F(NLF1, NLF2, NLF3, NLF4, NLF5);

[0044] In the 32-bit number, take 5 numbers: I0, I1, I2, I3, I4; these 5 numbers have uniform characteristics;

[0045] The uniform characteristic mentioned here means that the ratio of code 1 to code 0 is 1:1 when expressed in binary.

[0046] Example 0x3A5C742E as an example

[0047] 0x3A=001110101 and 0 account for 50%

[0048] 0x5C=010111001 and 0 account for 50%

[0049] 0x74=011101001 and 0 account for 50%

[0050] 0x2E=001011101 and 0 account for 50%

[0051] So 0x3A5C742E has uniformity.

[0052] Set the 64-bit key, key;

[0053] Set the cycle initial value N and initial value B; where 1≦B≦63;

[0054] Set loop variable i; 0≦i

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encrypting method. The encrypting method comprises the following steps that an original text X is expressed in a 32-bit mode; a nonlinear function is defined, and the expression is F(NLF1, NLF2, NLF3, NLF4 and NLF5); five numbers including I0, I1, I2, I3 and I4 are selected from 32-bit numbers; a 64-bit secret key is set; a circulation initial value N and a starting value B are set, wherein 1<=B<=63; a cyclic variable i is set, wherein 0<=i<N*64+B; X(i+1) is equal to X(i) which is larger than 1, or (bit (X(i),0) or bit (X(i),B) or bit (key,i&63) or bit(NLF, g5 (X(i), I0, I1, I2, I3 and I4)) is smaller than (31); the expression of X(0)=X, X(N*64+B) is a ciphertext. The encrypting method is high in encrypting performance and the ciphertext is not easy to decrypt.

Description

technical field [0001] The invention belongs to the field of communication information technology security, and in particular relates to an encryption method. Background technique [0002] With the development of society, the power system has also developed rapidly. In order to make the power system run well in various links such as transmission, power distribution, and power consumption, smart grids are generally used for control to achieve reliable grid power consumption. efficiency and resource conservation. [0003] The "smart grid" is generally a remote monitoring system platform for power distribution, and network data is transmitted through the public network. Therefore, the data may be stolen by hackers or criminals during the transmission process, and may be attacked and simulated. Therefore, it is necessary to develop a new encryption and decryption algorithm to support this and strengthen the protection of data. [0004] The signal encryption used in the communi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/22
Inventor 李敬锋马俊
Owner 苏州赛格能源股份有限公司