CN101001142A - Encipher-decipher method based on iterative random number generator - Google Patents
Encipher-decipher method based on iterative random number generator Download PDFInfo
- Publication number
- CN101001142A CN101001142A CN 200710062792 CN200710062792A CN101001142A CN 101001142 A CN101001142 A CN 101001142A CN 200710062792 CN200710062792 CN 200710062792 CN 200710062792 A CN200710062792 A CN 200710062792A CN 101001142 A CN101001142 A CN 101001142A
- Authority
- CN
- China
- Prior art keywords
- random number
- number generator
- iterative
- encipher
- method based
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
This invention discloses a ciphering-deciphering method based on an iterative random number generator, which takes the random binary bit flow generated by an iterative random generator as the cryptographic flow, and a sending party carries out XOR logic operation to cleartext data and said cryptographic key flow to generate cryptographic data and sends them to the receiving party, which carries out XOR logic operation to them to recover them to cleartext data.
Description
Technical field
The present invention relates to field of information security technology, relate in particular to a kind of encrypting and decrypting method that adopts iterative random number generator.
Background technology
Along with the fast development of computer technology and information technology, various data messages need transmit between different user.When this form offers convenience to people, fail safe hidden danger also occurred, a lot of data messages have confidentiality, and often requirement can not and be distorted by desultory reading, therefore just needs to guarantee the fail safe of sensitive information.People mainly utilize cryptographic technique to control the visit of disabled user to sensitive information at present, for example utilize various key mechanisms to file encryption, or utilize password authentification to verify user's identity, thereby prevent disabled user's access file.Encipher-decipher method is one of important technology of electronic security(ELSEC) and communication device, is widely used in fields such as bank, commerce, military affairs, automobile.
Present encipher-decipher method is various, but to reusing the encipher-decipher method of short message, remains the difficult problem in this field.Existing DES Cipher, IDEA IDEA etc. are the enciphering and deciphering algorithms of comparative maturity.But these ripe algorithms are more complicated all, realizes the cost height, not too suitable low-cost, the fairly simple application of hardware resource.
Summary of the invention
The present invention is directed to the problem that encipher-decipher method exists in the prior art, proposed a kind of enciphering and deciphering algorithm based on iterative random number generator.
Encipher-decipher method based on iterative random number generator of the present invention, be that the random binary bit stream that generates with iterative random number generator is as key stream, transmit leg is by carrying out XOR computing generation encrypt data with clear data and described key stream, send to the recipient, the recipient carries out the XOR computing with described encrypt data and described key stream, is reduced into clear data.
The next random number of described iterative random number generator is produced by interative computation by current random number.Existing tandom number generator can adopt the congruence method tandom number generator, constitute tandom number generator etc. with linear feedback shift register mostly based on iterative algorithm.
Described transmit leg and recipient be the iteration function, the step number and the current random number of iteration of known described iterative random number generator.
When described transmit leg is encrypted clear data, calculate next random number, carry out XOR, obtain encrypt data with described clear data with current random number and iteration function.
When described recipient deciphers encrypt data, calculate next random number, carry out XOR, obtain clear data with described encrypt data with current random number and iteration function.
Compared with prior art, the invention has the beneficial effects as follows: the enciphering and deciphering algorithm based on iterative random number generator provided by the invention, its algorithm is simple, is convenient to realize, and is not high to hardware requirement, economical and practical.
Description of drawings
Fig. 1 is the linear feedback shift register schematic diagram;
Fig. 2 is based on the encryption flow figure of iterative random number generator;
Fig. 3 is based on the deciphering flow chart of iterative random number generator.
Embodiment
Now reaching embodiment in conjunction with the accompanying drawings is described in further detail the present invention.
Encipher-decipher method based on iterative random number generator of the present invention, its principle is that the random binary bit stream that generates with iterative random number generator is as key stream, transmit leg is by carrying out XOR computing generation encrypt data with clear data and described key stream, send to the recipient, the recipient carries out the XOR computing with encrypt data and described key stream, be reduced into clear data, finish the encryption and decryption process.
In the present embodiment, iterative random number generator is made of linear feedback shift register, and its operation principle as shown in Figure 1.With reference to figure 1: this is one the 32 (shift registers of D32~D1), current 32 random number R (k) are packed among D32~D1, state d31~d1 of D31~D1 moves to left one, deliver among D32~D2 respectively, this moment, the new state of D1 was decided by feedback function F, feedback function f is: d0=d32+d7+d5+d3+d2+d1, the D32~D1 after the displacement are exactly new random number R (k+1).The rest may be inferred, and R (k) is R (k+n) through the random number that n displacement produces.Come encrypting plaintext data and decrypting ciphertext data with this random number as key stream.
Fig. 2 and Fig. 3 are based on the encryption flow figure and the deciphering flow chart of above-mentioned 32 bit linear feedback shift registers respectively.Represent to form the linear feedback shift register of random number key stream R with iteration function f, wherein k is 0,1,2 ..., then the relation of random number key stream R and iteration function f can be expressed as:
R(k+1)=f[R(k)]
The prerequisite of this method is step number n (n=0,1,2 that transmit leg and recipient need to know iteration function f and iteration ...).Ciphering process is with reference to figure 2, and transmit leg 201 carries out XOR 204 with clear data P202 and random number key stream 203, forms encrypt data M205, sends to recipient 206.If wherein random number key stream 203 is R (k+n), then clear data P is encrypted as encrypt data M by random number key stream 203, and encryption method is:
Encrypt data M=P XOR R (k+n)
Wherein XOR represents XOR.So, be exactly [R (k), M] to the data that recipient 206 sends this moment.
Corresponding decrypting process is with reference to figure 3, recipient 301 known R (k) and iteration function f, and with R (k+1)=f[R (k)] calculate random number key stream 303R (k+n), carry out XOR 304 with enciphered data M302:
Clear data P=R (k+n) XOR M
Wherein XOR represents XOR, obtains clear data P.
In some cases, transmit leg can also directly send a random number R (k) and inquire that to the recipient recipient calculates R (k+n) with known R (k) and iteration function f, and carries out XOR with R (k+n) and clear data P, obtains encrypt data M:
M=P?XOR?R(k+n)
Then recipient's transmission reply data is encrypt data M.Transmit leg calculates R (k+n) with same R (k) and iteration function f, carries out XOR with the encrypt data M that receives again, the clear data P that obtains reducing:
P=R(k+n)XOR?M
The above execution mode only is the preferred embodiments of the present invention; the invention is not restricted to the foregoing description; for persons skilled in the art; the any conspicuous change of under the prerequisite that does not deviate from the principle of the invention it being done all belongs to the protection range of design of the present invention and claims.
Claims (6)
1. encipher-decipher method based on iterative random number generator, it is characterized in that: the random binary bit stream that generates with iterative random number generator is as key stream, transmit leg is by carrying out XOR computing generation encrypt data with clear data and described key stream, send to the recipient, the recipient carries out the XOR computing with described encrypt data and described key stream, is reduced into clear data.
2. the encipher-decipher method based on iterative random number generator according to claim 1 is characterized in that: the next random number of described iterative random number generator is produced by interative computation by current random number.
3. the encipher-decipher method based on iterative random number generator according to claim 1 is characterized in that: described transmit leg and recipient be the iteration function, the step number and the current random number of iteration of known described iterative random number generator.
4. the encipher-decipher method based on iterative random number generator according to claim 1, it is characterized in that: when described transmit leg is encrypted clear data, calculate next random number with current random number and iteration function, carry out XOR, obtain encrypt data with described clear data.
5. the encipher-decipher method based on iterative random number generator according to claim 1, it is characterized in that: when described recipient deciphers encrypt data, calculate next random number with current random number and iteration function, carry out XOR, obtain clear data with described encrypt data.
6. the encipher-decipher method based on iterative random number generator according to claim 1 is characterized in that: described iterative random number generator is to constitute tandom number generator by the line feedback shift register.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710062792 CN101001142A (en) | 2007-01-17 | 2007-01-17 | Encipher-decipher method based on iterative random number generator |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710062792 CN101001142A (en) | 2007-01-17 | 2007-01-17 | Encipher-decipher method based on iterative random number generator |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101001142A true CN101001142A (en) | 2007-07-18 |
Family
ID=38692969
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200710062792 Pending CN101001142A (en) | 2007-01-17 | 2007-01-17 | Encipher-decipher method based on iterative random number generator |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101001142A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101882991B (en) * | 2009-05-06 | 2012-05-16 | 上海华虹集成电路有限责任公司 | Communication data stream encryption method based on block cipher |
CN101582123B (en) * | 2009-06-23 | 2012-08-15 | 北京易恒信认证科技有限公司 | Radio frequency system, device and safe processing method |
CN102833065A (en) * | 2012-08-07 | 2012-12-19 | 深圳光启创新技术有限公司 | Transmitting device and method and receiving device and method based on multi-user asynchronous encryption |
CN104063672B (en) * | 2013-03-23 | 2016-12-28 | 北京万协通信息技术有限公司 | Secure storage method of data |
CN106487659A (en) * | 2016-10-20 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | Information ciphering method and device, information decryption method and device and terminal |
CN107070666A (en) * | 2017-05-15 | 2017-08-18 | 广东虹勤通讯技术有限公司 | A kind of encryption and decryption method and device |
CN107135408A (en) * | 2017-03-31 | 2017-09-05 | 武汉斗鱼网络科技有限公司 | A kind of method for authenticating and device of video flowing address |
CN109413051A (en) * | 2018-10-09 | 2019-03-01 | 深圳南方德尔汽车电子有限公司 | Data encryption method and device, computer equipment and storage medium |
US10250384B2 (en) | 2012-07-31 | 2019-04-02 | Kuang-Chi Intelligent Photonic Technology Ltd. | Visible light encryption method, decryption method, communication device and communication system |
WO2020082820A1 (en) * | 2018-10-24 | 2020-04-30 | 华中科技大学 | Encryption and decryption system and operation method therefor |
-
2007
- 2007-01-17 CN CN 200710062792 patent/CN101001142A/en active Pending
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101882991B (en) * | 2009-05-06 | 2012-05-16 | 上海华虹集成电路有限责任公司 | Communication data stream encryption method based on block cipher |
CN101582123B (en) * | 2009-06-23 | 2012-08-15 | 北京易恒信认证科技有限公司 | Radio frequency system, device and safe processing method |
US10250384B2 (en) | 2012-07-31 | 2019-04-02 | Kuang-Chi Intelligent Photonic Technology Ltd. | Visible light encryption method, decryption method, communication device and communication system |
CN102833065B (en) * | 2012-08-07 | 2015-02-04 | 深圳光启创新技术有限公司 | Transmitting device and method and receiving device and method based on multi-user asynchronous encryption |
CN102833065A (en) * | 2012-08-07 | 2012-12-19 | 深圳光启创新技术有限公司 | Transmitting device and method and receiving device and method based on multi-user asynchronous encryption |
CN104063672B (en) * | 2013-03-23 | 2016-12-28 | 北京万协通信息技术有限公司 | Secure storage method of data |
CN106487659A (en) * | 2016-10-20 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | Information ciphering method and device, information decryption method and device and terminal |
CN106487659B (en) * | 2016-10-20 | 2022-12-20 | 宇龙计算机通信科技(深圳)有限公司 | Information encryption method, information encryption device and terminal |
CN107135408A (en) * | 2017-03-31 | 2017-09-05 | 武汉斗鱼网络科技有限公司 | A kind of method for authenticating and device of video flowing address |
CN107135408B (en) * | 2017-03-31 | 2020-06-12 | 武汉斗鱼网络科技有限公司 | Authentication method and device for video stream address |
CN107070666A (en) * | 2017-05-15 | 2017-08-18 | 广东虹勤通讯技术有限公司 | A kind of encryption and decryption method and device |
CN109413051A (en) * | 2018-10-09 | 2019-03-01 | 深圳南方德尔汽车电子有限公司 | Data encryption method and device, computer equipment and storage medium |
WO2020082820A1 (en) * | 2018-10-24 | 2020-04-30 | 华中科技大学 | Encryption and decryption system and operation method therefor |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101001142A (en) | Encipher-decipher method based on iterative random number generator | |
US8670563B2 (en) | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |
CN101447870B (en) | Safe storage method of private key based on technology of distributed password | |
CN110958219B (en) | SM2 proxy re-encryption method and device for medical cloud shared data | |
US8767959B2 (en) | Block encryption | |
CN102082790B (en) | Method and device for encryption/decryption of digital signature | |
CN101262341A (en) | A mixed encryption method in session system | |
Thein et al. | Comparative performance study on ordinary and chaos image encryption schemes | |
Saikumar | DES-Data Encryption Standard | |
Verma et al. | A novel approach for security in cloud data storage using AES-DES-RSA hybrid cryptography | |
Kumar et al. | Boolean Algebra based effective and efficient asymmetric key cryptography algorithm: BAC algorithm | |
Azaim et al. | Design and implementation of encrypted SMS on Android smartphone combining ECDSA-ECDH and AES | |
Landge et al. | VHDL based Blowfish implementation for secured embedded system design | |
Kadry et al. | An improvement of RC4 cipher using vigenère cipher | |
JP5586758B1 (en) | Dynamic encryption key generation system | |
CN103634113B (en) | Encryption and decryption method and device with user/equipment identity authentication | |
CN105049433A (en) | Identified card number information transmission verification method and system | |
WO2011059306A2 (en) | A secure key distribution protocol based on hash functions utilizing quantum authentication channel (kdp-6dp) | |
Handoko et al. | A File Encoding Using A Combination of Advanced Encryption Standard, Cipher Block Chaining and Stream Cipher In Telkom Region 4 Semarang | |
Hwang et al. | PFX: an essence of authencryption for block‐cipher security | |
Simmons | Symmetric and asymmetric encryption | |
CN109409143B (en) | Safety keyboard system and method thereof | |
CN113014531B (en) | Method for encrypting and transmitting e-mail data | |
JP4000899B2 (en) | Cryptographic method with authentication, decryption method and device with authentication, program, and computer-readable recording medium | |
Abikoye et al. | Symmetric and Asymmetric Based Encryption Model for Mobile Commerce |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20070718 |