Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A coding method, device, medium and electronic device for preventing quantum attack

A coding method, quantum technology, applied in the field of communication coding, can solve problems such as being unable to resist quantum attacks

Active Publication Date: 2022-08-02
BEIJING URBAN CONSTR DESIGN & DEV GRP CO
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing symmetric encryption is a linear encoding process, which cannot resist quantum attacks, such as search attacks and Shor attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A coding method, device, medium and electronic device for preventing quantum attack
  • A coding method, device, medium and electronic device for preventing quantum attack
  • A coding method, device, medium and electronic device for preventing quantum attack

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0108] The first embodiment of the present invention provides an encoding system for preventing quantum attacks. The system includes an encoding end and a decoding end. The embodiment of the present invention does not impose any restrictions on the encoding end and the decoding end. The encoding end and the decoding end can be For arbitrary terminals such as computers and servers, the encoding end implements a quantum attack-proof encoding method. The decoding end implements a quantum attack-proof decoding method, and the decoding method is the inverse process of the encoding method. For ease of understanding, before introducing the method, the round function of the nonlinear weighting coefficient used in the method is introduced.

[0109] First, the round function of the nonlinear weighting coefficient;

[0110] Let the input password (Passwords) have L (L≥6) bytes in total, n is the number of bytes in the sequence X, and B(j) is the jth (j=1, 2, ..., L) word of the password...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encoding method, device, medium and electronic equipment for preventing quantum attacks, and relates to the technical field of communication encoding. The method includes randomly generating a binary two-dimensional table, searching for a first bit value corresponding to the i-th symbol in the first binary sequence from the binary two-dimensional table based on lattice theory; A second bit value corresponding to the i-th symbol in a binary sequence, constructing a nonlinear round function based on the second bit value; constructing a weighted probability model, and encoding the first binary sequence according to the coding formula according to the weighted probability model, A first encoding result is obtained; a second encoding result is obtained based on the first bit value and the first encoding result. The quantum-attack-resistant encoding device is applied to a quantum-attack-resistant encoding method. The encoding method for preventing quantum attacks is applied in electronic equipment.

Description

technical field [0001] The present invention relates to the technical field of communication coding, and more particularly, to a coding method, device, medium and electronic equipment for preventing quantum attacks. Background technique [0002] Lossless compression algorithms (entropy coding) have been widely used in communication, storage and other technical fields. Common lossless compression algorithms include run-length coding, dictionary coding, Huffman coding, and arithmetic coding (interval coding). As the core tool of information security, symmetric encryption algorithm is also widely used in the fields of communication, transaction, payment and data desensitization. Common symmetric encryption algorithms include Data Encryption Standard (DES), Advanced Encryption Standard (Advanced Encryption Standard) , AES), a symmetric encryption block algorithm (Blowfish), etc. [0003] However, the current existing symmetric encryption is a linear encoding process and cannot ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/06
CPCH04L9/002H04L9/0625H04L9/0631
Inventor 李金龙赵梓妍鲁秋子张方冰刘占宇李娇文靖曲鸣川
Owner BEIJING URBAN CONSTR DESIGN & DEV GRP CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products