One-time pad replaceable encryption algorithm, component and equipment based on password book

An encryption algorithm and codebook technology, applied in the application field of computer software encryption algorithm, can solve the problems of cumbersome key replacement, single algorithm, insecure key storage, etc., achieve effective management, highlight substantive features, and improve resistance to differential attacks effect of ability

Pending Publication Date: 2021-04-13
山东山大鸥玛软件股份有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above problems, the object of the present invention is to provide a replaceable encryption algorithm, component and device based on a codebook, which can improve the software encryption algorithm of a single key, overcome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-time pad replaceable encryption algorithm, component and equipment based on password book
  • One-time pad replaceable encryption algorithm, component and equipment based on password book
  • One-time pad replaceable encryption algorithm, component and equipment based on password book

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0040]Example 1:

[0041]Such asfigure 1 A password-based one-printed alternative algorithm shown, including the following steps:

[0042]S1: Initialize the key space, use the general security component to combine the multi-thread mechanism to generate a key that meets the preset condition and generates a keystore.

[0043]In order to improve the conventional single key symmetry algorithm, first introduce a key library concept, the traditional single key algorithm only supports a limited keystore, this algorithm extends the keystore to a mass of space, for the key The library is managed and utilized.

[0044]In order to further expand key space, enhance encryption strength, this encryption mechanism requires enough key to participate in addendum, so supporting multiple keys, generally supported to 16,777,216 = 224128-bit symmetric key, each key 128bit = 16 bytes, 16, 777, 216 * 16 / 1024 = 262, 144, only the 262m storage space, the larger the keystore, the safer the algorithm, and of course, the ...

Example Embodiment

[0065]Example 2:

[0066]Based on Embodiment, the cipher-based primary one-dense replacement algorithm proposed by the present invention can be packaged in a separate service component, providing plus decryption services, all algorithms, keystores, and addending services, Form a black box, use the temporary storage medium by initialization method, after verify the keystore protection encryption key, the keystore is imported in a server memory, so that the key library only has memory, improve performance and security. Deploy the encryption algorithm in a separate service component, the process of providing plus decryption services, such asimage 3 As shown, the encryption algorithm proposed in the present invention is equivalent to the core components of the software encryption server.

[0067]In addition, ifFigure 4 As shown, the core components of the encryption algorithm can be called as part of the security middleware. As part of the program is deployed in the application, the system is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a one-time pad replaceable encryption algorithm, component and equipment based on a codebook, and the method comprises the steps: initializing a secret key space, generating a secret key meeting a preset condition through employing a universal safety component in combination with a multi-thread mechanism, and generating a secret key library; storing each group of generated secret key libraries in a secret key space in an encrypted file mode, and establishing an independent data channel for transmitting secret key library files; creating a secret key rotation mechanism in the encryption and decryption process, and randomly distributing a secret key in the secret key library in the encryption and decryption process; and scrambling the encryption process of the plaintext by adopting a random key. According to the invention, the software encryption algorithm with a single key can be improved, the defects of single algorithm, tedious key replacement and unsafe key storage are overcome, and the advantages of convenient upgrading, close combination with a program and high efficiency of the software encryption algorithm are exerted.

Description

technical field [0001] The invention relates to the application field of computer software encryption algorithms, and more specifically relates to a codebook-based one-time pad replaceable encryption algorithm, components and equipment. Background technique [0002] At present, the symmetric key encryption algorithm is mainly realized by two encryption and decryption methods, soft encryption based on software algorithm and hard encryption mode based on hardware encryption machine, each of which has its own shortcomings. [0003] The essence of software encryption is algorithm encryption key. The soft encryption key is generally stored in the program code or configuration file, and a fixed key is used for encryption. The encryption algorithm generally uses an open source algorithm, and the same encryption key is used for a long time. If the attacker obtains the key through brute force cracking or other attack methods, the entire encryption mechanism will be broken, and the co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/46
CPCG06F21/602G06F21/46
Inventor 马磊袁峰江林
Owner 山东山大鸥玛软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products