TW410519B - A method of encryption and decryption in data transmission - Google Patents

A method of encryption and decryption in data transmission Download PDF

Info

Publication number
TW410519B
TW410519B TW88101625A TW88101625A TW410519B TW 410519 B TW410519 B TW 410519B TW 88101625 A TW88101625 A TW 88101625A TW 88101625 A TW88101625 A TW 88101625A TW 410519 B TW410519 B TW 410519B
Authority
TW
Taiwan
Prior art keywords
data
sample
bits
patent application
column
Prior art date
Application number
TW88101625A
Other languages
Chinese (zh)
Inventor
Kuang-Shr Wu
Original Assignee
Chung Shan Inst Of Science
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chung Shan Inst Of Science filed Critical Chung Shan Inst Of Science
Priority to TW88101625A priority Critical patent/TW410519B/en
Application granted granted Critical
Publication of TW410519B publication Critical patent/TW410519B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A method of encryption and decryption in data transmission is provided to allocate a header for the encrypted or decrypted data, wherein the header having a methodology field, a bit-count field, and a sample field. According to the methodology field, the invention decides the way of logic operation for encryption and decryption and encrypts or decrypts the data needed to be encrypted or decrypted with the sample.

Description

410519 4 2 2 7 twf . doc / 0 0 8 A7 B7 經濟部中央標準局貝工消費合作杜印製 五、發明説明(ί ) 本發明是有關於一種資料傳送方法,且特別是有關 於一種具有保護資料隱密性之資料傳送方法。 隨著網際網路的蓬勃發展以及網路技術的突飛猛 進,使用網際網路來傳送資料已經是非常普遍的。網際 網路的資料可以被網路上的使用者所擷取與閱讀,這對 一般性資料而言,是無仿害的;然而,如果涉及到一些 個人基本資料、國家與國防機密或是必須特定人士才能 閱讀的資料時,在網際網路上所傳送的資料就必須加以 保護,以避免被不肯之徒利用。例如,個人之金融相關 資料若被竊取,將造成無比的損失。爲此,便發展出資 料傳送的加密(encryption)與解密方法。在資料傳送之 前’先以特定的加密方法將所傳之資料進行編碼或打 亂;接著,接收資料後,有權閱讀資料的人在以特定的 解密程序將資料還原,使之可以閱讀。藉此,資料便可 以在傳送過程中被保護而不至於被不宵之徒所竊取。加 解密之應用範圍包括文件與影像資料、電子郵件、網路 資料或無線傳送資料等等。保密技術係一種編碼/解碼方 法,用來確保只有受信人才能夠了解信件內容;確實發 信方之真實身分以及能夠驗證信件的內容並未被竄改。 在網際網路的情況下,資料的傳送係以封包(packet)的形 式來傳送的。爲了保護資料在傳送過程不會被攔截,傳 送的資料必須予以加密。所謂加密傳送係指一資料過程 中,所傳送的資料是重新編排過的,並且要經過正確的 解密鍵値才能解密。 3 本紙張尺度適用中國國家;^準(CNS > A4規格(210X297公瘦) ^ ' I--‘--------^----、訂------線 (請先閲讀背面之注意事項再填寫本頁) 經濟部中央標準局員工消费合作杜印製 410519 Δ7 Α7 4227twf.d〇c/008 町 五、發明説明(2 ) 資料加密標準(the data encrypt on standard,DES)係 其中一種加密方法’在1974年由美國國家標準局 (National Bureau of Standards,NBS)公開徵求而得的。 其由IBM公司硏發完成,並且成爲官方加密標準。DES 加密方法係擴散(diffusion)與混淆(confusion)由兩種運算 來完成加密’輸入的資料會被運算16次。每一次如何 使用擴散與混淆運算係由金匙(key)來決定。RC4加密 法,其由RSA資料安全組織(RSA Data Security)所發展 出來。例如目前在網景(Netscape)所用爲使用金匙長度 爲40位元的RC4-40方法,但是最近爲人所破解。IDEA 加密法,其利用128位元的金匙來將一 64位元的資料 區間加密。 此外,一種目前最被廣泛使用的加密法爲李微斯 (Revest) '夏米爾(shamir)與雅德曼(Adleman)所發展之 RSA法,取其三人的人名縮寫。RSA法爲公開金匙(public key)的加密程序。RSA法首先選擇兩個非常大的質數(p, q) °接著計算公開模數(public modulus) η,使得η爲p 與q之乘積以及k=(p-l)X(q-l)。選擇加密指數e,使 gcd(e ’ k)=l,以及選擇解密指數d,並使得ed=l mod k。 此法以(e,η)爲公開金匙,而(d,η)爲私人金匙(private key)。收資料的一方利用私人金匙(d,η)便可以將加密 資料解開,。 綜上所述,現行已公開之加名方法的方法都過於複 雜,其對應的實施硬體也隨之複雜。此外,現行已公開 4 本紙張尺度適用中國國家標準(CNS ) A4規格(:Π0Χ297公釐) (請先鬩讀背面之注意事項再填寫本页) ,1Τ 經濟部中央榡準局貝工消費合作社印製 410519 A7 4 2 2 7 twf . doc / Ο Ο 8 B7 五、發明説明(>7 ) 之加密有許多_都有破法。 因此本發明係提出一種資料傳送之加密與解密方 法,其爲一種快速且有效的方法。 本發明係提出一種資料傳送之加密與解密方法,其 用簡單的硬體架構便可,以達到本發明之方法。 本發明提出一種資料傳送之加密與解密方法,其簡 述如下: 一種資料加密方法,用以將資料流加密,此資料流 具有表頭部分與資料部分。表頭部分更包括方法欄、位 元數欄與樣本欄。首先’讀取表頭之方法欄,決定用以 加密的邏輯運算法。讀取表頭之位元數欄與樣本欄所紀 錄之位元數與樣本,樣本之位元數與位元數欄之位元數 相等。讀取資料流中之資料部分。依據上述邏輯運算法, 將資料與樣本進行邏輯運算,用以產生一加密資料。 邏輯運算法係包括互斥或運算(XOR)、加法運算 (ADD)、減法運算(SUB)、遞回互斥或運算(RXOR)、反 相運算、重複運算等之邏輯運算,或上述邏輯運算之組 合。 一種資料解密方法,用以將加密資料流解密,加密 資料流係由表頭部分與加密資料部分所構成。表頭更包 括方法欄、位元數欄與樣本欄。首先,讀取表頭之方法 欄,決定用以解密的邏輯運算法。讀取表頭之位元數欄 與樣本欄所紀錄之位元數與樣本,其中樣本之位元數與 位元數欄之位元數相等。讀取資料流中之加密資料。依 5 (請先閱讀背面之注意事項再填寫本頁) 訂 ^ 本紙張尺度適用中國國家橾準(CNS ) A4死格(210X297公釐) A7 B7 經濟部中央標举局員工消費合作杜印裝 22 7 twf 五、發明説明(4 ) 據上述之邏輯運算法,將加密資料與樣本進行邏輯運 算’用以還原加密資料。 邏輯運算法係包括互斥或運算(XOR)、加法運算 (ADD)、減法運算(SUB)、遞回互斥或運算(RXOR)、反 相運算、重複運算等之邏輯運算,或上述邏輯運算之組 合。 爲讓本發明之上述目的、特徵、和優點能更明顯易 懂’下文特舉較佳實施例,並配合所附圖式,作詳細說 明如下: 圖式之簡單說明:ι 第IA圖繪示繪示資料經過加密的傳輸流程圖; 第1B圖繪示繪示資料經過解密的傳輸流程圖; 第2圖繪示一資料流之表頭欄位配置圖; 第3圖繪示資料加密流程圖; 第4圖繪示實施第3圖之流程的硬體架構示意圖; 第5圖繪示資料解密流程圖;以及 第6圖繪示實施第5圖之流程的硬體架構示意圖; 標號說明: Ί---:-------士取-- (請先聞讀背面之注意事項再填寫本頁) 文 壓縮流程 14通道編碼流程 18解密流程 3 〇資,料流 34資料欄 32b位元數目攔 12加密流程 16通道解碼流程 20解壓縮流程 32表頭 32a方法欄 32c位元樣本欄 本纸張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 410519 4227twf ,d〇c/〇〇Q. 經濟部中央標準局員工消费合作社印製 五、發明説明U ) 100〜150加密流程 160輸入資料流 172解碼器 250接收資料流 262解碼器 實施例 請參照第1 Α圖與第1 Β圖 與解密的流程圖。 首先參考第1A圖,要被傳送的原始資料之資料流 (data flow)係數位訊號,經過流程1〇之壓縮技術將原始 資料流加以壓縮,其壓縮方法可以爲任一種已知的壓縮 技術。壓縮後的資料在給加密運算裝置進行加密流程 I2。經過加密的資料再藉由通道編碼(channel encoding) 方法進行通道編碼14,其通道編碼方法可以爲任一種已 知的通道編碼技術。此時,便可以將加密的壓縮資料透 過網路或無線傳輸的方式傳送出去。 參考第1B圖。接收者收到資料後,便依解密流程 來將加密的壓縮資料解密與解壓縮。加密的壓縮資料先 由任一種已知的通道解碼(channel decoding)技術進行通 道解碼16。接著,再由解密運算裝置將加密的資料解密 18,之後再經過任何一種既知解壓縮技術將壓縮資料解 壓縮20,,並還原爲原始資料。 本發明之重點與特徵即在加密與解密方法。加解密 的方法主要係依據資料流的欄位(field)結構來決定加密 200〜240解密流程 170加密運算裝置 174a〜〗74n邏輯電路 260解密運算裝置 264a〜264η邏輯電路 ,其繪示資料傳輸之解密 ! ^ n ~~ I 取 I I 訂"一I I 11 — 4 (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家揉準(CNS ) A4规格(2丨0 X 297公釐) 410519 4227twf.d〇c/008 A7 B7 經_部中央標準局員工消費合作社印製 五、發明説明u ) 與解密方法與運算方法。爲了讓本發明之方法更爲淸楚 理解,首先,先解釋應用於本發明之方法的資料流的欄 位結構。 請參考第2圖’其繪示應用本發明之加解密方法所 使用之資料流的欄位結構。一資料流30主要由兩部分 構成’一爲表頭(head)部分32,另一爲資料(data)34本 身°表頭32更包括方法欄32a、位元數目欄32b與位元 樣本欄32c。方法欄32a係用來指定加密或解密的方式, 其欄位的大小可以隨編碼演算法之數目而增減。例如, 方法欄32a的大小若爲8位元的話,就可以有25 6 (28) 加密或解密的演算法。方法欄3:2a可以爲一般之邏輯運 算,如互斥或(XOR)運算、加法(ADD)運算、遞回互斥 或(recursive XOR ’ RXOR)運算 '反相(invert)運算、互 補(complement)運算與重複(repeat)運算等等之邏輯運 算,或著上述之邏輯運算的組合。 /^元數目欄(bit number field)32b係用來指定最小的 加密或解密之基本單位,亦即一次運算所使用的位元 數。位元樣本欄(sample bit Held)32c係依據位元數目欄 位給於一樣本。當位元數目大於樣本的位元數目時,則 將樣本加以複製使用,直到與位元數目相等;之後,在 一方法欄32a所指定的演算法進行加密或解密。 請參考第3圖,其繪示本發明之加密方法的流程圖。 流程】〇〇表示開始加密流程。首先,執行流程102決定 資料位元的數目。接著,執行流程102,讀取要加密的 8 (請先閱讀背面之注意事項再填寫本頁) 訂 本紙張尺度適用中國國家標準(CNS ) A4規格(210X 297公釐) 410519 A7 B7 4 2 2 7 twf. doc/0 〇 8 五、發明説明(1 ) 資料。在流程丨06時,讀取編碼型態(encoding pattern) - * n· n ΙΓ n - ! : 1 b 丁 、T (請先閱讀背面之注$項再填寫本頁) 做爲加密方法,並且決定位元數目,以及與此位元數目 的位元數相等的一樣本。在流程108,便依據所讀取的 編碼型態(加密方法)、位元數目、樣本與資料,輸出包 含編碼型態、位元數目、樣本之表頭的資料流,其如第 2圖之結構。 經濟部中央標準局貝工消費合作社印製 擦#,加密流程U0讀取資料流。假如沒有要加密 的資料,即資料已經傳送完畢,到達檔案結束(end of file,EOF)時,便結束加密120。當檔案尙未結束時,便 依據資料流之表頭所定義的加密方法、位元數目以及與 位元數目之位元數相等的樣本,如130、132與134等, 並配合資料流中的資料加以運算140、142與144等, 而得到加密的資料150。每一筆資料流的資料加密完成 且輸出資料後,加密流程會再判斷是否爲EOF 110,當 EOF時,表示資料已經全部加密完畢,便結束加密120〇 、請參考第4圖,其繪示實施上述之加密方法的硬體 架構示意圖。加密運算裝置170至少包括一解碼器172 與多個加密邏輯電路174a,174b,...,174η等。請配合 參考第2圖之資料流欄位結構,輸入資料流160輸入到 加密運算裝置170後,表頭32之位元數目欄32b的位 元數目、樣本32c與資料34輸入至加密邏輯電路174a, 174b,..·,,174η。表頭32的方法欄32a資訊則輸入給解 碼器172,解碼器172依據方法欄位32a決定此筆資料 所要使用的加密邏輯運算方法,並選擇加密邏輯電路 9 本紙張尺度適用中國國家標準(CNS ) A4说格(210X297公着) 410519 4227twf.doc/008 A7 B7 經濟部中央標準局貝工消費合作社印聚 五、發明説明() l74a,l74b,…,174η的其中之一。例如,選擇加密邏 輯電路174a爲XOR邏輯時,加密邏輯電路174a便依據 樣本來與資料流中的資料進行XOR運算。資料經由XOR 運算後便產生加密的資料,而輸出給通道編碼裝置。 上述之加密流程(130、140)、(132、142)與(134、144) 係代表各種不同的邏輯運算加密方法,如前所述之XOR 運算、ADD運算、RXOR運算、反相運算、互補運算與 重複運算等等之邏輯運算,或者上述之邏輯運算的組 合。接著便要舉出數個例子用來說明本發明之加密的邏 輯方法。要注意的是,其僅做爲例子之用,並非用以限 制本發明一定要使用例子所指出的運算。 假如加密運算採用邏輯XOR運算,位元數目爲3 位元,則樣本也爲3位元,例如樣本爲1 0 1 (二進位)時, 要加密的資料如果爲10101100(二進位,8位元)。因爲 樣本的位元數少於資料,便必須先複製樣本成8位元而 成爲10110110=«之後在將資料101011000與複製樣本 10110110的每一對應位元進行XOR運算,藉以產生 0001 1010,此即爲加密的資料。 假如加密運算採用邏輯ADD運算,位元數目爲4 位元,則樣本也爲4位元,例如樣本爲1011(二進位)時, 要加密的資料如果爲1 〇 1011 〇〇(二進位,8位元)。因爲 樣本的位元數少於資料,便必須先複製樣本成S位元而 成爲10111011。之後在將資料10101 1000與複製樣本 10110110的每四個位元一組進行ADD運算,藉以產生 ---:--------裝— (請先閲讀背面之注意事項再填寫本頁〕410519 4 2 2 7 twf. Doc / 0 0 8 A7 B7 Printed by Shellfish Consumer Cooperation of the Central Standards Bureau of the Ministry of Economic Affairs of the People's Republic of China. 5. Description of the Invention The invention relates to a method for transmitting data, and in particular to a method having Data transmission methods to protect data privacy. With the rapid development of the Internet and the rapid advancement of network technology, the use of the Internet to transmit data has become very common. Internet data can be retrieved and read by users on the Internet, which is not imitation of general data; however, if it involves some basic personal data, state and national defense secrets, or it must be specified When data can only be read by people, the data transmitted on the Internet must be protected from being used by unscrupulous people. For example, if personal financial information is stolen, it will cause tremendous losses. For this reason, encryption and decryption methods for data transmission have been developed. Before the data is transmitted ', the transmitted data is encoded or scrambled with a specific encryption method; then, after receiving the data, the person who has the right to read the data restores the data with a specific decryption procedure so that it can be read. In this way, data can be protected during the transmission process from being stolen by unscrupulous people. The applications of encryption and decryption include documents and video data, e-mail, network data or wireless transmission data. Confidentiality technology is an encoding / decoding method used to ensure that only trusted people can understand the contents of the letter; the true identity of the sender and the ability to verify that the contents of the letter have not been tampered with. In the case of the Internet, data is transmitted in the form of packets. In order to protect the data from being intercepted during transmission, the transmitted data must be encrypted. The so-called encrypted transmission means that in the process of data transmission, the transmitted data has been rearranged and can only be decrypted with the correct decryption key. 3 This paper size applies to China; ^ standard (CNS > A4 size (210X297 male thin) ^ 'I --'-------- ^ ----, order ------ line ( Please read the precautions on the back before filling out this page) Consumption Cooperation by Employees of the Central Standards Bureau of the Ministry of Economic Affairs 410519 Δ7 Α7 4227twf.d〇c / 008 Description of the Invention (2) The data encrypt on standard (DES), one of the encryption methods, was publicly solicited by the National Bureau of Standards (NBS) in 1974. It was issued by IBM and became the official encryption standard. The DES encryption method has spread (Diffusion) and confusion are encrypted by two operations. The input data will be calculated 16 times. How to use the diffusion and confusion operations each time is determined by the key. RC4 encryption method, which is RSA Developed by RSA Data Security. For example, the RC4-40 method with a key length of 40 bits is currently used in Netscape, but it has been recently cracked. IDEA encryption method, which uses 128 Bit golden key to convert a 64 bit In addition, one of the most widely used encryption methods is the RSA method developed by Revest 'Shamir and Adleman, which is the abbreviation of the three names. RSA Method is a public key encryption program. The RSA method first selects two very large prime numbers (p, q) ° and then calculates the public modulus η, so that η is the product of p and q and k = (pl) X (ql). Choose the encryption index e such that gcd (e 'k) = l, and choose the decryption index d such that ed = l mod k. This method uses (e, η) as the public golden key. , And (d, η) is a private key. The party receiving the data can use the private key (d, η) to unlock the encrypted data. In summary, the existing methods of adding names are public. The methods are too complicated, and the corresponding implementation hardware is also complicated. In addition, the currently published 4 paper standards are applicable to the Chinese National Standard (CNS) A4 specification (: Π0 × 297 mm) (Please read the precautions on the back first (Fill in this page again), printed by 1TT Shellfish Consumer Cooperative, Central Bureau of Standards, Ministry of Economic Affairs 410519 A7 4 2 2 7 twf. doc / 〇 〇 8 B7 5. There are many encryption methods in the description of the invention (> 7). Therefore, the present invention proposes an encryption and decryption method for data transmission, which is a fast and effective method. The present invention proposes a method for encrypting and decrypting data, which can be achieved with a simple hardware architecture to achieve the method of the present invention. The present invention provides a method for encrypting and decrypting data transmission, which is briefly described as follows: A data encryption method is used to encrypt a data stream, which has a header part and a data part. The header section also includes a method column, a bit number column, and a sample column. First, read the method column of the header and determine the logical algorithm used for encryption. Read the number of bits and samples recorded in the digits column and sample column of the header. The number of bits in the sample is the same as the number of bits in the digit column. Read the data portion of the data stream. According to the above-mentioned logical operation method, the data and the sample are logically operated to generate an encrypted data. The logical operation system includes logical operations of mutual exclusion or operation (XOR), addition (ADD), subtraction (SUB), recursive mutual exclusion or operation (RXOR), inverse operation, repeated operation, or the above logical operations Of combination. A data decryption method is used to decrypt an encrypted data stream. The encrypted data stream is composed of a header part and an encrypted data part. The header includes a method column, a bit number column, and a sample column. First, read the method column of the header to determine the logical algorithm used for decryption. Read the number of bits and samples recorded in the bit number column and sample column of the header, where the number of bits in the sample is equal to the number of bits in the bit number column. Read encrypted data in the data stream. Based on 5 (Please read the notes on the back before filling in this page) Order ^ This paper size is applicable to China National Standards (CNS) A4 Dead Space (210X297 mm) A7 B7 Employees ’Central Government Bureau of Ministry of Economic Affairs Consumption Cooperation Du printed 22 7 twf V. Description of the invention (4) According to the above-mentioned logical operation method, the encrypted data and the sample are subjected to a logical operation 'to restore the encrypted data. The logical operation system includes logical operations of mutual exclusion or operation (XOR), addition (ADD), subtraction (SUB), recursive mutual exclusion or operation (RXOR), inverse operation, repeated operation, or the above logical operations Of combination. In order to make the above-mentioned objects, features, and advantages of the present invention more comprehensible, the following describes the preferred embodiments in detail with the accompanying drawings, as follows: Brief description of the drawings: ι diagram IA Figure 1B shows the encrypted transmission flowchart; Figure 1B shows the decrypted transmission flowchart; Figure 2 shows the header field layout of a data stream; Figure 3 shows the data encryption flowchart Figure 4 shows a schematic diagram of the hardware architecture implementing the process of Figure 3; Figure 5 shows a flowchart of data decryption; and Figure 6 shows a schematic diagram of the hardware architecture implementing the process of Figure 5; Symbol description: 说明---: ------- Shitou-- (Please read the notes on the back before filling in this page) Text Compression Process 14 Channel Encoding Process 18 Decryption Process 3 〇 Data, Stream 34 Data Column 32b Bit Yuan number block 12 encryption process 16 channel decoding process 20 decompression process 32 header 32a method column 32c bit sample column This paper size applies Chinese National Standard (CNS) A4 specification (210X297 mm) 410519 4227twf, doc / 〇〇Q. Consumers' cooperation with the Central Bureau of Standards of the Ministry of Economic Affairs Printed V. invention is described in U) 100~150 encryption process 160 input data stream 172 decoder 250 receives the data stream decoder 262 of FIG. 1 Α flowchart of FIG. 1 Β first embodiment and decryption refer embodiment. First, referring to FIG. 1A, the data flow coefficient signal of the original data to be transmitted is compressed by the compression technology of the flow 10, and the compression method can be any known compression technology. The compressed data is subjected to the encryption process I2 to the encryption computing device. The encrypted data is then channel-encoded by the channel encoding method. The channel encoding method can be any known channel encoding technology. At this time, the encrypted compressed data can be transmitted through the network or wireless transmission. Refer to Figure 1B. After receiving the data, the receiver decrypts and decompresses the encrypted compressed data according to the decryption process. Encrypted compressed data is first channel-decoded by any of the known channel decoding techniques16. Then, the encrypted data is decrypted 18 by the decryption computing device, and then the compressed data is decompressed 20 by any known decompression technology, and restored to the original data. The key and characteristic of the present invention is the encryption and decryption method. The encryption and decryption method is mainly based on the field structure of the data stream to determine the encryption 200 ~ 240 decryption process 170 encryption operation device 174a ~ 74n logic circuit 260 decryption operation device 264a ~ 264n logic circuit, which shows the data transmission Decrypt! ^ N ~~ I take II order " a II 11 — 4 (Please read the notes on the back before filling out this page) This paper size applies to China National Standards (CNS) A4 specifications (2 丨 0 X 297) (Centi) 410519 4227twf.doc / 008 A7 B7 Printed by the Ministry of Standards and Staff's Consumer Cooperatives. 5. Description of invention u) and decryption methods and calculation methods. In order to make the method of the present invention more understandable, first, the field structure of the data stream applied to the method of the present invention is explained first. Please refer to FIG. 2 'which shows the field structure of the data stream used in applying the encryption and decryption method of the present invention. A data stream 30 is mainly composed of two parts: one is a header part 32, and the other is data 34 itself. The header 32 further includes a method column 32a, a bit number column 32b, and a bit sample column 32c. . The method field 32a is used to specify the encryption or decryption method. The size of the field can be increased or decreased with the number of encoding algorithms. For example, if the size of the method field 32a is 8 bits, there can be an encryption or decryption algorithm of 25 6 (28). Method column 3: 2a can be general logical operations, such as mutually exclusive or (XOR) operations, addition (ADD) operations, recursive mutual exclusion or (recursive XOR 'RXOR) operations' invert operations, complementary ) Logical operations such as operations and repeat operations, or a combination of the above logical operations. The bit number field 32b is used to specify the smallest basic unit of encryption or decryption, that is, the number of bits used in one operation. The sample bit column 32c is based on the number of bits. When the number of bits is greater than the number of bits in the sample, the sample is copied and used until it is equal to the number of bits; thereafter, the algorithm specified in a method column 32a is used for encryption or decryption. Please refer to FIG. 3, which illustrates a flowchart of the encryption method of the present invention. Process] 〇〇 means start the encryption process. First, the execution process 102 determines the number of data bits. Next, execute the process 102 to read the 8 to be encrypted (please read the precautions on the back before filling this page) The size of the paper is applicable to the Chinese National Standard (CNS) A4 specification (210X 297 mm) 410519 A7 B7 4 2 2 7 twf. Doc / 0 〇8 5. Description of the invention (1) Information. At flow 丨 06, read the encoding pattern-* n · n ΙΓ n-!: 1 b D, T (please read the note on the back before filling this page) as the encryption method, and Determines the number of bits, and the same number of bits as this number of bits. In the process 108, a data stream including the encoding type, the number of bits, and the sample header is output according to the read encoding type (encryption method), number of bits, samples, and data, as shown in FIG. 2 structure. Printed by the Central Laboratories of the Ministry of Economic Affairs, Shellfish Consumer Cooperative, and the encryption process U0 reads the data stream. If there is no data to be encrypted, that is, the data has been transmitted and the end of file (EOF) is reached, the encryption is ended 120. When the file is not finished, according to the encryption method defined by the header of the data stream, the number of bits, and samples equal to the number of bits, such as 130, 132, and 134, and cooperate with the data stream. The data is calculated by 140, 142, and 144 to obtain encrypted data 150. After the data of each data stream is encrypted and the data is output, the encryption process will determine whether it is EOF 110. When EOF indicates that the data has been completely encrypted, it will end the encryption 120. Please refer to Figure 4 for the implementation. Schematic diagram of the hardware architecture of the above encryption method. The encryption operation device 170 includes at least a decoder 172 and a plurality of encryption logic circuits 174a, 174b, ..., 174n, and the like. Please refer to the data stream field structure in Figure 2. After the input data stream 160 is input to the encryption operation device 170, the number of bits in the bit number column 32b of the header 32, the sample 32c, and the data 34 are input to the encryption logic circuit 174a. , 174b, .. ,, 174η. The information in the method column 32a of the header 32 is input to the decoder 172, and the decoder 172 determines the encryption logic operation method to be used for this data according to the method field 32a, and selects the encryption logic circuit. ) A4 grid (210X297) 410519 4227twf.doc / 008 A7 B7 Printed by the Bayer Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs of the People's Republic of China 5. Description of the invention () One of l74a, l74b, ..., 174η. For example, when the encryption logic circuit 174a is selected as the XOR logic, the encryption logic circuit 174a performs an XOR operation on the data in the data stream according to the sample. After the data is XORed, encrypted data is generated and output to the channel encoding device. The above-mentioned encryption processes (130, 140), (132, 142), and (134, 144) represent a variety of different logical operation encryption methods, such as the XOR operation, ADD operation, RXOR operation, inverse operation, and complementation, as described above. Logical operations such as operations and repeated operations, or a combination of the above-mentioned logical operations. Next, a few examples will be given to illustrate the encryption logic method of the present invention. It should be noted that it is only used as an example, and is not intended to limit the present invention to the operations indicated by the examples. If the encryption operation uses a logical XOR operation and the number of bits is 3 bits, the sample is also 3 bits. For example, when the sample is 1 0 1 (binary), if the data to be encrypted is 10101100 (binary, 8 bits) ). Because the number of bits in the sample is less than the data, you must first copy the sample into 8 bits and become 10110110 = «, and then perform an XOR operation on each corresponding bit of the data 101011000 and the copied sample 10110110 to generate 0001 1010, that is, For encrypted data. If the encryption operation uses a logical ADD operation and the number of bits is 4 bits, the sample is also 4 bits. For example, when the sample is 1011 (binary), the data to be encrypted is 1 010 1011 〇 (binary, 8 Bit). Because the number of bits in the sample is less than the data, the sample must first be copied into S bits to become 10111011. Then perform an ADD operation on each of the four bits of the data 10101 1000 and the copy sample 10110110 to generate ---: -------- install— (Please read the precautions on the back before filling this page A

、1T r 本紙锒尺度適用中國國家標準(CNS ) A4说格(210X297公釐) 410519 4 2 2 7 twf . doc /0 ο 8 Α7 Β7 經濟部中央標準局舅工消費合作社印装 五、發明説明(q) 0101011.〗,此即爲加密的資料。 肩如加密運算採用邏輯RXOR運算,位元數目爲4 哲元,此情形不需要樣本,而要加密的資料如果爲 101 01100(二進位,8 位元)。資料 10101100 經過 RXOR 運算後成爲Η 11.1010,此即爲加密的資料。 假如加密運算採用邏輯反相運算,位元數目爲8位 元,則樣本也爲8位元,例如樣本爲01001000(二進位) 時,要加密的資料如果爲10101100(二進位,8位元)。 此時,樣本的位元數目等於資料的位元數目,所以不必 複製樣本。之後在將資料10101 1000與樣本01001000 的每一對應位元進行反相運算。當樣本位元爲1時,將 對應的資料位元反相:當樣本位元爲0時,資料位元中 與之對應财位元便保持不變,藉此產生mooioo,此即 爲加密/的資料。 假如加密運算採用邏輯複製運算,位元數目爲8位 元,則樣本也爲8位元,例如樣本爲00100000(二進位) 時,要加密的資料如果爲10101100(二進位,S位元)。 此時,樣本的位元數目等於資料的位元數目,所以不必 複製樣本。之後在將資料1010Π000與樣本00100000 的每-··對應位元進行複製運算。當樣本位元爲1時,將 對應的資料位元複製一位元;當樣本位元爲〇時,資料 位元中與之對應的位元便保持不變,藉此產生 101101100,此即爲加密的資料。 除上述之單--邏輯運算方法,當然也可以將上述之 L---^-------- ^-- (請先聞讀背面之注意事項再填寫本頁) 訂 本紙張尺度適用中圉國家標準(CNS) Α4規格(210Χ297公釐) 410519 4 2 2 7 C wf . doc /0 0 8 A7 B7 經濟部中央標準局員工消費合作杜印¾ 五、發明説明(P) 各種邏輯運算加以結合來將資料加密。 請參考第5圖’其繪示本發明之解密方法的流程圖。 流程200表示開始解密流程。首先,執行流程202讀取 加密資料流之表頭資料,其包括方法、位元數目與樣本, 其如第2圖之結構。接著,於解密流程204,依據表頭 資料決定位元數目與解碼方法。 接著,解密流程206從加密的資料流中讀取加密的 資料。假如沒有要解密的資料,即資料已經解密完畢, 到達檔案結束(end of file,EOF)時,便結束解密210。 當檔案尙未結束時,便依據資料流之表頭所定義的解密 方法、位元數目以及與位元數目之位元數相等的樣本, 如220、222與224等,並配合資料流中的資料加以運 算230、232與234等,而得到解密的資料24〇。每一筆 加密的資料流的資料解密完成且輸出資料後,解密流程 會再判斷是否爲E O F 2 0 8,當Ε Ο F時,表示資料已經全 部解密完畢5便結束解密2 1 0。 請參考第6圖,其繪示實施上述之解密方法的硬體 架構示意圖。解密運算裝置260至少包括一解碼器262 與多個解密邏輯電路264a,264b,…,264η等。請配合 參考第2圖之資料流欄位結構,輸入資料流2 5 0輸入到 解密運算裝置260後’表頭32之位元數目欄32b的位 元數目、樣本3:2C與資料34輸入至解密邏輯電路264a, 264b,…’ 264η。表頭32的方法欄32a資訊則輸入給解 碼器262,解碼器262依據方法欄位32a決定此筆資料 12 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) I I I I : I n ~ 訂 〆.11 (請先閱讀背面之注意事項再填寫本頁) 4227twf.d〇c/008 A7 B7 經濟都中央標準局員工消費合作社印製 五、發明説明(丨丨) 所要使用的解密邏輯運算方法,並選擇解密邏輯電路 264a,264b,…’ 264η的其中之一。例如,選擇解密邏 輯電路264爲XOR邏輯時,解密邏輯電路264a便依據 樣本來與資料流中的資料進行XOR運算。資料經由X〇R 運算後便產生解密的資料,而輸出給解壓縮裝置。 上述之加密流程(220、23 0)、(222、232)與(224、234) 係代表各種不同的邏輯運算解密方法,如前所述之XOR 運算、ADD運算、RXOR運算、反相運算、互補運算與 重複運算/等等之邏輯運算,或者上述之邏輯運算的組 合。 Λ密時只要依據表頭之方法欄以原來之加密之邏輯 逢·食方法、位元數目與樣本在運算一次便可以得到解密 資料。例如,原先以XOR運算而得之加密資料,便把 加密資料與樣本在用XOR運算即可以將資料解密。當 原先以ADD運算而得之加密資料,便把加密資料與樣 本在用減法運算以獲得解密資料。原先以反相與重複之 邏輯運算所得加密資料,便再進行一次反相與重複之邏 輯運算來獲得解密資料。 因此,本發明的優點傲加解密之編碼與解碼快豳。 本發明的另一優點係配合加解密之硬體架'構簡單, 易製作且成本較低。 本發,明的再一特徵係表頭之方法欄的度可以ϋ實 際需要來改變《具'塵變化) 本發明的又一特徵係適用於如網際網路'無線通訊 .-I--------k.I- (請先閲讀背面之注意事項再填寫本頁) 訂 1’ 本紙張尺度適用中囷國家標準(CNS ) A4規格(2!ΟΧ29·7公釐) 410519 4227twf.d〇c/〇〇8 A7 B7 五、發明説明(作) 等各種用途。 綜上所述’雖然本發明已以較佳實施例揭露如上, 然其並非用以限定本發明,任何熟習此技藝者,在不脫 離本發明之精神和範圍內,當可作各種之更動與潤飾, 因此本發明之保護範圍當視後附之申請專利範圍所界定 者爲準。 (請先聞讀背面之注意事項再填寫本頁) 經濟部中央標隼局員工消費合作社印裝 本紙張尺度適用中國國家標率(CNS ) A4規格(210X297公釐>、 1T r The standard of this paper is applicable to Chinese National Standard (CNS) A4 format (210X297 mm) 410519 4 2 2 7 twf .doc / 0 ο 8 Α7 Β7 (Q) 0101011.〗 This is the encrypted data. For example, the encryption operation uses the logical RXOR operation, and the number of bits is 4 philosophies. In this case, no sample is required, and the data to be encrypted is 101 01100 (binary, 8 bits). Data 10101100 becomes Η 11.1010 after RXOR operation, which is the encrypted data. If the encryption operation uses a logical inversion operation and the number of bits is 8 bits, the sample is also 8 bits. For example, when the sample is 01001000 (binary), the data to be encrypted is 10101100 (binary, 8 bits). . In this case, the number of bits in the sample is equal to the number of bits in the data, so there is no need to copy the sample. After that, each of the corresponding bits of the data 10101 1000 and the sample 01001000 is inverted. When the sample bit is 1, the corresponding data bit is inverted: When the sample bit is 0, the corresponding bit in the data bit remains unchanged, thereby generating mooioo, which is encrypted / data of. If the encryption operation uses a logical copy operation and the number of bits is 8 bits, the sample is also 8 bits. For example, when the sample is 00100000 (binary), the data to be encrypted is 10101100 (binary, S bit). In this case, the number of bits in the sample is equal to the number of bits in the data, so there is no need to copy the sample. After that, a copy operation is performed on each of the-·· corresponding bits of the data 1010Π000 and the sample 00100000. When the sample bit is 1, the corresponding data bit is copied one bit; when the sample bit is 0, the corresponding bit in the data bit remains unchanged, thereby generating 101101100, which is Encrypted data. In addition to the above-mentioned single-logic operation method, of course, the above-mentioned L --- ^ -------- ^-(please read the precautions on the back before filling this page) China National Standard (CNS) A4 specification (210 × 297 mm) 410519 4 2 2 7 C wf. Doc / 0 0 8 A7 B7 Consumption cooperation between employees of the Central Bureau of Standards of the Ministry of Economy Du Yin ¾ 5. Description of the invention (P) Various logics Operations are combined to encrypt the data. Please refer to FIG. 5 'for a flowchart of the decryption method of the present invention. The process 200 indicates that the decryption process is started. First, the execution process 202 reads the header data of the encrypted data stream, which includes the method, the number of bits, and the sample, which is the structure shown in FIG. 2. Then, in the decryption process 204, the number of bits and the decoding method are determined according to the header data. Next, the decryption process 206 reads the encrypted data from the encrypted data stream. If there is no data to be decrypted, that is, the data has been decrypted, and when the end of file (EOF) is reached, the decryption 210 is ended. When the file is not finished, it will be based on the decryption method defined by the header of the data stream, the number of bits, and samples equal to the number of bits, such as 220, 222, and 224, and cooperate with the data stream. The data is calculated by 230, 232, and 234, etc., and the decrypted data 24 is obtained. After the decryption of each encrypted data stream is completed and the data is output, the decryption process will determine whether it is E O F 2 0 8. When E 0 F, it means that the data has been completely decrypted 5 and the decryption ends 2 1 0. Please refer to FIG. 6, which shows a schematic diagram of the hardware architecture for implementing the above decryption method. The decryption computing device 260 includes at least a decoder 262 and a plurality of decryption logic circuits 264a, 264b, ..., 264n, and the like. Please refer to the structure of the data stream field in Figure 2. After entering the data stream 2 50 into the decryption computing device 260, the number of bits in the header 32 column number 32b, sample 3: 2C and data 34 are input to Decryption logic circuits 264a, 264b, ... '264n. The information in the method column 32a of the header 32 is input to the decoder 262, and the decoder 262 determines this data according to the method field 32a. 12 This paper size applies to the Chinese National Standard (CNS) A4 specification (210X297 mm) IIII: I n ~ Order 11.11 (Please read the notes on the back before filling out this page) 4227twf.d〇c / 008 A7 B7 Printed by the Employees' Cooperatives of the Central Bureau of Standards of the Economy V. Description of Invention (丨 丨) Decryption logic operation to be used Method and select one of the decryption logic circuits 264a, 264b, ... '264n. For example, when the decryption logic circuit 264 is selected as the XOR logic, the decryption logic circuit 264a performs XOR operation with the data in the data stream according to the samples. After the data is processed by XOR, decrypted data is generated and output to the decompression device. The above-mentioned encryption processes (220, 230), (222, 232), and (224, 234) represent a variety of different logical operation decryption methods, such as the XOR operation, ADD operation, RXOR operation, inverse operation, Complementary operations and repeated operations / etc. Logical operations, or a combination of the above logical operations. In the case of Λ dense, as long as the original encryption logic is used in accordance with the method column of the header, the number of bits and the sample are calculated once to obtain the decrypted data. For example, if the encrypted data was originally obtained by XOR operation, the encrypted data and samples can be decrypted by XOR operation. When the encrypted data originally obtained by the ADD operation is used, the encrypted data and the sample are subtracted to obtain the decrypted data. The encrypted data originally obtained by the logical operation of inversion and repetition is performed again, and the decrypted data is obtained by performing another logical operation of inversion and repetition. Therefore, the advantages of the present invention are the encoding and decoding speed of encryption and decryption. Another advantage of the present invention is that the hardware frame with encryption and decryption is simple in structure, easy to manufacture, and low in cost. In the present invention, another feature of the table is that the degree of the method column of the header can be changed according to actual needs. "With the" dust change "Another feature of the present invention is applicable to wireless communications such as the Internet. -I --- ----- kI- (Please read the notes on the back before filling in this page) Order 1 'This paper size is applicable to China National Standard (CNS) A4 specification (2! 〇 × 29 · 7 mm) 410519 4227twf.d. c / 〇〇8 A7 B7 V. Description of invention (work) and other uses. To sum up, 'Although the present invention has been disclosed as above with preferred embodiments, it is not intended to limit the present invention. Any person skilled in the art can make various changes and modifications without departing from the spirit and scope of the present invention. Retouching, so the scope of protection of the present invention shall be determined by the scope of the appended patent application. (Please read the precautions on the back before filling out this page) Printed by the Consumer Cooperatives of the Central Bureau of Standards of the Ministry of Economic Affairs This paper is sized for China National Standards (CNS) A4 (210X297 mm >)

Claims (1)

經濟部中央標準局貝工消費合作社印製 410519 μ ^227twf . doc / 008 £)8 六、申請專利範圍 一種資料加密方法,用以將一資料流加密,該資 料流包括^表頭與一資料,該表頭更包括一方法欄、一 位元數」關與一樣本欄,該資料加密方法包括: 讀取該表頭之該方法欄,決定用以加密的一邏輯運 算法; 讀取該表頭之J亥位屬該顧本欄所紀錄之一位 元蛩與一樣本,該樣本之位元數與該位元數欄之位元數 相等; 讀取該資料流中έ該資料;·以及 依朦款遽1員運貧备,將耪資斛與該樣本進行邏輯運 ^,用以產生一加密。 2. 如申請專利範圍第1項所述之資料加密方法,其 中該方法欄所紀錄之該邏輯運算法係選自於互斥或運算 (XOR)、力口法運算(ADD)、減法運算(SUB)、遞回互斥或 運算(RX0R)、反相運算、重複運算所組成之集合。 3. 如申請專利範圍第1項所述之資料加密方法,其 中該樣本與該資料之位元數相等。 4·如申請專利範圍第1項所述之資料加密方法,其 中該樣本與該資料之位元數不相等。 5. 如申請專利範圍第4項所述之資料加密方法,其 中當該樣本與該資料之位元數不相等時,該樣本之位元 數會複製戒與該資料之位元數相等。 6. 如申請專利範圍第1項所述之資料傳送之資料加 密方法,其中當該邏輯運算法爲一反相運算時,係將該 15 本紙張尺度通用中固圏家揉準(CNS ) A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁) ik_ 4 2 2 7 t w mm ABCD 六、申請專利範圍 資料與該樣本每一對應的位元進行該反相運算,且當該 樣本之一位元爲一第一邏輯態時,將該資料中與該樣本 之該位元對應的位元轉換邏輯態。 7. 如申請專利範圍第6項所述之資料加密方法,其 中該第一邏輯態係邏輯1。 8. 如申請專利範圍第1項所述之資料加密方法’其 中當該邏輯運算法爲一重複運算時,係將該資料與該樣 本每一對應的位元進行該重複運算,且當該樣本之一位 元爲一第一邏輯態時,將該資料中與該樣本之該位元對 應的位元重複一次。 9. 如申請專利範圍第8項所述之資料加密方法,其 中該第γ邏輯態係邏輯1。 /〇.—種資料解密方法,用以將一加密資料流解密, 寬加密資料流包括一表頭與一加密資料,該表頭更包括 一方法欄、一位兀數欄與一樣本欄,該資料解密方法包 括: 讀取該表頭之該方法欄,決定用以解密的一邏輯運 算法; 經濟部中央標準局貝工消費合作社印製 {請先閲讀背面之注意事項再填寫本頁) ltT 讀取該表頭之該位元數欄與該樣本欄所紀錄之一位 元數與一樣本,該樣本之位元數與該位元數欄之位元數 相等; 讀取,該資料流中之該加密資料;以及 依據該邏輯運算法,將該加密資料與該樣本進行邏 輯運算,用以還原該加密資料。 本紙張尺度逋用中國國家標準(CNS ) A4規格(210X297公釐) 5C odo 1 * f ^pw θη 8 8 8 8 ABCD 經濟部中央標隼局員工消f合作社印製 六、申請專利範圍 11. 如申請專利範圍第10項所述之資料加密方法, 其中該方法欄所紀錄之該邏輯運算法係選自於互斥或運 算(XOR)、加法運算(ADD)、減法運算(SUB)、遞回互斥 或運算(RXOR)、反相運算、重複運算所組成之集合。 12. 如申請專利範圍第10項所述之資料加密方法, 其中該樣本與該資料之位元數相等。 13. 如申請專利範圍第10項所述之資料加密方法, 其中該樣本與該資料之位元數不相等。 14. 如申請專利範圍第13項所述之資料加密方法, 其中當該樣本與該資料之位元數不相等時,該樣本之位 元數會複製成與該資料之位元數相等。 15. 如申請專利範圍第10項所述之資料傳送之資料 加密方法,其中當該邏輯運算法爲一反相運算時,係將 該資料與該樣本每一對應的位元進行該反相運算,且當 該樣本之一位元爲一第一邏輯態時,將該資料中與該樣 本之該位元對應的位元轉換邏輯態。 16. 如申請專利範圍第15項所述之資料加密方法, 其中該第一邏輯態係邏輯1。 17. 如申請專利範圍第10項所述之資料加密方法, 其中當該邏輯運算法爲一重複運算時,係將該資料與該 樣本每一對應的位元進行該重複運算,且當該樣本之一 位元爲一,第·邏輯態時,將該資料中與該樣本之該位元 對應的位元重複一次。 1 8.如申請專利範圍第1 7項所述之資料加密方法, —if 1 I n *1T1 i i (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度逋用中國國家標準(CNS ) A4規潘(210X297公釐) 4227twf .doc/VO 08 8 8 8 8 ABCD 六、申請專利範 其中該第一邏輯態係邏輯1。 —種資料保密方法,用以將一資料流保密,該資 料竭包括一表頭與一資料,該表頭更包括一方法欄、一 位元數欄與一樣本攔,該資料保密方法包括: 依據該表頭之該方法欄決定一邏輯運算;以及 將該資料流中之該資料與該樣本進行該邏輯運算, 藉以將該資料之各位元狀態改變。 20. 如申請專利範圍第19項所述之資料保密方法, 其中該方法欄所紀錄之該邏輯運算法係選自於互斥或運 算(X0R)、力口法運算(ADD)、減法運算(SUB)、遞回互斥 或運算(RXOR)、反相運算、重複運算所組成之集合。 21. 如申請專利範圍第19項所述之資料保密方法, 其中該樣本與該資料之位元數相等。 22. 如申請專利範圍第19項所述之資料保密方法, 其中該樣本與該資料之位元數不相等。 23. 如申請專利範圍第22項所述之資料加密方法, 其中當該樣本與該資料之位元數不相等時,該樣本之位 元數會複製成與該資料之位元數相等。 (請先閲讀背面之注意事項再填寫本頁) 訂 經濟部中央橾率局員工消費合作社印製 本紙張尺度適用中國國家標率(CNS > A4規格(210X297公釐)Printed by Shellfish Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 410519 μ ^ 227twf .doc / 008 £) 8 6. Scope of patent application A data encryption method is used to encrypt a data stream. The data stream includes ^ header and a data The header also includes a method column, a single-digit column, and the same column. The data encryption method includes: reading the method column of the header and determining a logical algorithm for encryption; reading the The J Hai position in the header is the same as the one recorded in the Gu column, and the number of bits in the sample is equal to the number of bits in the column; read the data in the data stream; · And according to the haze section, one member is transported to prepare for the poverty, and the data is logically operated with the sample to generate an encryption. 2. The data encryption method described in item 1 of the scope of patent application, wherein the logical algorithm recorded in the method column is selected from the group consisting of mutual exclusion or operation (XOR), force mouth operation (ADD), and subtraction ( SUB), recursive mutex OR operation (RX0R), inversion operation, repeat operation. 3. The data encryption method described in item 1 of the scope of patent application, wherein the sample has the same number of bits as the data. 4. The data encryption method described in item 1 of the scope of patent application, wherein the number of bits of the sample and the data are not equal. 5. The data encryption method as described in item 4 of the scope of patent application, wherein when the sample is not equal to the number of bits of the data, the number of bits of the sample is copied or equal to the number of bits of the data. 6. The data encryption method for data transmission as described in item 1 of the scope of the patent application, wherein when the logical operation method is an inverse operation, the 15 paper sizes are commonly used by the China National Standards Corporation (CNS) A4. Specifications (210X297 mm) (Please read the precautions on the back before filling this page) ik_ 4 2 2 7 tw mm ABCD VI. The patent application data and each corresponding bit of the sample perform the inverse operation, and when When one bit of the sample is a first logic state, a bit in the data corresponding to the bit of the sample is converted to a logic state. 7. The data encryption method as described in item 6 of the scope of patent application, wherein the first logic state is logic 1. 8. The data encryption method described in item 1 of the scope of the patent application, wherein when the logical operation is a repeated operation, the repeated operation is performed on the data and each corresponding bit of the sample, and when the sample When one bit is a first logic state, the bit corresponding to the bit in the sample is repeated once in the data. 9. The data encryption method described in item 8 of the scope of patent application, wherein the γ logic state is logic 1. /〇.—A data decryption method for decrypting an encrypted data stream. The wide encrypted data stream includes a header and an encrypted data. The header further includes a method column, a column number column, and a sample column. The method of decrypting the data includes: reading the method column of the meter header, and determining a logical algorithm for decryption; printed by the Shellfish Consumer Cooperative of the Central Standards Bureau of the Ministry of Economics {Please read the precautions on the back before filling this page) ltT read the same number of bits in the bit column and the sample column recorded in the header, and the number of bits in the sample is equal to the number of bits in the bit column; read, the data The encrypted data in the stream; and a logical operation between the encrypted data and the sample according to the logical algorithm to restore the encrypted data. The size of this paper is in accordance with Chinese National Standard (CNS) A4 (210X297 mm) 5C odo 1 * f ^ pw θη 8 8 8 8 ABCD Printed by the staff of the Central Bureau of Standards of the Ministry of Economic Affairs. The data encryption method as described in item 10 of the scope of patent application, wherein the logical algorithm recorded in the method column is selected from the group consisting of mutually exclusive or operation (XOR), addition (ADD), subtraction (SUB), and A set of mutexes (RXOR), inverse operations, and repeated operations. 12. The data encryption method described in item 10 of the scope of patent application, wherein the sample has the same number of bits as the data. 13. The data encryption method described in item 10 of the scope of patent application, wherein the number of bits of the sample and the data are not equal. 14. The data encryption method as described in item 13 of the scope of patent application, wherein when the number of bits of the sample and the data are not equal, the number of bits of the sample is copied to be equal to the number of bits of the data. 15. The data encryption method of data transmission as described in item 10 of the scope of patent application, wherein when the logical operation is an inverse operation, the inverse operation is performed on the data and each corresponding bit of the sample. And when one bit of the sample is a first logic state, the bit corresponding to the bit of the sample in the data is converted to a logic state. 16. The data encryption method according to item 15 of the scope of patent application, wherein the first logic state is logic 1. 17. The data encryption method as described in item 10 of the scope of patent application, wherein when the logical operation is a repeated operation, the repeated operation is performed on the data and each corresponding bit of the sample, and when the sample One bit is one. In the first logical state, the bit corresponding to the bit in the sample is repeated once. 1 8. As the data encryption method described in item 17 of the scope of patent application, —if 1 I n * 1T1 ii (Please read the precautions on the back before filling this page) This paper uses the Chinese National Standard (CNS) A4 gauge pan (210X297 mm) 4227twf .doc / VO 08 8 8 8 8 ABCD Six, the patent application, where the first logic state is logic 1. -A kind of data confidentiality method, which is used to keep a data stream confidential. The data includes a header and a piece of data. The header also includes a method column, a digit column and a sample block. Determine a logical operation according to the method column of the header; and perform the logical operation on the data in the data stream and the sample to change the status of each element of the data. 20. The data confidentiality method described in item 19 of the scope of patent application, wherein the logical algorithm recorded in the method column is selected from the group consisting of mutually exclusive OR operation (X0R), force mouth operation (ADD), and subtraction operation ( SUB), recursive mutex OR operation (RXOR), inverse operation, and repeated operations. 21. The data confidentiality method described in item 19 of the scope of patent application, wherein the sample has the same number of bits as the data. 22. The method of confidentiality of data as described in item 19 of the scope of patent application, wherein the number of bits of the sample and the data are not equal. 23. The data encryption method according to item 22 of the scope of patent application, wherein when the number of bits of the sample and the data are not equal, the number of bits of the sample is copied to be equal to the number of bits of the data. (Please read the notes on the back before filling this page) Order Printed by the Central Consumers Bureau of the Ministry of Economic Affairs and printed by the Employees' Cooperatives This paper is sized for China ’s national standard (CNS > A4 size (210X297 mm)
TW88101625A 1999-02-03 1999-02-03 A method of encryption and decryption in data transmission TW410519B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW88101625A TW410519B (en) 1999-02-03 1999-02-03 A method of encryption and decryption in data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW88101625A TW410519B (en) 1999-02-03 1999-02-03 A method of encryption and decryption in data transmission

Publications (1)

Publication Number Publication Date
TW410519B true TW410519B (en) 2000-11-01

Family

ID=21639606

Family Applications (1)

Application Number Title Priority Date Filing Date
TW88101625A TW410519B (en) 1999-02-03 1999-02-03 A method of encryption and decryption in data transmission

Country Status (1)

Country Link
TW (1) TW410519B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7486793B2 (en) 2002-02-15 2009-02-03 Nagracard S.A. Invoicing management method of a service transmitted per time unit

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7486793B2 (en) 2002-02-15 2009-02-03 Nagracard S.A. Invoicing management method of a service transmitted per time unit

Similar Documents

Publication Publication Date Title
EP3676986B1 (en) Single node multi-party encryption
JP3339688B2 (en) Non-deterministic mixture generator stream encryption system
US10515567B2 (en) Cryptographic machines with N-state lab-transformed switching devices
US6185304B1 (en) Method and apparatus for a symmetric block cipher using multiple stages
US5717760A (en) Message protection system and method
JP5338668B2 (en) Secret information distribution system, method and program, and transmission system
US6189095B1 (en) Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks
US5671284A (en) Data encryptor having a scalable clock
US8180048B2 (en) Method and system for computational transformation
Grabbe The DES algorithm illustrated
JP2009116348A (en) Method for data decorrelation
US20040223609A1 (en) Data encryption method
US11093213B1 (en) Cryptographic computer machines with novel switching devices
TW410519B (en) A method of encryption and decryption in data transmission
Venkatesha et al. AES based algorithm for image encryption and decryption
US20130058483A1 (en) Public key cryptosystem and technique
Suresh et al. VLSI implementation of text to image encryption algorithm based on private key encryption
Ahuja et al. Dual layer secured password manager using Blowfish and LSB
Younes et al. Definition and implementation of an elliptic curve cryptosystem using a new message mapping scheme
KR20020024998A (en) Method and apparatus for encrypting and decrypting information using chaos signal
Dubinsky Cryptography for Payment Professionals
Kashyap et al. Security techniques using Enhancement of AES Encryption
Hazzazi et al. Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field GF (2 n).
Oguntunde et al. A comparative study of some traditional and modern cryptographic techniques
Radhakrishna et al. Digital Image Encryption and Decryption based on RSA Algorithm

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MK4A Expiration of patent term of an invention patent