Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sequence encryption method of complex reconstruction key

A sequence encryption and key technology, applied in the field of information security cryptography

Pending Publication Date: 2021-10-01
徐智能 +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(6) The feature quantity or other manipulation quantity used in this adjoint pseudo-random key reconstruction method cannot be inversely deduced within the polynomial time complexity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sequence encryption method of complex reconstruction key
  • Sequence encryption method of complex reconstruction key
  • Sequence encryption method of complex reconstruction key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0249] Example 1 Non-overlapping & single metabolic model of progressive bit logic / delayed bit metabolic logic configuration

[0250] Calculation parameters and calculation formulas of embodiment 1 (the calculation formulas are all based on the real number type)

[0251] Chaos computing structure configuration

[0252] 1 As a secret agreement between the encryption / decryption parties, define the structure configuration quantity ctl of embodiment 1 init =640, and make the key length equal to it.

[0253] 2 Define the selection pool and working pool of embodiment 1, and define and generate pseudo-plaintext

[0254] 2.1 Define the selection pool SPool

[0255] Select the pool SPool to satisfy: length(SPool)=2*ctl init (1)

[0256] 2.2 Define the working pool SPool work And load the worker pool SPool work

[0257] Define the initial worker pool SPool work Satisfied: length(SPool work ) = ctl init

[0258] Set the working pool SPool work The initial content of is the ...

Embodiment 2

[0365] Embodiment 2 Progressive chain bit-taking logic / sequentially-promoting metabolic logic and bit-jumping bit-taking logic / extracted bit metabolic logic matching double superposition & double metabolism staggered superposition model embedded in pseudo-random bit twining

[0366] Since only one regeneration key bit sequence group is used in each regeneration key bit sequence group in this embodiment (s=1, see error segment superposition logic structure 4.5), this embodiment identifies the regeneration key bit segment sequence group (bsk1 i,q 、bsk2 i,q 1 and 2 in , refer to 4.5 of the wrong segment superposition logic structure) and the sequence submark of the regeneration key bit segment in the group (bsk1 i,q 、bsk2 i,q The q in , refer to the staggered segment superposition logic structure 4.5) is merged into '1' or '2', and a single buffer area is used instead of the stack.

[0367] Calculation parameter and calculation formula of embodiment 2

[0368] Chaos computing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sequence encryption method of a complex reconstruction key. A chaotic calculation structure is constructed by using a set of composite logic, and chaotic bit field stream sequence encryption is realized. According to the method, computing logic units such as bit fetching logic, bit metabolism logic and bit reconstruction logic are scheduled through a chaos computing structure, a construction source and a control source are pseudo-randomly reconstructed section by section, and a regeneration key bit segment sequence of 'pseudo-random dislocation extraction of non-metabolized key bit segments to construct source bits or reset extraction of metabolized key bit segments to construct source bits' is constructed. The core of the method is as follows: constructing a chaos calculation structure, performing metabolism on a working pool segment by segment in an encryption process, and further extracting a bit in a construction source and a pseudo-random complex reconstruction key bit segment from a control source and a construction source carried by the working pool by segment through bit control bit fetching logic in the control source. The method has the beneficial effects that the adaptive computing capability is improved in a breakthrough manner, and a set of efficient and high-density security encryption method with a wide application space is provided.

Description

technical field [0001] The invention relates to the field of information security cryptography, and relates to a sequence encryption method for reconfiguration keys. Background technique [0002] Chinese patent application number: 201710249427.9 discloses a sequence encryption method based on a random binary sequence with an adjustable adjoint random reconstruction key. The main features of the method are: (1) using an existing random sequence to dynamically construct a seed random sequence. (2) Use the seed random sequence to pseudo-randomly construct random keys with fixed-length or variable-length bit segments. (3) The pseudo-random construction process of the random key is accompanied by the encryption process. (4) Using the transitivity of XOR operation to realize frequency-variable non-linear XOR of key to plaintext. (5) The adjustment of the key structure is realized through the adjustment of the feature quantity and other manipulation quantities and the pseudo-ran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/20
CPCH04L9/001H04L9/0656H04L9/0662H04L9/0625H04L9/0861
Inventor 徐智能
Owner 徐智能
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products