Asymmetric key encryption method

An encryption method and asymmetric technology, applied to encryption devices with shift registers/memory, key distribution, can solve the problems of low data encryption, short key length, etc., to increase complexity, reduce time, increase Effects on Safety and Reliability

Pending Publication Date: 2021-10-29
KUNMING UNIV OF SCI & TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology allows users with certain keys or sequences for encrypting their messages more securely than traditional methods like passwords alone. It also improves how they communicate over networks faster compared to older systems such as email servers.

Problems solved by technology

This patented method uses two types of keys: one for symmetric encryption algorithms (the longer version) while another type called long-term randomness or pseudo-random number generators are also included in this system. These techniques help reduce the size of the necessary storage space needed by each piece of data being encrypted separately from other pieces.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric key encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Embodiment 1: as figure 1 As shown, an asymmetric key encryption method, first divides the plaintext of any length into groups according to the byte length, each group is 256bit, divides 256bit into 2 groups according to 128bit; then divides the key into each group of 128bit, and uses The key processes the plaintext, and only cyclically encrypts the plaintext processed by the previous group. The number of cycles of the main cycle is M / 256*2, where M is the length of the original text after processing, and each cycle contains 256 / 128*2 = 4 subcycles.

[0037] The specific steps are:

[0038] Step1: Increase the amount of initially obtained data;

[0039] Take the remainder of the original plaintext length according to the byte length of 1024bit, and fill the plaintext. After filling, the length of the information is (1024*N+896)bit, fill the original plaintext length with 128bit, and the length of the processed information is 1024* (N+1)bit.

[0040] Step2: Data ini

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an asymmetric key encryption method, and belongs to the technical field of electrical communication and improved algorithm optimization. Firstly, plaintexts of any length are grouped according to the byte length, each group is 256 bits, the 256 bits are divided into two groups according to 128 bits, and only the plaintexts processed in the previous group are subjected to cyclic encryption; and the keys with any length are grouped according to the byte length, each group has 128 bits, the circulation direction and the single circulation digit in the iteration process are controlled by the keys, and plaintext data corresponding to the keys are encrypted one by one. According to the method, primary circulation is improved into secondary circulation, four used nonlinear functions are changed into two functions, the circulation process is simplified, and the calculation time is shortened; and the length of the key is increased from 32 bits to 128 bits, the complexity of the key is improved, iteration of the key has randomness and uncontrollability, and the safety of information transmission is improved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner KUNMING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products