Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security digital encryption method based on one-time use codebook

An encryption method and information security technology, applied in the field of information security digital encryption based on a one-time use codebook

Active Publication Date: 2020-10-27
广州佳欣未来科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0045] The invention provides an information security digital encryption method based on a one-time use codebook, which is organically combined with a third-party transmission SSL / TLS communication protocol encryption system, and completely solves the problem of big data and information security in the Internet environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security digital encryption method based on one-time use codebook
  • Information security digital encryption method based on one-time use codebook
  • Information security digital encryption method based on one-time use codebook

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0055] Basic concept and mathematical principle of digital encryption modulation algorithm

[0056] 1. Monorail K-block digital vector unit:

[0057] suppose It is an L-dimensional positive integer digital vector group with a length of M digits and a measurement unit of l, which can be divided into K blocks.

[0058] When K>1, That is, the L-dimensional digital vector unit of the monorail K-block:

[0059] It is a digital vector group composed of positive integer digital information.

[0060] Can be recorded as: When K=1, Metamorphosis into ordinary single-track L-dimensional vector is a set of positive integer numbers.

[0061] 2. Dual-track K-block group digital vector association:

[0062] suppose It is two L-dimensional positive integer digital vector groups with a length of M digits and a measurement unit of l, which can be divided into K blocks:

[0063]

[0064] made up of Dual-track K-block digital vector association:

[0065] 3. Dual-trac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security digital encryption method based on a one-time use codebook. Front and back background information is formed by utilizing host characteristic informationof afile and specific information of communication equipment used by the file; therefore, a double-track double-block K grouping digital vector correlator structure is formed; and partial feature information is extracted the background information to serve as a digital key for encrypting the plaintext information, encryption modulation is carried out on asymbol dictionary by adopting a functionaldynamic encryption algorithm, a once-used digital password book with the background information is generated, and a public digital password of the plaintext information is generated. The informationsecurity digital encryption method based on the one-time use codebook provided by the invention is effectivelycombined with a third-party transmission SSL / TLS communication protocol cryptosystem, so that big data and information security in an Internet environment are effectively guaranteed. The method is suitable for completing an encryption task of plaintext information by utilizing the characteristic that private confidential information and public information are asymmetric under the condition that background information of an internet environment is not completely transparent.

Description

technical field [0001] The invention relates to an information security digital encryption method based on a one-time codebook. Background technique [0002] There is a wide variety of technologies associated with cryptography, both invisible and visible, digital and non-digital. However, they all have a common feature: digital cryptography technology generated around multiple keys generated by a fixed codebook, and each cryptography technology has a close relationship. [0003] A general cryptographic system refers to the information host A of information (message) W, using the encryption algorithm of symmetric key Q or asymmetric private key PW and public key GW to perform public key encryption processing on W that needs to be encrypted, and generate The public password MW, and pass the password MW to the third party C. [0004] After receiving the encrypted password MW, the access receiver B uses the private key and decryption algorithm to decrypt the MW and restore the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0863H04L9/0825H04L63/166
Inventor 王强林云侯刘星
Owner 广州佳欣未来科技有限公司