CN101662363B - Multi-layer rolling code encryption and decryption technology - Google Patents
Multi-layer rolling code encryption and decryption technology Download PDFInfo
- Publication number
- CN101662363B CN101662363B CN2008101431269A CN200810143126A CN101662363B CN 101662363 B CN101662363 B CN 101662363B CN 2008101431269 A CN2008101431269 A CN 2008101431269A CN 200810143126 A CN200810143126 A CN 200810143126A CN 101662363 B CN101662363 B CN 101662363B
- Authority
- CN
- China
- Prior art keywords
- encryption
- key
- decryption
- numerical value
- rolling code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention discloses multi-layer rolling code encryption and decryption technology. For overcoming the drawbacks of low anti-attack capacity, low adaptability and the like of the prior encryption and decryption technology of the same kind, the multi-layer code encryption and decryption technology adopts an encryption algorithm to perform the multi-layer nested rolling code encryption operation of privacy and a key, the code of a factory, a serial number and the like as well as two synchronous count values to obtain a final output cipher text, and adopts a decryption algorithm to perform the two-layer rolling code decryption of the received cipher text by using the key generated by the privacy and the key, the code of the factory, the serial number and the like to obtain the two synchronous count values, checks the two synchronous count values respectively, enables the two synchronous count values to pass through a synchronous count value dual-time window and determines the decryption is valid if the two synchronous count values meet matching requirements. The multi-layer rolling code encryption and decryption technology in the invention can be applied to key-free access control systems of automobiles, storehouses, houses and other important occasions, also can be applied in the field of data encryption and transmission ofbanks, securities, communications and the like, and is high in reliability, good in security, strong in anti-attack capacity, high in privacy and convenient in use.
Description
Technical field
The present invention relates to the adding of a kind of data encryption transmission, decryption technology, be specially a kind of multi-layer rolling code encryption and decryption technology.
Background technology
Civilian point-to-point wireless or cable data transmission technology is widely used in the keyless door guard system in automobile, warehouse, house and other important places; Also can be used for data encryption transmission fields such as bank, security, communication.
In recent years, obtained tremendous development, promoted civilian Point-to-Point Data Transmission coding techniques and developed to rolling code, eliminated the relatively poor fixed code technology of confidentiality basically by fixed code based on the research of the encoding and decoding IC security mechanism of AES.The most successful typical case's representative is the KEELOQ technology of U.S. Microship company; It has been created a kind of changeableization and (has calculated for 10 times to work every day; Work and do not send duplication code in 18 years), anti-intercept and capture, anti-ly duplicate, anti-coded scanning, fail safe is good, reliability is high non-linear rolling code encryption and decryption technology (be the individual layer rolling code encryption and decryption technology; It represents chip is HCS300), be the one preferred technique that present remote control does not in the world have key gate inhibition RKE field.
The fixed code confidentiality is poor, only need simply duplicate or scanning technique can be broken through easily, has huge potential safety hazard.Although the fixed code technology is eliminated abroad, the not too high place (comprising the data transmission system that some is important) of some security requirements is still in a large amount of uses at home.
HCS300 based on the non-linear rolling code encryption and decryption technology of KEELOQ (being the individual layer rolling code encryption and decryption technology) also comes with some shortcomings: the one, and the enciphered data of chip must write in advance; User's personal information can't follow-uply write; Limit range of application, caused the inconvenience in the use; The 2nd, HCS300 has technological leak, the harm secret and safe.For example: manufacturer's key (core key) is in case leak the huge disaster that possibly cause whole system to collapse.Simultaneously, also exist and utilize its leak to duplicate, thereby break through the possibility of its safe key.For example the gate inhibition that car clique breaks through a certain vehicle is stolen in 07 year northeast one, and can open car door second surplus in the of 20, steals nearly hundred in car half a year; The case that the gate control system that a certain vehicle has also taken place for 08 year Guangdong, Hunan is broken; The 3rd, HCS300 does not have the Error detection function, and in the use, in a single day error code appears in transfer of data, and consequence is equally very serious.
Summary of the invention
The object of the invention will overcome above-mentioned deficiency exactly; A kind of multi-layer rolling code encryption and decryption technology is provided; Use this encryption and decryption technology, the user can be provided with or revise secret flexibly and easily, takes secret and public close (key, producer's coding, sequence number etc.) two layers of protection; Multilayer nest rolls to encrypt and transmits, and reliability is higher, fail safe is better, anti-attack ability is stronger, confidentiality is higher, use is more convenient.
For achieving the above object, technical scheme of the present invention is that this multi-layer rolling code encryption and decryption technology comprises the steps:
(1) AES
A. with the rolling code AES synchronometer numerical value 2 and secret are carried out the encryption of top layer rolling code, obtain enciphered data 2;
B. with key schedule to enciphered data 2 and key handle new key;
C. with new key synchronometer numerical value 1 is carried out the encryption of bottom rolling code, get and export ciphertext to the end, promptly enciphered data 1;
D. this enciphered data 1 is formed the transmission sign indicating number with information code and sequence number, sends together.
(2) decipherment algorithm
A. check sequence number;
B. with generating algorithm secret, key, producer's coding are handled, generated new key;
C. the enciphered data 1 that the new key that generates with step b receives decoder is carried out the bottom deciphering, obtains synchronometer numerical value 1 and bottom decrypting ciphertext;
D. with secret the bottom decrypting ciphertext is carried out the top layer decryption processing, get synchronometer numerical value 2;
E. synchronometer numerical value 1 and synchronometer numerical value 2 are checked, if satisfy the coupling requirement, then through two synchronometer numerical value time windows, deciphering effectively;
If f. deciphering is effectively then carried out the instruction that information code is represented.
Carry out in the process of decryption processing at bottom and top layer, can obtain synchronometer numerical value 1 and synchronometer numerical value 2 respectively, these two synchronometer numerical value all need satisfy the requirement of time window coupling separately.Otherwise decrypting process can stop automatically, and it is invalid to decipher.The rotational angular velocity of dual-time window is different.Like this, strengthen the confidentiality and the anti-attack ability of encrypting and deciphering system greatly, also made the time cycle of sending duplication code extend to last a century.
The present invention is according to the grouping symmetric encipherment algorithm; And combined multilayer nest and non-linear hopping code, i.e. two layers of nested rolling coding algorithm, top layer is a secret rolling coding layer; Bottom is nested into the secret rolling code in the key that is generated by sequence number and producer's coding; Form new key, pass through the rolling encryption again, get the coded word of sending to the end.
In two layers of nested rolling coding process, used the encryption of two synchronometer numerical value, to have only when satisfying the requiring of two synchronometer numerical value time windows, decoding could effectively be carried out.
The utilization of two synchronometer numerical value time window technology; Make the time cycle of sending duplication code in theory extend to last a century; Substantially exceed 18 years of existing (individual layer) hopping code; Like this, strengthened the confidentiality and the anti-attack ability of encrypting and deciphering system greatly, made intercepting and capturing, duplicate, coded scanning and the equiprobable attack means complete failure of retransmission mechanism.
32 frame hoppings of bilayer that the present invention generates the quadratic nonlinearity AES and 24 bit sequence number, 4 information codes and flag bit etc. are combined; Form one 64 coded word, the transmission of secret takes nested type rolling cipher mode to carry out (quadratic nonlinearity rolling code encryption technology).User's secret is participated in the adding of multilayer rolling code, decrypting process, can effectively prevent to have improved the confidentiality and the applicability of system greatly because public close (key, producer's coding, sequence number etc.) leakage causes the harm that whole system is collapsed.
Key, sequence number and other significant datas that the present invention uses all leave in the various types of memory of design in the CPLD sheet, can not conduct interviews to it through any outside connection; Can prevent the attempt of any illegal steal information; Reliability is high, and fail safe is good, strong security.
Embodiment
Embodiment 1
Multi-layer rolling code encryption and decryption technology of the present invention can be implemented through CPLD/FPGA chip or other programming devices, and step is following:
(1) AES
A. with the rolling code AES synchronometer numerical value 2 and secret are carried out the encryption of top layer rolling code, obtain enciphered data 2;
B. with key schedule to enciphered data 2 and key handle new key;
C. with new key synchronometer numerical value 1 is carried out the encryption of bottom rolling code, get and export ciphertext to the end, promptly enciphered data 1;
D. this enciphered data 1 is formed the transmission sign indicating number with information code and sequence number, sends together.
(2) decipherment algorithm
A. check sequence number;
B. with generating algorithm secret, key, producer's coding are handled, generated new key;
C. the enciphered data 1 that the new key that generates with step b receives decoder is carried out the bottom deciphering, obtains synchronometer numerical value 1 and bottom decrypting ciphertext;
D. with secret the bottom decrypting ciphertext is carried out the top layer decryption processing, get synchronometer numerical value 2;
E. synchronometer numerical value 1 and synchronometer numerical value 2 are checked, if satisfy the coupling requirement, then through two synchronometer numerical value time windows, deciphering effectively;
If f. deciphering is effectively then carried out the instruction that information code is represented.
Claims (1)
1. a multi-layer rolling code encryption and decryption method is characterized in that it comprises the steps:
(1) encrypting step
A. with the rolling code AES synchronometer numerical value 2 and secret are carried out the encryption of top layer rolling code, obtain enciphered data 2;
B. with key schedule to enciphered data 2 and key handle new key;
C. the new key that generates with step b is carried out the encryption of bottom rolling code to synchronometer numerical value 1, gets and exports ciphertext to the end, and promptly enciphered data 1;
D. this enciphered data 1 is formed the transmission sign indicating number with information code and sequence number, sends together;
(2) decryption step
E. check sequence number;
F. with generating algorithm secret, key, producer's coding are handled, generated new key;
G. the enciphered data 1 that the new key that generates with step f receives decoder is carried out the bottom deciphering, obtains synchronometer numerical value 1 and bottom decrypting ciphertext;
H. with secret the bottom decrypting ciphertext is carried out the top layer decryption processing, get synchronometer numerical value 2;
I. synchronometer numerical value 1 and synchronometer numerical value 2 are checked, if satisfy the coupling requirement, then through two synchronometer numerical value time windows, deciphering effectively;
If j. deciphering is effectively then carried out the instruction that information code is represented.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101431269A CN101662363B (en) | 2008-08-30 | 2008-08-30 | Multi-layer rolling code encryption and decryption technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101431269A CN101662363B (en) | 2008-08-30 | 2008-08-30 | Multi-layer rolling code encryption and decryption technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101662363A CN101662363A (en) | 2010-03-03 |
CN101662363B true CN101662363B (en) | 2012-11-07 |
Family
ID=41790171
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008101431269A Expired - Fee Related CN101662363B (en) | 2008-08-30 | 2008-08-30 | Multi-layer rolling code encryption and decryption technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101662363B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101931523A (en) * | 2010-05-10 | 2010-12-29 | 胡章儒 | Inversed chip-stage decoding time synchronization rolling codes |
CN102568062B (en) * | 2011-09-29 | 2014-06-18 | 浙江吉利汽车研究院有限公司 | Encryption and decryption method for remote controller |
CN103178958B (en) * | 2012-11-23 | 2015-11-18 | 怀化学院 | Based on the file encryption-decryption device of multilayer rolling code |
CN104283674A (en) * | 2014-10-27 | 2015-01-14 | 北海市蕴芯电子科技有限公司 | TTF RFID with both rolling code and secret key encrypted |
CN107393277A (en) * | 2017-08-28 | 2017-11-24 | 江苏赫奕科技有限公司 | Method of sending and receiving based on low-power consumption safe mode des encryption rolling code |
CN107579824B (en) * | 2017-10-13 | 2021-03-12 | 车展交通器材(台山)有限公司 | Automobile remote control method based on rolling code |
CN107749795B (en) * | 2017-10-13 | 2021-03-30 | 车展交通器材(台山)有限公司 | Automobile remote control method based on rolling code secondary encryption |
CN109309571A (en) * | 2018-11-13 | 2019-02-05 | 厦门云拓智维科技有限公司 | A kind of setting method of key |
CN112019567A (en) * | 2020-10-14 | 2020-12-01 | 深圳瀚飞科技开发有限公司 | Repeated exclusion encryption system and communication method for networking communication equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1752996A (en) * | 2004-09-24 | 2006-03-29 | 比亚迪股份有限公司 | Identity recognition system for keyless entering automobile and its recognition method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7231041B2 (en) * | 2003-08-19 | 2007-06-12 | General Motors Corporation | Method, device, and system for secure motor vehicle remote keyless entry |
WO2007137246A2 (en) * | 2006-05-22 | 2007-11-29 | Continental Automotive Systems Us, Inc. | Method of operating multiple vehicles using any transmitter from a programmed group |
-
2008
- 2008-08-30 CN CN2008101431269A patent/CN101662363B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1752996A (en) * | 2004-09-24 | 2006-03-29 | 比亚迪股份有限公司 | Identity recognition system for keyless entering automobile and its recognition method |
Non-Patent Citations (4)
Title |
---|
Keeloq滚动码加密安全系统的开发设计;唐明星等;《江西农业大学学报》;20011231;第23卷(第05期);32-35 * |
何此昂等.远程无钥匙进入系统的方案设计.《单片机与嵌入式系统应用》.2006,(第12期), |
唐明星等.Keeloq滚动码加密安全系统的开发设计.《江西农业大学学报》.2001,第23卷(第05期), |
远程无钥匙进入系统的方案设计;何此昂等;《单片机与嵌入式系统应用》;20061231(第12期);49-51 * |
Also Published As
Publication number | Publication date |
---|---|
CN101662363A (en) | 2010-03-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101662363B (en) | Multi-layer rolling code encryption and decryption technology | |
US8577042B2 (en) | Location-based security, privacy, access control and monitoring system | |
CN108055235A (en) | A kind of control method of smart lock, relevant device and system | |
CN104851159B (en) | A kind of network-type access control system | |
CN102968835A (en) | Large-capacity digital door lock management and control system for remote authorization | |
CN102855504A (en) | Method and device for ownership transfer of radio frequency identification (RFID) tag | |
CN101265769B (en) | Password distant control lock control system based on AES cryptographic algorithm and control method | |
CN101656748A (en) | Second-generation ID card online inquiry system and method based on secure network | |
CN107276748A (en) | A kind of keyless entry of automobile and the key derivation process of activation system | |
CN104123777B (en) | A kind of gate inhibition's remote-authorization method | |
CN103593892A (en) | Challenge response and symmetrical encryption based electronic lock unlocking method | |
CN102857503B (en) | A kind of safe finger print data radio transmitting method | |
CN103106714B (en) | Based on method for unlocking and the system of hand-held terminal device PDA and fingerprint identification technology | |
CN108288315A (en) | A kind of smart lock control system, open method and storage medium | |
CN104282060A (en) | Method for unlocking safety intelligent lock system | |
CN104282059A (en) | Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods | |
CN2938591Y (en) | Remote control device of uneasy deciphering cipher | |
CN104361667A (en) | Door access control system based on 4G communication and door access authorization method of door access control system | |
CN101452536B (en) | Encrypting method for applying to container data communication | |
CN102694655A (en) | Hardware anti-counterfeiting method for LKJ monitoring device | |
CN103178958B (en) | Based on the file encryption-decryption device of multilayer rolling code | |
CN105298250A (en) | Door lock remote control system | |
CN101281504A (en) | Hard disc enciphering system based on MEMS enciphered lock and FPGA | |
CN107749795A (en) | A kind of vehicle remote control method of the secondary encryption based on rolling code | |
CN201289713Y (en) | Decipher circuit for multilayer rolling code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20121107 Termination date: 20170830 |
|
CF01 | Termination of patent right due to non-payment of annual fee |