Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Coding convention control transformation type information authentication method, and coding convention control transformation type information encryption/decryption method

A coding convention and transformation technology, applied in the fields of electronics and information technology, can solve the problems of breaking, the designer has a back door, and it is not open to the public.

Active Publication Date: 2015-08-26
陈麟华
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to strengthen the anti-cracking ability of data encryption, many algorithms mostly use complex functions, and the entire design process is often not disclosed, which makes people worry that crackers will use the weak links of functions to break through, or designers have backdoors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Coding convention control transformation type information authentication method, and coding convention control transformation type information encryption/decryption method
  • Coding convention control transformation type information authentication method, and coding convention control transformation type information encryption/decryption method
  • Coding convention control transformation type information authentication method, and coding convention control transformation type information encryption/decryption method

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0178] Example 1, if the program is: N(A(B(m)C(D(m))), the left side of the brackets is the control code, and the inside of the brackets is the basic code, (the basic code can be divided into the next layer Control code and basic code) if, N=number of repetitions, A=grouping mode, B=shifting method, C=operation method, D=mapping method, then, as long as the corresponding data is given, the corresponding conversion rule will be formed.

[0179] Like this, give digital 341826763321, just get 3(4(1(826)7(6(3321))) by program, wherein N=repetition times 3, A=grouping mode 4, B=shift method 1, C =operation method 7, D=mapping method 6, then the transformed result is unique.

example 2

[0180] Example 2, "common code"=abcdefg, "female code"=ABCDEFG, "combined code"=ABCDEFGabcdefg.

[0181] The first transformation (the program) is shifting: mutual intersection=AaBbCcDdEeFfGg.

[0182] The second conversion (program) is operation: "basic code" "control code"=(AaBbCc)(DdEeFfGg), artificially agreed coding situation: 1=+1; 2=×2, 3=-3, 4= +4, 5=x5, 6=-6, 7=+7, 8=x8, 9=-9.

[0183] Then, given the "mother code", = ABCDEFG = 1234567, "common code" = abcdefg = 9876123, you can get the formula:

[0184] 91827364152637=(918273)(64152637)=(((918273-6)+4)+1)×5×2-6-3+7=….

[0185] will have unique results. Given different "female code" and "male code" values, there are different unique values.

[0186] (Or, if "01~09" are respectively agreed as +1~+9, "11~19" are respectively agreed as -1~19, "21~29" are respectively agreed as ×1~×9, "31~39" "respectively agreed as / 1~ / 9..., the change will be more)

[0187] Such a simple program can provide millions of "mother cod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an information technology and an electronic technology, and mainly provides a coding convention control transformation type information authentication method, and a coding convention control transformation type information encryption / decryption method. According to the present invention, the coding convention control transformation is a technology core, defines a series of different transformation modes in a coding format and according to the artificial convention, and divides the to-be-transformed data into the control codes and the basic codes. The control codes transform the basic codes according to a coding defined control mode to generate a new data result, so that the information authentication or the information encryption / decryption is carried out according to the coding convention control transformation and the generated result. The coding convention control transformation type information authentication method, and the coding convention control transformation type information encryption / decryption method of the present invention are simple, easy, safe and reliable, are low in cost, are very suitable for the software program processing, and can be widely used in the fields, such as the daily life, the economy, the military, etc.

Description

technical field [0001] The invention relates to an information authentication method and an information encryption and decryption method, which is an information authentication technology and an information encryption technology based on a method of "coding convention control conversion", and belongs to the fields of information technology and electronic technology. Background technique [0002] In the information society, there are a large number of various "proof" and "verification" activities. For example, if the "management party" wants to authenticate the "customer", it is often done in the form of verifying the "password". The process generally consists of the customer submitting a "certification" application and submitting a "password"; while the manager performs "verification", the "password" submitted by the customer is compared with the "password" stored in the management side in advance. If they are consistent, then Recognize the authenticity of the customer's id...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 陈麟华
Owner 陈麟华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products