CN103199998A - Combination of five non-logical hardware encryption methods for digital information - Google Patents
Combination of five non-logical hardware encryption methods for digital information Download PDFInfo
- Publication number
- CN103199998A CN103199998A CN2013101349119A CN201310134911A CN103199998A CN 103199998 A CN103199998 A CN 103199998A CN 2013101349119 A CN2013101349119 A CN 2013101349119A CN 201310134911 A CN201310134911 A CN 201310134911A CN 103199998 A CN103199998 A CN 103199998A
- Authority
- CN
- China
- Prior art keywords
- module
- alienation
- sequence
- true form
- kinds
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention belongs to the domain of cryptology in the technical field of secret communication and relates to combination of five non-logical hardware encryption methods for digital information. The method combination comprises the following steps of: carrying out encryption processing on an original code sequence through a given encryption module by a sending terminal; sending encrypted information to a receiving terminal; and carrying out corresponding reverse decryption processing on the encrypted information through the corresponding encryption module by the receiving terminal after receiving the encrypted information, so as to restore the original code sequence, wherein the used functional modules are divided into five types according to different methods, a key database is prestored into hardware, and then the sending terminal and the receiving terminal respectively reserve one copy with the same content. According to the illogical hardware encryption method combination, the problem of the encryption is solved by solidifying the key database into the hardware, and the safety of the information is improved from a brand new cryptology point of view.
Description
Technical field
The invention belongs to the cryptography category in the private communication technology field, relate to five kinds of no logic hardware encryption method combinations that digital information is carried out.
Background technology
Aspect the information communication in government, military affairs, diplomacy, important commercial field etc., the safe transmission of information is the problem that becomes more and more important, aspect the cryptography that supports modern communication, instantly employed key one is limited length, the 2nd, recycle, and this all provides chance for the decoding work of usurping after the enciphered message, Duan Zhongke recovers key from the intercepting sign indicating number, this is a deficiency of present secure communication, and existing method is improved and augmented, and becomes very urgent and meaningful.
Summary of the invention
The technical problem to be solved in the present invention provides the encryption method that obtains after the hardware encryption method combination of no logic of five kinds of digital informations.Technical scheme of the present invention is as follows:
The no logic hardware encryption method combination of five kinds of digital informations is finished by following steps:
(1), transmitting terminal is encrypted processing with the true form sequence by the encrypting module of appointing;
(2), enciphered message is sent to receiving terminal;
(3), after receiving terminal receives enciphered message, the encrypting module by correspondence carries out corresponding oppositely decryption processing, thereby recovers the true form sequence;
(4), to be divided into according to the encryption method difference be five kinds to the functional module of Shi Yonging, be stored as hardware each standby portion of both sides afterwards in advance, content is identical, and five kinds of modules are specially: multiplier module, division module, alienation module one to one, the two pairs of alienation modules, more than three and three to an alienation module;
Multiplier module, division module make the working code of output unpredictable, and working code information transmitted amount also changes with true form information transmitted amount;
Alienation module one to one, the two pairs of alienation modules, more than three and three to an alienation module, utilize, two, three of guide sequence and of three above bit alignment true form sequences to carry out alienation; The unpredictability of the output services sign indicating number sequence of being brought by the randomness of guide sequence.
The cryptography method that the present invention adopts in life cycle indefinite length, do not recycle reaches the effect that can't recover key.Five kinds of encryptions adopting are generated by irregular physical method with key, the cipher key store that has stored that the back communicating pair of generation is respectively held a identical content is standby, and use one of them pointedly by adding of appointing, deciphering approach, perhaps functional module marshalling back is dynamically used, also gradable compound use.
Embodiment
Combined ciphering method of the present invention, adopt following concrete steps:
The no logic hardware encryption method combination of five kinds of digital informations is finished by following steps:
(1), transmitting terminal is encrypted processing with the true form sequence by the encrypting module of appointing;
(2), enciphered message is sent to receiving terminal;
(3), after receiving terminal receives enciphered message, the encrypting module by correspondence carries out corresponding oppositely decryption processing, thereby recovers the true form sequence;
(4), to be divided into according to the encryption method difference be five kinds to the functional module of Shi Yonging, be stored as hardware each standby portion of both sides afterwards in advance, content is identical, and five kinds of modules are specially: multiplier module, division module, alienation module one to one, the two pairs of alienation modules, more than three and three to an alienation module;
The technical characterstic of multiplier module, division module is, can make the working code of output unpredictable, and working code information transmitted amount also changes with true form information transmitted amount, can improve the fail safe of raw information well;
Alienation module one to one, two pairs of alienation modules, the technical characterstics to an alienation module more than three and three are to utilize, two, three of guide sequence and of three above bit alignment true form sequences to carry out alienation; The unpredictability of the output services sign indicating number sequence of being brought by the randomness of guide sequence can play a very good protection to the safety of true form sequence.
Specifically the implementation method to five kinds of modules is described below:
One, multiplication is used for the alienation processing method to the true form sequence
The function code sequence of the communicating pair that has generated the coexistence that is used for doing key is selected, is removed 00 and 01 among one group of 2 bit, with 10,11(2 and 3); Remove 000 and 001 among one group of 3 bit ..., because multiply by 0 reduction of having no idea, multiply by 1 effect that does not change, the bit number in when grouping agreement can be chosen wantonly, in the practicality with the more convenient calculating of 2~16bit; The true form sequence is also carried out segment processing, and section length can be chosen wantonly, and practical last 8~16bit relatively is easy to realize;
Number as the cipher key sections of correspondence is 1011=11, and when true form was 01101101=109, the transmission working code after the processing was 10010101111=1199; After the recipient received, the true form sequence that restores 109=01101101 with 1199 ÷ 11 was come;
Here, both sides can arrange, occur 2,3,4 as the key sequence that instructs ... the time, a, b, c are multiply by in representative ... (a, b, c ... can be set at the positive integer greater than 1 arbitrarily), at this moment the relative effect of directly using this yard to do multiplication with the degree of association of the segmentation correspondence code of key of output services sign indicating number has reduced, and has also just improved one deck fail safe relatively;
Redundancy of effort sign indicating number when the multiplication of the multiplication greater than 1 can cause producing transmission, this result has two effects, positive is can egrabage length, negative effect is to strengthen transmission quantity, should note during practical application adapting with service condition.
The output services sign indicating number segment length of multiplication will do segmentation with the maximum that segmentation and the key segmentation of true form are multiplied each other.
Two, division is used for the alienation processing method to the true form sequence
Adopt identical group technology with multiplication, after key sequence also removed 0,1, use the true form tract divided by the processing of key sequence section accordingly, different with multiplication is, need mark aliquant segment number, at this moment output sequence has 2 differences than the output sequence of multiplication: the one, and the superfluous bar code of mark key element will increase, the 2nd, the information of aliquant some section is not done encryption, the simple level of encryption of division that uses is low, need multiple use, or with the compound use of other encryption method;
Be 108 o'clock as the true form section, cryptopart is 4 o'clock, is output as 27, add that the output services sign indicating number after the mark key element is 110111, last 1 is the mark key element, and expression has been divided exactly and processed, cast out during reduction this 1, multiply by 4 with 11011=27, the true form sequence that recovers 01101100=108 is come;
When true form was 108, cryptopart is at 11 o'clock, and was aliquant, and then Shu Chu working code is 011011000, and last 0 this section of expression does not process, and removed this and 0 went out true form sequence 01101100 with regard to reducible;
The output services sign indicating number segment length of division is Duoed a marker bit than the processing whether result of true form sequence.
Three, use the method for key sequence alienation true form sequence one to one
The process of alienation has two kinds of options, selects 0 in the key sequence, 1 one to be the corresponding points of alienation processing, and the efficient of alienation is 50%;
It is 010101 o'clock as true form, key sequence is 110110, when selecting in the key sequence 0 for the corresponding position of alienation, the working code sequence of output is 011100, namely the former code value of two 0 in the key sequence corresponding position is become another binary number, oppositely become 010101 again during reduction, recover the true form sequence, need to prove, as long as the randomness of key sequence is enough good, just can't seek out primitive polynomial, the effect of this alienation processing will be fine; Multiple effect is better, and the usefulness method of alienation does not one to one produce redundant code, and the key sequences that consume better on the efficient more only;
Same true form and key sequence, 010101 and 110110, selecting 1 in the key sequence is corresponding alienation machining position, and the working code sequence of output is 100011, and recipient's reverse operating recovers true form sequence 010101 from 100011 li.
Four, with the method for a true form sequence of the corresponding alienation of two key sequences
One group of key sequence 2bit, every group value has 00,01,10,11 4 kind may, select wherein two as the corresponding position of alienation, can make overall alienation rate reach 50%, two pairs one alienation does not produce redundant code yet, but consumes key sequence two-to-onely.
Five, with the method for a true form sequence of the corresponding alienation of the key sequence more than three and three
Key sequence 3bit, 4bit ... one group, every group value is respectively 0~7, and 0~15, can select to carry out alienation to the true form sequence with parity, also can select to represent alienation with the value of appointment, as can be in the true form 1bit of 3bit, specify 000,010,011,101 to be the corresponding position of alienation, remaining four kinds of not alienation, then randomness is higher, and fail safe is just more strengthened;
The method of a true form sequence of the corresponding alienation of the key sequence more than three and three does not produce redundant code, but the degree of consumption key sequence has strengthened.
It is pointed out that in 2bit, the 3bit of guide sequence and true form sequence of 3 corresponding alienation of above bit what the alienation rate can be according to communicating pair fixes on 50% left and right adjusting, more flexible and safety approximately; As in 16 kinds of states of 0~15, can select wherein 7 or 9 kind of guidance of doing alienation, the alienation rate does not just in time equal 50%.
In addition, when needs dynamically use, need look for a random sequence to carry out instruction.Concrete grammar is one group of 3 bit of guide sequence, to remove 000, represent 1,2,3,4,5 in five kinds of methods with 001,010,011,100,101, a kind of dynamically use the in corresponding five kinds of methods gets final product respectively, has more randomness, also just increased fail safe.
Claims (1)
1. the no logic hardware encryption method combination of five kinds of digital informations is finished by following steps:
(1), transmitting terminal is encrypted processing with the true form sequence by the encrypting module of appointing;
(2), enciphered message is sent to receiving terminal;
(3), after receiving terminal receives enciphered message, the encrypting module by correspondence carries out corresponding oppositely decryption processing, thereby recovers the true form sequence;
(4), to be divided into according to the encryption method difference be five kinds to the functional module of Shi Yonging, be stored as hardware each standby portion of both sides afterwards in advance, content is identical, and five kinds of modules are specially: multiplier module, division module, alienation module one to one, the two pairs of alienation modules, more than three and three to an alienation module;
Multiplier module, division module make the working code of output unpredictable, and working code information transmitted amount also changes with true form information transmitted amount;
Alienation module one to one, the two pairs of alienation modules, more than three and three to an alienation module, utilize, two, three of guide sequence and of three above bit alignment true form sequences to carry out alienation; The unpredictability of the output services sign indicating number sequence of being brought by the randomness of guide sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013101349119A CN103199998A (en) | 2013-04-17 | 2013-04-17 | Combination of five non-logical hardware encryption methods for digital information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013101349119A CN103199998A (en) | 2013-04-17 | 2013-04-17 | Combination of five non-logical hardware encryption methods for digital information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103199998A true CN103199998A (en) | 2013-07-10 |
Family
ID=48722365
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013101349119A Pending CN103199998A (en) | 2013-04-17 | 2013-04-17 | Combination of five non-logical hardware encryption methods for digital information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103199998A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109889322A (en) * | 2019-03-08 | 2019-06-14 | 天津大学 | Quadravalence guards chaotic oscillator |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101086769A (en) * | 2006-06-07 | 2007-12-12 | 三星电子株式会社 | Encrypting system for encrypting input data, error detection circuit and operation method |
CN101567781A (en) * | 2009-06-09 | 2009-10-28 | 刘海云 | Sequence number encrypting method and cipher machine generated by sequencing |
CN102867285A (en) * | 2011-07-08 | 2013-01-09 | 丛树业 | Hard watermarking combined encryption method for six types of illogical digital information |
-
2013
- 2013-04-17 CN CN2013101349119A patent/CN103199998A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101086769A (en) * | 2006-06-07 | 2007-12-12 | 三星电子株式会社 | Encrypting system for encrypting input data, error detection circuit and operation method |
CN101567781A (en) * | 2009-06-09 | 2009-10-28 | 刘海云 | Sequence number encrypting method and cipher machine generated by sequencing |
CN102867285A (en) * | 2011-07-08 | 2013-01-09 | 丛树业 | Hard watermarking combined encryption method for six types of illogical digital information |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109889322A (en) * | 2019-03-08 | 2019-06-14 | 天津大学 | Quadravalence guards chaotic oscillator |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102904711B (en) | Information ciphering method | |
CN105391545A (en) | Method of generating pseudo-random sequence in LTE system | |
CN106533656A (en) | Key multilayer mixed encryption/decryption method based on WSN | |
CN105262557B (en) | A kind of generation method of pseudo-random sequence in LTE system | |
CN112165443A (en) | Multi-key information encryption and decryption method and device and storage medium | |
CN102624520B (en) | 192 bit key expansion system and method based on AES (Advanced Encryption Standard) | |
CN105391701A (en) | Data encryption method and system | |
CN102664730B (en) | 128 bit secret key expansion method based on AES (Advanced Encryption Standard) | |
CN103580859B (en) | Asymmetric encryption method for intelligent electricity using interaction | |
CN103269272A (en) | Secret key encapsulation method based on short-period certificate | |
US20100158243A1 (en) | Method of encryption in networked embedded systems | |
CN102647272B (en) | Expansion system and method for 256-bit keys | |
CN103199998A (en) | Combination of five non-logical hardware encryption methods for digital information | |
CN111931194A (en) | Security monitoring big data processing method and device based on cloud computing | |
CN113162765B (en) | Trustable public key encryption system and method based on non-interactive key agreement | |
JP2017527225A (en) | Cryptographic system reproducible random sequence | |
CN114679252A (en) | Resource sharing method for MACsec AES algorithm | |
CN111740818A (en) | Data processing method, device, equipment and storage medium | |
CN104796254A (en) | ECC-based official document transferring method | |
CN103051443B (en) | AES (Advanced Encryption Standard) key expansion method | |
CN105873033A (en) | Encryption and decryption method for short message communication | |
Soomro et al. | Secured symmetric key cryptographic algorithm for small amount of data | |
CN114598488A (en) | Data transmission method, communication device and communication system | |
CN106059748A (en) | Lightweight data secure storage method based on block security regeneration codes | |
CN103036675A (en) | Dynamic secret key based data communication method, transmitting end and receiving end |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130710 |