One-time pad replaceable encryption algorithm, component and equipment based on password book
An encryption algorithm and codebook technology, applied in the application field of computer software encryption algorithm, can solve the problems of cumbersome key replacement, single algorithm, insecure key storage, etc., achieve effective management, highlight substantive features, and improve resistance to differential attacks effect of ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0040]Example 1:
[0041]Such asfigure 1 A password-based one-printed alternative algorithm shown, including the following steps:
[0042]S1: Initialize the key space, use the general security component to combine the multi-thread mechanism to generate a key that meets the preset condition and generates a keystore.
[0043]In order to improve the conventional single key symmetry algorithm, first introduce a key library concept, the traditional single key algorithm only supports a limited keystore, this algorithm extends the keystore to a mass of space, for the key The library is managed and utilized.
[0044]In order to further expand key space, enhance encryption strength, this encryption mechanism requires enough key to participate in addendum, so supporting multiple keys, generally supported to 16,777,216 = 224128-bit symmetric key, each key 128bit = 16 bytes, 16, 777, 216 * 16 / 1024 = 262, 144, only the 262m storage space, the larger the keystore, the safer the algorithm, and of course, the ...
Example Embodiment
[0065]Example 2:
[0066]Based on Embodiment, the cipher-based primary one-dense replacement algorithm proposed by the present invention can be packaged in a separate service component, providing plus decryption services, all algorithms, keystores, and addending services, Form a black box, use the temporary storage medium by initialization method, after verify the keystore protection encryption key, the keystore is imported in a server memory, so that the key library only has memory, improve performance and security. Deploy the encryption algorithm in a separate service component, the process of providing plus decryption services, such asimage 3 As shown, the encryption algorithm proposed in the present invention is equivalent to the core components of the software encryption server.
[0067]In addition, ifFigure 4 As shown, the core components of the encryption algorithm can be called as part of the security middleware. As part of the program is deployed in the application, the system is...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap