Check patentability & draft patents in minutes with Patsnap Eureka AI!

Symmetric cipher table and symmetric key algorithm

A symmetric password and symmetric encryption technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve the problems of easy password peeping, bank card theft, magnetic stripe bank card cloning, and theft.

Inactive Publication Date: 2015-09-09
信和汇诚信用管理(北京)有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(1) For the safety of electronic payment, it is often necessary to use random verification codes; for example, online ticket purchases require the use of verification codes on computers, but it is often impossible to prevent "scalpers" from using ticket-grabbing software to rob tickets; (2) ) For example, when operating online banking, the mobile phone SMS verification code sent by the bank to the bank card user may be intercepted (shielded) by the mobile phone virus and secretly forwarded to the mobile phone designated by the criminal, causing the user's bank card to be stolen; (3) The magnetic stripe bank card being used is easy to be cloned and swiped by criminals; (4) When the IC chip bank card is used in shopping malls and supermarkets, the input password is easy to be peeped at; (5) The asymmetric encryption algorithm RSA (public The key encryption algorithm, which has been used in the USBKey of the bank, such as U-Shield), has a key length of 1024 bits or 2048 bits, resulting in relatively slow calculations and even relatively large power consumption. It is only suitable for small data and is not universal (need to download (6) Biometric identification (fingerprint, face, iris) not only has technical limitations, but also cannot identify the authenticity of the communication content (only the identity of the communicator can be identified) (7) Smartphone QR code payment (mobile payment) is convenient, but the payment password will be peeped by a Trojan virus, or the smartphone will be "hijacked" by a Trojan virus; (8) For harassing text messages, especially fraudulent text messages, Existing technology has no good solution, leading to rampant fraudulent text messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric cipher table and symmetric key algorithm
  • Symmetric cipher table and symmetric key algorithm

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0088] Example 1, such as figure 1 , A5 is the fifth symmetric password table (c=5) in A; A54 is the fourth password area (c=5, y=4) in the symmetric password table A5.

[0089] In Acy, there are altogether Icy common rows and Hcy common column password characters; the common row number is ncy, the common column number is wcy, and each password character corresponds to ncy and wcy. In this example, in A54, there are altogether the password characters of 999 public rows (I54=999), 999 public columns (H54=999); Vertical is row, and horizontal is column; Each public row has a public row number n54 , for example, n54 = ..., 440, 317, 000, 280, 281, 282, ...; each common column has a common column number w54, eg, w54 = ..., 900, 901, 00, ..., 201, 0, 25, ...; For example, in A54, the password character 123456789 corresponds to the public row 440 and the public column 900, and the password character 246801357 corresponds to the public row 317 and the public column 901, ....

[00...

example 2

[0105] Example 2, assuming that the plaintext L to be encrypted is 00555.

[0106] (1) if figure 2 , have the symmetric cipher table as claimed in claim 1, claim 2, claim 3, claim 4 (included in symmetric cipher system A, AI and AII are identical); A5 is the No. 5 symmetric cipher table in A , A54 is the No. 4 password area in A5.

[0107] (2) According to the preset program in AI, plaintext L (00555) is divided into 1 segment (L1), f=F=1; L1 is the plaintext character segment in L, further, L1 is divided into 2 groups ( L11, L12), L1g1 is the plaintext character group (1≤g1≤G1) in L1, Gf=G1=2; so, 00555 (=L=L1) is divided into L11, L12; When gf=g1=1 , Lfgf=Lfg1=L11=00; when gf=g1=2, LfGf=L1G1=Lfgf=Lfg1=L12=555.

[0108] (3) According to the preset program in AI:

[0109] ③: When Gf≥2, Lfgf corresponds to Jfgf. In this example, when f=1, gf=g1=1, "Lfgf and Jfgf in AI correspond to each other" in the above ① refers to "L11 corresponds to (mapping) J11 in A54" (Lfgf is L1...

example 3

[0123] Example 3, when Gf≥2, ..., the forward series has one or more of the following 10 forms. In this example, in the 5th form, the row element (fgf) is connected forward to the column element [f(gf+1)]; further, as described in the third situation in claim 8, icy(fgf ) is forward concatenated to the column element [f(gf+1)] involving icy(fgf).

[0124] Assuming that the plaintext L to be encrypted is 99888 (L=L1, L11=99, L12=888); L11 corresponds to (mapping) J11; suppose, J11=icy(11), then L11 corresponds to (mapping) icy(11), then icy(11)=99.

[0125] like figure 2(A54); Suppose, icy (11) is located on the public column 900 in A54 (w54=900), and after searching, it is found that i54=99 at the public column 900 and public row 317, so, i54 at this place Temporarily become i54(11), i54(11)=99, L11 corresponds (maps) this i54(11); because, the i54 at this place becomes i54(11) temporarily, so, at this place, n54(=317) involves The same i54 (11) at this place temporarily ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a symmetric cipher table. All or partial cipher characters in the symmetric cipher table correspond to common rows and common columns, as well as random rows and / or random columns (which makes the table difficult to crack) ; a few rows and / or columns can be formed by several contiguous zeros. The invention further discloses a symmetric key algorithm. A plaintext is divided into plaintext character segments, and the plaintext character segments are divided into plaintext character sets; the plaintext character sets correspond to elements (including one or more of row, column, region, table and difference elements) in the table and are subjected to forward cascading (i.e. the position of a previous element refers to the position of a next element), so that the plaintext character segments or the plaintext are encrypted into cipher characters in a tail reserving manner (i.e. the cipher characters correspond to the last plaintext character set in the plaintext character segment or the plaintext). A multiple-character plaintext can be encrypted into a cipher character set by using the symmetric key algorithm, so that the ciphertext becomes brief.

Description

technical field [0001] The invention relates to symmetric ciphers, in particular to a symmetric cipher table and a symmetric encryption method; the symmetric encryption method is based on the symmetric cipher table. Background technique [0002] In the patent application "a parametric cipher system and a direct communication method and an indirect communication method" (201410211178.0): (1) the cipher table Ac is a symmetric cipher table; (2) in Ac, the plaintext character group Fvg corresponds to the initial character Ecbd, and Ecbd corresponds to the special-purpose password character group Xcih, so that Fvg is encrypted into the ciphertext character group Fvg' (Fvg'=Xcih, or relevant to Xcih); (3) in Ac, in the special-purpose password character The public row Ic and the public column Hc are respectively arranged in order of size, so the i and h in the special password character Xcih are regular and non-random; Xcih corresponds to the public row and public column, but bec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 褚万青
Owner 信和汇诚信用管理(北京)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More