Unlock instant, AI-driven research and patent intelligence for your innovation.

Encrypting and decrypting information

An encryption method, ciphertext technology, applied in the system field of encrypting and decrypting information

Pending Publication Date: 2021-12-24
INAIT SA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, only the intended recipient will have access to the decryption key that enables the ciphertext to be decrypted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypting and decrypting information
  • Encrypting and decrypting information
  • Encrypting and decrypting information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Permutation encryption appears to have been practiced for thousands of years. For example, Julius Caesar is said to have invented a shift algorithm to encode messages. Regardless of the truth of this claim, the shift algorithm is still called "Caesar code". With modern computing, even more advanced forms of permutation encryption are easily broken.

[0017] figure 1 is a schematic representation of a process 100 for permutation-dependent cryptographic encryption. Process 100 relies on decomposing permutations into circular products to allow encryption and decryption of messages.

[0018] In more detail, in process 100 , plaintext 105 is input into recurrent artificial neural network 110 . Artificial neural networks are devices inspired by structural and functional aspects of biological neuronal networks but implemented in hardware, in software, or in a combination thereof. In particular, artificial neural networks use a system of interconnected constructs called no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods, systems, and devices for encrypting and decrypting data. In one implementation, an encryption method includes inputting plaintext into a recurrent artificial neural network, identifying topological structures in patterns of activity in the recurrent artificial neural network, wherein the patterns of activity are responsive to the input of the plaintext, representing the identified topological structures in a binary sequence of length (L) and implementing a permutation of the set of all binary codewords of length (L). The implemented permutation is a function from the set of binary codewords of length (L) to itself that is injective and surjective.

Description

Background technique [0001] Cryptographic encryption provides secure communications between parties even in the event that a third party (often referred to as an "adversary") intercepts communications. Encrypted communications are encoded such that only authorized recipients have access to the communication. Often, the communication itself is referred to as "plaintext," a term that includes both text messages and other messages. Algorithms for encrypted communications are often referred to as "ciphers," and encrypted communications are referred to as "ciphertext." Decrypting ciphertexts to gain access to encrypted communications is often very difficult, although ciphertexts may be intercepted or otherwise made available to adversaries. [0002] In general, encryption can be classified as "symmetric key" or "public key". In symmetric key encryption, the same key is used to encrypt plaintext and decrypt ciphertext. Since both the sender and receiver must have access to the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06N3/04G09C1/00H04L9/08H04L9/00
CPCH04L2209/12G09C1/00H04L9/0819H04L9/00G06N3/044H04L9/0618H04L9/0816G06N3/08
Inventor K·赫斯H·马克莱姆
Owner INAIT SA