Dynamic deletion encryption system

An encryption system and dynamic technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as insufficient security performance, and achieve the effect of increasing the difficulty of cracking

Active Publication Date: 2022-07-22
湖南工商大学
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this system, the sender still sends all the information including the ciphertext at one time. If the information hijacking party maste

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic deletion encryption system
  • Dynamic deletion encryption system
  • Dynamic deletion encryption system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0035] Example 1.

[0036] This embodiment provides a dynamic deletion encryption system, which combines figure 1 , including a processing module, a segmentation module, a random module, a missing module, a transmission module and an identity module, the processing module is used to encrypt the plaintext to obtain the ciphertext and decrypt the ciphertext to obtain the plaintext, the segmentation module It is used to segment the ciphertext to obtain several ordered ciphertext packets, the random module is used to generate a series of random number sequences, and the missing module extracts the corresponding ciphertext packets from the ciphertext packets according to the random number sequence. content, the missing module constructs the extracted content and the random number sequence into missing data packets, the transmission module is used to transmit data between two terminals containing the system, the identity module is used to The transmitted terminal is authenticated; ...

Example Embodiment

[0055] Example two.

[0056] This embodiment includes all the content in the first embodiment, and provides a dynamic missing encryption system, including a processing module, a segmentation module, a random module, a missing module, a transmission module, and an identity module. The processing module is used to encrypt the plaintext Perform encryption processing to obtain ciphertext and decrypt the ciphertext to obtain plaintext, the segmentation module is used to segment the ciphertext to obtain several ordered ciphertext packets, and the random module is used to generate a series of random Sequence of numbers, the number in the sequence is the same as the number of the ciphertext packets, the missing module extracts the corresponding content from the ciphertext packets according to the random number sequence, and the missing module will extract the content and the random number sequence is constructed into a missing data packet, the transmission module is used to transmit d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a dynamic deletion encryption system, which comprises a processing module, a segmentation module, a random module, a deletion module, a transmission module and an identity module, and is characterized in that the processing module is used for carrying out encryption processing on a plaintext to obtain a ciphertext and carrying out decryption processing on the ciphertext to obtain the plaintext; the segmentation module is used for segmenting the ciphertext to obtain a plurality of ordered ciphertext packets, the random module is used for generating a string of random number sequences, the number in the number sequences is the same as the number of the ciphertext packets, and the missing module extracts corresponding contents from the ciphertext according to the random number sequences and sends the corresponding contents to the storage module. The missing module constructs the extracted content and a random number sequence into a missing data packet, the transmission module is used for transmitting data between two terminals containing a system, and the identity module is used for performing identity verification on the terminals participating in transmission; according to the system, the ciphertext is divided into the ciphertext packet and the missing packet, and the missing packet is sent after the ciphertext packet is correctly received, so that the security of the transmission content is improved.

Description

technical field [0001] The invention relates to the field of encrypted transmission of digital information, in particular to a dynamic deletion encryption system. Background technique [0002] The encryption system is a very important part of the information transmission process. With the development of the Internet and the huge increase in the amount of information transmission, the importance of the encryption system is also increasing. The encryption method is constantly developing, and the cracking method is also improving accordingly. The development of a more difficult to crack encryption system is needed in the current environment, and the lack of encryption is one of the directions. In the existing lack of encryption Improving security is a problem that needs to be solved at present. [0003] The foregoing discussion of the background art is merely intended to facilitate an understanding of the present invention. This discussion does not endorse or acknowledge any ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40
CPCH04L63/0428H04L63/0869H04L63/083H04L63/0876
Inventor 万前红陈刚赵军产覃业梅
Owner 湖南工商大学
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products