Encrypting and decrypting information
An encryption method, ciphertext technology, applied in the system field of encrypting and decrypting information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Permutation encryption appears to have been practiced for thousands of years. For example, Julius Caesar is said to have invented a shift algorithm to encode messages. Regardless of the truth of this claim, the shift algorithm is still called "Caesar code". With modern computing, even more advanced forms of permutation encryption are easily broken.
[0017] figure 1 is a schematic representation of a process 100 for permutation-dependent cryptographic encryption. Process 100 relies on decomposing permutations into circular products to allow encryption and decryption of messages.
[0018] In more detail, in process 100 , plaintext 105 is input into recurrent artificial neural network 110 . Artificial neural networks are devices inspired by structural and functional aspects of biological neuronal networks but implemented in hardware, in software, or in a combination thereof. In particular, artificial neural networks use a system of interconnected constructs called no...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


