CN108270549A - The key encryption of remote control gate inhibition a kind of and decryption method - Google Patents

The key encryption of remote control gate inhibition a kind of and decryption method Download PDF

Info

Publication number
CN108270549A
CN108270549A CN201711463858.1A CN201711463858A CN108270549A CN 108270549 A CN108270549 A CN 108270549A CN 201711463858 A CN201711463858 A CN 201711463858A CN 108270549 A CN108270549 A CN 108270549A
Authority
CN
China
Prior art keywords
ciphertext
group
array
plaintext
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711463858.1A
Other languages
Chinese (zh)
Inventor
刘平
梁建军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Fanhai Sanjiang Technology Development Co Ltd
Original Assignee
Shenzhen Fanhai Sanjiang Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Fanhai Sanjiang Technology Development Co Ltd filed Critical Shenzhen Fanhai Sanjiang Technology Development Co Ltd
Priority to CN201711463858.1A priority Critical patent/CN108270549A/en
Publication of CN108270549A publication Critical patent/CN108270549A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder

Abstract

A kind of key encryption method of remote control gate inhibition, including:S1., clear text key is split as to the binary system plaintext array of N equal portions M;S2. it carries out XOR operation with initialization vector table and first group of plaintext array and obtains the intermediate ciphertext of M;S3. intermediate ciphertext is subjected to XOR operation with next group of plaintext array and obtains intermediate ciphertext;S4. loop iteration step S3, until intermediate ciphertext and N group plaintexts array, which carry out XOR operation, obtains N group ciphertexts.Since encryption and decryption processes can carry out in client or gate inhibition end, comparison carries out stream cipher encrypting mode using network, has the advantage independent of external network, can the need protection data generated is encrypted and be stored in real time.The present invention also provides a kind of key decrypting methods of remote control gate inhibition.

Description

The key encryption of remote control gate inhibition a kind of and decryption method
Technical field
This application involves gate inhibition's technologies, and in particular to the key encryption of remote control gate inhibition a kind of and decryption method.
Background technology
The information age is had been enter into now, house security is gradually valued by the people, and under this opportunity, access control system is got over Come more universal.Wherein, user's recognition mode form is more, there is fingerprint, vocal print, specific card etc..But according to cost and technology into For ripe, by specific card, more popularized as IC, ID card carry out user identity identification.But traditional access control system is only limited to In unlocking of locally swiping the card, function is more single, and it is not good enough to form simple and safe property.Meanwhile all user informations in local side because It will not be in into encryption excessively and easily be exposed among the hazardous situation of criminal.It can be easier to without encrypted information IC, ID card information are obtained by the external mode of infection, to cause access control equipment that cannot play original so as to be duplicated into illegal card Effect.With the rise that intelligence community is built, interconnect as the trend of development, remote door access monitoring system is gradually substituting Traditional access control system.At the same time, as what second-generation resident identification card used popularizes, user has technically been supported to use for two generations The problem of resident identification card carries out user identity identification, but the thing followed is also information privacy is badly in need of solving.
There are many common data encryption algorithm, cuts both ways.And it is more common for stream cipher form at present, that is, pass through net Network obtains the mode that key carries out two-way encryption and decryption in real time, and encryption performance is preferable, but it is extremely strong to mesh dependence, needs to occupy More Internet resources.But in access control system, because existing simultaneously real-time video and voice signal, network available resources itself is It is less, network blockage can be easy to cause, when network delay or mistake, the failure of decryption can be caused, while system fortune can be increased Row load and network overhead are easy to cause the unstable of system, this is to cause for the access control system for being related to public safety Life.At the same time, when Local Area Network disconnects, storage can not be encrypted to the characteristic that need to be protected in local access control system, Easily obtained by force by outside.
Invention content
Present invention aims at providing a kind of key encryption method of remote control gate inhibition, can realize to remotely sending Key information is protected, and is prevented from being cracked by criminal in transmission process, is eliminated the risk of information leakage.
The application also provides a kind of key decrypting method of remote control gate inhibition, to realize to using above-mentioned encrypted information It is decrypted.
According in a first aspect, a kind of key encryption method of remote control gate inhibition, including:S1. clear text key is split as N The binary system plaintext array of equal portions M;S2. it carries out XOR operation with initialization vector table and first group of plaintext array and obtains M Intermediate ciphertext;S3. intermediate ciphertext is subjected to XOR operation with next group of plaintext array and obtains intermediate ciphertext;S4. loop iteration Step S3, until intermediate ciphertext and N group plaintexts array, which carry out XOR operation, obtains N group ciphertexts.
Preferably, it further includes and independent encryption is carried out to intermediate ciphertext and N groups ciphertext, ciphertext is is divided by independent encryption The left and right two halves ciphertext of equity, using expand conversion table wherein half ciphertext is carried out expansion handle to obtain it is close more than M/2 Text, the XOR operation that the data after expansion are carried out with cyclic shift table are reduced to the ciphertext of M/2;Left and right two halves ciphertext is closed again And restore the intermediate ciphertext after obtaining independent encryption and the N group ciphertexts after independent encryption.
Preferably, the ciphertext for being reduced to M/2 is exchanged into left and right sequence with the other half ciphertext, then remerges left and right two halves Ciphertext restores to obtain the ciphertext of each group M.
Preferably, in S1, if clear text key cannot be split as the binary system plaintext array of N equal portions M, with the two of setting System number polishing clear text key allows the binary number of polishing to be split as the M positions plaintext array of N equal portions.
According to second aspect, a kind of key decrypting method of remote control gate inhibition, including:A1, by N groups ciphertext with it is previous Group ciphertext carries out inverse exclusive or and handles, and obtains N group plaintext arrays;A2, the ciphertext of previous group ciphertext and previous group again is carried out it is inverse Exclusive or processing, obtains previous group plaintext array;A3, loop iteration step A2, until by first group of ciphertext and initialization vector table Inverse exclusive or is carried out to handle, obtain first group of plaintext array A4, obtained each group plaintext array is combined to obtain in order it is close in plain text Key.
Preferably, A1, inverse exclusive or will be carried out with previous group ciphertext after N group ciphertext independent decryptions handle, it is bright to obtain N groups Literary array;A2, inverse exclusive or processing will be carried out after previous group ciphertext independent decryption with the ciphertext of previous group again, it is bright obtains previous group Literary array;A3, loop iteration step A2 are carried out with initialization vector table at inverse exclusive or after by first group of ciphertext independent decryption Reason, obtains first group of plaintext array;A4, obtained each group plaintext array is combined to obtain clear text key in order;Wherein, it is independent The left and right two halves ciphertext for ciphertext to be divided into equity is decrypted, the half ciphertext wherein arranged is opened up using cyclic shift table Exhibition handles to obtain the ciphertext more than M/2, and carrying out shifting processing with expansion conversion table to the data after expansion is reduced to M/2 Ciphertext;Left and right two halves ciphertext is merged into reduction again and obtains one group of M intermediate ciphertext.
Preferably, during independent decryption, ciphertext is divided into the left and right two halves ciphertext of equity, by left and right two halves ciphertext Left and right sequence is exchanged, expansion is then carried out to the half ciphertext wherein arranged using cyclic shift table and handles to obtain more than M/2 Ciphertext, the ciphertext that shifting processing is reduced to M/2 is carried out with conversion table is expanded to the data after expansion;It is again that left and right two halves are close Text merges reduction and obtains one group of M intermediate ciphertext.
The key encryption of remote control gate inhibition according to above-described embodiment and decryption method, due to encryption and decryption processes all It can be carried out in client or gate inhibition end, comparison carries out stream cipher encrypting mode using network, has independent of extranets The advantage of network can be encrypted and store to the need protection data generated in real time.The point is for being detached from the still normal work of network It is particularly important for the access control system of work.Since there is no the dependence to network, system can be greatly decreased for Internet resources Demand, system performance and stability will be enhanced.Meanwhile in the present invention, because there is series connection coupling between different ciphertext blocks There is mistake, it will subsequent ciphertext is caused to malfunction, receiving terminal will be discovered different at this time when one of them is under attack in conjunction relationship Often.This method can efficiently and safely identify that risk and guarantee can only be decrypted partly after data are intercepted.Further, this hair It is bright in ciphering process, other than using initialization vector table to data encryption, also using expanding conversion table and cyclic shift table To data encryption, the safety of data can be improved.
Description of the drawings
Fig. 1 is one embodiment of the invention encryption flow block diagram;
Fig. 2 is independent encryption flow diagram in encryption method.
Specific embodiment
The present invention is described in further detail below by specific embodiment combination attached drawing.Wherein different embodiments Middle similar component employs associated similar element numbers.In the following embodiments, many datail descriptions be in order to The application is better understood.However, those skilled in the art can be without lifting an eyebrow recognize, which part feature It is dispensed or can be substituted by other elements, material, method in varied situations.In some cases, this Shen Please it is relevant some operation there is no in the description show or describe, this is the core in order to avoid the application by mistake More descriptions are flooded, and to those skilled in the art, these relevant operations, which are described in detail, not to be necessary, they The general technology knowledge of description and this field in specification can completely understand relevant operation.
It is herein component institute serialization number itself, such as " first ", " second " etc., is only used for distinguishing described object, Without any sequence or art-recognized meanings.And " connection ", " connection " described in the application, unless otherwise instructed, include directly and It is indirectly connected with (connection).
The present invention is based on the multiple-enciphered table matrixes of both sides' agreement, including weight cipher table matrix initialisation vector table, expand Conversion table, cyclic shift table carry out real-time encrypted and decryption using the thought of block cipher to that need to transmit data.
- 2 are please referred to Fig.1, a kind of key encryption method of remote control gate inhibition of the present invention includes:
S1. clear text key is converted into binary number, and binary number is divided into N equal portions plaintexts array difference in client Storage, every group of plaintext array has 8 character, 64 bit, if clear text key is not enough to be split as the two of N equal portions 64 System plaintext array, with the content polishing of setting, the content of the setting, which will not generate key information, to be obscured.For example, by using not having The ^ of meaning ,/, etc. the corresponding binary number of characters.
S2. it carries out XOR operation with initialization vector table and first group of plaintext array and obtains the intermediate ciphertext of 64;
S3., 64 intermediate ciphertexts are divided into 32 ciphertexts of left and right two halves of equity, using expansion conversion table to wherein one Half ciphertext carries out expansion and handles to obtain the ciphertext of 48, and then the XOR operation of the cyclic shift table of the data after expansion is restored For the ciphertext of 32;Left and right two halves ciphertext is exchanged into left and right sequence, then left and right two halves ciphertext is merged reduction and is obtained in 64 Between ciphertext;It is close that the intermediate ciphertext restored above and next group of plaintext array progress XOR operation are obtained into next centre Text;
S4. loop iteration step S3, until to obtain N groups close for intermediate ciphertext and N group plaintexts array progress XOR operation Text.
S5. 32 ciphertexts of left and right two halves of equity are divided into N group ciphertexts, conversion table is close to wherein half using expanding Text carries out expansion and handles to obtain the ciphertext of 48, is then reduced to 32 with the XOR operation of cyclic shift table to the data after expansion The ciphertext of position;Left and right two halves ciphertext is exchanged into left and right sequence, then left and right two halves ciphertext is merged reduction and obtains the ciphertext of 64, i.e., Obtain the N group ciphertexts after independent encryption.
In other embodiments of the invention, clear text key can also be divided into N equal portions plaintext arrays to store respectively, every group Plaintext array has 4 character, 32 bit, and during subsequent partition, each 16 close around is divided by 32 Text.The realization of the present invention is not influenced.
In other embodiments of the invention, can be without independent encryption process, ciphering process is simpler, available for pair The not high place of security requirements.
The present invention also provides a kind of key decrypting methods of remote control gate inhibition, are encrypted vice versa.
The method comprising the steps of:
A1, N groups ciphertext and previous group ciphertext are subjected to inverse exclusive or processing, obtain N group plaintext arrays;
A2, the ciphertext of previous group ciphertext and previous group again is subjected to inverse exclusive or processing, obtains previous group plaintext array;
A3, loop iteration step A2 are handled until first group of ciphertext and initialization vector table are carried out inverse exclusive or, obtain the One group of plaintext array;
A4, obtained each group plaintext array is combined to obtain clear text key in order.
As the preferred embodiment of decryption method of the present invention, inverse exclusive or before processing is carried out with previous group ciphertext, to current Ciphertext carries out independent decryption, specifically includes following steps:
A1, inverse exclusive or processing will be carried out after N group ciphertext independent decryptions with previous group ciphertext, and will obtain N group plaintext arrays;
A2, inverse exclusive or processing will be carried out after previous group ciphertext independent decryption with the ciphertext of previous group again, and will obtain previous group Plaintext array;
A3, loop iteration step A2 carry out inverse exclusive or after by first group of ciphertext independent decryption with initialization vector table Processing, obtains first group of plaintext array;
A4, obtained each group plaintext array is combined to obtain clear text key in order;
Wherein, independent decryption is the left and right two halves ciphertext that ciphertext is divided into equity, using cyclic shift table to wherein about Fixed half ciphertext carries out expansion and handles to obtain the ciphertext of 48, and shifting processing is carried out with conversion table is expanded to the data after expansion It is reduced to the ciphertext of 32;Left and right two halves ciphertext is merged into reduction again and obtains one group of 64 intermediate ciphertext.In addition, the half of agreement Ciphertext is corresponding with the half ciphertext expanded in ciphering process.
As the preferred embodiment of the present invention, for the exchange left and right ciphertext in corresponding ciphering process sequentially, in independent solution During close, ciphertext is divided into the left and right two halves ciphertext of equity, left and right two halves ciphertext is exchanged into left and right sequence, then using following Ring displacement table carries out expansion to the half ciphertext wherein arranged and handles to obtain the ciphertext of 48, and the expansion of the data after expansion is changed Position table carries out the ciphertext that shifting processing is reduced to 32;It is close that two halves ciphertext merging reduction in left and right is obtained into one group of 64 centre again Text.
The half ciphertext of agreement is corresponding with the half ciphertext expanded in ciphering process.
Use above specific case is illustrated the present invention, is merely used to help understand the present invention, not limiting The system present invention.For those skilled in the art, thought according to the present invention can also be made several simple It deduces, deform or replaces.

Claims (7)

1. a kind of key encryption method of remote control gate inhibition, it is characterised in that including:
S1., clear text key is split as to the binary system plaintext array of N equal portions M;
S2. it carries out XOR operation with initialization vector table and first group of plaintext array and obtains the intermediate ciphertext of M;
S3. intermediate ciphertext is subjected to XOR operation with next group of plaintext array and obtains intermediate ciphertext;
S4. loop iteration step S3, until intermediate ciphertext and N group plaintexts array, which carry out XOR operation, obtains N group ciphertexts.
2. the key encryption method of remote control gate inhibition as described in claim 1, it is characterised in that:It further includes to intermediate ciphertext Independent encryption is carried out with N groups ciphertext, independent encryption is that ciphertext is divided into the left and right two halves ciphertext of equity, is replaced using expanding Table carries out wherein half ciphertext expansion and handles to obtain the ciphertext more than M/2, and cyclic shift table is carried out to the data after expansion XOR operation be reduced to the ciphertext of M/2;Left and right two halves ciphertext is merged into the intermediate ciphertext after reduction obtains independent encryption again With the N group ciphertexts after independent encryption.
3. the key encryption method of remote control gate inhibition as claimed in claim 2, it is characterised in that:It will be reduced to M/2 Ciphertext exchanges left and right sequence with the other half ciphertext, then remerges left and right two halves ciphertext and restores to obtain the ciphertext of each group M.
4. the key decrypting method of remote control gate inhibition as described in claim 1, it is characterised in that:In S1, if close in plain text Key cannot be split as the binary system plaintext array of N equal portions M, with the binary number polishing clear text key of setting, make the two of polishing System number can be split as the M positions plaintext array of N equal portions.
5. a kind of key decrypting method of remote control gate inhibition, it is characterised in that including:
A1, N groups ciphertext and previous group ciphertext are subjected to inverse exclusive or processing, obtain N group plaintext arrays;
A2, the ciphertext of previous group ciphertext and previous group again is subjected to inverse exclusive or processing, obtains previous group plaintext array;
A3, loop iteration step A2 handle until first group of ciphertext and initialization vector table are carried out inverse exclusive or, obtain first group Plaintext array;
A4, obtained each group plaintext array is combined to obtain clear text key in order.
6. the key decrypting method of remote control gate inhibition as claimed in claim 5, it is characterised in that:
A1, inverse exclusive or processing will be carried out after N group ciphertext independent decryptions with previous group ciphertext, and will obtain N group plaintext arrays;
A2, inverse exclusive or processing will be carried out after previous group ciphertext independent decryption with the ciphertext of previous group again, and will obtain previous group in plain text Array;
A3, loop iteration step A2 carry out inverse exclusive or processing after by first group of ciphertext independent decryption with initialization vector table, Obtain first group of plaintext array;
A4, obtained each group plaintext array is combined to obtain clear text key in order;
Wherein, independent decryption is the left and right two halves ciphertext that ciphertext is divided into equity, using cyclic shift table to wherein arranging Half ciphertext carries out expansion and handles to obtain the ciphertext more than M/2, and the data after expansion are carried out with expansion conversion table at displacement Reason is reduced to the ciphertext of M/2;Left and right two halves ciphertext is merged into reduction again and obtains one group of M intermediate ciphertext.
7. the key decrypting method of remote control gate inhibition as claimed in claim 6, it is characterised in that:In independent decryption process In, ciphertext is divided into the left and right two halves ciphertext of equity, left and right two halves ciphertext is exchanged into left and right sequence, then using cyclic shift Table carries out the half ciphertext wherein arranged expansion and handles to obtain the ciphertext more than M/2, and the expansion of the data after expansion is changed Position table carries out the ciphertext that shifting processing is reduced to M/2;Two halves ciphertext merging reduction in left and right is obtained again close among one group M Text.
CN201711463858.1A 2017-12-28 2017-12-28 The key encryption of remote control gate inhibition a kind of and decryption method Pending CN108270549A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711463858.1A CN108270549A (en) 2017-12-28 2017-12-28 The key encryption of remote control gate inhibition a kind of and decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711463858.1A CN108270549A (en) 2017-12-28 2017-12-28 The key encryption of remote control gate inhibition a kind of and decryption method

Publications (1)

Publication Number Publication Date
CN108270549A true CN108270549A (en) 2018-07-10

Family

ID=62772701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711463858.1A Pending CN108270549A (en) 2017-12-28 2017-12-28 The key encryption of remote control gate inhibition a kind of and decryption method

Country Status (1)

Country Link
CN (1) CN108270549A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109784076A (en) * 2019-01-10 2019-05-21 八维通科技有限公司 A kind of encrypting and decrypting method of 8583 agreement
CN110798455A (en) * 2019-10-18 2020-02-14 深圳市高德信通信股份有限公司 Encrypted communication transmission system for preventing information leakage
CN116720537A (en) * 2023-08-10 2023-09-08 天津环球磁卡科技有限公司 Bus card data reading method and reading system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7167856B2 (en) * 2001-05-15 2007-01-23 Jonathan Keir Lawder Method of storing and retrieving multi-dimensional data using the hilbert curve
CN103634101A (en) * 2013-12-03 2014-03-12 中国电子器材总公司 Encryption processing method and encryption processing equipment
CN106656472A (en) * 2016-12-27 2017-05-10 广州智慧城市发展研究院 Transaction data encryption method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7167856B2 (en) * 2001-05-15 2007-01-23 Jonathan Keir Lawder Method of storing and retrieving multi-dimensional data using the hilbert curve
CN103634101A (en) * 2013-12-03 2014-03-12 中国电子器材总公司 Encryption processing method and encryption processing equipment
CN106656472A (en) * 2016-12-27 2017-05-10 广州智慧城市发展研究院 Transaction data encryption method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109784076A (en) * 2019-01-10 2019-05-21 八维通科技有限公司 A kind of encrypting and decrypting method of 8583 agreement
CN109784076B (en) * 2019-01-10 2021-07-06 八维通科技有限公司 Encryption and decryption method of 8583 protocol
CN110798455A (en) * 2019-10-18 2020-02-14 深圳市高德信通信股份有限公司 Encrypted communication transmission system for preventing information leakage
CN110798455B (en) * 2019-10-18 2021-05-18 深圳市高德信通信股份有限公司 Encrypted communication transmission system for preventing information leakage
CN116720537A (en) * 2023-08-10 2023-09-08 天津环球磁卡科技有限公司 Bus card data reading method and reading system
CN116720537B (en) * 2023-08-10 2023-10-10 天津环球磁卡科技有限公司 Bus card data reading method and reading system

Similar Documents

Publication Publication Date Title
CN107682141A (en) Data ciphering method and system for data transfer
CN108055235A (en) A kind of control method of smart lock, relevant device and system
CN108270549A (en) The key encryption of remote control gate inhibition a kind of and decryption method
CN112101531B (en) Neural network model training method, device and system based on privacy protection
Bringer et al. Faster secure computation for biometric identification using filtering
US7779272B2 (en) Hardware cryptographic engine and encryption method
Morawiecki Practical attacks on the round‐reduced PRINCE
Rajput et al. An improved cryptographic technique to encrypt text using double encryption
Dongare et al. An efficient technique for image encryption and decryption for secured multimedia application
CN111698252B (en) Cloud platform data encryption transmission method and system
CN106022158A (en) A takeout management system for file datas
WO2021176242A1 (en) Scrambler apparatus and method in particular for cryptographic applications, and descrambler apparatus and method therefor
CN105959106B (en) A kind of low-complexity digital encryption method
Wu et al. Cryptanalysis of Rijmen-Preneel trapdoor ciphers
Forhad et al. An improvement of advanced encryption standard
AlRababah Digital image encryption implementations based on AES algorithm
Kumar et al. Invo-substitute: Three layer encryption for enhanced e-commerce website security using substitution cipher and involution function
Krishnagopal et al. Image encryption and steganography using chaotic maps with a double key protection
Habibi et al. Security and privacy analysis of Song–Mitchell RFID authentication protocol
EP3883178A1 (en) Encryption system and method employing permutation group-based encryption technology
Kiryukhin Related-key attack on 5-round Kuznyechik
Quenaya et al. Image encryption using an image pattern based on advanced encryption standard
JP2001257673A (en) Communicating method and communicating system device
JP2002108205A (en) Block ciphering method and decoding method
Liu et al. Legitimate-reader-only attack on MIFARE Classic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180710

RJ01 Rejection of invention patent application after publication