Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Random encryption method for decrypting by adopting exhaustion method

An encryption method and random key technology, which is applied in the field of random encryption, can solve the problems that password identification information cannot withstand attacks, cannot recover certificates and private keys, and is not easy to use.

Inactive Publication Date: 2011-04-13
刘海云
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing EFS method for exporting and importing certificates and private keys is not only difficult to use, so that many people are afraid to use EFS, but also the time spent on exporting and importing certificates and private keys, taking twice and placing mobile storage devices twice is on average within one hour. More than a minute, and the certificate and private key may not be recovered due to the loss of the mobile storage device, which makes many users stay away from EFS
On the other hand, when the known encryption method utilizes user identity information to encrypt plaintext, various algorithms are used to generate password identification information, and the verification of user identity information by using the password identification information provides convenience for the user, but also creates a problem for the cracker. Shortcuts are provided, and the cryptographic identification information is often vulnerable to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random encryption method for decrypting by adopting exhaustion method
  • Random encryption method for decrypting by adopting exhaustion method
  • Random encryption method for decrypting by adopting exhaustion method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0207] In order to distinguish it from ordinary files and information, information such as private keys, certificates, and important files that are encrypted and protected by the encryption method of the present invention are called important plaintext in this paper. The invention utilizes the user identity information and the random key to encrypt together, locks the random key and the user identity information in the password identification information, and adopts the measure of anti-cryptanalysis method when generating the password identification information. According to the encrypted ciphertext of the present invention, no matter how the cracker writes the decryption program, except for using the exhaustive method or the method combining the exhaustive method and the cryptanalysis technique, other cryptanalysis methods cannot be effectively used to decipher the ciphertext, even if In the case that the user identity information provided is correct, any decryption program fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a random encryption method for decrypting by adopting an exhaustion method, which is mainly used for encrypting backup keys, certificates and important documents. The random encryption method comprises the following encryption flow: inputting use identity information and encryption strength; calculating the random length of a random key and generating the random key of the random length according to the relationship among encryption strength and other factors; and encrypting the key and the certificate by using the user identity information and the random key according to the encryption algorithm to obtain backups of the encrypted key and certificate and locking the user identity information and the random key in password identification information by using the encryption algorithm determined by the program. The backups generated by the encryption method are decrypted by using the exhaustion method no matter how to write the decryption program even if the correct user identity is input; in addition, the user and the random key are required to be respectively compared. The method is not only applied to a stand-alone system, but also can be applied to key escrow services in clouds.

Description

technical field [0001] The invention relates to a random encryption method. The ciphertext encrypted by the encryption method needs to be decrypted by exhaustive method no matter how the decryption program is written. Background technique [0002] The advanced EFS (Encrypting File System, Encrypting File System) is adopted in the currently commonly used operating systems Windows XP and Windows Vista. After the certificate and private key in the cryptographic system are lost, the files encrypted by EFS cannot be decrypted. The encryption strength of the private key backup exported by EFS depends entirely on the password entered by the user during the process of exporting the private key. In order to ensure the security of certificate and private key backups, people using EFS often save backups in mobile storage devices. When the certificate and private key in the operating system are lost, users often need to rummage through boxes and cabinets to find a mobile storage devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00
CPCH04L9/30H04L2209/08
Inventor 刘海云
Owner 刘海云
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products