Limited gibberish text one-way conversion method and encryption/decryption application thereof

A one-way transformation and codebook technology, applied to encryption devices with shift registers/memory, key distribution, can solve the problems of encryption and decryption, unable to directly apply stream data, and the encryption overhead is amazing, and achieve the effect of improving the speed.

Active Publication Date: 2015-04-29
NANJING FAWEIKE INFORMATION TECH CO LTD
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But these two types of encryption methods all have a common defect: the speed is too slow
First of all, the encryption speed of the asymmetric encryption method is at the millisecond level. Basically, it cannot be directly applied to the encryption and decryption of stream data, and can only be used to exchange passwords or digital signatures.
It is faster to implement DES and AES with hardwar...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Limited gibberish text one-way conversion method and encryption/decryption application thereof
  • Limited gibberish text one-way conversion method and encryption/decryption application thereof
  • Limited gibberish text one-way conversion method and encryption/decryption application thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0216]The following function EncryptOfGLOWT is the C++ sample code implementation of the GLOWT encryption method with known plaintext and plaintext length. The function EncryptOfGLOWT is defined as follows:

[0217]

[0218]

[0219] The input of the present embodiment is: plaintext szPlain and plaintext length lenPlain, and the buffer size lenGarbled of the buffer szGarbled that is used to output initial garbled book and initial garbled book, the buffer szCipher that is used to output ciphertext and ciphertext buffer Size lenCipher. The output after the function execution is completed is the failed and successful result returned by the function execution, as well as the initial garbled book and the length lenGarbled of the initial garbled book stored in the buffer szGarbled of the initial garbled book when the function is executed successfully, and the buffer szCipher of the ciphertext The length of the ciphertext and the ciphertext in lenCipher. The initial garbled b...

Embodiment 2

[0247] The present embodiment is the decryption method corresponding to the function EncryptOfGLOWT that realizes the garbled book limited one-way transformation encryption method in embodiment 1, and this decryption method is realized by the function DecryptOfGLOWT of C++ code, and example is as follows:

[0248]

[0249]

[0250] The input of this embodiment is: the ciphertext szCipher and the ciphertext length lenCipher, the initial garbled book szGarbled and the size lenGarbled of the initial garbled book, and the buffer szPlain for outputting plaintext and the size lenPlain of the plaintext buffer. The output after the function execution is completed is the failure and success results returned by the function execution, as well as the plaintext and the plaintext length lenPlain stored in the plaintext buffer szPlain when the function execution is successful.

[0251] The above-mentioned process of this embodiment is mainly as follows: first decrypt the initial garble...

Embodiment 3

[0254] In the garbled code book limited one-way transformation encryption method realized by the function EncryptOfGLOWT in the foregoing embodiment 1, the one-way transformation transformation limit value NR and the length lenPlain of the plaintext are fixed, so the length of the required garbled code book can be directly calculated. For stream data encryption, the length of the plaintext is often dynamic, so it is impossible to calculate the length of the required garbled text according to the length of the plaintext. The function StreamGLOWT::EncryptSend disclosed in this embodiment is an embodiment of the present invention in the application of stream data encryption. The function StreamGLOWT::EncryptSend is implemented by C++ code, where StreamGLOWT is a C++ class, and EncryptSend is a method of class StreamGLOWT. The class StreamGLOWT is used for data encrypted communication, and it constructs two data communication channels, namely: m_sockGarbled and m_sockContent. Amo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a limited gibberish text one-way conversion method and an encryption/decryption application thereof. The limited gibberish text one-way conversion method includes subjecting an initial gibberish text to one-way conversion with limited times and exclusive OR with message. The limited gibberish text one-way conversion method is actually an encryption/decryption method spending fewer bandwidths to accelerate the encryption/decryption speed. Compared with the traditional standard encryption/decryption method, the limited gibberish text one-way conversion method has the advantages that with fewer bandwidth spent, the encryption/decryption speed is improved by 10-100 times at the premise that the data safety is guaranteed; method is simple and widely applicable to large-scale data storage and transmission.

Description

technical field [0001] The invention relates to data encryption, in particular to data encryption and decryption in large flow communication and large data storage encryption and decryption. Background technique [0002] The purpose of communication encryption is to keep the secret of plaintext from being known by eavesdroppers. Corresponding to this is cryptanalysis, whose purpose is to recover the encrypted plaintext. According to the theory of modern applied cryptography, the existing encryption methods are generally divided into two categories: one is a symmetric encryption algorithm represented by DES and AES, and the other is an asymmetric encryption algorithm represented by RSA and ECC. Many encryption methods in communication rely on these two basic algorithms, or are optimized variants of these two algorithms, or rely on the principles of these two algorithms. But these two types of encryption methods all have a common defect: the speed is too slow. First of all,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/06H04L9/08
Inventor 韦雪英
Owner NANJING FAWEIKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products