CN103199998A - Combination of five non-logical hardware encryption methods for digital information - Google Patents

Combination of five non-logical hardware encryption methods for digital information Download PDF

Info

Publication number
CN103199998A
CN103199998A CN2013101349119A CN201310134911A CN103199998A CN 103199998 A CN103199998 A CN 103199998A CN 2013101349119 A CN2013101349119 A CN 2013101349119A CN 201310134911 A CN201310134911 A CN 201310134911A CN 103199998 A CN103199998 A CN 103199998A
Authority
CN
China
Prior art keywords
module
alienation
sequence
true form
kinds
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101349119A
Other languages
Chinese (zh)
Inventor
张国山
丛树业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN2013101349119A priority Critical patent/CN103199998A/en
Publication of CN103199998A publication Critical patent/CN103199998A/en
Pending legal-status Critical Current

Links

Abstract

The invention belongs to the domain of cryptology in the technical field of secret communication and relates to combination of five non-logical hardware encryption methods for digital information. The method combination comprises the following steps of: carrying out encryption processing on an original code sequence through a given encryption module by a sending terminal; sending encrypted information to a receiving terminal; and carrying out corresponding reverse decryption processing on the encrypted information through the corresponding encryption module by the receiving terminal after receiving the encrypted information, so as to restore the original code sequence, wherein the used functional modules are divided into five types according to different methods, a key database is prestored into hardware, and then the sending terminal and the receiving terminal respectively reserve one copy with the same content. According to the illogical hardware encryption method combination, the problem of the encryption is solved by solidifying the key database into the hardware, and the safety of the information is improved from a brand new cryptology point of view.

Description

The no logic hardware encryption method combination of five kinds of digital informations
Technical field
The invention belongs to the cryptography category in the private communication technology field, relate to five kinds of no logic hardware encryption method combinations that digital information is carried out.
Background technology
Aspect the information communication in government, military affairs, diplomacy, important commercial field etc., the safe transmission of information is the problem that becomes more and more important, aspect the cryptography that supports modern communication, instantly employed key one is limited length, the 2nd, recycle, and this all provides chance for the decoding work of usurping after the enciphered message, Duan Zhongke recovers key from the intercepting sign indicating number, this is a deficiency of present secure communication, and existing method is improved and augmented, and becomes very urgent and meaningful.
Summary of the invention
The technical problem to be solved in the present invention provides the encryption method that obtains after the hardware encryption method combination of no logic of five kinds of digital informations.Technical scheme of the present invention is as follows:
The no logic hardware encryption method combination of five kinds of digital informations is finished by following steps:
(1), transmitting terminal is encrypted processing with the true form sequence by the encrypting module of appointing;
(2), enciphered message is sent to receiving terminal;
(3), after receiving terminal receives enciphered message, the encrypting module by correspondence carries out corresponding oppositely decryption processing, thereby recovers the true form sequence;
(4), to be divided into according to the encryption method difference be five kinds to the functional module of Shi Yonging, be stored as hardware each standby portion of both sides afterwards in advance, content is identical, and five kinds of modules are specially: multiplier module, division module, alienation module one to one, the two pairs of alienation modules, more than three and three to an alienation module;
Multiplier module, division module make the working code of output unpredictable, and working code information transmitted amount also changes with true form information transmitted amount;
Alienation module one to one, the two pairs of alienation modules, more than three and three to an alienation module, utilize, two, three of guide sequence and of three above bit alignment true form sequences to carry out alienation; The unpredictability of the output services sign indicating number sequence of being brought by the randomness of guide sequence.
The cryptography method that the present invention adopts in life cycle indefinite length, do not recycle reaches the effect that can't recover key.Five kinds of encryptions adopting are generated by irregular physical method with key, the cipher key store that has stored that the back communicating pair of generation is respectively held a identical content is standby, and use one of them pointedly by adding of appointing, deciphering approach, perhaps functional module marshalling back is dynamically used, also gradable compound use.
Embodiment
Combined ciphering method of the present invention, adopt following concrete steps:
The no logic hardware encryption method combination of five kinds of digital informations is finished by following steps:
(1), transmitting terminal is encrypted processing with the true form sequence by the encrypting module of appointing;
(2), enciphered message is sent to receiving terminal;
(3), after receiving terminal receives enciphered message, the encrypting module by correspondence carries out corresponding oppositely decryption processing, thereby recovers the true form sequence;
(4), to be divided into according to the encryption method difference be five kinds to the functional module of Shi Yonging, be stored as hardware each standby portion of both sides afterwards in advance, content is identical, and five kinds of modules are specially: multiplier module, division module, alienation module one to one, the two pairs of alienation modules, more than three and three to an alienation module;
The technical characterstic of multiplier module, division module is, can make the working code of output unpredictable, and working code information transmitted amount also changes with true form information transmitted amount, can improve the fail safe of raw information well;
Alienation module one to one, two pairs of alienation modules, the technical characterstics to an alienation module more than three and three are to utilize, two, three of guide sequence and of three above bit alignment true form sequences to carry out alienation; The unpredictability of the output services sign indicating number sequence of being brought by the randomness of guide sequence can play a very good protection to the safety of true form sequence.
Specifically the implementation method to five kinds of modules is described below:
One, multiplication is used for the alienation processing method to the true form sequence
The function code sequence of the communicating pair that has generated the coexistence that is used for doing key is selected, is removed 00 and 01 among one group of 2 bit, with 10,11(2 and 3); Remove 000 and 001 among one group of 3 bit ..., because multiply by 0 reduction of having no idea, multiply by 1 effect that does not change, the bit number in when grouping agreement can be chosen wantonly, in the practicality with the more convenient calculating of 2~16bit; The true form sequence is also carried out segment processing, and section length can be chosen wantonly, and practical last 8~16bit relatively is easy to realize;
Number as the cipher key sections of correspondence is 1011=11, and when true form was 01101101=109, the transmission working code after the processing was 10010101111=1199; After the recipient received, the true form sequence that restores 109=01101101 with 1199 ÷ 11 was come;
Here, both sides can arrange, occur 2,3,4 as the key sequence that instructs ... the time, a, b, c are multiply by in representative ... (a, b, c ... can be set at the positive integer greater than 1 arbitrarily), at this moment the relative effect of directly using this yard to do multiplication with the degree of association of the segmentation correspondence code of key of output services sign indicating number has reduced, and has also just improved one deck fail safe relatively;
Redundancy of effort sign indicating number when the multiplication of the multiplication greater than 1 can cause producing transmission, this result has two effects, positive is can egrabage length, negative effect is to strengthen transmission quantity, should note during practical application adapting with service condition.
The output services sign indicating number segment length of multiplication will do segmentation with the maximum that segmentation and the key segmentation of true form are multiplied each other.
Two, division is used for the alienation processing method to the true form sequence
Adopt identical group technology with multiplication, after key sequence also removed 0,1, use the true form tract divided by the processing of key sequence section accordingly, different with multiplication is, need mark aliquant segment number, at this moment output sequence has 2 differences than the output sequence of multiplication: the one, and the superfluous bar code of mark key element will increase, the 2nd, the information of aliquant some section is not done encryption, the simple level of encryption of division that uses is low, need multiple use, or with the compound use of other encryption method;
Be 108 o'clock as the true form section, cryptopart is 4 o'clock, is output as 27, add that the output services sign indicating number after the mark key element is 110111, last 1 is the mark key element, and expression has been divided exactly and processed, cast out during reduction this 1, multiply by 4 with 11011=27, the true form sequence that recovers 01101100=108 is come;
When true form was 108, cryptopart is at 11 o'clock, and was aliquant, and then Shu Chu working code is 011011000, and last 0 this section of expression does not process, and removed this and 0 went out true form sequence 01101100 with regard to reducible;
The output services sign indicating number segment length of division is Duoed a marker bit than the processing whether result of true form sequence.
Three, use the method for key sequence alienation true form sequence one to one
The process of alienation has two kinds of options, selects 0 in the key sequence, 1 one to be the corresponding points of alienation processing, and the efficient of alienation is 50%;
It is 010101 o'clock as true form, key sequence is 110110, when selecting in the key sequence 0 for the corresponding position of alienation, the working code sequence of output is 011100, namely the former code value of two 0 in the key sequence corresponding position is become another binary number, oppositely become 010101 again during reduction, recover the true form sequence, need to prove, as long as the randomness of key sequence is enough good, just can't seek out primitive polynomial, the effect of this alienation processing will be fine; Multiple effect is better, and the usefulness method of alienation does not one to one produce redundant code, and the key sequences that consume better on the efficient more only;
Same true form and key sequence, 010101 and 110110, selecting 1 in the key sequence is corresponding alienation machining position, and the working code sequence of output is 100011, and recipient's reverse operating recovers true form sequence 010101 from 100011 li.
Four, with the method for a true form sequence of the corresponding alienation of two key sequences
One group of key sequence 2bit, every group value has 00,01,10,11 4 kind may, select wherein two as the corresponding position of alienation, can make overall alienation rate reach 50%, two pairs one alienation does not produce redundant code yet, but consumes key sequence two-to-onely.
Five, with the method for a true form sequence of the corresponding alienation of the key sequence more than three and three
Key sequence 3bit, 4bit ... one group, every group value is respectively 0~7, and 0~15, can select to carry out alienation to the true form sequence with parity, also can select to represent alienation with the value of appointment, as can be in the true form 1bit of 3bit, specify 000,010,011,101 to be the corresponding position of alienation, remaining four kinds of not alienation, then randomness is higher, and fail safe is just more strengthened;
The method of a true form sequence of the corresponding alienation of the key sequence more than three and three does not produce redundant code, but the degree of consumption key sequence has strengthened.
It is pointed out that in 2bit, the 3bit of guide sequence and true form sequence of 3 corresponding alienation of above bit what the alienation rate can be according to communicating pair fixes on 50% left and right adjusting, more flexible and safety approximately; As in 16 kinds of states of 0~15, can select wherein 7 or 9 kind of guidance of doing alienation, the alienation rate does not just in time equal 50%.
In addition, when needs dynamically use, need look for a random sequence to carry out instruction.Concrete grammar is one group of 3 bit of guide sequence, to remove 000, represent 1,2,3,4,5 in five kinds of methods with 001,010,011,100,101, a kind of dynamically use the in corresponding five kinds of methods gets final product respectively, has more randomness, also just increased fail safe.

Claims (1)

1. the no logic hardware encryption method combination of five kinds of digital informations is finished by following steps:
(1), transmitting terminal is encrypted processing with the true form sequence by the encrypting module of appointing;
(2), enciphered message is sent to receiving terminal;
(3), after receiving terminal receives enciphered message, the encrypting module by correspondence carries out corresponding oppositely decryption processing, thereby recovers the true form sequence;
(4), to be divided into according to the encryption method difference be five kinds to the functional module of Shi Yonging, be stored as hardware each standby portion of both sides afterwards in advance, content is identical, and five kinds of modules are specially: multiplier module, division module, alienation module one to one, the two pairs of alienation modules, more than three and three to an alienation module;
Multiplier module, division module make the working code of output unpredictable, and working code information transmitted amount also changes with true form information transmitted amount;
Alienation module one to one, the two pairs of alienation modules, more than three and three to an alienation module, utilize, two, three of guide sequence and of three above bit alignment true form sequences to carry out alienation; The unpredictability of the output services sign indicating number sequence of being brought by the randomness of guide sequence.
CN2013101349119A 2013-04-17 2013-04-17 Combination of five non-logical hardware encryption methods for digital information Pending CN103199998A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101349119A CN103199998A (en) 2013-04-17 2013-04-17 Combination of five non-logical hardware encryption methods for digital information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013101349119A CN103199998A (en) 2013-04-17 2013-04-17 Combination of five non-logical hardware encryption methods for digital information

Publications (1)

Publication Number Publication Date
CN103199998A true CN103199998A (en) 2013-07-10

Family

ID=48722365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101349119A Pending CN103199998A (en) 2013-04-17 2013-04-17 Combination of five non-logical hardware encryption methods for digital information

Country Status (1)

Country Link
CN (1) CN103199998A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109889322A (en) * 2019-03-08 2019-06-14 天津大学 Quadravalence guards chaotic oscillator

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101086769A (en) * 2006-06-07 2007-12-12 三星电子株式会社 Encrypting system for encrypting input data, error detection circuit and operation method
CN101567781A (en) * 2009-06-09 2009-10-28 刘海云 Sequence number encrypting method and cipher machine generated by sequencing
CN102867285A (en) * 2011-07-08 2013-01-09 丛树业 Hard watermarking combined encryption method for six types of illogical digital information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101086769A (en) * 2006-06-07 2007-12-12 三星电子株式会社 Encrypting system for encrypting input data, error detection circuit and operation method
CN101567781A (en) * 2009-06-09 2009-10-28 刘海云 Sequence number encrypting method and cipher machine generated by sequencing
CN102867285A (en) * 2011-07-08 2013-01-09 丛树业 Hard watermarking combined encryption method for six types of illogical digital information

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109889322A (en) * 2019-03-08 2019-06-14 天津大学 Quadravalence guards chaotic oscillator

Similar Documents

Publication Publication Date Title
CN102904711B (en) Information ciphering method
CN105391545A (en) Method of generating pseudo-random sequence in LTE system
CN106533656A (en) Key multilayer mixed encryption/decryption method based on WSN
CN105262557B (en) A kind of generation method of pseudo-random sequence in LTE system
CN112165443A (en) Multi-key information encryption and decryption method and device and storage medium
CN102624520B (en) 192 bit key expansion system and method based on AES (Advanced Encryption Standard)
CN105391701A (en) Data encryption method and system
CN102664730B (en) 128 bit secret key expansion method based on AES (Advanced Encryption Standard)
CN103580859B (en) Asymmetric encryption method for intelligent electricity using interaction
CN103269272A (en) Secret key encapsulation method based on short-period certificate
US20100158243A1 (en) Method of encryption in networked embedded systems
CN102647272B (en) Expansion system and method for 256-bit keys
CN103199998A (en) Combination of five non-logical hardware encryption methods for digital information
CN111931194A (en) Security monitoring big data processing method and device based on cloud computing
CN113162765B (en) Trustable public key encryption system and method based on non-interactive key agreement
JP2017527225A (en) Cryptographic system reproducible random sequence
CN114679252A (en) Resource sharing method for MACsec AES algorithm
CN111740818A (en) Data processing method, device, equipment and storage medium
CN104796254A (en) ECC-based official document transferring method
CN103051443B (en) AES (Advanced Encryption Standard) key expansion method
CN105873033A (en) Encryption and decryption method for short message communication
Soomro et al. Secured symmetric key cryptographic algorithm for small amount of data
CN114598488A (en) Data transmission method, communication device and communication system
CN106059748A (en) Lightweight data secure storage method based on block security regeneration codes
CN103036675A (en) Dynamic secret key based data communication method, transmitting end and receiving end

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130710