CN101001142A - Encipher-decipher method based on iterative random number generator - Google Patents

Encipher-decipher method based on iterative random number generator Download PDF

Info

Publication number
CN101001142A
CN101001142A CN 200710062792 CN200710062792A CN101001142A CN 101001142 A CN101001142 A CN 101001142A CN 200710062792 CN200710062792 CN 200710062792 CN 200710062792 A CN200710062792 A CN 200710062792A CN 101001142 A CN101001142 A CN 101001142A
Authority
CN
China
Prior art keywords
random number
number generator
iterative
encipher
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200710062792
Other languages
Chinese (zh)
Inventor
张建华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200710062792 priority Critical patent/CN101001142A/en
Publication of CN101001142A publication Critical patent/CN101001142A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

This invention discloses a ciphering-deciphering method based on an iterative random number generator, which takes the random binary bit flow generated by an iterative random generator as the cryptographic flow, and a sending party carries out XOR logic operation to cleartext data and said cryptographic key flow to generate cryptographic data and sends them to the receiving party, which carries out XOR logic operation to them to recover them to cleartext data.

Description

A kind of encipher-decipher method based on iterative random number generator
Technical field
The present invention relates to field of information security technology, relate in particular to a kind of encrypting and decrypting method that adopts iterative random number generator.
Background technology
Along with the fast development of computer technology and information technology, various data messages need transmit between different user.When this form offers convenience to people, fail safe hidden danger also occurred, a lot of data messages have confidentiality, and often requirement can not and be distorted by desultory reading, therefore just needs to guarantee the fail safe of sensitive information.People mainly utilize cryptographic technique to control the visit of disabled user to sensitive information at present, for example utilize various key mechanisms to file encryption, or utilize password authentification to verify user's identity, thereby prevent disabled user's access file.Encipher-decipher method is one of important technology of electronic security(ELSEC) and communication device, is widely used in fields such as bank, commerce, military affairs, automobile.
Present encipher-decipher method is various, but to reusing the encipher-decipher method of short message, remains the difficult problem in this field.Existing DES Cipher, IDEA IDEA etc. are the enciphering and deciphering algorithms of comparative maturity.But these ripe algorithms are more complicated all, realizes the cost height, not too suitable low-cost, the fairly simple application of hardware resource.
Summary of the invention
The present invention is directed to the problem that encipher-decipher method exists in the prior art, proposed a kind of enciphering and deciphering algorithm based on iterative random number generator.
Encipher-decipher method based on iterative random number generator of the present invention, be that the random binary bit stream that generates with iterative random number generator is as key stream, transmit leg is by carrying out XOR computing generation encrypt data with clear data and described key stream, send to the recipient, the recipient carries out the XOR computing with described encrypt data and described key stream, is reduced into clear data.
The next random number of described iterative random number generator is produced by interative computation by current random number.Existing tandom number generator can adopt the congruence method tandom number generator, constitute tandom number generator etc. with linear feedback shift register mostly based on iterative algorithm.
Described transmit leg and recipient be the iteration function, the step number and the current random number of iteration of known described iterative random number generator.
When described transmit leg is encrypted clear data, calculate next random number, carry out XOR, obtain encrypt data with described clear data with current random number and iteration function.
When described recipient deciphers encrypt data, calculate next random number, carry out XOR, obtain clear data with described encrypt data with current random number and iteration function.
Compared with prior art, the invention has the beneficial effects as follows: the enciphering and deciphering algorithm based on iterative random number generator provided by the invention, its algorithm is simple, is convenient to realize, and is not high to hardware requirement, economical and practical.
Description of drawings
Fig. 1 is the linear feedback shift register schematic diagram;
Fig. 2 is based on the encryption flow figure of iterative random number generator;
Fig. 3 is based on the deciphering flow chart of iterative random number generator.
Embodiment
Now reaching embodiment in conjunction with the accompanying drawings is described in further detail the present invention.
Encipher-decipher method based on iterative random number generator of the present invention, its principle is that the random binary bit stream that generates with iterative random number generator is as key stream, transmit leg is by carrying out XOR computing generation encrypt data with clear data and described key stream, send to the recipient, the recipient carries out the XOR computing with encrypt data and described key stream, be reduced into clear data, finish the encryption and decryption process.
In the present embodiment, iterative random number generator is made of linear feedback shift register, and its operation principle as shown in Figure 1.With reference to figure 1: this is one the 32 (shift registers of D32~D1), current 32 random number R (k) are packed among D32~D1, state d31~d1 of D31~D1 moves to left one, deliver among D32~D2 respectively, this moment, the new state of D1 was decided by feedback function F, feedback function f is: d0=d32+d7+d5+d3+d2+d1, the D32~D1 after the displacement are exactly new random number R (k+1).The rest may be inferred, and R (k) is R (k+n) through the random number that n displacement produces.Come encrypting plaintext data and decrypting ciphertext data with this random number as key stream.
Fig. 2 and Fig. 3 are based on the encryption flow figure and the deciphering flow chart of above-mentioned 32 bit linear feedback shift registers respectively.Represent to form the linear feedback shift register of random number key stream R with iteration function f, wherein k is 0,1,2 ..., then the relation of random number key stream R and iteration function f can be expressed as:
R(k+1)=f[R(k)]
The prerequisite of this method is step number n (n=0,1,2 that transmit leg and recipient need to know iteration function f and iteration ...).Ciphering process is with reference to figure 2, and transmit leg 201 carries out XOR 204 with clear data P202 and random number key stream 203, forms encrypt data M205, sends to recipient 206.If wherein random number key stream 203 is R (k+n), then clear data P is encrypted as encrypt data M by random number key stream 203, and encryption method is:
Encrypt data M=P XOR R (k+n)
Wherein XOR represents XOR.So, be exactly [R (k), M] to the data that recipient 206 sends this moment.
Corresponding decrypting process is with reference to figure 3, recipient 301 known R (k) and iteration function f, and with R (k+1)=f[R (k)] calculate random number key stream 303R (k+n), carry out XOR 304 with enciphered data M302:
Clear data P=R (k+n) XOR M
Wherein XOR represents XOR, obtains clear data P.
In some cases, transmit leg can also directly send a random number R (k) and inquire that to the recipient recipient calculates R (k+n) with known R (k) and iteration function f, and carries out XOR with R (k+n) and clear data P, obtains encrypt data M:
M=P?XOR?R(k+n)
Then recipient's transmission reply data is encrypt data M.Transmit leg calculates R (k+n) with same R (k) and iteration function f, carries out XOR with the encrypt data M that receives again, the clear data P that obtains reducing:
P=R(k+n)XOR?M
The above execution mode only is the preferred embodiments of the present invention; the invention is not restricted to the foregoing description; for persons skilled in the art; the any conspicuous change of under the prerequisite that does not deviate from the principle of the invention it being done all belongs to the protection range of design of the present invention and claims.

Claims (6)

1. encipher-decipher method based on iterative random number generator, it is characterized in that: the random binary bit stream that generates with iterative random number generator is as key stream, transmit leg is by carrying out XOR computing generation encrypt data with clear data and described key stream, send to the recipient, the recipient carries out the XOR computing with described encrypt data and described key stream, is reduced into clear data.
2. the encipher-decipher method based on iterative random number generator according to claim 1 is characterized in that: the next random number of described iterative random number generator is produced by interative computation by current random number.
3. the encipher-decipher method based on iterative random number generator according to claim 1 is characterized in that: described transmit leg and recipient be the iteration function, the step number and the current random number of iteration of known described iterative random number generator.
4. the encipher-decipher method based on iterative random number generator according to claim 1, it is characterized in that: when described transmit leg is encrypted clear data, calculate next random number with current random number and iteration function, carry out XOR, obtain encrypt data with described clear data.
5. the encipher-decipher method based on iterative random number generator according to claim 1, it is characterized in that: when described recipient deciphers encrypt data, calculate next random number with current random number and iteration function, carry out XOR, obtain clear data with described encrypt data.
6. the encipher-decipher method based on iterative random number generator according to claim 1 is characterized in that: described iterative random number generator is to constitute tandom number generator by the line feedback shift register.
CN 200710062792 2007-01-17 2007-01-17 Encipher-decipher method based on iterative random number generator Pending CN101001142A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200710062792 CN101001142A (en) 2007-01-17 2007-01-17 Encipher-decipher method based on iterative random number generator

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200710062792 CN101001142A (en) 2007-01-17 2007-01-17 Encipher-decipher method based on iterative random number generator

Publications (1)

Publication Number Publication Date
CN101001142A true CN101001142A (en) 2007-07-18

Family

ID=38692969

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200710062792 Pending CN101001142A (en) 2007-01-17 2007-01-17 Encipher-decipher method based on iterative random number generator

Country Status (1)

Country Link
CN (1) CN101001142A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101882991B (en) * 2009-05-06 2012-05-16 上海华虹集成电路有限责任公司 Communication data stream encryption method based on block cipher
CN101582123B (en) * 2009-06-23 2012-08-15 北京易恒信认证科技有限公司 Radio frequency system, device and safe processing method
CN102833065A (en) * 2012-08-07 2012-12-19 深圳光启创新技术有限公司 Transmitting device and method and receiving device and method based on multi-user asynchronous encryption
CN104063672B (en) * 2013-03-23 2016-12-28 北京万协通信息技术有限公司 Secure storage method of data
CN106487659A (en) * 2016-10-20 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information ciphering method and device, information decryption method and device and terminal
CN107070666A (en) * 2017-05-15 2017-08-18 广东虹勤通讯技术有限公司 A kind of encryption and decryption method and device
CN107135408A (en) * 2017-03-31 2017-09-05 武汉斗鱼网络科技有限公司 A kind of method for authenticating and device of video flowing address
CN109413051A (en) * 2018-10-09 2019-03-01 深圳南方德尔汽车电子有限公司 Data encryption method and device, computer equipment and storage medium
US10250384B2 (en) 2012-07-31 2019-04-02 Kuang-Chi Intelligent Photonic Technology Ltd. Visible light encryption method, decryption method, communication device and communication system
WO2020082820A1 (en) * 2018-10-24 2020-04-30 华中科技大学 Encryption and decryption system and operation method therefor

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101882991B (en) * 2009-05-06 2012-05-16 上海华虹集成电路有限责任公司 Communication data stream encryption method based on block cipher
CN101582123B (en) * 2009-06-23 2012-08-15 北京易恒信认证科技有限公司 Radio frequency system, device and safe processing method
US10250384B2 (en) 2012-07-31 2019-04-02 Kuang-Chi Intelligent Photonic Technology Ltd. Visible light encryption method, decryption method, communication device and communication system
CN102833065B (en) * 2012-08-07 2015-02-04 深圳光启创新技术有限公司 Transmitting device and method and receiving device and method based on multi-user asynchronous encryption
CN102833065A (en) * 2012-08-07 2012-12-19 深圳光启创新技术有限公司 Transmitting device and method and receiving device and method based on multi-user asynchronous encryption
CN104063672B (en) * 2013-03-23 2016-12-28 北京万协通信息技术有限公司 Secure storage method of data
CN106487659A (en) * 2016-10-20 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information ciphering method and device, information decryption method and device and terminal
CN106487659B (en) * 2016-10-20 2022-12-20 宇龙计算机通信科技(深圳)有限公司 Information encryption method, information encryption device and terminal
CN107135408A (en) * 2017-03-31 2017-09-05 武汉斗鱼网络科技有限公司 A kind of method for authenticating and device of video flowing address
CN107135408B (en) * 2017-03-31 2020-06-12 武汉斗鱼网络科技有限公司 Authentication method and device for video stream address
CN107070666A (en) * 2017-05-15 2017-08-18 广东虹勤通讯技术有限公司 A kind of encryption and decryption method and device
CN109413051A (en) * 2018-10-09 2019-03-01 深圳南方德尔汽车电子有限公司 Data encryption method and device, computer equipment and storage medium
WO2020082820A1 (en) * 2018-10-24 2020-04-30 华中科技大学 Encryption and decryption system and operation method therefor

Similar Documents

Publication Publication Date Title
CN101001142A (en) Encipher-decipher method based on iterative random number generator
US8670563B2 (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
CN101447870B (en) Safe storage method of private key based on technology of distributed password
CN110958219B (en) SM2 proxy re-encryption method and device for medical cloud shared data
US8767959B2 (en) Block encryption
CN102082790B (en) Method and device for encryption/decryption of digital signature
CN101262341A (en) A mixed encryption method in session system
Thein et al. Comparative performance study on ordinary and chaos image encryption schemes
Saikumar DES-Data Encryption Standard
Verma et al. A novel approach for security in cloud data storage using AES-DES-RSA hybrid cryptography
Kumar et al. Boolean Algebra based effective and efficient asymmetric key cryptography algorithm: BAC algorithm
Azaim et al. Design and implementation of encrypted SMS on Android smartphone combining ECDSA-ECDH and AES
Landge et al. VHDL based Blowfish implementation for secured embedded system design
Kadry et al. An improvement of RC4 cipher using vigenère cipher
JP5586758B1 (en) Dynamic encryption key generation system
CN103634113B (en) Encryption and decryption method and device with user/equipment identity authentication
CN105049433A (en) Identified card number information transmission verification method and system
WO2011059306A2 (en) A secure key distribution protocol based on hash functions utilizing quantum authentication channel (kdp-6dp)
Handoko et al. A File Encoding Using A Combination of Advanced Encryption Standard, Cipher Block Chaining and Stream Cipher In Telkom Region 4 Semarang
Hwang et al. PFX: an essence of authencryption for block‐cipher security
Simmons Symmetric and asymmetric encryption
CN109409143B (en) Safety keyboard system and method thereof
CN113014531B (en) Method for encrypting and transmitting e-mail data
JP4000899B2 (en) Cryptographic method with authentication, decryption method and device with authentication, program, and computer-readable recording medium
Abikoye et al. Symmetric and Asymmetric Based Encryption Model for Mobile Commerce

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20070718