Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Random ciphering method which needs to be deciphered by exhaust algorithm

An encryption method and random key technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve the problems of random keys locked in password identification information, difficult to use, and kept at a distance.

Inactive Publication Date: 2009-07-22
刘海云
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing EFS method for exporting and importing certificates and private keys is not only difficult to use, so that many people are afraid to use EFS, but also the time spent on exporting and importing certificates and private keys, taking twice and placing mobile storage devices twice is on average within one hour. More than a minute, and the certificate and private key may not be recovered due to the loss of the mobile storage device, which makes many users stay away from EFS
On the other hand, when the known encryption method utilizes user identity information to encrypt plaintext, various algorithms are used to generate password identification information, and the verification of user identity information by using the password identification information provides convenience for the user, but also creates a problem for the cracker. Shortcuts are provided, and the cryptographic identification information is often vulnerable to attack
In addition, when the existing random encryption method generates password identification information, although the random key is encrypted, only the user identity information is locked in the password identification information, and the random key is not locked in the password identification information. Only need to compare the user identity information, do not need to compare the random key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random ciphering method which needs to be deciphered by exhaust algorithm
  • Random ciphering method which needs to be deciphered by exhaust algorithm
  • Random ciphering method which needs to be deciphered by exhaust algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0184] In order to distinguish it from ordinary files and information, information such as private keys, certificates, and important files that are encrypted and protected by the encryption method of the present invention are called important plaintext in this paper. The invention utilizes the user identity information and the random key to encrypt together, locks the random key and the user identity information in the password identification information, and adopts the measure of anti-cryptanalysis method when generating the password identification information. According to the encrypted ciphertext of the present invention, no matter how the cracker writes the decryption program, except for using the exhaustive method or the method combining the exhaustive method and the cryptanalysis technique, other cryptanalysis methods cannot be effectively used to decipher the ciphertext, even if In the case that the user identity information provided is correct, any decryption program fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an accidental ciphering method by using an exhaustion method to decipher, the method is designed based on increasing the ciphering strength for the user identification information and the accidental cipher key, the method is mainly used for ciphering a backup private key, a certificate and important files. The ciphering process flow comprises: inputting the user identification information and the ciphering strength; calculating the length of the accidental cipher key according to the relationships among the length of the accidental cipher key, the ciphering strength and the preset deciphering program speed and generating the accidental cipher key of the length; ciphering the private key and the certificate to obtain the backups of the ciphered private key and the ciphered certificate by using the user identification information and the accidental cipher key according to the ciphering algorithm determined by the program, and locking the user identification information and the accidental cipher key in the cipher recognition information by the ciphering algorithm determined by the program. The backup generated by the ciphering method, however, the writing of the deciphering program, even inputting the correct user identification information, the exhaustion method is also used for deciphering, and not only the user identification information needs to be compared, but also the accidental cipher keys need to be compared.

Description

technical field [0001] The invention relates to a random encryption method. The ciphertext encrypted by the encryption method needs to be decrypted by exhaustive method no matter how the decryption program is written. Background technique [0002] The advanced EFS (Encrypting File System, Encrypting File System) is adopted in the currently commonly used operating systems Windows XP and Windows Vista. After the certificate and private key in the cryptographic system are lost, the files encrypted by EFS cannot be decrypted. The encryption strength of the private key backup exported by EFS depends entirely on the password entered by the user during the process of exporting the private key. In order to ensure the security of certificate and private key backups, people using EFS often save backups in mobile storage devices. When the certificate and private key in the operating system are lost, users often need to rummage through boxes and cabinets to find a mobile storage devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00
CPCH04L9/32
Inventor 刘海云
Owner 刘海云
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products