Wide spectrum password plan

A cipher and scheme technology, applied in the field of digital encoding and encryption, can solve problems such as difficult original algorithms or reverse engineering of decryption keys, and achieve a wide range of applications.

Inactive Publication Date: 2017-02-22
廖华勇
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] In fact, even given the entire logic-driven implementation, it is extremely difficult to reverse engineer the original algorithm or decryption key used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Currently, logic-driven implementations are only known for a limited number of ciphers [eg, AES, DES, Lombok]. The following provides a description of a general approach for building a logic-driven implementation of an arbitrary cipher [or, more generally, a function] on a known logic-driven implementation of [a cipher or another function].

[0044] This logic-driven implementation can be built in a manner that does not take a lot of additional processing time.

[0045] A cryptographic scheme can be created that includes a logic-driven implementation of a function, an implementation of a cryptographic algorithm, and an implementation of a compositional operation for building cryptographically processed data from the results of the function and from the results of the cryptographic algorithm.

[0046] Due to the logic-driven implementation of the combined operations and functions, the entire cryptographic scheme becomes a logic-driven implementation. Multiple combinator...

Embodiment 2

[0068] This embodiment also includes a cryptographic scheme bjj, in which the combining operation includes combining the result of the function with the received data elements to obtain a combined result, and applying a cryptographic algorithm to the combined result.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a password plan, and furthermore relates to a password processing method. The invention aims to provide a password algorithm which is suitable for digital information transmission of Internet. The password algorithm facilitates realization of logical driving. For realizing the purpose, the password processing method manly comprises the steps of realizing a logical drive of a function; realizing the password algorithm; and realizing a data combined operation which is used for establishing password processing according to a function result and a password algorithm result. Because jja is realized by logical drive, mapping which is defined by the function cannot be easily found by an attacker. Therefore, through realizing feeding an appropriate value to the logical drive of the function, a sequence of values which are hard to predicate by the attacker can be generated. Through combining the password algorithm result and a logical drive realizing result, higher difficulty in attacking the password plan by the attacker is realized. Actually, strength of the password algorithm is improved by means of safety which is realized by the logical drive. The function can comprise further password algorithms such as DES and AES. On this condition, the logical drive of the function comprises realizing of the logical drive of the further password algorithm. The algorithm of the invention has advantages of wide application and high encryption reliability.

Description

technical field [0001] The invention relates to the field of digital code encryption, specifically, it belongs to a digital encryption scheme. Background technique [0002] Nowadays, content is increasingly delivered to users in digital format. [0003] For example, via the Internet, broadcast media, or via digital data carriers such as CDs or DVDs. [0004] Consumer electronics [CE] such as televisions, set-top boxes, and audio equipment are equipped with digital data processing capabilities to present such digital content. [0005] Digital rights management schemes have been introduced to control the distribution of digital content to legitimate users. [0006] Typically, digital rights management schemes use encryption techniques that only allow legitimate users to decrypt the content. The implementation of such encryption techniques in consumer electronics can be obscured to make it more difficult for an attacker to find the value of the key. Commonly used for passwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 廖华勇
Owner 廖华勇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products