Computer encryption unit and encryption method

An encryption method and encryption device technology, applied in the field of computer and data communication, can solve problems such as hidden dangers

Inactive Publication Date: 2004-03-10
杨斌 +2
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such a cryptographic system is easy to crack the key value th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer encryption unit and encryption method
  • Computer encryption unit and encryption method
  • Computer encryption unit and encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The computer data encryption system and method thereof of the present invention will be described in detail below in conjunction with the accompanying drawings. For the convenience of description, the symbols and positions involved in this manual are stipulated as follows:

[0066] The plaintext is M={M 1 ,M 2 ,...,M 1m}, 0≤M i 1 , C 2 ,...,C 1c}, 0≤C i <256, its length is lc;

[0067] The user-defined key text is Key={Key1 ,Key 2 ,...,Key 1k}, 0≤Key i 1 , k 2 ,...,k 1k}, 0≤k i 4 , namely k i It is a 4-byte integer, and its length is also lk;

[0068] If f() is a chaotic function, then f n+1 (x)=f(f n (x))(n>0), f 1 (x)=f(x). where 0≤x4 , 0≤f(x)4 .

[0069] In order to achieve the chaotic effect, the initial value needs to be iterated several times (that is, N) times before encryption, and usually N=50 can satisfy the condition.

[0070] In addition, in this encryption / decryption method, a total of 5 steps use the chaotic function: encrypted header (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Based on chaos principle about sensitive dependence to initial value, infinite looped key stream is generated providing very high security. Length of cryptographic key is variable, could be any length theoretically (recommend 64-4096). Initial process makes subtle change of cryptographic key lead to non-correlative cryptographs. The random number agitation method in the invention adds random unpredictable information into encrypting process. Thus, even plaintext is same, but the cryptographs are different in each time. Thus, it is not possible to attack and explain the cryptograph. Moreover, the time for the method is not dependent to length of the cryptographic key. Thus, the speed is higher than other methods with same intension. The invention is suitable to various platforms. Wide application prospects are used in Internet and handphone.

Description

technical field [0001] The present invention generally relates to an encryption device and an encryption method in the fields of computer and data communication, and in particular to a data encryption device and an encryption method for encrypting private and non-public data before transmission and decrypting after receiving. Background technique [0002] With the rapid development of the Internet, computer and network technology has become an indispensable part of human life. However, while people are enjoying the convenience brought by computers and networks, their personal privacy is constantly being violated. Therefore, in recent years, computer and network security has increasingly become one of the focal issues of information technology. Network security technologies such as firewalls for computers and networks have emerged as the times require. However, these passive defense schemes can only work within computers and local area networks, but are powerless for data t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14G06F17/00G09C1/00
Inventor 杨斌阮晓迅青山信义
Owner 杨斌
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products