CN106452743B - Communication key obtaining method and device and communication message decryption method and device - Google Patents

Communication key obtaining method and device and communication message decryption method and device Download PDF

Info

Publication number
CN106452743B
CN106452743B CN201610852319.6A CN201610852319A CN106452743B CN 106452743 B CN106452743 B CN 106452743B CN 201610852319 A CN201610852319 A CN 201610852319A CN 106452743 B CN106452743 B CN 106452743B
Authority
CN
China
Prior art keywords
key
decryption
decryption key
time sequence
timing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610852319.6A
Other languages
Chinese (zh)
Other versions
CN106452743A (en
Inventor
万贤明
王淑君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Pango Microsystems Co Ltd
Original Assignee
Shenzhen Pango Microsystems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Pango Microsystems Co Ltd filed Critical Shenzhen Pango Microsystems Co Ltd
Priority to CN201610852319.6A priority Critical patent/CN106452743B/en
Publication of CN106452743A publication Critical patent/CN106452743A/en
Application granted granted Critical
Publication of CN106452743B publication Critical patent/CN106452743B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The invention provides a communication key acquisition method and device and a communication message decryption method and device, wherein the method comprises the steps of acquiring a sending time sequence of a message to be decrypted, calling a th decryption key corresponding to a pre-stored specific time sequence and a key generation rule, and generating a second decryption key corresponding to the sending time sequence according to a th decryption key and the key generation rule.

Description

Communication key obtaining method and device and communication message decryption method and device
Technical Field
The invention relates to the field of information security, in particular to a method and a device for acquiring communication keys and a method and a device for decrypting communication messages.
Background
In order to ensure the security of communication data in the communication process, in the prior art, key encryption and decryption algorithms are provided, the same encryption and decryption algorithms and the same initial keys are adopted in the data sending end and the data receiving end in an appointed manner, and the information security is also provided while the communication data can be correctly received.
However, in the prior art, before the data receiving end receives and decrypts the data packet, the initial key needs to be used to generate the extended keys required by each round of operations in advance, and the extended keys are used in the reverse order, which requires the data receiving end to consume a large amount of hardware resources to store the extended keys, resulting in unnecessary waste of storage resources.
Disclosure of Invention
The invention provides communication key acquisition methods and devices and a communication message decryption method and device, which are used for solving the problem that storage resources are unnecessarily wasted because an existing data receiving end needs to generate and store an extended key required by each round of operation in advance.
The invention provides an communication key acquisition method, which comprises the following steps:
acquiring a sending time sequence of a message to be decrypted;
calling th decryption keys and key generation rules corresponding to the pre-stored specific time sequence;
a second decryption key corresponding to the transmission timing is generated based on the th decryption key and a key generation rule.
Further to , generating the second decryption key corresponding to the transmission timing sequence includes:
calculating a time sequence difference value between a specific time sequence and a sending time sequence;
generating calculation logic between the decryption key and the second decryption key according to the time sequence difference and the key generation rule;
a second decryption key is computed based on the computation logic and the th decryption key.
, the logic for generating th decryption key and the second decryption key according to the timing difference and the key generation rule comprises:
when the time sequence difference value is that the specific time sequence is earlier than the sending time sequence, calling a sequential key expansion algorithm; using a sequential key expansion algorithm and a key generation rule, and sequentially calculating to obtain a calculation logic; and/or the presence of a gas in the gas,
when the time sequence difference value is that the specific time sequence is later than the sending time sequence, calling a reverse-sequence key expansion algorithm; using a reverse order key expansion algorithm and a key generation rule, and performing reverse order calculation to obtain a calculation logic; and/or the presence of a gas in the gas,
when the timing difference is a particular timing equal to the transmission timing, the computational logic is configured to obtain an th decryption key equal to the second decryption key.
Further , after generating the second decryption key corresponding to the transmission timing, the method further includes:
judging whether decryption is successful;
if the decryption is successful, the th decryption key corresponding to the pre-stored specific time sequence is updated to the second decryption key corresponding to the sending time sequence.
And , decrypting the message to be decrypted by using an Advanced Encryption Standard (AES) algorithm, wherein the key generation rule comprises the steps of carrying out exclusive OR, word line transformation, word S box transformation and exclusive OR with an ethical number by using the decryption key to obtain a second decryption key.
The invention provides a method for decrypting communication messages, which comprises the following steps:
receiving a message to be decrypted;
the method for obtaining the communication key obtains the decryption key of the message to be decrypted;
and decrypting the message to be decrypted by using the decryption key.
The invention provides communication key obtaining devices, which comprises a detection module, a storage module, a calling module and a calculation module, wherein,
the storage module is used for storing th decryption keys and key generation rules corresponding to specific time sequences;
the detection module is used for acquiring the sending time sequence of the message to be decrypted and inputting the sending time sequence to the calculation module;
the calling module is used for calling th decryption keys corresponding to the pre-stored specific time sequence and key generation rules;
the calculation module is used for generating a second decryption key corresponding to the sending time sequence according to the th decryption key and the key generation rule.
, the calculation module is used to calculate the difference between the specific time sequence and the sending time sequence, generate the calculation logic between the th decryption key and the second decryption key according to the difference and the key generation rule, and calculate the second decryption key according to the calculation logic and the th decryption key.
, the calculation module is used to invoke the sequential key expansion algorithm when the timing difference is that the specific timing is earlier than the transmission timing, to obtain the calculation logic by sequential calculation using the sequential key expansion algorithm and the key generation rule, and/or to invoke the reverse key expansion algorithm when the timing difference is that the specific timing is later than the transmission timing, to obtain the calculation logic by reverse calculation using the reverse key expansion algorithm and the key generation rule, and/or to configure the calculation logic to obtain the th decryption key equal to the second decryption key when the timing difference is that the specific timing is equal to the transmission timing.
, the calculation module is used to determine whether the decryption is successful after generating the second decryption key, and if the decryption is successful, the th decryption key corresponding to the pre-stored specific time sequence is updated to the second decryption key corresponding to the sending time sequence.
And , decrypting the message to be decrypted by using an Advanced Encryption Standard (AES) algorithm, wherein the key generation rule comprises the steps of carrying out exclusive OR, word line transformation, word S box transformation and exclusive OR with an ethical number by using the decryption key to obtain a second decryption key.
The invention provides communication message decrypting devices, which comprise a communication module, a decrypting module and a communication key acquiring device provided by the invention, wherein,
the communication module is used for receiving a message to be decrypted;
the communication key acquisition device is used for outputting a decryption key of a message to be decrypted;
the decryption module is used for decrypting the message to be decrypted by using the decryption key.
The invention has the beneficial effects that:
the invention provides an communication key acquisition method, which is based on of key generation rules, and the calculated key is the same as the key calculated in advance in the data transmission process, after receiving a message to be decrypted, the method calculates the correct decryption key of the message according to the sending time sequence of the message and decryption keys stored in advance, thus, at a data receiving end, the effect of storing all decryption keys can be realized only by storing decryption keys, the consumption of storage resources is reduced, and the problem of unnecessary waste of storage resources caused by the fact that the existing data receiving end needs to generate and store extended keys required by each round of operation in advance is solved.
Drawings
Fig. 1 is a schematic structural diagram of a communication packet decryption apparatus according to an embodiment of the present invention;
fig. 2 is a flowchart of a communication packet decryption method according to a second embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating a calculation rule for sequentially calculating keys according to a third embodiment of the present invention;
fig. 4 is a schematic diagram illustrating a calculation rule of a key calculated in a reverse order according to a third embodiment of the present invention;
fig. 5 is a schematic diagram of an S-box conversion according to a third embodiment of the present invention.
Detailed Description
The present invention will now be described by way of example with reference to the accompanying drawings, which illustrate the output of the invention at step .
example:
fig. 1 is a schematic structural diagram of a communication packet decryption apparatus according to an th embodiment of the present invention, and as can be seen from fig. 1, in this embodiment, the communication packet decryption apparatus 1 according to the present invention includes a communication module 11, a decryption module 12, and a communication key obtaining apparatus 13, wherein,
the communication module 11 is configured to receive a message to be decrypted;
the communication key acquisition device 13 is used for acquiring the sending time sequence of the message to be decrypted, calling th decryption key and key generation rule corresponding to the pre-stored specific time sequence, generating a second decryption key corresponding to the sending time sequence according to th decryption key and key generation rule, and outputting the second decryption key as the decryption key of the message to be decrypted;
the decryption module 12 is configured to decrypt the message to be decrypted by using the decryption key.
In , as shown in fig. 1, the communication key obtaining apparatus 13 in the above embodiments includes a detecting module 131, a storing module 132, a calling module 133 and a calculating module 134, wherein,
the storage module 132 is used for storing th decryption keys and key generation rules corresponding to specific time sequences;
the detection module 131 is configured to obtain a sending time sequence of the message to be decrypted, and input the sending time sequence to the calculation module;
the calling module 133 is configured to call th decryption keys and key generation rules corresponding to pre-stored specific time sequences;
the calculation module 134 is configured to generate a second decryption key corresponding to the transmission timing according to the th decryption key and the key generation rule.
In , the calculating module 134 in the above embodiments is used to calculate a timing difference between a specific timing and a transmission timing, generate a calculating logic between the th decryption key and the second decryption key according to the timing difference and a key generating rule, and calculate the second decryption key according to the calculating logic and the th decryption key.
In , the calculation module 134 of the above embodiments is configured to invoke a sequential key expansion algorithm when the timing difference is that the specific timing is earlier than the transmission timing, to obtain a calculation logic by sequential calculation using the sequential key expansion algorithm and a key generation rule, and/or to invoke a reverse key expansion algorithm when the timing difference is that the specific timing is later than the transmission timing, to obtain a calculation logic by reverse calculation using the reverse key expansion algorithm and a key generation rule, and/or to configure the calculation logic to obtain a th decryption key equal to the second decryption key when the timing difference is that the specific timing is equal to the transmission timing.
In practical applications, the th decryption key may be an initial key or an expanded key of the last round, and the calculation rule of the scheme for storing the initial key is only the difference between sequential calculation and reverse-order calculation compared with the scheme for storing the expanded key of the last round, which is described in detail below in the context of reverse-order calculation, and sequential calculation may refer to reverse-order calculation.
In , the calculating module 134 in the above embodiments is further configured to determine whether the decryption is successful after generating the second decryption key for decryption, and if the decryption is successful, update the th decryption key corresponding to the pre-stored specific timing sequence to the second decryption key corresponding to the sending timing sequence.
In , the message to be decrypted in the above embodiments is decrypted by using AES algorithm, and the key generation rule includes performing xor, word line transformation, word S-box transformation by using decryption key, and performing xor with an arithmetic number to obtain a second decryption key.
Second embodiment:
fig. 2 is a flowchart of a communication packet decryption method according to a second embodiment of the present invention, and as can be seen from fig. 2, in this embodiment, the communication packet decryption method according to the present invention includes:
s201: receiving a message to be decrypted;
s202, acquiring the sending time sequence of the message to be decrypted, calling th decryption key and key generation rule corresponding to the pre-stored specific time sequence, and generating a second decryption key corresponding to the sending time sequence according to th decryption key and key generation rule;
s203: and using the second decryption key as a decryption key of the message to be decrypted, and decrypting the message to be decrypted by using the decryption key.
In , the generating of the second decryption key corresponding to the transmission timing in the above embodiments includes:
calculating a time sequence difference value between a specific time sequence and a sending time sequence;
generating calculation logic between the decryption key and the second decryption key according to the time sequence difference and the key generation rule;
a second decryption key is computed based on the computation logic and the th decryption key.
In , the logic for generating the th decryption key and the second decryption key according to the timing difference and the key generation rule in the above embodiments includes:
when the time sequence difference value is that the specific time sequence is earlier than the sending time sequence, calling a sequential key expansion algorithm; using a sequential key expansion algorithm and a key generation rule, and sequentially calculating to obtain a calculation logic; and/or the presence of a gas in the gas,
when the time sequence difference value is that the specific time sequence is later than the sending time sequence, calling a reverse-sequence key expansion algorithm; using a reverse order key expansion algorithm and a key generation rule, and performing reverse order calculation to obtain a calculation logic; and/or the presence of a gas in the gas,
when the timing difference is a particular timing equal to the transmission timing, the computational logic is configured to obtain an th decryption key equal to the second decryption key.
In , after generating the second decryption key corresponding to the transmission timing, the method in the foregoing embodiments further includes:
judging whether decryption is successful;
if the decryption is successful, the th decryption key corresponding to the pre-stored specific time sequence is updated to the second decryption key corresponding to the sending time sequence.
In , the message to be decrypted in the above embodiments is decrypted by using AES algorithm, and the key generation rule includes performing xor, word line transformation, word S-box transformation by using decryption key, and performing xor with an arithmetic number to obtain a second decryption key.
The present invention will now be explained in further with reference to specific application scenarios.
The third embodiment:
this embodiment takes an AES (Advanced Encryption Standard) algorithm as an example for explanation.
In practical applications, the common AES algorithm is of the kind shown in table 1 below:
Figure BDA0001121054850000081
Figure BDA0001121054850000091
TABLE 1
In the conventional calculation, in order to implement AES decryption, a data receiving end needs to generate an extended key required by each round of operation in advance according to an initial key by using a calculation rule shown in fig. 3, and use the extended key in a reverse order, which needs to consume a large amount of hardware resources to store the extended key.
The present embodiment provides key expansion methods, that is, a reverse order key expansion method, by using the characteristics of the key expansion xor algorithm of AES decryption, and calculates to obtain the last rounds of expanded keys, and then reverses the previous rounds of expanded keys in reverse order.
Due to the adoption of the reverse-order key expansion method, the decrypted expanded keys of each round do not need to be stored, only rounds of expanded keys need to be stored, and the time sequence of the data packets is matched with that of the input data packets, namely groups of data are input, rounds of expanded keys are generated at the same time, rounds of processing are carried out, groups of data are output, so that the expanded keys of each round of decryption do not need to be additionally stored
, the key expansion method provided in this embodiment, which utilizes the characteristic that the key expansion methods are all exclusive-or operations and the reversibility of the exclusive-or operations, is preferably implemented by using an FPGA (field programmable gate array, field programmable array) or an ASIC (Application Specific inter-programmed Circuits), calculates the expansion key of the final round according to the initial key and stores the expansion key, when AES decryption is performed, reversely pushes the expansion key result of the previous rounds according to the expansion key result of the final round, and so on, knows to push the expansion key result of the th round, as shown in fig. 4.
Specifically, taking the AES-128 mode as an example, the length of each round of the expanded keys and the initial key is 4 words (1 word is 32 bits), for example, the last rounds of the expanded keys are 4 words, which are respectively named as i-3, i-2, i-1, i.W [ i ] as the ith word expanded key, and W [ i-1] as the ith-1 word expanded key.
And during the reverse order calculation, obtaining an i-Nk word expansion key W [ i-Nk ] by using XOR of W [ i ] and W [ i-1], and by analogy, obtaining W [ i-Nk-1] by using XOR of W [ i-1] and W [ i-2 ].
When i is integer multiple of NK, it is necessary to perform word line transformation, word S box transformation, and XOR with round constant word sequence to W [ i-1] sequentially on W [ i-1], and then XOR between the XOR result W [ i-1] and W [ i ] to obtain W [ i-Nk ].
In practice, the word line transformation is to rotate 1 word left by 1 byte, the word S-box transformation is to perform the transformation shown in fig. 5 for 1 word, and the round constant word sequence is to perform the transformation shown in table 2 below for 1 word.
Number of rounds Nr Constant digital sequence values
1 1000000
2 2000000
3 4000000
4 8000000
5 10000000
6 20000000
7 40000000
8 80000000
9 1b000000
10 36000000
TABLE 2
In summary, the implementation of the present invention has at least the following advantages:
the invention provides an communication key acquisition method, which is based on of key generation rules, and the calculated key is the same as the key calculated in advance in the data transmission process, after receiving a message to be decrypted, the method calculates the correct decryption key of the message according to the sending time sequence of the message and decryption keys stored in advance, thus, at a data receiving end, the effect of storing all decryption keys can be realized only by storing decryption keys, the consumption of storage resources is reduced, and the problem of unnecessary waste of storage resources caused by the fact that the existing data receiving end needs to generate and store extended keys required by each round of operation in advance is solved.
The above embodiments are only examples of the present invention, and are not intended to limit the present invention in any way, and any simple modification, equivalent change, combination or modification made by the technical essence of the present invention to the above embodiments still fall within the protection scope of the technical solution of the present invention.

Claims (10)

1, A communication key obtaining method, comprising:
acquiring a sending time sequence of a message to be decrypted, wherein the message to be decrypted is decrypted by adopting an Advanced Encryption Standard (AES) algorithm;
calling th decryption keys and key generation rules corresponding to the pre-stored specific time sequence;
and generating a second decryption key corresponding to the sending time sequence according to the th decryption key and a key generation rule, wherein the key generation rule comprises the steps of carrying out exclusive OR, word line transformation, word S box transformation and exclusive OR with an ethical number by using the th decryption key to obtain the second decryption key.
2. The communication key acquisition method according to claim 1, wherein the generating of the second decryption key corresponding to the transmission timing includes:
calculating a timing difference between the specific timing and the transmission timing;
generating a calculation logic between the th decryption key and the second decryption key according to the time sequence difference and a key generation rule;
and calculating the second decryption key according to the calculation logic and the th decryption key.
3. The method according to claim 2, wherein the computing logic for generating the th decryption key and the second decryption key according to the timing difference and a key generation rule comprises:
when the time sequence difference value is that the specific time sequence is earlier than the sending time sequence, calling a sequential key expansion algorithm; sequentially calculating to obtain the calculation logic by using the sequential key expansion algorithm and the key generation rule; and/or the presence of a gas in the gas,
when the time sequence difference value is that the specific time sequence is later than the sending time sequence, calling a reverse-sequence key expansion algorithm; using the reverse order key expansion algorithm and the key generation rule, and performing reverse order calculation to obtain the calculation logic; and/or the presence of a gas in the gas,
when the timing difference is that the particular timing is equal to the transmit timing, the computational logic is configured to th decryption key is equal to the second decryption key.
4. The communication key acquisition method according to claim 1, further comprising, after generating the second decryption key corresponding to the transmission timing:
judging whether decryption is successful;
and if the decryption is successful, updating the th decryption key corresponding to the pre-stored specific time sequence into a second decryption key corresponding to the sending time sequence.
The method for decrypting the communication message in is characterized by comprising the following steps:
receiving a message to be decrypted;
acquiring a decryption key of the message to be decrypted by using the communication key acquisition method according to any in claims 1 to 4;
and decrypting the message to be decrypted by using the decryption key.
The communication key obtaining device of 6 and kinds is characterized by comprising a detection module, a storage module, a calling module and a calculation module, wherein,
the storage module is used for storing th decryption keys and key generation rules corresponding to specific time sequences;
the detection module is used for acquiring the sending time sequence of the message to be decrypted and inputting the sending time sequence to the calculation module, and the message to be decrypted is decrypted by adopting an Advanced Encryption Standard (AES) algorithm;
the calling module is used for calling th decryption keys corresponding to the pre-stored specific time sequence and key generation rules;
the calculation module is used for generating a second decryption key corresponding to the sending time sequence according to the th decryption key and a key generation rule, wherein the key generation rule comprises the steps of carrying out XOR, word line transformation, word S box transformation and XOR with an ethical number by using the th decryption key to obtain the second decryption key.
7. The apparatus as claimed in claim 6, wherein the calculation module is configured to calculate a timing difference between the specific timing and the transmission timing, generate a calculation logic between the th decryption key and the second decryption key according to the timing difference and a key generation rule, and calculate the second decryption key according to the calculation logic and the th decryption key.
8. The communication key acquisition apparatus according to claim 7, wherein the calculation module is configured to invoke a sequential key expansion algorithm when the timing difference is that the specific timing is earlier than the transmission timing, to obtain the calculation logic by sequential calculation using the sequential key expansion algorithm and the key generation rule, and/or to invoke a reverse key expansion algorithm when the timing difference is that the specific timing is later than the transmission timing, to obtain the calculation logic by reverse calculation using the reverse key expansion algorithm and the key generation rule, and/or to configure the calculation logic so that the th decryption key is equal to the second decryption key when the timing difference is that the specific timing is equal to the transmission timing.
9. The communication key obtaining apparatus according to claim 8, wherein the calculation module is further configured to determine whether the decryption is successful after the decryption is performed by generating the second decryption key, and update the th decryption key corresponding to the pre-stored specific timing sequence to the second decryption key corresponding to the transmission timing sequence if the decryption is successful.
A apparatus for decrypting communication messages, comprising a communication module, a decryption module, the communication key obtaining apparatus according to any of claims 6 to 9 and , wherein,
the communication module is used for receiving a message to be decrypted;
the communication key obtaining device is used for outputting a decryption key of the message to be decrypted;
the decryption module is used for decrypting the message to be decrypted by using the decryption key.
CN201610852319.6A 2016-09-26 2016-09-26 Communication key obtaining method and device and communication message decryption method and device Active CN106452743B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610852319.6A CN106452743B (en) 2016-09-26 2016-09-26 Communication key obtaining method and device and communication message decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610852319.6A CN106452743B (en) 2016-09-26 2016-09-26 Communication key obtaining method and device and communication message decryption method and device

Publications (2)

Publication Number Publication Date
CN106452743A CN106452743A (en) 2017-02-22
CN106452743B true CN106452743B (en) 2020-01-31

Family

ID=58169669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610852319.6A Active CN106452743B (en) 2016-09-26 2016-09-26 Communication key obtaining method and device and communication message decryption method and device

Country Status (1)

Country Link
CN (1) CN106452743B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311771B (en) * 2018-03-20 2022-07-22 北京小米松果电子有限公司 SM4 encryption and decryption method and circuit
CN113556404A (en) * 2021-08-03 2021-10-26 广东九博科技股份有限公司 Communication method and system between single disks in equipment
CN114301664A (en) * 2021-12-27 2022-04-08 中国电信股份有限公司 Communication encryption method, communication decryption device, and non-volatile storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1909450A (en) * 2005-08-04 2007-02-07 索尼株式会社 Method, apparatus, and program for processing information
CN101729242A (en) * 2008-10-29 2010-06-09 苏州中科集成电路设计中心有限公司 Method and device for generating symmetric block ciphers
CN101882991A (en) * 2009-05-06 2010-11-10 上海华虹集成电路有限责任公司 Communication data stream encryption method based on block cipher
CN102144370A (en) * 2008-09-04 2011-08-03 富士通株式会社 Transmitting device, receiving device, transmitting method and receiving method
CN103401871A (en) * 2013-08-05 2013-11-20 苏州大学 Method and system for sequencing ciphertexts orienting to homomorphic encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1909450A (en) * 2005-08-04 2007-02-07 索尼株式会社 Method, apparatus, and program for processing information
CN102144370A (en) * 2008-09-04 2011-08-03 富士通株式会社 Transmitting device, receiving device, transmitting method and receiving method
CN101729242A (en) * 2008-10-29 2010-06-09 苏州中科集成电路设计中心有限公司 Method and device for generating symmetric block ciphers
CN101882991A (en) * 2009-05-06 2010-11-10 上海华虹集成电路有限责任公司 Communication data stream encryption method based on block cipher
CN103401871A (en) * 2013-08-05 2013-11-20 苏州大学 Method and system for sequencing ciphertexts orienting to homomorphic encryption

Also Published As

Publication number Publication date
CN106452743A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
US7933905B2 (en) Universal-hash-function-family calculation unit and shared-key generation system
CN104270247B (en) Suitable for the efficient general Hash functions authentication method of quantum cryptography system
US11546135B2 (en) Key sequence generation for cryptographic operations
US8345861B2 (en) Sharing a secret using polynomial division over GF(Q)
US20140233727A1 (en) Method for secure substring search
Fay Introducing the counter mode of operation to compressed sensing based encryption
US11153068B2 (en) Encryption device, encryption method, decryption device and decryption method
JP2020508021A (en) Key exchange device and method
CN109274485B (en) Data encryption method, data authentication method, related equipment and system
EP2962420B1 (en) Network device configured to derive a shared key
CN106452743B (en) Communication key obtaining method and device and communication message decryption method and device
US20170272243A1 (en) Encryption apparatus, decryption apparatus, cryptography processing system, encryption method, decryption method, encryption program, and decryption program
US11438137B2 (en) Encryption device, decryption device, encryption method, decryption method, and computer readable medium
Asif et al. A novel image encryption technique based on Mobius transformation
Kish et al. Enhanced usage of keys obtained by physical, unconditionally secure distributions
CN110889695A (en) Method and device for saving and recovering private data based on secure multi-party computing
US11012230B2 (en) Communication apparatus and cryptographic processing system
US8774402B2 (en) Encryption/decryption apparatus and method using AES rijndael algorithm
CN110611568B (en) Dynamic encryption and decryption method, device and equipment based on multiple encryption and decryption algorithms
CN107317669A (en) Noiseless full homomorphism public key encryption method based on binary Representation theorem ring
JP2007019789A (en) Random number sharing system and method therefor
US20170048062A1 (en) Methods for facilitating secure communication
US11165758B2 (en) Keystream generation using media data
CN115632765A (en) Encryption method, decryption device, electronic equipment and storage medium
WO2017036251A1 (en) Advanced encryption standard encryption and decryption method, device, and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant