RU94027301A - Method for generation of encoding/decoding keyword - Google Patents

Method for generation of encoding/decoding keyword

Info

Publication number
RU94027301A
RU94027301A RU94027301/09A RU94027301A RU94027301A RU 94027301 A RU94027301 A RU 94027301A RU 94027301/09 A RU94027301/09 A RU 94027301/09A RU 94027301 A RU94027301 A RU 94027301A RU 94027301 A RU94027301 A RU 94027301A
Authority
RU
Russia
Prior art keywords
keyword
key
personal
generation
confidential
Prior art date
Application number
RU94027301/09A
Other languages
Russian (ru)
Other versions
RU2090006C1 (en
Inventor
В.И. Коржик
Ю.В. Меринович
Original Assignee
Военная академия связи
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Военная академия связи filed Critical Военная академия связи
Priority to RU94027301A priority Critical patent/RU2090006C1/en
Publication of RU94027301A publication Critical patent/RU94027301A/en
Application granted granted Critical
Publication of RU2090006C1 publication Critical patent/RU2090006C1/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

FIELD: cryptography. SUBSTANCE: method involves generation of confidential circular code keyword by choose of coefficients of symmetric polynomials f(x,x) by means of random number generator, generation of personal user identification keyword by means of substitution of user identifier in polynomials f(x,x), generation of current session keyword by means of substitution of it to personal keyword of respondent identifier. Device provides possibility of keyword distribution which is reliable to given number of disclosing personal user keywords in order to provide their confidential communications. EFFECT: simplified hardware-software design using single standard microprocessor, increased speed for generation of session keywords, decreased probability of faults when personal keyword is output, simplified storage of personal keywords, increased stability to external mechanical and electromagnetic interference. 1 dwg

Claims (1)

Изобретение относится к области криптографии, а именно к распределению ключей, и может быть использовано для построения систем распределения ключей, устойчивых к заданному числу компрометаций личных ключей пользователей, для обеспечения конфиденциальной связи между любой их парой. Целью изобретения являются разработка способа формирования ключа шифрования/дешифрования, обеспечивающего более простую программно-аппаратную реализацию на базе одного типового микропроцессора быстродействующего устройства формирования сеансового ключа, снижение вероятностных сбоев при вводе личного ключа, упрощение его хранения, повышение устойчивости к внешним механическим и электромагнитным воздействиям. Способ включает формирование конфиденциального ключа ЦРК путем выбора на основе датчика случайных чисел коэффициентов симметрических полиномов fi(x1,x2), выработку личного конфиденциального ключа пользователя - подстановкой в полиномы идентификатора пользователя, получение сеансового ключа - подстановкой в личный ключ идентификатора корреспондента.The invention relates to the field of cryptography, namely to the distribution of keys, and can be used to build key distribution systems that are resistant to a given number of compromises of users' private keys, to ensure confidential communication between any pair of them. The aim of the invention is to develop a method for generating an encryption / decryption key that provides a simpler hardware and software implementation based on one typical microprocessor of a high-speed device for generating a session key, reducing probable failures when entering a private key, simplifying its storage, increasing resistance to external mechanical and electromagnetic influences. The method includes generating a confidential key of the CRC by selecting, based on the random number sensor, coefficients of symmetric polynomials f i (x 1 , x 2 ), generating a personal confidential user key by substituting the user identifier in polynomials, obtaining a session key by substituting the correspondent identifier in the personal key.
RU94027301A 1994-07-18 1994-07-18 Encryption-decryption key forming technique RU2090006C1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
RU94027301A RU2090006C1 (en) 1994-07-18 1994-07-18 Encryption-decryption key forming technique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
RU94027301A RU2090006C1 (en) 1994-07-18 1994-07-18 Encryption-decryption key forming technique

Publications (2)

Publication Number Publication Date
RU94027301A true RU94027301A (en) 1996-07-20
RU2090006C1 RU2090006C1 (en) 1997-09-10

Family

ID=20158711

Family Applications (1)

Application Number Title Priority Date Filing Date
RU94027301A RU2090006C1 (en) 1994-07-18 1994-07-18 Encryption-decryption key forming technique

Country Status (1)

Country Link
RU (1) RU2090006C1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103647641A (en) * 2005-06-08 2014-03-19 皇家飞利浦电子股份有限公司 Deterministic key pre-distribution for mobile body sensor networks

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2642806C1 (en) * 2017-03-27 2018-01-26 Франгиз Гильфанетдинович Хисамов Method for forming key of encryption/decryption

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103647641A (en) * 2005-06-08 2014-03-19 皇家飞利浦电子股份有限公司 Deterministic key pre-distribution for mobile body sensor networks
CN103647641B (en) * 2005-06-08 2017-07-11 皇家飞利浦电子股份有限公司 The method of the scalability, elasticity and performance of identification sensor and maximization wireless system

Also Published As

Publication number Publication date
RU2090006C1 (en) 1997-09-10

Similar Documents

Publication Publication Date Title
Zhang et al. Research on a covert communication model realized by using smart contracts in blockchain environment
Saarinen HILA5: On reliability, reconciliation, and error correction for Ring-LWE encryption
Simmons Symmetric and asymmetric encryption
Zhang et al. Privacy-preserving profile matching for proximity-based mobile social networking
CN1244998C (en) Enciphering method using double keys and its wireless local network system
Farash et al. An enhanced authenticated key agreement for session initiation protocol
Frykholm et al. Error-tolerant password recovery
US20100034385A1 (en) Combinational combiner cryptographic method and apparatus
AU3144101A (en) Consumable authentication protocol and system
Chen et al. Lightweight one‐time password authentication scheme based on radio‐frequency fingerprinting
CN113297591B (en) Webpage resource encryption method, equipment and storage medium
Abiodun et al. Reinforcing the security of instant messaging systems using an enhanced honey encryption scheme: the case of WhatsApp
CN114338025A (en) Ciphertext equivalence testing method in cloud environment
Lu et al. A secure anonymous authentication scheme for wireless communications using smart cards
RU94027301A (en) Method for generation of encoding/decoding keyword
Pinto et al. Multi-recipient encryption, revisited
Zhang et al. A secure and efficient remote user authentication scheme for multi-server environments using ECC
Maximov Some words on cryptanalysis of stream ciphers
Fan et al. Provably secure nested one-time secret mechanisms for fast mutual authentication and key exchange in mobile communications
Simmons Symmetric and asymmetric encryption
Lu et al. Design and formal analysis of an authentication protocol, eWMDP on wearable devices
Qi et al. A privacy‐preserving biometrics based authenticated key agreement scheme using ECC
CN116980232B (en) Data processing method, device, computer equipment and readable storage medium
Gupta et al. Performance study of genus 3 hyperelliptic curve cryptosystem
CN113938274B (en) Data security transmission method for wearable equipment