Check patentability & draft patents in minutes with Patsnap Eureka AI!

A Decoding Method of Binary Cipher Decoder Based on Optimal Enumeration Algorithm

A decoding method, binary technology, applied to encryption devices with shift registers/memory, etc., can solve problems such as time wasted in sending repetitive passwords, achieve the effects of reduced data volume, low complexity, and shortened decoding time

Active Publication Date: 2017-10-13
CHINA AEROSPACE TIMES ELECTRONICS CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem solved by the present invention is: to overcome the shortage of time wasted in sending a large number of repetitive passwords caused by simply enumerating all passwords in the prior art, and to provide a binary password decoder decoding method based on an optimized enumeration algorithm to achieve fast decoding the goal of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Decoding Method of Binary Cipher Decoder Based on Optimal Enumeration Algorithm
  • A Decoding Method of Binary Cipher Decoder Based on Optimal Enumeration Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] According to the inventive method, take decoding 24 passwords as an example, specifically as follows:

[0014] Enumerate and send all numbers from 1 to 16777216 in the password set one by one. A total of 16777216 24-digit binary passwords need to be sent. Taking the time interval between each 2-digit binary data as being limited to greater than or equal to 2 milliseconds as an example, the password set It takes a total of 0.002s×24×16777216=805306.368 seconds ≈ 223.7 hours for all the data to be sent. Such as figure 1 As shown, the existing enumeration method is to send the next 24-bit binary number (shown in section 2) every time all the bits of the previous 24-bit binary data (shown in section 1) are completely sent, until the password set All data is enumerated and sent once and ends.

[0015] Since the decoded device receives a bit of binary data every time, it will combine the bit data with the latest 23-bit data received before to form a new 24-bit number, and c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A binary cipher decoder decoding method based on the optimal enumeration algorithm includes the steps of supposing that a cipher to be decoded is an n-bit binary cipher; sequentially sending odd numbers in a cipher set to a decoded device in forms of n-bit binary numbers from small to large, wherein 2n-2 n-bit binary cipher are integrally sent in total; obtaining the calculated cipher which is the last n-bit binary number sent to the decoded device if the decoded device is successfully decoded in the sending process; continuing sending numbers which are not sent and left out in the cipher set till all the numbers are sent if the decoded device is not decoded; combining one bit of data with the most newly received n-1 bit of data to form a new n-bit number each time the decoded device receives one bit of binary data, and comparing the bit of data with the cipher to be decoded. According to the method, the enumeration data size is reduced by seventy-five percent, the time is shortened by three quarters, and the method is simple and easy to achieve.

Description

technical field [0001] The invention belongs to the decoding field and relates to an optimized password enumeration decoding algorithm. Background technique [0002] As a security measure, passwords are widely used in various important control occasions. The more critical the control field, the more password digits and the more complex the composition. Once the password is lost, the password-protected device cannot be unlocked and opened, which will cause greater losses. Therefore, a decoding device is needed to decipher the password, and the most common method is to try one by one possible password combinations. However, if the locked device has a certain anti-deciphering mechanism, such as controlling the password transmission rate to prevent high-speed deciphering, the enumeration and deciphering process will take a lot of time. The optimized enumeration algorithm mentioned in this article is to optimize the enumeration strategy to achieve the purpose of greatly shorte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 高路南非唐侃禹继芳余建明杨斌
Owner CHINA AEROSPACE TIMES ELECTRONICS CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More