Unlock instant, AI-driven research and patent intelligence for your innovation.

A dynamic encryption method

A dynamic password, encryption and decryption technology, applied in the field of information security, can solve problems such as security, security risks, inconvenient use, etc., and achieve the effect of convenient use and high security

Active Publication Date: 2018-02-02
DONGGUAN HONGDA POWER TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the slow speed of quantum communication, quantum communication is generally used for key distribution, and then the information is encrypted by the key, and then the encrypted information is transmitted, so even if quantum information transmission is physically safe, quantum communication is still There are two security risks, one is key distribution and the other is information encryption
If there is no independent secret and corresponding encryption and decryption methods to authenticate and confirm the identity, the distribution of keys may lead to man-in-the-middle attacks. Even zero-knowledge proofs cannot resist man-in-the-middle attacks, and quantum itself has no encryption function. If you want to use secrets and Corresponding encryption to ensure the security of key distribution must use traditional mathematical encryption methods, so quantum key distribution must be based on traditional mathematical encryption methods to resist man-in-the-middle attacks, and it is impossible to compare traditional mathematical encryption methods. The mathematical encryption method is more secure; in addition, if quantum communication uses a key to encrypt information, it must be a mathematical encryption method, and it cannot be a one-time pad encryption method, because the plaintext and password length of the one-time pad are the same, if you If you can safely transmit the one-time pad password information, then you can also safely transmit the plaintext without encryption at all, so encryption basically uses a general-purpose symmetric encryption method, such as the DES algorithm, and the entire quantum communication The process is actually similar to the SSL security protocol. The difference is that SSL uses a public key cryptography algorithm and an independent private key. Communication, in the traditional mathematical encryption method, is not the safest method
[0017] To sum up, quantum communication is a secure communication method based on traditional encryption methods. It cannot be more secure than traditional secure communication, and quantum communication generally uses light for communication. The communication speed is relatively fast, but it is inconvenient to use. , quantum communication cannot be too far in optical fiber, and the cost is also high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Dynamic password encryption method. Use random password information 1M, the variable is an integer, starting from 1, each variable value is only used for one encryption, the variable increases by 1 after each encryption, each encrypted information group is 64 bytes, and the group message digest is 8 bytes, When transmitting, the message digest is placed before the packet, and the integer variable is 8 bytes before all packets. Each packet corresponds to a variable value. The variable value of the first packet is the variable value at the beginning, and the variable values ​​of the remaining packets are incremented by 1 in sequence. , except for the first integer variable, other variables do not need to be transmitted; after encryption, the first packet is 80 bytes, of which the integer variable is the first 8 bytes, followed by the packet message digest 8 bytes, and the last is the ciphertext information 64 bytes; all other packets are 72 bytes, the message digest is 8 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a dynamic encryption method. Dynamic passwords are used for replacing passwords in the one-time pad encryption method. The dynamic codes are generated by jointly using one-timevariables, message abstracts and partial information of passwords via a hash random function. The variables used for encryption are different each time and the password information used each time is different, so that generated dynamic passwords are different and encryption results are totally different. The method can provide greater security for information data encryption and is more secure than the one-time pad encryption method; as long as password information is fully kept secret, ciphertexts cannot be modified and generated even people know messages; while providing greater security forinformation data encryption, the method facilitate use, storage and management of password information.

Description

technical field [0001] The invention relates to an information data encryption method of cryptography in the field of information security, in particular to an encryption method in which password information can be dynamically used for encryption. Background technique [0002] In cryptography, a message is called plaintext, the process of disguising a message in some way to hide its content is called encryption, and the encrypted message is called ciphertext, and the ciphertext The process of converting to plaintext is called decryption. Modern cryptography uses keys and algorithms to operate plaintext to obtain ciphertext, which is an encryption algorithm; uses keys and algorithms to perform operations on ciphertext to obtain plaintext, which is a decryption algorithm. There are usually two types of key-based algorithms: symmetric algorithms and asymmetric algorithms, and asymmetric algorithms are also called public-key algorithms. The symmetric algorithm means that the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618H04L9/0656
Inventor 刘金宏
Owner DONGGUAN HONGDA POWER TECH CO LTD