Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Novel authentication mechanism for encrypting vector

An encryption authentication, vector technology, applied in the basic field of information security

Inactive Publication Date: 2014-01-08
冯振周
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among the two existing cryptographic technologies, 3DES, IDEA, and AES belong to single-key secrecy, RSA, DSS, ECC, etc. belong to public key signature, and comprehensive types such as PGP, PKI, IPsec, etc. belong to the combined application of two cryptographic systems. The biggest flaw of the application technology is that it separates encryption and authentication, cannot effectively link users and cryptographic systems, and is difficult to resist third-party attacks
Moreover, the implementation of these technologies is inefficient, complicated and cumbersome, and key management is a major problem in the world

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel authentication mechanism for encrypting vector
  • Novel authentication mechanism for encrypting vector
  • Novel authentication mechanism for encrypting vector

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0162]After the legal decryptor receives the ciphertext information, start the software module and choose to decrypt, and then tell the system the location of the ciphertext. The software first takes out the space code of the legal destination in the head and compares it with the space code of the machine. If they are the same, then The sink is authenticated, and then uses the encryptor's space code to retrieve the last digital relay key from the communication database to decrypt the ciphertext header. If the header checksum is correct, use the subsequent header data to apply to the hardware key regenerator. To solve the key regeneration, the key regenerator first starts the space exchange unit to exchange the position of the internal / external space code, and then sends the internal / external space code, key material and migration constant to the nonlinear sequence encoder to generate the seed key, and then passes The key is amplified and crushed, and the qualified decryption ke...

Embodiment 2

[0172] After the terminal PTM module of user B receives the ciphertext information, it takes out the space code of the legal destination and compares it with itself, so as to confirm that the legal destination is itself, obtains the verification data from the decryption of the ciphertext header, and judges that the data is valid according to the header checksum Then, send the follow-up source space code, random key material and encryption mode to the key regenerator to regenerate the decryption vector key, decrypt the ciphertext information, obtain the digital baton, plaintext and checksum, and based on the calibration Whether the checksum is correct or not disposes of the plaintext.

[0173] If the checksum is wrong, it means that the obtained ciphertext information has been tampered with, then discard the plaintext; if the checksum is correct, then judge whether the obtained plaintext information is a replay of past information according to the digital baton, and discard the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a novel vector encryption authentication mechanism and relates to a vector cryptography method, belonging to the technical field of information security. The method comprises the following steps: a cipher system selects a large number encryption key space M which is twice divided into 2<N>*2<N> encryption key subspaces which are provided with 2<M-2N> vectors with different orientations in order that each cipher system of the system possesses a unique encryption key subspace and a unique decryption key subspace; according to the method, the novel vector encryption authentication mechanism can be constructed; the mechanism adopts a hardware tamperproof encryption key generation / regeneration technology to realize the secondary division of the large number encryption key space and endow the encryption key with vector property; and the mechanism adopts a dissymmetrical symmetric algorithm array for encryption / decryption, thereby realizing high strength security, anti-replay, integral control, identity authentication and digital signature and having no problem of the management of the encryption key.

Description

technical field [0001] The invention belongs to the basic technical field of information security, and specifically relates to a vector cipher encoding method and a novel vector cipher authentication mechanism constructed by the method. Background technique [0002] Cryptography technology is one of the main basic technologies for ensuring the security of information networks today. According to the different forms of keys used, cryptographic technology can be divided into symmetric cryptosystems and asymmetric cryptosystems or single-key (private key) cryptosystems and double-key (public key) cryptosystems. key) cryptographic system. In today's network environment, in order to ensure the security of information network and information, it is necessary to use cryptographic technology in order to realize the confidentiality of information, the identity authentication of information generators, digital signatures to prevent repudiation, and digital fingerprints to prevent inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/22H04L9/32H04L9/30
Inventor 于军谷海红尤晓琳王军金爱花刘武洲冯振周
Owner 冯振周
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products