Compound time varying password and time varying type data encryption method
A technology of data encryption and encryption method, which is applied in the fields of information technology and electronics, can solve problems such as easy confusion, and achieve the effect of complex calculation results
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0104] 1. Implementation of "composite time-varying cipher".
[0105] When the cryptographic system is implemented, both the "proving party" (client) and the "verifying party" (manager) who use the password need to master the "original source code" and related algorithms in advance, and then use each time according to the figure 1 The process of calculating the "time-varying code" in real time.
[0106] Such as figure 1 , "Yuan initial code" is divided into two parts: "base code" and "operating code".
[0107] Among them, "operation code" defines "self-calculation method", "selection calculation method" and "operation method" correspondingly. "Self-calculation method" transforms "basic code" into "basic code". "Calculation method" transforms "auxiliary code" into "time-diffuse code". The "computing method" enables the "basic code" and "time code" to be mutually calculated into an "intermediate code".
[0108] The "intermediate code" is further divided into two parts: "bas...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 