Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Novel password

A new type of cipher and encoding technology, applied in the field of cipher compilation, can solve problems such as defeating attempts, low cost, and information errors received by the receiver, and achieve the effects of great business prospects, wide practicability, and easy decoding

Pending Publication Date: 2020-03-31
李君池
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (5) However, there are some problems in quantum cryptography as follows: (The reason why we copy these problems in quantum cryptography from the Internet is not to attack and slander, but to compare and contrast, so as to facilitate the improvement and improvement of Hange cipher Complete
Therefore, efficient photon detectors must be used in quantum cryptography to reduce the system's own errors and thwart the attempts of potential eavesdroppers
[0011] ②In addition, even when there is no eavesdropper in the quantum cryptography system, due to the system's own errors, the information received by the receiver will have some errors
This also weakens the technical advantages of quantum cryptography to a certain extent
[0012] ③ The non-technical issues that hinder quantum cryptography from being practical are economic issues, because quantum key distribution technology has to compete with some traditional methods to obtain the market, and these traditional methods are lower in long-distance and cost, Therefore, the key distribution technology of quantum cryptography is at a disadvantage
Due to some of the above problems in quantum cryptography, it is difficult for quantum cryptography to quickly enter the commercial field in the short term

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel password
  • Novel password
  • Novel password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] When the present invention is actually implemented, writing the Hange cipher must rely on the mathematical formula for Goldbach's conjecture equation.

[0031] The formula for finding Goldbach’s conjecture equation is as follows: Suppose n is an even number greater than 6, the Goldbach’s conjecture equation can be obtained by the following formula: (This formula is my original creation, published on "Science Network" and "Strength Country Forum" )

[0032]

[0033] In the above formula:

[0034] (1) G(n) indicates the number of times Goldbach's conjecture can be established when n is an even number greater than 6;

[0035] (2) Indicates the number of odd numbers in the lower half area, when the value is not an integer, use the rounding method to round up;

[0036] (3) Indicates the number of all qualified odd composite numbers in the lower half area, and only the first one appears when there is overlap;

[0037] (4) Indicates the number of "prime composite n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a novel password. The novel password comprises the following steps: (1) firstly, encoding and encrypting Chinese characters (generally adopting 4-6 Arabic numerals); (2) the first encryption result is one of a telegram code, a Chinese character code and a self-encoding; (3) substituting the coded numbers of the Chinese characters into a Goldbach conjecture equation for secondary encryption, wherein the secondary encryption mode is a self-set calculation mode; and (4) performing three-level or four-level encryption on the data obtained in the Goldbach conjecture equation(which can be set according to the requirement of secrecy) to obtain a novel Hange password. Compared with the prior art, the method has the advantage that any two different even numbers have different guessing equations. Therefore, the Chinese-wikstroemia password based on the wikstroemia password has regularity and uniqueness.

Description

technical field [0001] The invention relates to the field of cipher compilation, in particular to a new type of cipher. Background technique [0002] 1. There is a major problem of uncoded availability in the field of encryption in today's era. [0003] (1) In the 1970s, three American mathematicians proposed a new encoding method called RSA code. At that time, the three inventors also announced a cipher with 129 digits and offered a reward of $100 to decipher it. They predicted that it would take at least 20,000 years for people to decipher it. Even if the performance of the computer is improved by a hundred times, it will take 200 years. But only less than 18 years later, the code was deciphered. [0004] In the face of quantum computers with supercomputing capabilities, the self-righteous super passwords of human beings are being cracked again and again, and people are becoming more and more anxious and uneasy: the current encryption system based on the difficulty of so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/46G06F21/60
CPCG06F21/46G06F21/602
Inventor 李君池
Owner 李君池
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products