Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A New Shannon Perfect Secrecy Method

A method of secrecy, Shannon's technique, applied in digital data protection, instrumentation, computing, etc.

Active Publication Date: 2021-05-28
CHONGQING INST OF GREEN & INTELLIGENT TECH CHINESE ACADEMY OF SCI +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this assumption does not have a rigorous proof

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A New Shannon Perfect Secrecy Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]The embodiments of the present invention will be easily understood by those skilled in the

[0032]It should be noted that the illustrations provided in the following examples will be described only by way of illustration only, and only the components related to the components associated with the components in the present invention are not shown in the actual implementation of the components. Dimensions, the type, quantity, and proportion of each component can be a random change in the actual implementation, and its component layout is also ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a novel Shannon's perfect secrecy method, which belongs to the field of information technology and includes the following steps: Step 1: determine the basic alphabet according to the information to be transmitted, and combine to form information plaintext; Step 2: encode the alphabet to obtain numbers plaintext; step 3: group the digital plaintext with a certain fixed length in order; step 4: encrypt each group of digital plaintext to obtain the plaintext and hidden text of the new group; step 5: use the permutation relationship to generate the hidden text key, Encrypt to obtain the information ciphertext; Step 6: Encrypt the cryptography key to obtain the key ciphertext; Step 7: Information transmission; Step 8: The receiver uses the seed key received by the secure channel to calculate all cryptography keys, and uses the cryptography The text key decrypts the ciphertext of the information to obtain the plaintext and hidden text; Step 9: Calculate the plaintext corresponding to the plaintext and hidden text. The encryption and decryption of the present invention are linear time, so that Shannon's perfect secrecy concept can be applied to the secure transmission of large-scale plaintext.

Description

Technical field[0001]The present invention is a new type of scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented.Background technique[0002]In the information security technology, information encryption is a core of information security. Shannon put forward a set of entropy-based information on the mathematical theory foundation for information security. Among them, Xiangnong put forward a perfect confidential program. Regrettably, Xiangnong also proves that perfect confidentiality requires at least the same password as the amount of information can guarantee the perfect confidentiality of information. All current commercial encryption schemes are encryption based on computational complexity.[0003]The confidentiality method based on computational complexity assumes tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 刘江方成玲
Owner CHONGQING INST OF GREEN & INTELLIGENT TECH CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products