Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method and device thereof

A data processing and parameter technology used in the field of information security

Inactive Publication Date: 2017-09-26
李光余
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the rapid development of computers and the emergence and maturity of various password attack methods, the existing technology is facing severe challenges.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device thereof
  • Data processing method and device thereof
  • Data processing method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0109] Example 1: Data Encryption

[0110] This embodiment implements symmetric packet encryption, and the rules for establishing a diffusion network can be found in Figure 9 shown. For path connection methods, see Figure 12-1 , Figure 12-2 , the two connection methods have the same meaning. This embodiment only encrypts a set of plaintexts.

[0111] Processing steps:

[0112] S1. Let N(n) be the packet length. Calculate the logarithm G=log 2 N, and round up G to calculate the perfect length P=2 G , calculate the number of diffusion stages round=G+E required for processing, E>=2, E=2 in this example.

[0113] S2. Take two sets of plaintexts X and Y whose lengths are both n, and i and j are the element indexes of X and Y respectively.

[0114] S3. Take two sets of keys A and B whose length is n, and require that the elements in A and B are not all equal, and a and b are the element indexes of A and B respectively.

[0115] S4. Let the integer r be the index number ...

Embodiment 2

[0156] Example 2: Data decryption

[0157] This embodiment implements symmetric packet decryption, and the network establishment rule is opposite to encryption. This example only decrypts a set of ciphertexts.

[0158] Processing steps:

[0159] S1. Let N(n) be the packet length (N is equal to the encrypted packet length). Calculate the logarithm G=log 2 N, and round up G to calculate the perfect length P=2 G , calculate the number of diffusion stages round=G+E required for processing, E>=2, E=2 in this example.

[0160] S2. Take two groups of ciphertexts X and Y whose length is n, corresponding to the corresponding encrypted output, i and j are the element indexes of X and Y respectively.

[0161] S3. Take two sets of keys A and B whose length is n, corresponding to the key used for encryption, a and b are the element indexes of A and B respectively.

[0162] S4. Let the integer r be the index number of the diffusion stage, and the first stage r=0. Diffusion from Y, A,...

Embodiment 3

[0203] Example 3: Calculating message digests

[0204] The length of the digest used in this embodiment is 128 bits (16 bytes, any length is optional). For the network establishment rules, please refer to Figure 9 , Please refer to Example 1 for diffusion-type formation.

[0205] In order to further increase the reliability of the message summary, a constant (as the first parameter) is specially added to the diffusion formula to form together, and these constants are processed together during the diffusion operation. The diffusion expression is changed to: E+K→R, where E is the original body, K is the constant, and R is the acceptor.

[0206] Processing steps:

[0207] S1. Let N(n) be the packet length (N=8 in this example), and S is the packet used to store the message digest, and its length is 2N=16. For the convenience of description, the first half of S is named S Q , the second half named S H . i is the element index of S, S Q The element index range of is [0,N); S ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information safety technology, and particularly to a data processing method and a device thereof. The data processing method comprises the steps of establishing a diffusion network for aiming at one or a plurality of subgroups which participate in processing; wherein the subgroup is an element set with a preset length, and furthermore each subgroup comprises at least one element; the diffusion network is composed of diffusion paths, and each diffusion path is connected with and aligned to the elements and / or element groups in the same and / or different subgroups, and the element group is an element assembly; establishing a diffusion formula according to the diffusion paths, wherein the diffusion formula is mainly composed of an original element and a receiving element; and performing diffusion operation on the diffusion formula. The method and the device can realize a quick and complete avalanche effect and can be used for data encryption and decryption, information abstract calculation, random number generation, etc. When the method and the device are used in data encryption, the method and the device realize advantages of high strength, high speed, anti-attack performance, etc.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular, to a data processing method and device. Background technique [0002] The avalanche effect means that in data processing, any small change in the original input will cause a huge change in the output; and the complete avalanche effect, any small change in the original input will cause all outputs to change. This processing feature can be used for a variety of purposes, such as data encryption and decryption, computing message digests, generating random numbers, and more. [0003] Encryption technology has been studied since ancient times, and the protection of information is very important whether it is military, government, business or even personal. Some departments and organizations have extremely high requirements for encryption strength. If the encrypted message is deciphered, the consequences can be very serious. As human society enters the era of comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 李光余
Owner 李光余