A New Shannon Perfect Secrecy Method
A method of secrecy, Shannon's technique, applied in digital data protection, instrumentation, computing, etc.
Active Publication Date: 2021-05-28
CHONGQING INST OF GREEN & INTELLIGENT TECH CHINESE ACADEMY OF SCI +1
View PDF5 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
However, this assumption does not have a rigorous proof
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0031]The embodiments of the present invention will be easily understood by those skilled in the
[0032]It should be noted that the illustrations provided in the following examples will be described only by way of illustration only, and only the components related to the components associated with the components in the present invention are not shown in the actual implementation of the components. Dimensions, the type, quantity, and proportion of each component can be a random change in the actual implementation, and its component layout is also ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
The invention discloses a novel Shannon's perfect secrecy method, which belongs to the field of information technology and includes the following steps: Step 1: determine the basic alphabet according to the information to be transmitted, and combine to form information plaintext; Step 2: encode the alphabet to obtain numbers plaintext; step 3: group the digital plaintext with a certain fixed length in order; step 4: encrypt each group of digital plaintext to obtain the plaintext and hidden text of the new group; step 5: use the permutation relationship to generate the hidden text key, Encrypt to obtain the information ciphertext; Step 6: Encrypt the cryptography key to obtain the key ciphertext; Step 7: Information transmission; Step 8: The receiver uses the seed key received by the secure channel to calculate all cryptography keys, and uses the cryptography The text key decrypts the ciphertext of the information to obtain the plaintext and hidden text; Step 9: Calculate the plaintext corresponding to the plaintext and hidden text. The encryption and decryption of the present invention are linear time, so that Shannon's perfect secrecy concept can be applied to the secure transmission of large-scale plaintext.
Description
Technical field[0001]The present invention is a new type of scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented scented.Background technique[0002]In the information security technology, information encryption is a core of information security. Shannon put forward a set of entropy-based information on the mathematical theory foundation for information security. Among them, Xiangnong put forward a perfect confidential program. Regrettably, Xiangnong also proves that perfect confidentiality requires at least the same password as the amount of information can guarantee the perfect confidentiality of information. All current commercial encryption schemes are encryption based on computational complexity.[0003]The confidentiality method based on computational complexity assumes tha...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 刘江方成玲
Owner CHONGQING INST OF GREEN & INTELLIGENT TECH CHINESE ACADEMY OF SCI


