Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital encryption algorithm

An encryption algorithm and digital technology, applied in encryption devices with shift registers/memory, key distribution, can solve the problem of time-consuming decryption of asymmetric algorithms, and achieve the effect of low cost and data security.

Active Publication Date: 2016-11-23
湖南瀚洲智能科技有限公司
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The asymmetric algorithm mainly uses the public key (publickey) and (privatekey) private key algorithm, that is, the public key is encrypted, the private key is decrypted, and the private key is encrypted, the public key is decrypted. The public key and the private key are in one-to-one correspondence and only use First, the asymmetric algorithm is theoretically more secure than the MD5 algorithm, but the decryption of the asymmetric algorithm is time-consuming. Compared with the similar MD5 algorithm, the asymmetric algorithm is even 1000 times slower than the MD5 algorithm, and the IC card or U- The key itself is a microcomputer system. For example, the PBOC card issued in China has its own CPU. Since the IC card or U-key is forced to open an external physical port, hackers can use this physical port to maliciously write virus programs and spread viruses through the ATM system. Or carry out sabotage activities. If online banking uses U-shield, it is safer than other methods. However, the automatic teller machine opens the physical port. If the hacker does not steal customer funds, but directly instructs the teller machine to spit out money, by modifying the system Database balance, then, it may be difficult for banks to find out for a long time, but magnetic stripe card hackers have no way to achieve this. From this perspective, IC cards may not be more secure than magnetic stripe cards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital encryption algorithm
  • Digital encryption algorithm
  • Digital encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0010] Specific implementation methods: The implementation methods discussed in this specification introduce the general process of implementing this patent, but implementing this patent does not necessarily need to completely follow the process described here, it is only a special case of implementing this patent.

[0011] Explanation of terms: source data, strictly speaking, connection variables, passwords entered by users, etc. are also source data, but the source data in this manual is defined in a narrow sense, which only refers to encrypted data, such as 6 groups of connection variables through magnetic stripe cards The imported 6 sets of data, these 6 sets of data are the source data, and the others are not source data. For encryption needs, the source data has more characters, too few characters, and the encryption strength is not enough.

[0012] Data and characters, strings, in computer and telecommunications technology, a character is the basic information of a unit ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A digital encryption algorithm uses a connection variable to connect a same kind field or a same kind data table and performs encryption on source data; the encryption method needs hardware data to participate and enables a password to be complex through multiple times of encryption and expanding encrypted data; and the biggest characteristic of the password is that the encrypted data is not completely stored, so that cracking on the server terminal is very difficult.

Description

technical field [0001] The invention belongs to digital encryption technology. Background technique [0002] The following first introduces the general situation of commonly used digital encryption algorithms: [0003] What we often call passwords are actually passwords. Passwords can be understood as a very difficult translation. It translates recognizable text into unrecognizable text. Passwords and digital certificates are special passwords. The telegram message used is the real password. It converts Chinese into a four-digit number. The long and short signals of each number are different. Use these long and short signals to send and receive. After receiving, find the corresponding Chinese through the number. , through manual translation into the original text, the digital number of the mass telegram is not a secret, so the encryption performance of the mass telegram message is very poor. In addition to the telegram message, there is also a password transmitter. The prin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L29/06
Inventor 汪风珍
Owner 湖南瀚洲智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products