A cryptographic system and method

A technology of a cryptographic system and an encryption scheme, applied in the field of cryptographic systems, can solve problems such as large key size and multiple storage resources, and achieve the effect of improving security

Pending Publication Date: 2021-10-12
01 COMMUNIQUE LAB INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] Although a more secure form of encryption, the McEliece and Niederreiter schemes use larger key sizes and require more storage resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cryptographic system and method
  • A cryptographic system and method
  • A cryptographic system and method

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0084] Example 1: In this example, m=6, r=2. because We get n=2048+32=2080. Let d=61, t=30, then k≥2080-60·6=1720.

example 2

[0085] Example 2: For l=2, G(x) is a polynomial ring irreducible formula. The parity check matrix for this example is:

[0086]

[0087] and

[0088]

[0089] in and

[0090]

[0091] sum

[0092] middle x t-1 、x t-2 , ..., x, coefficients at 1

[0093]

[0094]

[0095]

[0096]

[0097] The parity check matrix H is defined as:

[0098]

[0099] As mentioned above, through the support set L as a set of rational functions to construct specific generalizations of Goppa codes. A specific generalization of Goppa codes is neither Reed Solomon (RS) codes nor alternation codes.

[0100] In order to decode these generalized Goppa codes, the Goppa polynomial G(x) and the support set L must be known. Classical decoding algorithms can then be used (Euclidean, Berlekamp-Massey, Patterson, etc.).

[0101] Using a set of position numerators whose order is greater than 1 reduces the order m of the Galois field extension used to obtain the support...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for encryption of data. The system and method utilizes a cryptographic function that provides asymmetric encryption / decryption and digital signing capabilities that are hardened against cyber attack from quantum computers.

Description

technical field [0001] The present invention generally relates to cryptographic systems and methods. More specifically, the present invention relates to public key cryptography systems and methods that can be used, for example, to build highly secure systems for data storage, access, encryption, decryption, digital signatures, and digital signature verification. Background technique [0002] Internet security is critical as everyday life increasingly relies on the Internet for, for example, remote access, social media, banking, money transfers, stock trading, shopping, research, transfer of medical records, voting, tax filing, identification, and more. Internet security has many aspects, one of which is securely protecting the accessibility of data by preventing unauthorized access to hardware components such as servers. Another aspect is preventing interpretation of data after unauthorized access has occurred. The second aspect is critical to addressing the evolving illic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28
CPCH04L9/0852H04L9/304H04L9/50G06F21/602H04L9/002H04L9/3026H04L9/3247
Inventor 谢尔盖·贝扎捷耶夫谢尔盖·斯特拉霍夫安德鲁·张
Owner 01 COMMUNIQUE LAB INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products