Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Alignment password system, direct communication method and indirect communication method

A cryptographic system and cryptographic technology, applied in the cryptographic field, can solve problems such as incompatibility, insensitive insertion and modification of serial ciphers, and unfavorable parallel computing.

Active Publication Date: 2014-08-06
褚万青
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The block cipher or sequence cipher needs to be calculated; the sequence cipher is insensitive to insertion and modification; the CBC mode (ciphertext link mode), CFB (ciphertext feedback mode), and OFB (output feedback mode) in the block cipher are not conducive to parallel computing , There is error transmission (one plaintext unit damage affects multiple units), in ECB (electronic codebook mode): (1) if the plaintext is repeated, the corresponding ciphertext will also be repeated, (2) the ciphertext content is easily replaced , rearrange, delete, replay
[0004] The single-table substitution cipher in the described substitution cipher includes a general single-table substitution cipher, a shift cipher, an affine cipher, and a key phrase cipher; when encrypting and decrypting, it uses a fixed substitution table (substitution table or substitution table is Key), is to use a fixed mapping for all letters in the plaintext. The disadvantage is that the frequency distribution of a single letter is the same as that in the ciphertext, and it is difficult to resist frequency analysis.
[0006] The asymmetric encryption, for example, the current mainstream asymmetric encryption algorithm RSA (public key encryption algorithm, has been used in the bank's USBKey, such as U shield), anti-attack, difficult to be cracked, relatively high security, but its encryption The key length is 1024 bits or 2048 bits, which leads to relatively slow calculation and even relatively large power consumption. It is only suitable for small data and is not universal (mainly not convenient for mobile use)
Of course, asymmetric ciphers can be used in combination with symmetric ciphers. For example, while the private key in the RSA algorithm is used for digital signatures, it can be used to encrypt symmetric ciphers, but the symmetric cipher needs to be changed frequently, and the RSA algorithm is not convenient for mobile use. , so, still not ideal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alignment password system, direct communication method and indirect communication method
  • Alignment password system, direct communication method and indirect communication method
  • Alignment password system, direct communication method and indirect communication method

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0044] Example 1, the pairwise cipher system A has the same double (A I and AII); C=70, that is, there are 70 cipher tables in A; taking A5 (c=5, No. 5 cipher tables) as example.

[0045] Password Form No. 5 (A5):

[0046]

[0047] In the No. 5 password table, horizontal columns are columns and vertical columns are rows; there are a total of 2 columns and 99999 rows of starting characters, the first column is a sequence of numbers (intervals of 1, E51d, a total of 99999 rows), and the second column is comprehensive characters (E52d, 99991 rows); 99991 rows and 240 special password characters are arranged in total, and each group of special password characters wherein is 6 Chinese characters; Bc=B5=2, Dc=D5=99999, Ecbd is E5bd, Ic=I5 =99991, Hc=H5=240, Xcih is X5ih.

[0048] E51d is: 0, 1, 2, 3, ..., 99(d=100), 100(d=101), 101(d=102), 102(d=103), 103(d=104), 104(d=105), 105(d=106),..., 254(d=255),..., 6045,..., 99990(d=99991),..., 99998(d= 99999); for example, the startin...

example 2

[0088] Example 2, the pairwise cryptosystem A has identical, synchronous double (A I and AII); C=240, promptly there are 240 cipher tables in A; Take A1 (c=1, No. 1 cipher table) as example .

[0089] Password Form No. 1 (A1):

[0090]

[0091] In the No. 1 password table, vertical columns are columns and horizontal rows are rows; a total of 1 column and 99999 rows of starting characters (digital sequences, with 1 intervals, represented by E11d); the starting characters have representative characters (use E' 11d represents); There are 99999 rows in total, 1 column dedicated password characters (represented by X1i1, h=1); Among A1, Bc=B1=1, Dc=D1=99999, Ic=I1=99999, Hc=H1=1 .

[0092] From right to left, the E11d is: 0(d=1), 1(d=2), 2(d=3), 3(d=4), 4(d=5), ..., 99998(d =99999, not shown in the No. 1 password table), that is, the 1st row initial character E111=0 (c=1, b=1, d=1) in the 1st column initial character, the 2nd row The starting character E112=1, the starting ch...

example 3

[0116] Example 3, the three-dimensional parametric cipher table (A'5, such as figure 1 ), A'5 has two parts, the first part comes from the No. 5 password table (A5) in example 1, and the second part is the imitated z1 plane.

[0117] With the 2nd column starting character (comprehensive character, b=2 in Ecbd, i.e. E52d) in the No. 5 password table in example 1 as dividing line, vertically, A5 is divided into two parts, the left side The part is named as XY plane, and the part on the right side is named as z2 plane (2 in z2 comes from b in zb, b=2, and zb comes from claim 5); again with E52d as the longitudinal axis, the XY plane Rotate 90 clockwise. And form the first part of A'5 (made up of XY plane and z2 plane); On the plane (then Ecbd becomes Ecbxydxy), the special-purpose password character Xcih among the A5 is on the z2 plane (then Xcih becomes Xciz2hz2); Equivalent, the original 99991 row special-purpose password characters among the A5 are 99991 Z axes (each row is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an alignment password system and a direct communication method and an indirect communication method based on the system. The system is similar to but not equivalent to symmetric passwords and is high in safety, rapid to use and universal, and the system comprises more than one dynamic password table and further can comprise an annexed table of the password table; only after the tagmeme where a plaintext character set or a ciphertext character set is located is aligned, the plaintext character set or the ciphertext character set can be encrypted, the system comprises three-dimensional alignment passwords, and at least two identical systems are arranged.

Description

technical field [0001] The present invention relates to a cipher, a method of direct communication, a method of indirect communication, especially a pair cipher system which is not equal to symmetric cipher. Background technique [0002] Ciphers are mainly divided into symmetric ciphers and asymmetric ciphers. Symmetric cipher means that both parties or parties to the communication have the same key (for encryption and decryption), such as permutation ciphers and substitution ciphers (substitution ciphers) in classical ciphers, such as block ciphers (DES, AES, etc.) or sequence Ciphers (RC4, etc.); in general, symmetric ciphers are usually very fast and suitable for long texts, but are vulnerable, easily cracked, or not sufficiently secure. [0003] The block cipher or sequence cipher needs to be calculated; the sequence cipher is insensitive to insertion and modification; the CBC mode (ciphertext link mode), CFB (ciphertext feedback mode), and OFB (output feedback mode) in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 褚万青
Owner 褚万青
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products