Double-bit unidirectional circular linked list encryption and decryption method based on stream ciphers

A one-way circulation, encryption and decryption technology, applied in encryption devices with shift registers/memory, usage of multiple keys/algorithms, digital transmission systems, etc. , the method is simple, the effect is easy to achieve

Inactive Publication Date: 2016-09-21
JILIN UNIV
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Third, a lot of information transmitted on the Internet is unencrypted plaintext informa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-bit unidirectional circular linked list encryption and decryption method based on stream ciphers
  • Double-bit unidirectional circular linked list encryption and decryption method based on stream ciphers
  • Double-bit unidirectional circular linked list encryption and decryption method based on stream ciphers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. The game interface behavior control system of the present invention is suitable for the development of stand-alone games, mobile games, web games and other games, especially for the processing of game interface behaviors realized in controlling role-playing games.

[0050] figure 1 Shown is a schematic diagram of encryption and decryption according to an embodiment of the present invention. The figure shows that the public key realizes the mutual conversion of plaintext and ciphertext, and the algorithm is the encryption or decryption algorithm and the corresponding restoration algorithm. Based on this figure, the encryption system quadruple (M (clear code), C (ciphertext), P (key), A (algorithm

[0051] )). M, C, P, A sets have the following cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The stream cipher-based double-bit one-way circular linked list encryption and decryption method of the present invention includes: opening up memory space, performing initialization and setting values ​​for setting; generating corresponding first pointers and second pointers; running an algorithm program to perform the first The pointer and the second pointer are shifted and read; the first pointer and the second pointer are traversed through the one-way circular linked list four times, and the ciphertext file is obtained according to the XOR result of the character bits pointed to by the first pointer and the second pointer. The decryption scheme of the present invention is consistent with the encryption method. The beneficial effects of the invention are: it is extremely difficult to decipher, easy to implement, and the security system is more secure. This encryption method is out-of-order encryption, which can be transmitted in the existing and open communication channels; it does not need auxiliary hardware equipment, and is completely realized by software; the key byte can be of any length, with the length of the key byte As it increases, its encryption complexity also increases.

Description

technical field [0001] The invention relates to an encryption and decryption method for a double-bit one-way circular linked list based on a stream cipher, and belongs to the field of digital communication technology and information encryption. Background technique [0002] After the Snowden incident, all countries have stepped up research and development efforts on their own information security. The reason why the United States can obtain the information content of other countries mainly has the following problems. [0003] First, the United States has the technological advantages in communication technology and the super user management rights of the Internet; [0004] Second, mail servers (relevant departments in the United States force mail server service providers to provide mail information), information passing through routers (relevant departments in the United States force communication service departments and communication equipment suppliers to provide informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14H04L9/06
CPCH04L9/14H04L9/0656
Inventor 司玉娟郎六琪
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products