One-time pad replaceable encryption algorithm, component and equipment based on password book

An encryption algorithm and codebook technology, applied in the application field of computer software encryption algorithm, can solve the problems of cumbersome key replacement, single algorithm, insecure key storage, etc., achieve effective management, highlight substantive features, and improve resistance to differential attacks effect of ability

Pending Publication Date: 2021-04-13
山东山大鸥玛软件股份有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above problems, the object of the present invention is to provide a replaceable encryption algorithm, component and device based on a codebook, which can improve the software encryption algorithm of a single key, overcome the single algorithm, cumbersome key replacement, and cryptography. The shortcomings of insecure key storage, and the advantages of easy upgrade of software algorithm encryption algorithm, close integration with programs, and high efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-time pad replaceable encryption algorithm, component and equipment based on password book
  • One-time pad replaceable encryption algorithm, component and equipment based on password book
  • One-time pad replaceable encryption algorithm, component and equipment based on password book

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Such as figure 1 The shown one-time-pad alternative encryption algorithm based on codebook includes the following steps:

[0042] S1: Initialize the key space, use the general security component combined with the multi-thread mechanism to generate the key that meets the preset conditions, and generate the key store.

[0043] In order to improve the traditional single-key symmetric encryption algorithm, the concept of a key store is firstly introduced. The traditional single-key algorithm only supports a limited key store. This algorithm expands the key store to a large amount of space. Libraries are managed and utilized.

[0044] In order to further expand the key space and enhance the encryption strength, this encryption mechanism requires enough keys to participate in encryption and decryption, so it supports the generation of multiple keys, generally up to 16,777,216 = 2 24 A 128-bit symmetric key, each key 128bit = 16 bytes, 16,777,216*16 / 1024 = 262,144, only occu...

Embodiment 2

[0066] Based on Embodiment 1, the cipherbook-based one-time pad replaceable encryption algorithm proposed by the present invention can be packaged in an independent service component to provide external encryption and decryption services, and all algorithms, keystores, and encryption and decryption services are packaged. Form a black box, use the temporary storage medium to pass the initialization method, and after verifying the keystore to protect the encryption key, import the keystore into the server memory at one time, so that the keystore only exists in the memory, improving performance and security. The encryption algorithm is deployed in an independent service component, and the process of providing external encryption and decryption services is as follows: image 3 As shown, the encryption algorithm proposed by the present invention is equivalent to the core component of the software encryption server.

[0067] In addition, if Figure 4 As shown, the core components o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a one-time pad replaceable encryption algorithm, component and equipment based on a codebook, and the method comprises the steps: initializing a secret key space, generating a secret key meeting a preset condition through employing a universal safety component in combination with a multi-thread mechanism, and generating a secret key library; storing each group of generated secret key libraries in a secret key space in an encrypted file mode, and establishing an independent data channel for transmitting secret key library files; creating a secret key rotation mechanism in the encryption and decryption process, and randomly distributing a secret key in the secret key library in the encryption and decryption process; and scrambling the encryption process of the plaintext by adopting a random key. According to the invention, the software encryption algorithm with a single key can be improved, the defects of single algorithm, tedious key replacement and unsafe key storage are overcome, and the advantages of convenient upgrading, close combination with a program and high efficiency of the software encryption algorithm are exerted.

Description

technical field [0001] The invention relates to the application field of computer software encryption algorithms, and more specifically relates to a codebook-based one-time pad replaceable encryption algorithm, components and equipment. Background technique [0002] At present, the symmetric key encryption algorithm is mainly realized by two encryption and decryption methods, soft encryption based on software algorithm and hard encryption mode based on hardware encryption machine, each of which has its own shortcomings. [0003] The essence of software encryption is algorithm encryption key. The soft encryption key is generally stored in the program code or configuration file, and a fixed key is used for encryption. The encryption algorithm generally uses an open source algorithm, and the same encryption key is used for a long time. If the attacker obtains the key through brute force cracking or other attack methods, the entire encryption mechanism will be broken, and the co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/46
CPCG06F21/602G06F21/46
Inventor 马磊袁峰江林
Owner 山东山大鸥玛软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products