Method for enciphering and deciphering code of packet, and encipherer and decipherer

A technology of encryption and decryption and block cipher, applied in the field of method and its encryption and decryption device, can solve the problems of no introduction

Inactive Publication Date: 2005-11-16
HEBEI UNIV OF TECH
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the end of the 20th century, the leading American DES has been broken, and there are some other block ciphers, such as the deformation of DES (including NewDES, multiple DES, whitened DES, s-box optional DES, s-box variable DES, DES using independent subkeys, generalized DES, etc.), Rc series block ciphers (including RC2, RC5, RC6, etc.) Lucifer, Madryga, Feal-N, RedocII, RedocIII, LOKI series block ciphers (including LOKI89, LOKI91 , LOKI97, etc.), Khufa, Khafre, Safer series block ciphers (including Safer64, Safer128, Safer+, etc.), MMB, CAST, 3WAY, TEA, MacGuffin, SHARK, BEAR, LION, CA.1.1, CRAB, Blowfish, GOST, SQUARE . According to the theory, the encryption strength can only be improved by increasing the block length, and the cracking ability and encryption ability are growing simultaneously

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enciphering and deciphering code of packet, and encipherer and decipherer
  • Method for enciphering and deciphering code of packet, and encipherer and decipherer
  • Method for enciphering and deciphering code of packet, and encipherer and decipherer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] Explanation of the program design of permutation code with n=4

[0068] 1. Establish a permutation code table with n=4

[0069] Key 0 1 2 3

[0070] 0 0 1 2 3

[0071] 1 0 1 3 2

[0072] 2 0 2 1 3

[0073] 3 0 2 3 1

[0074] 4 0 3 1 2

[0075] 5 0 3 2 1

[0076] .........

[0077] 23 3 2 1 0

[0078] Such a table has 24! , we randomly build 256 of them. When Key=4, there is the following mapping relationship: 0→0, 1→3, 2→1, 3→2. Figure 1 depicts a schematic diagram of bit exchange when Key=4.

[0079] In order to save storage space, 0→00, 1→01, 2→10, 3→11, and Key are represented by storage addresses. Such a permutation code table occupies 24 bytes.

[0080] Figure 2: Schematic diagram of the encryption process; Figure 3: Schematic diagram of the decryption process; Note: The order of encryption and decryption can be performed by row or by column.

[0081] 2. Key design

[0082] Use 1 byte as an integer, and the range it represents is 0-255. Just can det...

Embodiment 2

[0092] Application of Key Sequence as Logical Ruler in Encryption and Decryption

[0093] Encryption and decryption are two opposite processes, which can be encrypted first and then decrypted, or decrypted first and then encrypted. We can use 1-bit binary 0 or 1 as a key to control whether to run the encryption module or the decryption module at present. That is: the input key sequence Key can be used as a logic rule to control which passes are encrypted and which passes are decrypted during the multi-pass encryption and decryption process.

[0094] The following notation conventions are now used in this embodiment:

[0095] To perform one pass of encryption requires a k bit key, then perform j passes of encryption and decryption, and you can input a key with a length of j*k bits; use the k bits in the key sequence Key in sequence for each pass of encryption and decryption; you can also input a key with a length less than j * A key with a length of k bits. In this case, the ...

Embodiment 3

[0119] Application of Key Sequence and Plaintext Group as Logic Ruler in Encryption and Decryption Process

[0120] In each example of embodiment 2, the key sequence Key is used as the logical rule to control which pass to execute the encryption module and which pass to execute the decryption module; in this embodiment, the key sequence and plaintext grouping are used as the logical rule.

[0121] Figure 12 describes the application of the key sequence and plaintext as a logical ruler in the process of longitudinally encrypting plaintext. In this figure, for each plaintext group m 1 , m 2 ,... m L Carry out vertical encryption; first use the key sequence Key as a logical ruler, and when the key sequence Key is used up as a logical ruler, use the plaintext group m 1 Each bit of each bit continues to be used as a logic rule to control which pass performs encryption and which pass performs decryption. If the plaintext group m 1 still not enough, then when m 1 After running ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Different Keys including Key1, Key2, Key3... are utilized for each packet or each several packets. Encrypted cryptograph is encrypted again by using a changed cipher key. Or, arranged in groups, cryptograph is encrypted repeatedly for multiple times that is to say: encrypting each packet for multiple times, then encrypting next packet and whole plaintext, after completion, changing a Key and carrying out encryption once again, thus, repeating the above procedure for multiple times. The invention raises encryption intensity, and makes encryption device simple. Encryption method with encryption intensity being higher than 2n can be designed by using the invention. The disclosed method is suitable to all case of encryption by using grouped ciphers, including encryptions for stored digital quantity, transmitted digital signals, or real-time system.

Description

technical field [0001] The invention relates to encryption technology in the process of data transmission or storage, in particular to a block cipher encryption and decryption method and an encryption decryptor thereof. The invention can further improve the strength of block cipher encryption. technical background [0002] The 21st century is an era of informatization. Information is becoming more and more networked, which is reflected in the electronic business, financial electronic, and government office networking. The security and confidentiality of information that follow is becoming more and more important. Encryption Technology is the foundation of information security. Encryption strength and encryption speed must be improved, and encryption costs must be reduced. With the rapid development of computing technology, the ability to break secrets has also developed surprisingly, which makes encryption technology face severe challenges. At the end of the 20th century, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 武优西武金木洪流涛姚芳李艳刘依张邑博
Owner HEBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products