Code-controlled data encryption method for variability key

A data encryption and key technology, applied in the field of information electronics, can solve problems such as ambiguity and confusion

Pending Publication Date: 2020-05-15
陈麟华
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

"Key" and "private key" and "public key" are easy to cause ambiguity and confusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code-controlled data encryption method for variability key
  • Code-controlled data encryption method for variability key
  • Code-controlled data encryption method for variability key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0196] Next, according to the method of the present invention, a specific encryption transformation method is set to implement encryption and decryption.

[0197] 1. Secret key.

[0198] Divided into "pre-stored secret key" and "group secret key".

[0199] 1. Pre-store the secret key. Pre-stored, preset digital string (key), 1K bytes (Byte) 1Byte=8bit

[0200] 2. Group secret key. Select one of the 8 bytes in the "pre-stored secret key" as the secret key used in the block encryption process.

[0201] Two, the clear key.

[0202] It is divided into "preparation key" and "group key".

[0203] 1. Prepare the public key. 16 bytes, a public digital string, or a public "virtual text" (a file that is encrypted and transmitted publicly).

[0204] 2. The group secret key. 8 bytes. Select one of the 8 bytes in the "preparation secret key", each group is different.

[0205] In the group secret key, ①, the first group uses the "boot code", and ②, the second group starts to use t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a code-controlled data encryption method for a variability key, and relates to an information electronic technology. The invention mainly provides a data encryption method fora non-fixed secret key, and the core of the method is the transformation of'a clear key + a dark key-a variable key '. According to the method, a dynamic'private key 'and a static'dark key' are introduced and are decomposed into a'control code 'and a'controlled code' after being mixed, and then repeated'code control transformation 'is performed to form a'variability key'. And then encryption is carried out through a variability key. The technology of the invention is an unfixed secret key system with an unfixed secret key, which is created outside the existing fixed secret key system. A thirdsystem, namely a double-key symmetric system, is invented and created outside two existing systems, namely a single-key symmetric system and a double-key asymmetric system. Because the repeated transformation is discrete and agreed, the method is more suitable for the implementation of software and the use of an embedded chip. The technology is simple, convenient, feasible, safe and reliable, andcan be widely applied to the fields of national defense, finance, Internet, daily life and the like.

Description

technical field [0001] The invention relates to a data encryption method, which belongs to the field of information electronics technology and can be applied to daily life, economy, military affairs and the like. Background technique [0002] The history of the development of human society is a history of constant wars. War is inseparable from the attack and defense of information. On the one hand, it is necessary to decipher the encrypted information of the opponent more quickly, and on the other hand, it is necessary to ensure the confidentiality of one's own communication more securely. [0003] The invention of the computer can be said to have fundamentally changed the status quo and development trajectory of human society in just a few decades, making mankind enter the information society. The original intention of inventing the electronic computer was only out of the needs of war and to decipher the enemy's military secret information more quickly. [0004] Entering ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 陈麟华
Owner 陈麟华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products