Encryption method, program, and system

A computing system and computer program technology, applied in the field of security against known plaintext attacks, can solve problems such as increasing memory space, and achieve a good encoding rate.

Active Publication Date: 2016-11-23
加泽一郎
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, when this method is applied to stream encryption, a problem arises because the entire plaintext must be scanned twice to be cached, significantly increasing the required memory space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, program, and system
  • Encryption method, program, and system
  • Encryption method, program, and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Hereinafter, an embodiment of the present invention will be described with reference to the accompanying drawings.

[0027] figure 1 is a functional overview diagram of an exemplary information system 101 used in one embodiment of the invention. The information system 101 may be composed of physical computers, or virtual computing resources provided by, for example, cloud infrastructure services.

[0028] Encryption preprocessing 102 is the function of transforming plaintext prior to conventional encryption 103 . Its details are in Figure 4 shown in and described below.

[0029] Conventional encryption 103 is a function of performing encryption (converting plaintext into ciphertext) using a well-known encryption method such as Data Encryption Standard (DES). It is well known and self-explanatory, so it will not be discussed further.

[0030] Conventional decryption 104 is the function of performing decryption (transforming ciphertext to plaintext) using a well-kno...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

[Problem] To perform, by use of an existing encryption scheme, an encryption that is excellent in encoding rate and suitable for stream encryption and that exhibits a high security against known plain text attacks. [Solution] From a random number sequence matrix consisting of random number sequences having no mutual correlations and having different lengths, a random number sequence is selected by using, as an index, a random number that is independently generated by means of a physical random number or the like. A plain text to be encrypted is then camouflaged on the basis of the selected random number sequence, further coupled to the aforementioned random number and thereafter subjected to application of a conventional type of encryption algorithm.

Description

technical field [0001] The present invention relates to a computer-implemented method for encryption, in particular a method for securely resisting known-plaintext attacks. Background technique [0002] Encryption technology is very important in today's information technology. For encryption technology, it is necessary to be secure against various types of attacks; without knowing the encryption key, it is impossible to decrypt encrypted text in a reasonable time. [0003] One type of attack is a known-plaintext attack (KPA). KPA is an effective attack when the ciphertext corresponding to the known plaintext is available. When the beginning of the plaintext is fixed data, serial number or time stamp (for example, in order to comply with the communication protocol standard), it is easier to infer the plaintext corresponding to said ciphertext. Therefore, security against KPA is an important requirement for encryption methods. [0004] If only the encryption key size is in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/18
CPCH04L9/0662H04L9/065
Inventor 加泽一郎
Owner 加泽一郎
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products