By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path ...By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path encryption. We present permutation code encryption which is based on path encryption. Now permutation code encryption is a patent of Chinese invention. In Permutation Code Encryption, we use a pseudo-random sequence of the keys to control the paths. The simulation result shows that for n-bit block the encryption strength is novel higher than 2^n and the algorithm can finish the encryption of one block in 7.5 ns, which is unrelated with the block length.展开更多
First this paper introduces the kinds of category of Cipher and the current situation of the Block Cipher. Then it talks about the old concepts holding back the Block Cipher and presents a new concept. Finally, it int...First this paper introduces the kinds of category of Cipher and the current situation of the Block Cipher. Then it talks about the old concepts holding back the Block Cipher and presents a new concept. Finally, it introduces our patent-Permutation Code and the Encipher/Decipher. Its encryption strength exceeds 2^N. With DES having been proved unsafe, we should not enhance the encryption strength just by increasing its block length just as AES does.展开更多
In view of the fact that the quantum computer attack is not considered in the cloud storage environment,this paper selects the code-based public key encryption scheme as the security protection measure in the cloud st...In view of the fact that the quantum computer attack is not considered in the cloud storage environment,this paper selects the code-based public key encryption scheme as the security protection measure in the cloud storage.Based on random linear code encryption scheme,it employs the structure of the RLCE scheme and Polar code polarization properties,using the Polar code as underlying encoding scheme,through the method of RLCEspad,putting forward a kind of improved public key encryption scheme which considers semantic security and is resistant to adaptively chosen ciphertext attacks.The improved scheme is applied to cloud storage to ensure that the storage environment will not be attacked by quantum computer while ensuring the confidentiality,availability and reliability.展开更多
文摘By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path encryption. We present permutation code encryption which is based on path encryption. Now permutation code encryption is a patent of Chinese invention. In Permutation Code Encryption, we use a pseudo-random sequence of the keys to control the paths. The simulation result shows that for n-bit block the encryption strength is novel higher than 2^n and the algorithm can finish the encryption of one block in 7.5 ns, which is unrelated with the block length.
文摘First this paper introduces the kinds of category of Cipher and the current situation of the Block Cipher. Then it talks about the old concepts holding back the Block Cipher and presents a new concept. Finally, it introduces our patent-Permutation Code and the Encipher/Decipher. Its encryption strength exceeds 2^N. With DES having been proved unsafe, we should not enhance the encryption strength just by increasing its block length just as AES does.
基金the National Natural Science Foundation of China(No.61572521)The Scientific Foundation of the Scientific Research and Innovation Team of Engineering University of PAP(No.KYTD201805).
文摘In view of the fact that the quantum computer attack is not considered in the cloud storage environment,this paper selects the code-based public key encryption scheme as the security protection measure in the cloud storage.Based on random linear code encryption scheme,it employs the structure of the RLCE scheme and Polar code polarization properties,using the Polar code as underlying encoding scheme,through the method of RLCEspad,putting forward a kind of improved public key encryption scheme which considers semantic security and is resistant to adaptively chosen ciphertext attacks.The improved scheme is applied to cloud storage to ensure that the storage environment will not be attacked by quantum computer while ensuring the confidentiality,availability and reliability.