Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method of using multidimensional technology to perform secret key encryption

A key encryption and key technology, which is applied to key distribution, can solve problems such as easy forgetting of passwords or keys, insufficient security performance of passwords or keys, loss of passwords or keys, etc., to achieve easy use and difficulty in cracking Large, easy-to-memory effect

Active Publication Date: 2016-07-13
INSPUR FINANCIAL INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this patent has the problem that the password or key is easy to forget, resulting in the loss of the password or key, and the security performance of the password or key is not high enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of using multidimensional technology to perform secret key encryption
  • Method of using multidimensional technology to perform secret key encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] A kind of method that uses multi-dimensional technology to carry out key encryption of the present invention, comprises the following steps:

[0027] (1) Call the function MDS_InitEncryptionKeyManager() to initialize the data operation environment of the multi-dimensional key;

[0028] (2) Call the function MDS_ReadUserPassword() to read the key and geometric characteristics entered by the user; read the key and geometric characteristics entered by the user, including key bits and corresponding geometric structures;

[0029] (3) Call the function MDS_ReadExtSettings() to read the additional encryption level configuration of the key. If there is no additional encryption level configuration, NULL will be returned; the additional confidentiality level configuration of the key includes the configuration of the key rotation angle and micro determinants information;

[0030] (4) Call the function MDS_CreateMDSPassword() to create a multi-dimensional key according to the key ...

Embodiment 2

[0033] as attached figure 1 As shown, the same group of 6-digit keys can be projected onto different surfaces of the spatial geometry in the multi-dimensional space, and these spatial geometric correspondences can reduce the complexity of the original 6-digit key Upgrade to the security level of 26-bit key, which greatly increases the difficulty of cracking (the cracking time of 26-bit pure digital key is about 7920000000 years).

[0034] The calculation formula for complexity improvement: v=2*k+(k-1)*(n-2), where v is the number of key digits after complexity improvement, k is the number of non-contact surfaces of spatial geometry, and n is the number of geometry .

[0035] The above process of increasing the number of digits of the key will not greatly increase the difficulty of memory for the user. The user only needs to assign different digits to the corresponding geometric surface on the basis of setting the traditional 6-digit key to complete the key upgrade process. ,...

Embodiment 3

[0037] When the level of the key in Embodiment 2 still cannot meet the requirements, in addition to increasing the original length of the key, the security factor of the key can be further greatly improved by determining the level of the cluster determined by the surface identification of the key. Set the unlocking process of the key to 90° to the left for authentication, and the level of the surface identification determinant is determined by the number of bits of the binary data that constitutes the surface of the geometry, as shown in the attached figure 2 As shown, because the keys to be stored are 1, 2, 3, 4, 5, 6 respectively, the number of bits constituting the fixed point of the geometry can adopt the default value of 2, so the length of each number of bits on the surface of the geometry is 8, that is Arbitrary values ​​in ASCII encoding can be stored.

[0038] When the ASCII digit length cannot meet the requirements of the security level, more digit information can b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method of using the multidimensional technology to perform secret key encryption, belonging to a secret key encryption method, and aims at solving the technical problems of improving secret key encryption security, and meanwhile facilitating user memory and use. The technical scheme comprises the steps of: (1) invoking a function MDS_InitEncryptionKeyManager () and initializing multidimensional secret key data operation environments; (2) invoking a function MDS_ReadUserPassword (), and reading the secret key inputted by a user and geometrical characteristics; and (3) invoking a function MDS_ReadExtSettings (), reading additional encryption level configuration of a secret key, and returning to NULL if the additional encryption level configuration does not exist.

Description

technical field [0001] The invention relates to a key encryption method, in particular to a key encryption method using multi-dimensional technology. Background technique [0002] With the continuous development of computer hardware computing power, the traditional key security certification system is no longer enough to protect the security of private data. Taking the simplest 6-digit password as an example (such as bank password), under the premise of using a dual-core CPU ordinary computer to crack, the cracking tool can crack the key instantly (0.00025 seconds), and 10 passwords need 0.025 seconds , compared to 0.1 seconds and 16 minutes in 2011. It takes 0.077 seconds for a 6-digit passcode and 9 hours for a 10-digit passcode, compared to 30 seconds and 163 days in 2011. [0003] It can be seen that although increasing the length and complexity of the key can effectively increase the time cost of cracking the key, with the continuous improvement of computer hardware c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0861H04L9/3226
Inventor 王红娟董毅李光瑞王玉奎
Owner INSPUR FINANCIAL INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products