Data encipher and decipher system based on dynamic variable-length code

A technology of variable length code and system state, applied in the field of information security in the field of information technology, can solve problems such as difficulties, and achieve the effect of good security

Inactive Publication Date: 2005-01-05
北京唐桓科技发展有限公司
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The so-called encryption is to use mathematical methods to re-encode the original data, so that anyone other than the legal receiver (

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encipher and decipher system based on dynamic variable-length code
  • Data encipher and decipher system based on dynamic variable-length code
  • Data encipher and decipher system based on dynamic variable-length code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The content of the present invention will be further described below in conjunction with specific embodiments.

[0031] 1. Encryption and decryption equipment, including:

[0032] 1.1 System initial state generator: The automatic conversion of system state is the core of this system. The plaintext to be encrypted is a group of 8 bits, so there are 2 8 = 256 different characters, in order to illustrate the concept of "system state", first define the amount of "degree" of the character. The "degree" of a character (represented by the symbol D) is an amount related to the number of occurrences of the character in plaintext, and its initial value is determined by the user key. Every time a character appears, the D of the character increases by a certain value, and the increased value is determined by the D of the character at the previous moment. After the 256 characters are arranged according to their respective Ds from large to small, the sequence of the characters and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an information security technology in information technology field, which concretely relates to binary code and decode of data. The invention belongs to sequence coding system; the essence is periodless multi-table code substituting method. It uses dynamic length variable code technology, a group of input data with fixed length (8 bits), the length of the output code is between 1 and 255, the size of the encrypted text is determined according to the state of the coding system. The state of the system will change after coding a group of plain text, and the initial state of the system is determined by the user key, the code analyzer is hard to determine the relation between the encrypted text and the plain text, thus the attacking method to each kind of system can be resisted effectively.

Description

technical field [0001] The invention relates to information security technology in the field of information technology, in particular to encryption and decryption of binary coded data. Background technique [0002] Cryptography technology is the core technology in information security technology, which mainly includes encryption technology, authentication technology and key management technology. Encryption technology is an important means to realize information confidentiality. The so-called encryption is to use mathematical methods to re-encode the original data, so that anyone other than the legal receiver (using the correct key) can restore the original "message" - plaintext, or read the changed "message" "—Ciphertext, are very difficult. According to whether the keys used for encryption and decryption are the same, cryptosystems can be divided into symmetric cryptosystems and public key cryptosystems. The present invention belongs to the symmetric encryption system. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G09C1/00
Inventor 李春林
Owner 北京唐桓科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products