Grouping encryption and decryption algorithm

A block encryption and algorithm technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of long ciphertext, increase ciphertext input time and operation amount, and achieve the effect of reducing time and operation amount

Inactive Publication Date: 2006-12-13
BEIJING FORTUNE INVESTMENT
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the problem that the existing encryption algorithm technology in the field of information security technology encrypts decimal numbers, the ciphertext is longer than the plaintex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Grouping encryption and decryption algorithm
  • Grouping encryption and decryption algorithm
  • Grouping encryption and decryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] In the field of information security technology, the bill number sequence (plaintext) displayed by the decimal number is set as P here, and the specific operation process of the block encryption algorithm for the plaintext is as follows figure 2 As shown, it includes grouping operations on plaintext P, encryption loop iterative calculation, position transformation and output ciphertext, etc. The encryption loop iterative calculation includes six sub-operation processes, which are digital expansion operation, mixed operation of key and variable, nonlinear Transformation operation, information concealment operation, reassignment operation, and one-time key cycle right shift operation, the above operation processes are all existing technologies, the difference is that in this embodiment, the plaintext P is a set of decimal numbers P 1 ,P 2 ,...,P i ,...,P m , 0≤i≤m, and the number Pi takes one of the following a and b value ranges,

[0048] a. 0≤Pi ≤9

[0049] b. 0≤P ...

Embodiment 2

[0078] In this embodiment, the ciphertext output in the corresponding embodiment 1 is decrypted, and the specific operation process of the decryption algorithm is as follows: image 3 As shown, it includes grouping operation on ciphertext C, decryption loop iterative calculation, position transformation and output plaintext, etc. The decryption loop iterative calculation includes six sub-operation processes, which are digital expansion operation, mixed operation of key and variable, non-linear Transformation operation, information masking operation, reassignment and key one cycle left shift operation, the above operation process is

[0079] current technology.

[0080] Corresponding to the encryption algorithm in Embodiment 1, the input ciphertext C of the decryption algorithm is a set of decimal numbers C 1 、C 2 ,...,C i ,...,C m , 0≤i≤m, and the number C i Only one of the following a and b value ranges can be taken.

[0081] a. 0≤C i ≤9

[0082] b. 0≤C i ≤99

[008...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses sectionalization encipher-decipher algorithm, which is characterized by the following: adopting 10-bit number for clear text and secret text as basic arithmetic unit; adopting 10-subtraction method for deciphering course; making the digital sequence length of obtained 10-bit secret text; reducing the problem of secret text inputting time and operating quantity.

Description

technical field [0001] The invention relates to a group encryption and decryption algorithm, which belongs to the technical field of digital anti-counterfeiting and information security. Background technique [0002] Cryptography is a science and technology that studies encryption and decryption transformations. Generally, the file to be encrypted and protected is called plaintext, and the encrypted transformed file is called ciphertext. The process of converting plaintext into ciphertext is called encryption, and the process of converting ciphertext into plaintext is called decryption. The mutual transformation between plaintext and ciphertext is reversible, and there is only a unique, error-free reversible transformation. The transformation rules used when encrypting plaintext are called encryption algorithms, and the transformation rules used when decrypting ciphertext are called decryption algorithms. Encryption algorithms and decryption algorithms are collectively cal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/18
Inventor 叶季青
Owner BEIJING FORTUNE INVESTMENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products