CN100589380C - Encryption method based on double-circular queue shift and transposition rule - Google Patents
Encryption method based on double-circular queue shift and transposition rule Download PDFInfo
- Publication number
- CN100589380C CN100589380C CN200810017494A CN200810017494A CN100589380C CN 100589380 C CN100589380 C CN 100589380C CN 200810017494 A CN200810017494 A CN 200810017494A CN 200810017494 A CN200810017494 A CN 200810017494A CN 100589380 C CN100589380 C CN 100589380C
- Authority
- CN
- China
- Prior art keywords
- computing
- transformation matrix
- key
- matrix
- row
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 71
- 230000017105 transposition Effects 0.000 title abstract description 8
- 239000011159 matrix material Substances 0.000 claims abstract description 109
- 230000009466 transformation Effects 0.000 claims abstract description 72
- 238000006073 displacement reaction Methods 0.000 claims description 18
- 238000006243 chemical reaction Methods 0.000 claims description 11
- 230000009977 dual effect Effects 0.000 claims description 11
- 230000008676 import Effects 0.000 claims description 7
- 230000015572 biosynthetic process Effects 0.000 description 4
- 125000004122 cyclic group Chemical group 0.000 description 4
- 239000003550 marker Substances 0.000 description 2
- 230000011218 segmentation Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000011066 ex-situ storage Methods 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to an encryption method for a double-circular queue shift and transposition rule, which comprises the following steps: taking a plaintext information matrix; creating a random integer sequence; inputting matrix transformation times by a user; randomly taking a random number in the random integer sequence and rounding; performing circular queue shift on one row or one column of the transformation matrix according to a set remainder rule and transposing; obtaining a ciphertext matrix after multiple times of transformation; and recording each transformation operation process as the sub-keys which are sequentially arranged to obtain the key. The invention belongs to classical replacement encryption, adopts the most basic shift operation, realizes a quick encryption and decryption process by using less resources, solves the problems of small encryption strength, low speed, poor operability and the like of the existing shift encryption method, has the advantages of high encryption and decryption speed, simple encryption method realization, high encryption strength of the encryption method, good safety and wide application range, and is suitable for software and hardware realization.
Description
Technical field
The present invention relates to a kind of conventional cryptography method, relate in particular to a kind of conventional cryptography method based on dual cycle queue shift rule and rule of conversion.
Background technology
The conventional cryptography method mainly realizes hiding of information by replacement and displacement dual mode.Typical displacement encryption method comprises fence displacement, rotor machine etc.Wherein substitute mode is not hidden the character of former plaintext, and employing will be formed character expressly and resequence to reach the purpose of Information hiding.
But the Cipher Strength of existing displacement displacement encryption method is little, low to information scramble degree, and some encryption method such as rotor machine etc. only are applicable to the hardware realization.
Summary of the invention
The present invention seeks to propose a kind of encryption method based on dual cycle queue shift and rule of conversion, it has solved little, the problems such as speed is low, operability difference of existing displacement encryption method Cipher Strength, is applicable to soft, hardware realization.
Technical solution of the present invention is:
A kind of encryption method based on dual cycle queue shift and rule of conversion, concrete steps are as follows:
Step 1] the cleartext information matrix A of getting m * n;
Step 2] establishment random integers sequence X=r ∈ N, r≤max (m, n) };
Step 3] user is according to the Cipher Strength requirement, imports an integer w as the matrixing number of times;
Step 4] in the random integers sequence X, appoint and get random number k, computing k=k mod 5;
When k=0, from the random integers sequence X, get 4 random number L
1, L
2, L
3, L
4, require L
1<L
3≤ m, L
2<L
4≤ n; Then with L
1Row is as initial row, with L
3Row is as end line, with L
2Row are as initial row, with L
4Row make up transformation matrix A ' as end column, and the recording operation process is #fL
1/ L
2/ L
3/ L
4, form a sub-key;
When k=1, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
3-L
1)), computing y=1+ (y mod (1+L
3-L
1)), computing z=z mod 2, capable and the capable ring shift left position of carrying out of y to the x among the transformation matrix A ', when z=0, do not replace, when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', the recording operation process is #ax/y/z, forms a sub-key;
When k=2, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
4-L
2)), computing y=1+ (y mod (1+L
4-L
2)), computing z=z mod 2, x among the transformation matrix A ' row and y are listed as the displacement that circulates down, when z=0, do not replace, when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', recording operation process #bx/y/z forms a sub-key;
When k=3, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
3-L
1), computing y=1+ (y mod (1+L
3-L
1)), computing z=z mod 2, capable and the capable ring shift right position of carrying out of y to the x among the transformation matrix A ', when z=0, do not replace, when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', recording operation process #cx/y/z forms a sub-key;
When k=4, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
4-L
2)), computing y=1+ (y mod (1+L
4-L
2)), computing z=z mod 2, x among the transformation matrix A ' row and y are listed as the superior displacement that circulates, when z=0, do not replace, when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', recording operation process #dx/y/z forms a sub-key;
If k ≠ 0 that obtains during the 1st computing k makes up transformation matrix A '=A, i.e. L
1=1, L
2=1, L
3=m, L
4=n, the recording operation process is #fL
1/ L
2/ L
3/ L
4, form first sub-key;
Step 5] repeating step 4] be total to w time, obtain the ciphertext matrix Z of m * n;
Step 6] each sub-key is arranged in order obtains key.
When cleartext information is not matrix form, above-mentioned steps 1] specifically may further comprise the steps: the user imports integer m, n, and the cleartext information that needs are encrypted is inserted m * n matrix from left to right, from top to bottom successively, forms the cleartext information matrix A; Above-mentioned steps 5] specifically may further comprise the steps: repeating step 4] be total to w time, obtain the ciphertext matrix Z of m * n; According to from left to right, from top to bottom mode reads ciphertext matrix Z, obtains cipher-text information; Above-mentioned steps 6] specifically may further comprise the steps: m, n and each sub-key are arranged in order obtain key.
Above-mentioned cleartext information can be text message, graphical information, image information or stream media information.
Advantage of the present invention comprises:
1, encryption/decryption speed is fast: this encryption method belongs to classic displacement encrypts, and the encryption method conversion is simple, adopts the most basic displacement and ex-situ operations, and not additional special conversion process can utilize less resource to realize encryption and decryption process fast;
2, encryption method realizes that simply widely applicable: the encryption method principle is simple relatively, can utilize hardware also can realize based on software;
3, encryption method Cipher Strength height, fail safe is good: the matrix for n * n carries out w conversion, and encryption method intensity can reach n
w
4, encryption method is widely applicable: encryption method promptly can be used for text encryption, also encrypts applicable to multimedia messagess such as figure, image, Streaming Medias.
Description of drawings
Fig. 1 is the ciphering process schematic diagram of encryption method of the present invention.
Embodiment
A kind of encryption method based on dual cycle queue shift and rule of conversion is as follows:
Step 1] input integer m, n, the cleartext information that needs are encrypted is inserted m * n matrix from left to right, from top to bottom successively, form the cleartext information matrix A;
Step 2] establishment random integers sequence X=r ∈ N, r≤max (m, n) };
Step 3] user is according to the Cipher Strength requirement, imports an integer w as the matrixing number of times;
Step 4] in the random integers sequence X, appoint and get random number k, computing k=k mod 5;
When k=0, from the random integers sequence X, get 4 random number L
1, L
2, L
3, L
4, require L
1<L
3≤ m, L
2<L
4≤ n; Then with L
1Row is as initial row, with L
3Row is as end line, with L
2Row are as initial row, with L
4Row make up transformation matrix A ' as end column, and the recording operation process is #fL
1/ L
2/ L
3/ L
4, form a sub-key;
When k=1, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
3-L
1)), computing y=1+ (y mod (1+L
3-L
1)), computing z=z mod 2, capable and the capable ring shift left position of carrying out of y to the x among the transformation matrix A ', when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', when z=0, do not replace, the recording operation process is #ax/y/z, forms a sub-key;
When k=2, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
4-L
2)), computing y=1+ (y mod (1+L
4-L
2)), computing z=z mod 2, x among the transformation matrix A ' row and y are listed as the displacement that circulates down, when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', when z=0, do not replace, the recording operation process is #bx/y/z, forms a sub-key;
When k=3, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
3-L
1)), computing y=1+ (y mod (1+L
3-L
1)), computing z=z mod 2, capable and the capable ring shift right position of carrying out of y to the x among the transformation matrix A ', when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', when z=0, do not replace, then transposition, recording operation process #cx/y/z forms a sub-key;
When k=4, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
4-L
2)), computing y=1+ (y mod (1+L
4-L
2)), computing z=z mod 2, x among the transformation matrix A ' row and y are listed as the superior displacement that circulates, when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', when z=0, do not replace, recording operation process #dx/y/z forms a sub-key;
If k ≠ 0 that obtains during the 1st computing k makes up transformation matrix A '=A, i.e. L
1=1, L
2=1, L
3=m, L
4=n, the recording operation process is #fL
1/ L
2/ L
3/ L
4, form first sub-key;
Step 5] repeating step 4] be total to w time, obtain the ciphertext matrix Z of m * 4; According to from left to right, from top to bottom mode reads ciphertext matrix Z, obtains cipher-text information;
Step 6] m, n and each sub-key arranged according to order of operation obtain key, and form safe storage with file, the form of key file be m n#fl
1/ l
2/ l
3/ l
4#ax/y/z#bx/y/z ...
At above-mentioned ciphering process, as follows based on the decrypting process of dual cycle queue shift and rule of conversion:
Step 1] from key file, get preceding two data m and n, obtain line number m and the columns n of ciphertext matrix Z;
Step 2] with cipher-text information according to from left to right, from top to bottom mode inserts m * n matrix successively, forms ciphertext matrix Z;
Step 3] in key, be the segmentation marker of sub-key section with #f, get last sub-key section;
Step 4] as follows to the decryption oprerations process of ciphertext matrix with the sub-key section:
With L
1Row is as initial row, with L
3Row is as end line, with L
2Row are as initial row, with L
4Row are determined the transformation matrix Z ' of ciphertext matrix Z as end column;
According to from after forward order, with each sub-key in the sub-key section transformation matrix Z ' is decrypted operation:
When sub-key is #ax/y/z, the capable and capable ring shift right position of carrying out of y to the x among the transformation matrix Z '; When z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', when z=0, do not replace;
When sub-key is #bx/y/z, row of the x among the transformation matrix Z ' and y are listed as the superior displacement that circulates; When z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', when z=0, do not replace;
When sub-key is #cx/y/z, the capable and capable ring shift left position of carrying out of y to the x among the transformation matrix Z '; When z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', when z=0, do not replace;
When sub-key is #dx/y/z, row of the x among the transformation matrix Z ' and y are listed as the displacement that circulates down; When z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', when z=0, do not replace;
Step 5] delete this sub-key section;
Step 6] repeating step 3] to step 5], till key is sky, finish the decryption oprerations process, obtain expressly matrix A;
Step 7] according to reading expressly matrix A from left to right, from top to bottom, obtain cleartext information.
With Fig. 1 is example, adopts the inventive method to information 1,2,3 ... 20 encrypt, and process is as follows:
1, the user imports m=4, n=5, and structure is matrix A expressly, as Figure 1A;
2, the user imports Cipher Strength w=6;
3, create the random integers sequence X=3,4,5,1,4,5,3,2 ...;
4, operating process for the first time: appoint in the random integers sequence X and get k=5, computing k=k mod 5=0 then gets L in the random integers sequence X
1=2, L
2=3, L
3=4, L4=5 chooses the 2nd of plaintext matrix A and walks to the 4th row, the 3rd row to the 5th structure transformation matrix A ' that is listed as, and shown in black surround part among Figure 1B, recording operation is #f2/3/4/5, as a sub-key;
5, operating process for the second time: appoint in the random integers sequence X and get k=4, computing k=k mod 5=4 then appoints in the random integers sequence X and gets x=4, y=5, z=1, computing x=1+ (x mod (1+L
4-L
2))=2, computing y=1+ (y mod (1+L
4-L
2))=3, computing z=z mod 2=1 carries out upwards cyclic shift to the 2nd row of transformation matrix A ' and the 3rd row, and transposition, and formation is as the result of Fig. 1 C, and the recording operation process is #d2/3/1, as a sub-key;
6, operating process for the third time: appoint in the random integers sequence X and get k=3, computing k=k mod 5=3 then appoints in the random integers sequence X and gets x=5, y=3, z=2, computing x=1+ (x mod (1+L
4-L
2))=3, computing y=1+ (y mod (1+L
4-L
2))=1, computing z=z mod 2=0, the 1st capable and the 3rd capable cyclic shift of carrying out to the right to transformation matrix A ' forms the result as Fig. 1 D, and the recording operation process is #c3/1/0, as a sub-key;
7, the 4th operating process: appoint in the random integers sequence X and get k=0, computing k=k mod 5=0 gets L again in the random integers sequence X
1=1, L
2=1, L
3=3, L4=4 chooses the 1st and walks to the 3rd row, the 1st row to the 4th transformation matrix A that is listed as ", shown in black surround part among Fig. 1 E, the recording operation process is #f1/1/3/4, as a sub-key;
8, the 5th operating process: appoint in the random integers sequence X and get k=1, computing k=k mod 5=1 appoints in the random integers sequence X and gets x=3, y=5, z=1, computing x=1+ (x mod (1+L
3-L
1))=1, computing y=1+ (y mod (1+L
3-L
1))=3, computing z=z mod 2=1 is to transformation matrix A " the 1st row and the 3rd row carry out left cyclic shift, and transposition, formation is as the result of Fig. 1 F, the recording operation process is #a1/3/1, as a sub-key;
9, the 6th operating process: appoint in the random integers sequence X and get k=2, computing k=k mod 5=2 appoints in the random integers sequence X and gets x=3, y=1, z=1, computing x=1+ (x mod (1+L
4-L
2))=4, computing y=1+ (y mod (1+L
4-L
2))=2, computing z=z mod 2=0 is to transformation matrix A " the 4th row and the 2nd row carry out downward cyclic shift, formation is as the result of Fig. 1 G, the recording operation process is #b4/2/0, as a sub-key;
10, obtain key: 4 5#f2/3/4/5#d2/3/1#c3/1/0#f1/1/3/4#a1/3/1#b4/2/0; Ciphertext is: 2,13,4,1,5,6,3,15,11,14,12,7,19,8,20,16,17,9,18,10.
To ciphertext be: 2,13,4 ... 16,17,9,18,10 processes that are decrypted are as follows:
1, from key, gets preceding two numerals 4 and 5, obtain ciphertext matrix Z and be 4 row and 5 and be listed as, ciphertext 2,13,4,1,5,6,3,15,11,14,12,7,19,8,20,16,17,9,18,10 is inserted among 4 * 5 the ciphertext matrix Z;
2, in key, be the segmentation marker of sub-key section, get last sub-key section #f1/1/3/4#a1/3/1#b4/2/0 with #f;
3, with the 1st the row as initial row, with the 3rd the row as end line, with the 1st row as initial row, with the 4th row as end column, determine the transformation matrix Z of ciphertext matrix Z ", see Fig. 1 G black surround part;
4, get last sub-key #b4/2/0, to transformation matrix Z " in the 4th row and the 2nd row superior displacement that circulates, must Fig. 1 F;
5, get penult sub-key #a1/3/1 again, to transformation matrix Z " in the 1st row and the 3rd row carry out the ring shift right position, and transposition, Fig. 1 E;
6, delete last sub-key section #f1/1/3/4#a1/3/1#b4/2/0;
7, get last sub-key section #f2/3/4/5#d2/3/1#c3/1/0 in the key;
8, with the 2nd the row as initial row, with the 4th the row as end line, with the 3rd row as initial row, with the 5th row as end column, determine the transformation matrix Z ' of ciphertext matrix Z, see Fig. 1 D black surround part;
9, get last sub-key #c3/1/0, row of the 3rd among the transformation matrix Z ' and the 1st row are carried out the ring shift left position, get Fig. 1 C;
10, get penult sub-key #d2/3/1 again, the row of the 2nd among the transformation matrix Z ' and the 3rd are listed as the displacement that circulates down, and transposition, Figure 1B got;
12, delete last sub-key section #f2/3/4/5#d2/3/1#c3/1/0; Finish the decryption oprerations process, obtain expressly matrix A;
13, according to reading expressly matrix A from left to right, from top to bottom, obtain cleartext information 1,2,3,4,5,6 ... 19,20.
Technical foundation of the present invention:
1, round-robin queue is a kind of basic data structure.For an ordered data sequence X={ x
1, x
2..., x
N-1, x
n, n>2} has defined move operation R=(r
Just, r
Instead), to the r of X
JustBe operating as X '={ x
n, x
1, x
2..., x
N-1, n>2} is that forward circulation moves, to the r of X
InsteadBe operating as X '={ x
2..., x
N-1, x
n, x
1, n>2} is that recycled back moves;
2, for a m*n matrix A (or its arbitrary submatrix A '), can regard its row or column as round-robin queue respectively, so just have capable move to left and move to right or be listed as move down and on move 4 kinds of modes of operation;
3, dual cycle queue: regard two row or two row of matrix A (or its arbitrary submatrix A ') as formation, carry out move operation simultaneously;
4, transposition: when dual cycle queue moves, shift out two data of matrix A (or its arbitrary submatrix A '), switch is put into matrix.
Claims (3)
1, a kind of encryption method based on dual cycle queue shift and rule of conversion is characterized in that:
The step of described encryption method is as follows:
Step 1] the cleartext information matrix A of getting m * n;
Step 2] establishment random integers sequence X=r ∈ N, r≤max (m, n) };
Step 3] user is according to the Cipher Strength requirement, imports an integer w as the matrixing number of times;
Step 4] in the random integers sequence X, appoint and get random number k, computing k=k mod 5;
When k=0, from the random integers sequence X, get 4 random number L
1, L
2, L
3, L
4, require L
1<L
3≤ m, L
2<L
4≤ n; Then with L
1Row is as initial row, with L
3Row is as end line, with L
2Row are as initial row, with L
4Row make up transformation matrix A ' as end column, and the recording operation process is #fL
1/ L
2/ L
3/ L
4, form a sub-key;
When k=1, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
3-L
1)), computing y=1+ (y mod (1+L
3-L
1)), computing z=z mod 2, capable and the capable ring shift left position of carrying out of y to the x among the transformation matrix A ', when z=0, do not replace, when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', the recording operation process is #ax/y/z, forms a sub-key;
When k=2, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
4-L
2)), computing y=1+ (y mod (1+L
4-L
2)), computing z=z mod 2, x among the transformation matrix A ' row and y are listed as the displacement that circulates down, when z=0, do not replace, when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', the recording operation process is #bx/y/z, forms a sub-key;
When k=3, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
3-L
1)), computing y=1+ (y mod (1+L
3-L
1)), computing z=z mod 2, capable and the capable ring shift right position of carrying out of y to the x among the transformation matrix A ', when z=0, do not replace, when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', recording operation process #cx/y/z forms a sub-key;
When k=4, from the random integers sequence X, appoint and get random number x, y, z, require x ≠ y, computing x=1+ (xmod (1+L
4-L
2)), computing y=1+ (y mod (1+L
4-L
2)), computing z=z mod 2, x among the transformation matrix A ' row and y are listed as the superior displacement that circulates, when z=0, do not replace, when z=1, put into transformation matrix A ' again after then shifting out two information exchange positions of transformation matrix A ', recording operation process #dx/y/z forms a sub-key;
If k ≠ 0 that obtains during the 1st computing k makes up transformation matrix A '=A, i.e. L
1=1, L
2=1, L
3=m, L
4=n, the recording operation process is #fL
1/ L
2/ L
3/ L
4, form first sub-key;
Step 5] repeating step 4] be total to w time, obtain the ciphertext matrix Z of m * n;
Step 6] each sub-key is arranged in order obtains key.
2, the encryption method based on dual cycle queue shift and rule of conversion according to claim 1 is characterized in that:
Described step 1] specifically may further comprise the steps: the user imports integer m, n, and the cleartext information that needs are encrypted is inserted m * n matrix from left to right, from top to bottom successively, forms the cleartext information matrix A;
Described step 5] specifically may further comprise the steps: repeating step 4] be total to w time, obtain the ciphertext matrix Z of m * n; According to from left to right, from top to bottom mode reads ciphertext matrix Z, obtains cipher-text information;
Described step 6] specifically may further comprise the steps: m, n and each sub-key are arranged in order obtain key.
3, the encryption method based on cycle queue shift rule according to claim 1 and 2 is characterized in that:
Described cleartext information comprises text message, graphical information, image information or stream media information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810017494A CN100589380C (en) | 2008-02-03 | 2008-02-03 | Encryption method based on double-circular queue shift and transposition rule |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810017494A CN100589380C (en) | 2008-02-03 | 2008-02-03 | Encryption method based on double-circular queue shift and transposition rule |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101237322A CN101237322A (en) | 2008-08-06 |
CN100589380C true CN100589380C (en) | 2010-02-10 |
Family
ID=39920698
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200810017494A Expired - Fee Related CN100589380C (en) | 2008-02-03 | 2008-02-03 | Encryption method based on double-circular queue shift and transposition rule |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100589380C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107968705A (en) * | 2017-11-28 | 2018-04-27 | 深圳大学 | A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425170A (en) * | 2008-11-25 | 2009-05-06 | 李东声 | Dynamic password implementing method, system and device |
CN101938350B (en) * | 2010-07-16 | 2012-06-06 | 黑龙江大学 | File encryption and decryption method based on combinatorial coding |
CN101895389B (en) * | 2010-07-16 | 2012-06-06 | 黑龙江大学 | Methods for encrypting and decrypting combined coding based file by adopting proportion calculation |
CN102271036B (en) * | 2011-08-29 | 2014-10-15 | 田耕 | Method for encrypting digital signal by utilizing matrixes |
CN113744436B (en) * | 2021-09-02 | 2023-05-23 | 中广核永寿新能源有限公司 | Internet of things fan cabin door safety error-prevention control method based on electric power two-ticket management |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0278740A2 (en) * | 1987-02-10 | 1988-08-17 | Veritec, Inc. | A method for encrypting a code and an encryption device |
CN1425987A (en) * | 2001-12-10 | 2003-06-25 | 中国科学院软件研究所 | Encrypting method for reinforcing disordered block cipher |
CN1773906A (en) * | 2004-11-10 | 2006-05-17 | 谢道裕 | Magic square signature method for true or false identification |
-
2008
- 2008-02-03 CN CN200810017494A patent/CN100589380C/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0278740A2 (en) * | 1987-02-10 | 1988-08-17 | Veritec, Inc. | A method for encrypting a code and an encryption device |
CN1425987A (en) * | 2001-12-10 | 2003-06-25 | 中国科学院软件研究所 | Encrypting method for reinforcing disordered block cipher |
CN1773906A (en) * | 2004-11-10 | 2006-05-17 | 谢道裕 | Magic square signature method for true or false identification |
Non-Patent Citations (2)
Title |
---|
AES算法的高速实现. 蔡宇东,沈海斌,严晓浪.微电子学与计算机,第21卷第1期. 2004 * |
数据加密标准算法的DSP实现. 关宗安,仲丛久.数据采集与处理,第21卷增刊卷. 2006 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107968705A (en) * | 2017-11-28 | 2018-04-27 | 深圳大学 | A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system |
Also Published As
Publication number | Publication date |
---|---|
CN101237322A (en) | 2008-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101237321B (en) | Encryption method based on cycle queue shift rule | |
CN100589380C (en) | Encryption method based on double-circular queue shift and transposition rule | |
CN107707343B (en) | SP network structure lightweight block cipher realization method with consistent encryption and decryption | |
CN101206815B (en) | Encryption process and encryption method | |
EP2016524B1 (en) | Robust cipher design | |
WO2005099167A1 (en) | Information processing method, decryption method, information processing device, and computer program | |
CN106327414A (en) | Plaintext feature-based double-chaos image encryption method | |
CN101461173A (en) | Method of symmetric key data encryption | |
CN106598882A (en) | Secure memory data protection method and device | |
US10225074B2 (en) | Encryption system and method based on biometric technology | |
CN103345609A (en) | Method and device for text encryption and decryption | |
CN1241352C (en) | Encryption method for information in binary code | |
CN105916141B (en) | A kind of realization system and method for self synchronous Zu Chongzhi's enciphering and deciphering algorithm | |
CN110149200A (en) | A kind of color image encrypting method based on dynamic DNA and 4D chaos | |
CN1523810A (en) | Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system | |
Meghrajani et al. | Universal share for multisecret image sharing scheme based on Boolean operation | |
CN1190034C (en) | Swing type block code enciphering method | |
Kaur et al. | 3D—Playfair cipher using LFSR based unique random number generator | |
CN101938352B (en) | Block cipher software encrypting method | |
CN109194845A (en) | A kind of image encryption method based on inverse time chaos system | |
CN1168058C (en) | Data enciphering method for dynamic cipher coding | |
CN115484019A (en) | AES key expansion improved algorithm with weak correlation | |
Verma et al. | Modified caesar cipher using rectangular method for enhanced security | |
CN117114959B (en) | Image encryption method based on key feedback mechanism of multi-parameter one-dimensional chaotic system | |
RU2007123714A (en) | METHOD FOR CRITOGRAPHIC TRANSFORMATION OF DIGITAL DATA BLOCKS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100210 Termination date: 20110203 |