CN101662363B - Multi-layer rolling code encryption and decryption technology - Google Patents

Multi-layer rolling code encryption and decryption technology Download PDF

Info

Publication number
CN101662363B
CN101662363B CN2008101431269A CN200810143126A CN101662363B CN 101662363 B CN101662363 B CN 101662363B CN 2008101431269 A CN2008101431269 A CN 2008101431269A CN 200810143126 A CN200810143126 A CN 200810143126A CN 101662363 B CN101662363 B CN 101662363B
Authority
CN
China
Prior art keywords
encryption
key
decryption
numerical value
rolling code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008101431269A
Other languages
Chinese (zh)
Other versions
CN101662363A (en
Inventor
张小溪
张涛
张学斌
吴庆麟
张乐冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaihua University
Original Assignee
Huaihua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaihua University filed Critical Huaihua University
Priority to CN2008101431269A priority Critical patent/CN101662363B/en
Publication of CN101662363A publication Critical patent/CN101662363A/en
Application granted granted Critical
Publication of CN101662363B publication Critical patent/CN101662363B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention discloses multi-layer rolling code encryption and decryption technology. For overcoming the drawbacks of low anti-attack capacity, low adaptability and the like of the prior encryption and decryption technology of the same kind, the multi-layer code encryption and decryption technology adopts an encryption algorithm to perform the multi-layer nested rolling code encryption operation of privacy and a key, the code of a factory, a serial number and the like as well as two synchronous count values to obtain a final output cipher text, and adopts a decryption algorithm to perform the two-layer rolling code decryption of the received cipher text by using the key generated by the privacy and the key, the code of the factory, the serial number and the like to obtain the two synchronous count values, checks the two synchronous count values respectively, enables the two synchronous count values to pass through a synchronous count value dual-time window and determines the decryption is valid if the two synchronous count values meet matching requirements. The multi-layer rolling code encryption and decryption technology in the invention can be applied to key-free access control systems of automobiles, storehouses, houses and other important occasions, also can be applied in the field of data encryption and transmission ofbanks, securities, communications and the like, and is high in reliability, good in security, strong in anti-attack capacity, high in privacy and convenient in use.

Description

Multi-layer rolling code encryption and decryption technology
Technical field
The present invention relates to the adding of a kind of data encryption transmission, decryption technology, be specially a kind of multi-layer rolling code encryption and decryption technology.
Background technology
Civilian point-to-point wireless or cable data transmission technology is widely used in the keyless door guard system in automobile, warehouse, house and other important places; Also can be used for data encryption transmission fields such as bank, security, communication.
In recent years, obtained tremendous development, promoted civilian Point-to-Point Data Transmission coding techniques and developed to rolling code, eliminated the relatively poor fixed code technology of confidentiality basically by fixed code based on the research of the encoding and decoding IC security mechanism of AES.The most successful typical case's representative is the KEELOQ technology of U.S. Microship company; It has been created a kind of changeableization and (has calculated for 10 times to work every day; Work and do not send duplication code in 18 years), anti-intercept and capture, anti-ly duplicate, anti-coded scanning, fail safe is good, reliability is high non-linear rolling code encryption and decryption technology (be the individual layer rolling code encryption and decryption technology; It represents chip is HCS300), be the one preferred technique that present remote control does not in the world have key gate inhibition RKE field.
The fixed code confidentiality is poor, only need simply duplicate or scanning technique can be broken through easily, has huge potential safety hazard.Although the fixed code technology is eliminated abroad, the not too high place (comprising the data transmission system that some is important) of some security requirements is still in a large amount of uses at home.
HCS300 based on the non-linear rolling code encryption and decryption technology of KEELOQ (being the individual layer rolling code encryption and decryption technology) also comes with some shortcomings: the one, and the enciphered data of chip must write in advance; User's personal information can't follow-uply write; Limit range of application, caused the inconvenience in the use; The 2nd, HCS300 has technological leak, the harm secret and safe.For example: manufacturer's key (core key) is in case leak the huge disaster that possibly cause whole system to collapse.Simultaneously, also exist and utilize its leak to duplicate, thereby break through the possibility of its safe key.For example the gate inhibition that car clique breaks through a certain vehicle is stolen in 07 year northeast one, and can open car door second surplus in the of 20, steals nearly hundred in car half a year; The case that the gate control system that a certain vehicle has also taken place for 08 year Guangdong, Hunan is broken; The 3rd, HCS300 does not have the Error detection function, and in the use, in a single day error code appears in transfer of data, and consequence is equally very serious.
Summary of the invention
The object of the invention will overcome above-mentioned deficiency exactly; A kind of multi-layer rolling code encryption and decryption technology is provided; Use this encryption and decryption technology, the user can be provided with or revise secret flexibly and easily, takes secret and public close (key, producer's coding, sequence number etc.) two layers of protection; Multilayer nest rolls to encrypt and transmits, and reliability is higher, fail safe is better, anti-attack ability is stronger, confidentiality is higher, use is more convenient.
For achieving the above object, technical scheme of the present invention is that this multi-layer rolling code encryption and decryption technology comprises the steps:
(1) AES
A. with the rolling code AES synchronometer numerical value 2 and secret are carried out the encryption of top layer rolling code, obtain enciphered data 2;
B. with key schedule to enciphered data 2 and key handle new key;
C. with new key synchronometer numerical value 1 is carried out the encryption of bottom rolling code, get and export ciphertext to the end, promptly enciphered data 1;
D. this enciphered data 1 is formed the transmission sign indicating number with information code and sequence number, sends together.
(2) decipherment algorithm
A. check sequence number;
B. with generating algorithm secret, key, producer's coding are handled, generated new key;
C. the enciphered data 1 that the new key that generates with step b receives decoder is carried out the bottom deciphering, obtains synchronometer numerical value 1 and bottom decrypting ciphertext;
D. with secret the bottom decrypting ciphertext is carried out the top layer decryption processing, get synchronometer numerical value 2;
E. synchronometer numerical value 1 and synchronometer numerical value 2 are checked, if satisfy the coupling requirement, then through two synchronometer numerical value time windows, deciphering effectively;
If f. deciphering is effectively then carried out the instruction that information code is represented.
Carry out in the process of decryption processing at bottom and top layer, can obtain synchronometer numerical value 1 and synchronometer numerical value 2 respectively, these two synchronometer numerical value all need satisfy the requirement of time window coupling separately.Otherwise decrypting process can stop automatically, and it is invalid to decipher.The rotational angular velocity of dual-time window is different.Like this, strengthen the confidentiality and the anti-attack ability of encrypting and deciphering system greatly, also made the time cycle of sending duplication code extend to last a century.
The present invention is according to the grouping symmetric encipherment algorithm; And combined multilayer nest and non-linear hopping code, i.e. two layers of nested rolling coding algorithm, top layer is a secret rolling coding layer; Bottom is nested into the secret rolling code in the key that is generated by sequence number and producer's coding; Form new key, pass through the rolling encryption again, get the coded word of sending to the end.
In two layers of nested rolling coding process, used the encryption of two synchronometer numerical value, to have only when satisfying the requiring of two synchronometer numerical value time windows, decoding could effectively be carried out.
The utilization of two synchronometer numerical value time window technology; Make the time cycle of sending duplication code in theory extend to last a century; Substantially exceed 18 years of existing (individual layer) hopping code; Like this, strengthened the confidentiality and the anti-attack ability of encrypting and deciphering system greatly, made intercepting and capturing, duplicate, coded scanning and the equiprobable attack means complete failure of retransmission mechanism.
32 frame hoppings of bilayer that the present invention generates the quadratic nonlinearity AES and 24 bit sequence number, 4 information codes and flag bit etc. are combined; Form one 64 coded word, the transmission of secret takes nested type rolling cipher mode to carry out (quadratic nonlinearity rolling code encryption technology).User's secret is participated in the adding of multilayer rolling code, decrypting process, can effectively prevent to have improved the confidentiality and the applicability of system greatly because public close (key, producer's coding, sequence number etc.) leakage causes the harm that whole system is collapsed.
Key, sequence number and other significant datas that the present invention uses all leave in the various types of memory of design in the CPLD sheet, can not conduct interviews to it through any outside connection; Can prevent the attempt of any illegal steal information; Reliability is high, and fail safe is good, strong security.
Embodiment
Embodiment 1
Multi-layer rolling code encryption and decryption technology of the present invention can be implemented through CPLD/FPGA chip or other programming devices, and step is following:
(1) AES
A. with the rolling code AES synchronometer numerical value 2 and secret are carried out the encryption of top layer rolling code, obtain enciphered data 2;
B. with key schedule to enciphered data 2 and key handle new key;
C. with new key synchronometer numerical value 1 is carried out the encryption of bottom rolling code, get and export ciphertext to the end, promptly enciphered data 1;
D. this enciphered data 1 is formed the transmission sign indicating number with information code and sequence number, sends together.
(2) decipherment algorithm
A. check sequence number;
B. with generating algorithm secret, key, producer's coding are handled, generated new key;
C. the enciphered data 1 that the new key that generates with step b receives decoder is carried out the bottom deciphering, obtains synchronometer numerical value 1 and bottom decrypting ciphertext;
D. with secret the bottom decrypting ciphertext is carried out the top layer decryption processing, get synchronometer numerical value 2;
E. synchronometer numerical value 1 and synchronometer numerical value 2 are checked, if satisfy the coupling requirement, then through two synchronometer numerical value time windows, deciphering effectively;
If f. deciphering is effectively then carried out the instruction that information code is represented.

Claims (1)

1. a multi-layer rolling code encryption and decryption method is characterized in that it comprises the steps:
(1) encrypting step
A. with the rolling code AES synchronometer numerical value 2 and secret are carried out the encryption of top layer rolling code, obtain enciphered data 2;
B. with key schedule to enciphered data 2 and key handle new key;
C. the new key that generates with step b is carried out the encryption of bottom rolling code to synchronometer numerical value 1, gets and exports ciphertext to the end, and promptly enciphered data 1;
D. this enciphered data 1 is formed the transmission sign indicating number with information code and sequence number, sends together;
(2) decryption step
E. check sequence number;
F. with generating algorithm secret, key, producer's coding are handled, generated new key;
G. the enciphered data 1 that the new key that generates with step f receives decoder is carried out the bottom deciphering, obtains synchronometer numerical value 1 and bottom decrypting ciphertext;
H. with secret the bottom decrypting ciphertext is carried out the top layer decryption processing, get synchronometer numerical value 2;
I. synchronometer numerical value 1 and synchronometer numerical value 2 are checked, if satisfy the coupling requirement, then through two synchronometer numerical value time windows, deciphering effectively;
If j. deciphering is effectively then carried out the instruction that information code is represented.
CN2008101431269A 2008-08-30 2008-08-30 Multi-layer rolling code encryption and decryption technology Expired - Fee Related CN101662363B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101431269A CN101662363B (en) 2008-08-30 2008-08-30 Multi-layer rolling code encryption and decryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101431269A CN101662363B (en) 2008-08-30 2008-08-30 Multi-layer rolling code encryption and decryption technology

Publications (2)

Publication Number Publication Date
CN101662363A CN101662363A (en) 2010-03-03
CN101662363B true CN101662363B (en) 2012-11-07

Family

ID=41790171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101431269A Expired - Fee Related CN101662363B (en) 2008-08-30 2008-08-30 Multi-layer rolling code encryption and decryption technology

Country Status (1)

Country Link
CN (1) CN101662363B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931523A (en) * 2010-05-10 2010-12-29 胡章儒 Inversed chip-stage decoding time synchronization rolling codes
CN102568062B (en) * 2011-09-29 2014-06-18 浙江吉利汽车研究院有限公司 Encryption and decryption method for remote controller
CN103178958B (en) * 2012-11-23 2015-11-18 怀化学院 Based on the file encryption-decryption device of multilayer rolling code
CN104283674A (en) * 2014-10-27 2015-01-14 北海市蕴芯电子科技有限公司 TTF RFID with both rolling code and secret key encrypted
CN107393277A (en) * 2017-08-28 2017-11-24 江苏赫奕科技有限公司 Method of sending and receiving based on low-power consumption safe mode des encryption rolling code
CN107579824B (en) * 2017-10-13 2021-03-12 车展交通器材(台山)有限公司 Automobile remote control method based on rolling code
CN107749795B (en) * 2017-10-13 2021-03-30 车展交通器材(台山)有限公司 Automobile remote control method based on rolling code secondary encryption
CN109309571A (en) * 2018-11-13 2019-02-05 厦门云拓智维科技有限公司 A kind of setting method of key
CN112019567A (en) * 2020-10-14 2020-12-01 深圳瀚飞科技开发有限公司 Repeated exclusion encryption system and communication method for networking communication equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1752996A (en) * 2004-09-24 2006-03-29 比亚迪股份有限公司 Identity recognition system for keyless entering automobile and its recognition method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7231041B2 (en) * 2003-08-19 2007-06-12 General Motors Corporation Method, device, and system for secure motor vehicle remote keyless entry
WO2007137246A2 (en) * 2006-05-22 2007-11-29 Continental Automotive Systems Us, Inc. Method of operating multiple vehicles using any transmitter from a programmed group

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1752996A (en) * 2004-09-24 2006-03-29 比亚迪股份有限公司 Identity recognition system for keyless entering automobile and its recognition method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Keeloq滚动码加密安全系统的开发设计;唐明星等;《江西农业大学学报》;20011231;第23卷(第05期);32-35 *
何此昂等.远程无钥匙进入系统的方案设计.《单片机与嵌入式系统应用》.2006,(第12期),
唐明星等.Keeloq滚动码加密安全系统的开发设计.《江西农业大学学报》.2001,第23卷(第05期),
远程无钥匙进入系统的方案设计;何此昂等;《单片机与嵌入式系统应用》;20061231(第12期);49-51 *

Also Published As

Publication number Publication date
CN101662363A (en) 2010-03-03

Similar Documents

Publication Publication Date Title
CN101662363B (en) Multi-layer rolling code encryption and decryption technology
US8577042B2 (en) Location-based security, privacy, access control and monitoring system
CN108055235A (en) A kind of control method of smart lock, relevant device and system
CN104851159B (en) A kind of network-type access control system
CN102968835A (en) Large-capacity digital door lock management and control system for remote authorization
CN102855504A (en) Method and device for ownership transfer of radio frequency identification (RFID) tag
CN101265769B (en) Password distant control lock control system based on AES cryptographic algorithm and control method
CN101656748A (en) Second-generation ID card online inquiry system and method based on secure network
CN107276748A (en) A kind of keyless entry of automobile and the key derivation process of activation system
CN104123777B (en) A kind of gate inhibition's remote-authorization method
CN103593892A (en) Challenge response and symmetrical encryption based electronic lock unlocking method
CN102857503B (en) A kind of safe finger print data radio transmitting method
CN103106714B (en) Based on method for unlocking and the system of hand-held terminal device PDA and fingerprint identification technology
CN108288315A (en) A kind of smart lock control system, open method and storage medium
CN104282060A (en) Method for unlocking safety intelligent lock system
CN104282059A (en) Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods
CN2938591Y (en) Remote control device of uneasy deciphering cipher
CN104361667A (en) Door access control system based on 4G communication and door access authorization method of door access control system
CN101452536B (en) Encrypting method for applying to container data communication
CN102694655A (en) Hardware anti-counterfeiting method for LKJ monitoring device
CN103178958B (en) Based on the file encryption-decryption device of multilayer rolling code
CN105298250A (en) Door lock remote control system
CN101281504A (en) Hard disc enciphering system based on MEMS enciphered lock and FPGA
CN107749795A (en) A kind of vehicle remote control method of the secondary encryption based on rolling code
CN201289713Y (en) Decipher circuit for multilayer rolling code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121107

Termination date: 20170830

CF01 Termination of patent right due to non-payment of annual fee