Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for transmitting binary information with security

A binary information, electronic transmission technology, applied in the field of encryption and decryption of binary information, can solve the problems of information data leakage, security impact, etc.

Inactive Publication Date: 2002-07-10
金东均
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] However, security-wise this system is heavily affected by attack methods developed by Bricke, Lagarias and Odlyzko, Schnor et al.
That is, the recipient's private key is easily discovered by a third party, so that the problem of easy leakage of information data occurs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for transmitting binary information with security
  • Method for transmitting binary information with security
  • Method for transmitting binary information with security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be described in detail below with reference to the accompanying drawings.

[0037] FIG. 1 is a flow chart of the process of generating a public key and a private key according to an embodiment of the present invention.

[0038] The process first generates a private key (cc t , W 1 , W 2 , M), where cc t means n K 1 × K 1 Sequence of superincreasing matrices, W is a k 1 ×k 1 Matrix, W 2 is a k 2 ×k 2 matrices, which are values ​​corresponding to B, W, and M', respectively, in a knapsack public-key transmission system based on superincreasing integer sequences.

[0039] First, the positive integer k 2 , k 2 , l 1 , l 2 ,..., l u is chosen arbitrarily, k 1 ×k 2 ≥3, 2≤u≤k 1 ×k 2 -1, which is represented as (step 110).

[0040] Then, select relative to each s (1≤s≤u), with length l s , a sequence of n superincreasing integers, which is denoted as d s =(d s,1 , d s,2 ,...,d s,1 ), 1≤s≤u (step 120). This superincreasing in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for transmitting binary information through electronic transmission media, which comprises a step of producing a public key and a private key as a preparatory stage for encrypting binary information data, a step of encrypting binary information by using the public key, and a deciphering step wherein super-increasing matrix sequences are used in producing the public key and the private key for encryption.

Description

technical field [0001] The present invention relates to a method of transmitting binary information through an electronic transmission medium; in particular, to a method of encrypting and decrypting binary information during transmission using a sequence of super-incrementing matrices. Background technique [0002] Recently, in the case of the transmission of information via electronic transmission media, especially in the transmission of data between computers, the issue of confidentiality has been increasingly emphasized. In fact, data transmitted over transmission lines is relatively easy to eavesdrop, which means that important information can be transmitted to third parties. In order to prevent such danger, it is necessary to encrypt the transmitted information so that it cannot be easily understood by a third party. [0003] In order to encrypt information, various encryption methods have been proposed. These encryption methods are broadly classified into: symmetric ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04B1/00H04L9/30
CPCH04L9/30Y04S40/20H04B1/00
Inventor 金东均裴在国
Owner 金东均