CN103368730A - Eight kinds of no logic hardware encryption method combination of digital information - Google Patents

Eight kinds of no logic hardware encryption method combination of digital information Download PDF

Info

Publication number
CN103368730A
CN103368730A CN2012100995059A CN201210099505A CN103368730A CN 103368730 A CN103368730 A CN 103368730A CN 2012100995059 A CN2012100995059 A CN 2012100995059A CN 201210099505 A CN201210099505 A CN 201210099505A CN 103368730 A CN103368730 A CN 103368730A
Authority
CN
China
Prior art keywords
true form
function code
kinds
borrow
subtracts
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012100995059A
Other languages
Chinese (zh)
Inventor
丛树业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2012100995059A priority Critical patent/CN103368730A/en
Publication of CN103368730A publication Critical patent/CN103368730A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

Provided are eight kinds of no logic hardware encryption method combination of digital information, and belongs to a cryptography category in the technical field of secret communication. The steps of the method combination are listed as follows: an original code array is encrypted by a sending terminal via a designated encryption module; encrypted information is sent to a receiving terminal; after the receiving terminal receives the encrypted information, a corresponding reverse decryption is conducted via the corresponding encryption module so that the original code array is recovered, wherein function modules that are used are divided into eight kinds according to different functions, and each of two parties backs up one copy of the function modules with the same contents after the function modules are stored in advance. According to the invention, a problem of encryption is solved by solidifying information into hardware so that the security of information is enhanced.

Description

Eight kinds of digital informations without logic hardware encryption Combination of Methods
Technical field
The invention belongs to the cryptography category in the private communication technology field, relate to eight kinds to digital information carry out without logic hardware encryption method.
Background technology
At government's net, military information, diplomacy, important commercial field, the safe transmission of information is the problem that becomes more and more important, aspect the cryptography that supports modern communication, instantly employed key one is limited length, the 2nd, recycle, this all provides chance for the decoding work of usurping after the enciphered message, and a Duan Zhongke recovers key from the intercepting code, and this is a deficiency of present secure communication.
Summary of the invention
The technical problem to be solved in the present invention is the hardware encryption method without logic that discloses eight kinds of digital informations.
The technical scheme that the present invention deals with problems is the cryptography method that adopts in life cycle indefinite length, do not recycle, and reaches the effect that can't recover key.
Eight kinds of encryptions of the present invention adopt irregular physical method to generate with key, it is for subsequent use that the rear communicating pair of generation is respectively held the spacious good cipher key store of depositing of a identical content, and use pointedly one of them by the Encrypt and Decrypt approach of appointing, also gradable time multiple use.
Concrete grammar is finished by following steps
1. transmitting terminal is encrypted processing with the true form battle array by the encrypting module of appointing;
2. enciphered message is sent to receiving terminal;
3. after receiving terminal received enciphered message, the encrypting module by correspondence carried out corresponding oppositely decryption processing, thereby recovers the true form battle array;
4. to be divided into according to the method difference be eight kinds to use therein functional module, deposit in advance spacious good after each portion for subsequent use of both sides, content is identical.
Specifically the implementation method of eight kinds of modules is described below:
One, the addition at one's own department or unit
Be used for doing the function code that has generated of key and true form only in corresponding position one's own department or unit addition, do not consider carry, 1+1=0 during binary system; The 8+7=5 during decimal system; A+8=2 during hexadecimal.Binary Zero-1=1 during reduction; The 5-7=8 during decimal system; 2-8=A during hexadecimal does not consider borrow.And these three true forms of " 1 " " 8 " " A " have obtained the reduction at one's own department or unit with " 0 ", " 5 ", " 2 " code of working after receiving.
Two, one's own department or unit true form subtracts function code
Take hexadecimal as example, be A9 such as true form only, function code is 1B, and A9-1B=9E. does not consider borrow; 9E+1B=A9. does not consider carry during reduction, reduces successfully two, method is identical during the decimal system.
Three, one's own department or unit function code subtracts true form
Only take hexadecimal as example: be A9 such as true form, function code is 1B.1B-A9=72, does not consider borrow; 1B-72=A9 does not consider borrow during reduction.
Relatively two, three as can be known, and when true form was identical with function code, the subtraction at one's own department or unit was that effect is different because the exchange of subtrahend and minuend obtains respectively working code 9E and 72.
Above three kinds of situations are because advancing between data, borrow relation before and after need not considering, can be from not segmentation deal with data chains to tail, and be the digital watermark that does not increase working code length, be particularly suitable for voice encryption, especially be suitable for field telephone.
When processed voice was encrypted, unified binary true form and the corresponding processing key of using carried out work, can only come Sequential output according to the talker to the encryption of voice by postponing a bit, and instantaneity and successional effect are all fine.
Four, the addition of carry backward
Change low method behind traditional front height, allow the addition carry backward of digital string, take hexadecimal as example: AB is true form .CD when being function code:
Figure BSA00000696742900021
During reduction
Figure BSA00000696742900022
What need pay special attention to is, the addition of carry is particularly useful for voice encryption backward, and is especially good to the cipher round results of field telephone, diplomatic code phone, sends successively such as AB123 because voice sequence is from left to right the sounding according to the teller Be AB front, need during with traditional addition process process after the segment, affect instantaneity and the connectivity of voice, can well address this problem during to the method processed voice encryption of laggard borrow.
Five, the true form of borrow subtracts function code:
Take hexadecimal as example, true form is A9C, and function code is 7BF6, first 6 back that are spliced to true form, becomes A9C6.
Figure BSA00000696742900023
3EC5+7BF=A9C6. during reduction
Figure BSA00000696742900024
After among the A9C6 6 removed, restore true form A9C.
Here allowing true form Duo one method than function code is to guarantee enough subtracting, if fill non-zero numeral in the next function code, run into 0 o'clock both sides and all automatically get following non-zero number and come usefulness, common plus-minus for the treatment of 10,16 systems becomes different and does not use 0 in the function code.
Six, the function code of borrow deducts true form backward
At this moment allow function code Duo one than true form, enough subtracting. be A98 such as true form, function code is 5EC6,
Figure BSA00000696742900025
B446 is working code; During reduction
Figure BSA00000696742900031
Among the A980 0 removed, restore true form A98.
Seven, the true form of normal borrow subtracts function code
Take hexadecimal as example, allow true form Duo one than function code, be A1C such as true form, can the merit code be 5BC9
After the variation:
Figure BSA00000696742900032
Working code is 4E53 .4E53+BC9 during reduction
Figure BSA00000696742900033
After the prefix 5 of 5A1C removed, restore true form A1C.
Eight. the function code of normal borrow subtracts true form
Allow function code Duo one than true form, and many be non-zero position, take hexadecimal as example,
F85 is true form
3E94 is function code.
Obtain working code 2F0F
Figure BSA00000696742900034
During reduction
The prefix 0 of 0F85 is removed, obtain true form F85
Illustrate:
1. the addition of normal carry has been declared in " a kind of digital information without logic hardware encryption, decryption method " and has been finished.
2. above-mentioned eight kinds of methods can be alone, and the dynamic use under also can instructing by programming is sent out the instruction module of receiving both sides and taken in memory separately under CPU management separately.
3. various keys are without logically generating, and the length of key is equal to or slightly greater than the length of true form, does not recycle.
4. communicating pair adopts is the stuck-module that keeps in advance, software function is fixed into the effect of hardware, belongs to the category of hardware encryption.
5. the working code that obtains after processing with 2,10,16 systems of same bit information is different, be exactly with after the same function code processing, also obtain different working codes, but as long as reduce according to the former same system that uses man-hour that adds, all reduciblely go out same true form, only affect pilot process, do not affect the result.Give so on the contrary and use what system that the possibility of mobilism is provided, binary system can be described respectively 10,16 systems, and communicating pair can be arranged rear dynamic use system, makes key have more flexibility, randomness, therefore also can improve privacy degrees.
6. above-mentioned true form is being processed when processing and segmentation is being carried out, can be with 1000 bit segment processing binary numbers, 100 digital segment processing decimal numbers, 50 heuristicimal code segment processing hexadecimal numbers; Communicating pair also can be arranged other fragment size, only plays the convenient effect of processing, and the size of segmentation is on the not impact of fail safe of communication.

Claims (1)

  1. Eight kinds of digital informations without logic hardware encryption Combination of Methods, finished by following steps:
    1). transmitting terminal is encrypted processing with the true form battle array by the encrypting module of appointing;
    2). enciphered message is sent to receiving terminal;
    3). after receiving terminal received enciphered message, the encrypting module by correspondence carried out corresponding oppositely decryption processing, thereby recovers the true form battle array;
    It is eight kinds that use therein functional module is divided into according to the method difference, each portion for subsequent use of both sides after storing in advance, and content is identical.
    Eight kinds of methods are followed successively by:
    One, the addition at one's own department or unit
    Two, one's own department or unit true form subtracts function code
    Three, one's own department or unit function code subtracts true form
    Four, the addition of carry backward
    Five, the true form of borrow subtracts function code backward
    Six, the function code of borrow deducts true form backward
    Seven, the true form of normal borrow subtracts function code
    Eight, the function code of normal borrow subtracts true form.
CN2012100995059A 2012-04-09 2012-04-09 Eight kinds of no logic hardware encryption method combination of digital information Pending CN103368730A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100995059A CN103368730A (en) 2012-04-09 2012-04-09 Eight kinds of no logic hardware encryption method combination of digital information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100995059A CN103368730A (en) 2012-04-09 2012-04-09 Eight kinds of no logic hardware encryption method combination of digital information

Publications (1)

Publication Number Publication Date
CN103368730A true CN103368730A (en) 2013-10-23

Family

ID=49369333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100995059A Pending CN103368730A (en) 2012-04-09 2012-04-09 Eight kinds of no logic hardware encryption method combination of digital information

Country Status (1)

Country Link
CN (1) CN103368730A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1863042A (en) * 2005-12-13 2006-11-15 华为技术有限公司 Method for information encryption
US20070286413A1 (en) * 2006-06-07 2007-12-13 Samsung Elecstronics Co., Ltd. Cryptographic systems for encrypting input data using an address associated with the input data, error detection circuits, and methods of operating the same
CN102227105A (en) * 2011-06-13 2011-10-26 丛树业 Digital information no logic hard encryption and decryption method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1863042A (en) * 2005-12-13 2006-11-15 华为技术有限公司 Method for information encryption
US20070286413A1 (en) * 2006-06-07 2007-12-13 Samsung Elecstronics Co., Ltd. Cryptographic systems for encrypting input data using an address associated with the input data, error detection circuits, and methods of operating the same
CN102227105A (en) * 2011-06-13 2011-10-26 丛树业 Digital information no logic hard encryption and decryption method

Similar Documents

Publication Publication Date Title
Maitri et al. Secure file storage in cloud computing using hybrid cryptography algorithm
US20080137837A1 (en) Encryption method for message authentication
CN112287377A (en) Model training method based on federal learning, computer equipment and storage medium
CN111010266B (en) Message encryption and decryption, reading and writing method and device, computer equipment and storage medium
GB2528959A (en) Encoder, decoder and method
CN104396182A (en) Method of encrypting data
US20100005307A1 (en) Secure approach to send data from one system to another
WO2021129470A1 (en) Polynomial-based system and method for fully homomorphic encryption of binary data
JP2003513490A (en) Data processing method resistant to data extraction by analyzing unintended side channel signals
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
WO2001084766A2 (en) System and method for encryption using transparent keys
US11563566B2 (en) Key splitting
CN111556004A (en) Hybrid dual network encryption system
CN114826587A (en) Data encryption method, data decryption method, data encryption device, data decryption device and data decryption equipment
CN112737783B (en) Decryption method and device based on SM2 elliptic curve
CN111931194A (en) Security monitoring big data processing method and device based on cloud computing
CN103368730A (en) Eight kinds of no logic hardware encryption method combination of digital information
CN108777622B (en) Binary stream hash modular encryption and decryption method
CN111131158A (en) Single byte symmetric encryption and decryption method, device and readable medium
CN114095157B (en) Key management method, key management device, computer equipment and readable storage medium
CN115276961B (en) Data processing method and device based on OT protocol
US20220393853A1 (en) Method and devices for creating redundancy and encryption using mojette transform
CN114499845B (en) Multi-party secure computing method, system, device, storage medium and equipment
CN117955636A (en) High-security sensitive data access method and system
CN114329518A (en) Encryption and decryption method and device for software cryptographic module account

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131023