CN101394274B - Dynamic stream ciphering and deciphering method based on broad sense information field - Google Patents

Dynamic stream ciphering and deciphering method based on broad sense information field Download PDF

Info

Publication number
CN101394274B
CN101394274B CN2008102188166A CN200810218816A CN101394274B CN 101394274 B CN101394274 B CN 101394274B CN 2008102188166 A CN2008102188166 A CN 2008102188166A CN 200810218816 A CN200810218816 A CN 200810218816A CN 101394274 B CN101394274 B CN 101394274B
Authority
CN
China
Prior art keywords
module
information field
broad sense
sense information
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008102188166A
Other languages
Chinese (zh)
Other versions
CN101394274A (en
Inventor
张国基
刘清
黎凤鸣
徐浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN2008102188166A priority Critical patent/CN101394274B/en
Publication of CN101394274A publication Critical patent/CN101394274A/en
Application granted granted Critical
Publication of CN101394274B publication Critical patent/CN101394274B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a system for encrypting and deciphering a dynamical flow based on a generalized information field, wherein the system that can realize the method comprises a PRG (Pseudorandom Code Generator) connected with the system and based on the generalized information field, and an encryption and decryption subsystem; the encryption and decryption subsystem comprises a size control module of a dynamic buffering area, a locus ring conversion and matrix generation module, a flow encryption module and a flow decryption module; the PRG (Pseudorandom Code Generator) comprises an IV generation module, an IV normalization module, an m module, a constrained processing module, a key length judgment module, a physical reconfiguration module and a logical reconfiguration module; the PRG (Pseudorandom Code Generator) is respectively connected with the size control module of the dynamic buffering area, the flow encryption module and the flow decryption module; and the flow encryption module and the flow decryption module are connected with the m module through a transfer entrance. The system realizes locus ring conversion and flow encryption in a conventional activity background space between both sides of encryption and decryption, overcomes the problem of the periodic property of a normal key flow generator, achieves 'one word one cipher', and has strong resistance to conventional cipher analysis.

Description

Dynamic flow encipher-decipher method based on broad sense information field
Technical field
The present invention relates to field of cryptography, be specifically related to dynamic flow encipher-decipher method based on broad sense information field.
Background technology
In recent years, computer network has obtained development rapidly, is widely used in every field such as politics, military affairs, economy and science, and increasing information has obtained effective transmission and storage.Because the opening of computer network makes information possible stolen in transmission and storing process, the confidentiality of information, integrality, availability and non-repudiation all need adopt cryptographic technique to realize.Information transmitted can analyzed and intercept and capture to the computer of modern high performance automatically, and per second can be searched for hundreds of ins and outs, thereby information security is constituted serious threat.Message area hopes to have safer, convenient, effective information protection means in a hurry.
Cause people's very big concern as the cryptography of one of network security basic theory, attracted increasing researcher to put in the middle of the research of field of cryptography; Owing to the development and change of real-life actual needs and computing technique, many new problems, new direction have all appearred in cryptographic each research field simultaneously.
DSE arithmetic is a cryptographic important component part; Mainly be divided into stream cipher and block cipher; Wherein stream cipher is that plaintext to be encrypted is divided into continuous character or bit, with key stream it is encrypted then, and key stream is produced through the key stream generator by seed key.Because stream cipher is realized characteristics such as simple, that encryption/decryption speed is fast, error propagation is low, therefore in practical application, keep on top.The RC4 algorithm is one of representative of stream cipher, and it relies on a variable table and produces key stream, makes it and XOR generation ciphertext mutually expressly.Because RC4 algorithm use XOR cipher mode, so, repetition will influence its fail safe in case having appearred in the sub-key sequence.The key stream of Chan Shenging can not be avoided periodically therefore when using the RC4 algorithm, must testing encryption key fully in actual applications, judges whether it is weak key.The representative of another kind of stream cipher is to utilize shift register to produce key stream.The security intensity of stream cipher arithmetic depends on the characteristic of the key stream that it produces.
There is following problem in traditional stream cipher algorithm:
(1) key (being pseudo noise code) of stream cipher algorithm produces and can represent with doublet usually
K=(m,IV)
Wherein, K is a key, and m is that key produces algorithm, and IV is an initial value, i.e. the seed of algorithm requirement.Key produces the mode that algorithm generally adopts iteration, begins iteration from initial value IV and produces key, and m, IV are directly related with key.Therefore, the safety issue of algorithm depends on the safety issue of m and IV.
(2) AES of stream cipher adopts XOR more, and is therefore simple with block encryption, higher to the dependence of key generator, and the actual key flow generator can not be avoided periodically fully.
(3) same key often is repeated repeatedly to use in actual use, exists the safety issue that produces owing to repeatedly reusing.
Summary of the invention
The objective of the invention is to overcome the shortcoming and defect of above-mentioned prior art; A kind of dynamic flow encipher-decipher method based on broad sense information field is provided; The present invention introduces the broad sense information field notion, has broken through the restriction of doublet key stream generator, and it is expanded to the tlv triple structure; Make the encryption and decryption both sides that the common activity context through broad sense information field conversion acquisition arranged; Realize the transfer of key safety problem to the broad sense information field safety issue, can to obtain arbitrarily individual activity context selective through broad sense information field being carried out physics reconstruct and logical reconstruction simultaneously, thereby improve Information Security greatly; The processing of data is carried out in the dynamic buffer of native system definition in the encryption and decryption process, wherein comprises track ring transformation and conventional stream encryption; Track ring transformation algorithm is constructed by the traveling locus in the activity context; Track ring transformation of in dynamic buffer, carrying out and stream encryption etc. are nonlinear transformation.The present invention has good scramble diffusion property, and anti-conventional cryptanalysis ability is strong, has realized one-time pad well.
The object of the invention realizes through following technical proposals: based on the dynamic flow encipher-decipher method of broad sense information field, realize that the dynamic flow encrypting and deciphering system based on broad sense information field of this method comprises the pseudo-noise code generator based on broad sense information field, the encryption and decryption subsystem that is connected;
Wherein the encryption and decryption subsystem comprises dynamic buffer size Control module, track ring transformation matrix generation module, stream encryption module, stream deciphering module; Said dynamic buffer size Control module is with after track ring transformation matrix generation module is connected, and track ring transformation matrix generation module is connected with stream encryption module, stream deciphering module respectively;
The pseudo-noise code generator based on broad sense information field wherein comprises that initial address message (IV) generation module, IV normalization module, the key that connect successively produce algorithm (m) module, about fasciculation processing module, key length judge module, and said m module also is connected with the activity context generation module simultaneously; Wherein, m is that key produces algorithm; IV is an initial address message, i.e. the seed of algorithm requirement;
Simultaneously; Said pseudo-noise code generator based on broad sense information field respectively with the encryption and decryption subsystem in dynamic buffer size Control module, stream encryption module and stream deciphering module be connected, said stream encryption module with flow deciphering module and also link to each other with the m module through a call entry simultaneously;
Said activity context generation module comprises physics reconstructed module and the logical reconstruction module that is connected.
Can be expressed as binary-coded data arbitrarily in the computer, be referred to as broad sense information field (IF).
Utilize above-mentioned dynamic stream ciphering system based on broad sense information field to realize the method for encryption and decryption, comprise ciphering process and decrypting process, ciphering process is specific as follows:
(1) the activity context generation module becomes activity context to this subspace logical reconstruction then through the physics reconstruct of selected IF being obtained certain sub spaces of IF;
(2) the IV generation module produces initial address message (IV), and the IV normalization module becomes the binary address string of confirming length to IV compression or stretching, and it is divided into the n piece:
X 1 X 2 X n
As the dimension of the n in activity context logical bit address;
(3) the m module is carried out the space tracking migration to dimension logical bit address of the n in the activity context and physical space, and in each address transfer, from activity context, separates out the long bit string in k position and incorporate in the key sequence.In order to obtain migration address, the about fasciculation of difference of the frequency of the maximum of k position bit string value and minimum value is handled before about fasciculation processing module basis, obtains a correction value.Incorporate correction value into address sequence by the m module then, obtain new n dimension migration address through translation, and the reservation traveling locus is used for constructing in the future track ring transformation matrix;
(4) the key length judge module judges according to preset parameter whether the length of key is enough, if not enough, then repeats step (3) operation, if enough, then exports key;
(5) dynamic buffer size Control module Dynamic Selection dynamic buffer size, the scope of dynamic buffer is chosen in interval [a, b].Producing length by the pseudo-noise code generator based on broad sense information field is the bit string of a byte or word, and the value of establishing bit string is BV, the big or small BuffL=a+ of dynamic buffer (BV mod (b-a)) byte.
(6) generate track ring transformation matrix module the migration address that step (3) produces is numbered (numbering is since 0) by producing precedence, obtain track address sequence { P j(j=0,1 ..., BuffL-1).Then by each P jSize sorts, if P jCome the i position, then be designated as V i=j i(be labeled as j to j simultaneously i), thereby obtain sequence { V i(i=0,1 ..., BuffL-1).V i=j iRepresent j in the dynamic buffering piece iIndividual byte content transforms on i the byte location of ciphertext.V is exactly a track ring transformation matrix, makes this transformation matrix become monocycle through constraint, guarantees that all addresses all exchange processing.
(7) plaintext is pressed the intercepting successively of defined dynamic buffer size, and put into dynamic buffer.
(8) the stream encryption module is carried out evolution and step-by-step and key XOR by track ring transformation matrix.By continue based on the pseudo-noise code generator of broad sense information field to produce the key K of the pseudo noise code of BuffL byte long as the current dynamic buffer of encryption=(K (0), K (1) ..., K (BuffL-1)).The plaintext of note in the dynamic buffer be A=(A (0), A (1) ..., A (BuffL-1)), encrypt the corresponding ciphertext in back and be A '=(A ' (0), A ' (1) ..., A ' is (BuffL-1)), K (i) wherein, A (i), A ' (i) account for a byte.To V i(i=0,1 ..., BuffL-1), order
Figure GSB00000673225200041
Calculated all A ' (i) after, return A '.
(9) if expressly unencryption finishes, return (7), otherwise, encrypt and finish, return ciphertext.
In the said method; The said IV of step (2) is by one in system random number (SR), internal system time (ST), the given content (SC) or any multinomial composition; Wherein SR, ST obtain through call function, realize randomness and the uniqueness of IV, and given content is by the personalization of the given realization of user IV.The IV that produces will partly transmit as the information header in the ciphertext.
In the said method, the effect of the said physics reconstruct of step (1) selected broad sense information field (IF) be constructed with certain dispersion, in physically visible subspace; Logical reconstruction then is the logical bit space that is mapped as the subspace that is obtained by physics reconstruct the n dimension, has discreteness and randomness; Normalization IV is certain any address in this higher-dimension logical space, the initial address that carries out the space tracking migration after also being.
In the said method, the described IF of step (1) can be the data of any type, is to be Binary Zero, 1 bit string of any length of unit with the byte in essence, thinks that it is end to end.IF can be produced by algorithm, generates like chaos/mixed chaos system, also one section code of image, text or internal memory etc.Can be to its label, so that use.
In the said method, the structure of the described activity context of step (1) under selected broad sense information field has as giving a definition:
ABG-code IF-code [S 1/L 1][,S 2/L 2]…[S i/L i]… D 1,D 2,D 3[,D 4[,…]]
Wherein:
ABG-code: activity context number, be convenient to quote through code name;
IF-code: broad sense information field number;
[S 1/ L 1] [, S 2/ L 2] ... [S i/ L i] ...: the physics reconstruction parameter, can select arbitrarily, consequently produce the physics subspace of confirming.S wherein iBe skew, L iBe length, expression decimally.Unit during physics reconstruct is a byte;
D 1, D 2, D 3[D 4[... ]]: logical reconstruction parameter, D iBe dimension definition, decimal representation provides this and ties up maximum subscript value, can choose wantonly in the bracket, and its unit is the position during logical reconstruction.The result of logical reconstruction produces the activity context of confirming.
In the said method, the described activity context generation module of step (1) carries out physics reconstruct to this selected IF, is realized by the logical reconstruction module that specifically its concrete operations are following:
If the physics reconstruction parameter is empty, physics subspace that then constitutes and selected information field are of equal value; If physics reconstruction parameter non-NULL is then chosen one group of physics reconstruction parameter [S successively i/ L i], from the S of broad sense information field or intermediate object program iIt is L that byte plays intercepted length i0,1 string of byte long is as effective information.Physics reconstruct can be extended to the information of a broad sense information field physical message piece of a different activity context arbitrarily;
In physics reconstruct, introduce one group of discretization rule, algorithm, reach unidirectional and calculate, the target of high degree of isolation property and discretization, therefore,, make physics reconstruct have following characteristics through definition rule:
A, a reconstruct might make certain byte value produce multiple variation, satisfy unidirectional computability;
B, reconstruct keep stochastic behaviour, the ratio as 0,1;
The physical structure that c, reconstruct produce intermediate object program or activity context satisfies unidirectional calculating, does not have inverse function, can't reversely obtain the result on upper strata, has high degree of isolation property.
In the said method, the described activity context generation module of step (1) carries out logical reconstruction to the IF through physics reconstruct and obtains activity context, is realized by the logical reconstruction module that specifically its concrete operations are following:
Is the linear space conversion of the byte of one dimension the position logical space of any multidimensional, is reconstructed into D to the one-dimensional data that is obtained by physics reconstruct 1* D 2* ... * D nBlock of information, then each corresponding address, and all available (y in each address 1, y 2..., y n) expression, and D 1, D 2..., D nIt is each maximum subscript value of tieing up of appointing in advance.
In the said method; The m ternary of step (1), (2), (3) described IF, IV, m module coordinates to be implemented in the migration of activity context space tracking; In each transition process, separate out k position key; Revise traveling locus simultaneously, till the key length that generates or traveling locus address number meet the demands.
The decrypting process of decrypting subsystem is with the ciphering process difference of encryption subsystem: the step of stream deciphering is different with the computing formula of stream encryption.Decrypting process is specific as follows:
(1) the activity context generation module becomes activity context to this subspace logical reconstruction then through the physics reconstruct of selected IF being obtained certain sub spaces of IF;
(2) the IV generation module reads initial address message (IV) from the cipher-text information head, and the IV normalization module becomes the binary address string of confirming length to IV compression or stretching, and it is divided into the n piece:
X 1 X 2 X n
As the dimension of the n in activity context logical bit address;
(3) the m module is carried out the space tracking migration to dimension logical bit address of the n in the activity context and physical space; And in each address transfer; From activity context, separating out the long bit string in k position incorporates in the key sequence; In order to obtain migration address, the about fasciculation of difference of the frequency of the maximum of k position bit string value and minimum value is handled before about fasciculation processing module basis, obtains a correction value; Incorporate correction value into address sequence by the m module then, obtain new n dimension migration address through translation, and the reservation traveling locus is used for constructing in the future track ring transformation matrix;
(4) key length judges based on preset parameter to judge whether the length of key is enough, if not enough, then repeats step (3) operation, if enough, then exports key;
(5) dynamic buffer size Control module Dynamic Selection dynamic buffer size, the scope of dynamic buffer is chosen in interval [a, b].Producing length by the pseudo-noise code generator based on broad sense information field is the bit string of a byte or word.If the value of bit string is BV, the big or small BuffL=a+ of dynamic buffer (BV mod (b-a)) byte.
(6) generate track ring transformation matrix module the migration address that step (12) produces is numbered (numbering is since 0) by producing precedence, obtain track address sequence { P jJ=0,1 ..., BuffL-1).Then by each P jSize sorts, if P jCome the i position, then be designated as V i=j i(be labeled as j to j simultaneously i), thereby obtain sequence { V i(i=0,1 ..., BuffL-1).V i=j iRepresent j in the dynamic buffering piece iIndividual byte content transforms on i the byte location of ciphertext.V is exactly a track ring transformation matrix, makes this transformation matrix become monocycle through constraint, guarantees that all addresses all exchange processing.
(7) ciphertext is pressed the intercepting successively of defined dynamic buffer size, and put into dynamic buffer.
(8) the stream deciphering module carries out evolution and step-by-step and key XOR by track ring transformation matrix.By the pseudo noise code that continues to produce BuffL byte long based on the pseudo-noise code generator of broad sense information field as the key K of deciphering current dynamic buffer=(K (0), K (1) ..., K (BuffL-1)).The ciphertext of note in the dynamic buffer be A '=(A ' (0), A ' (1) ..., A ' is (BuffL-1)), the deciphering back is corresponding expressly be A=(A (0), A (1) ..., A (BuffL-1)), K (i) wherein, A (i), A ' (i) account for a byte.To V i(i=0,1 ..., BuffL-1), order After having calculated all A (i), return A.
(9) if ciphertext is not deciphered and finished, return (7), otherwise deciphering finishes, and returns expressly.
In the said method, the said IV of step (2) is by the information header intercepting in the ciphertext.
In the said method, the effect of the said physics reconstruct of step (1) selected broad sense information field (IF) be constructed with certain dispersion, in physically visible subspace; Logical reconstruction then is the logical space that is mapped as the subspace that is obtained by physics reconstruct the n dimension, has discreteness and randomness; Normalization IV is certain any address in this higher-dimension logical space, the initial address that carries out the space tracking migration after also being.
In the said method, the described IF of step (1) can be the data of any type, is to be Binary Zero, 1 bit string of any length of unit with the byte in essence, thinks that it is end to end.IF can be produced by algorithm, generates like chaos/mixed chaos system, also one section code of image, text or internal memory etc.Can be to its label, so that use.
In the said method, the structure of the described activity context of step (1) under selected broad sense information field has as giving a definition:
ABG-code IF-code [S 1/L 1][,S 2/L 2]…[S i/L i]… D 1,D 2,D 3[,D 4[,…]]
Wherein:
ABG-code: activity context number, be convenient to quote through code name;
IF-code: broad sense information field number;
[S 1/ L 1] [, S 2/ L 2] ... [S i/ L i] ...: the physics reconstruction parameter, can select arbitrarily, consequently produce the physics subspace of confirming.S wherein iBe skew, L iBe length, expression decimally.Unit during physics reconstruct is a byte;
D 1, D 2, D 3[, D 4[... ]]: logical reconstruction parameter, D iBe dimension definition, decimal representation provides this and ties up maximum subscript value, can choose wantonly in the bracket, and its unit is the position during logical reconstruction.The result of logical reconstruction produces the activity context of confirming.
In the said method, the described physics reconstructed module of step (1) is carried out physics reconstruct to this selected IF, and its concrete operations are following:
If the physics reconstruction parameter is empty, physics subspace that then constitutes and selected information field are of equal value; If physics reconstruction parameter non-NULL is then chosen one group of physics reconstruction parameter [S successively i/ L i]], from the S of broad sense information field or intermediate object program iIt is L that byte plays intercepted length i0,1 string of byte long is as effective information.Physics reconstruct can be extended to the information of a broad sense information field physical message piece of a plurality of different activity contexts;
In physics reconstruct, introduce one group of discretization rule, algorithm, reach unidirectional and calculate, the target of high degree of isolation property and discretization, therefore,, make physics reconstruct have following characteristics through definition rule:
A, a reconstruct might make certain byte value produce multiple variation, satisfy unidirectional computability;
B, reconstruct keep stochastic behaviour, the ratio as 0,1;
The physical structure that c, reconstruct produce intermediate object program or activity context satisfies unidirectional calculating, does not have inverse function, can't reversely obtain the result on upper strata, has high degree of isolation property.
In the said method, the described logical reconstruction module of step (1) is carried out logical reconstruction to the IF through physics reconstruct and is obtained activity context, and its concrete operations are following:
Is the linear space conversion of the byte of one dimension the position logical space of any multidimensional, is reconstructed into D to the one-dimensional data that is obtained by physics reconstruct 1* D 2* ... * D nBlock of information, then each corresponding address, and all available (y in each address 1, y 2..., y n) expression, and D 1, D 2..., D nIt is each maximum subscript value of tieing up of appointing in advance.
In the said method; The m ternary of step (1), (2), (3) described IF, IV, m module coordinates to be implemented in the migration of activity context space tracking; In each transition process, separate out k position key; Revise traveling locus simultaneously, till the key length that generates or traveling locus address number meet the demands.
The dynamic stream ciphering system that the present invention is based on broad sense information field has the following advantages with respect to prior art:
(1) introduces the broad sense information field notion; Break through the restriction of doublet, expanded to tlv triple (m, IV under the broad sense information field conversion; IF); Encryption and decryption both sides can produce the key of any number, random length under the joint activity background, realization key safety problem is transferred on the broad sense information field safety issue, thereby has improved Information Security greatly;
(2) the present invention has certain dispersion, randomness and higher dimensional space complexity by the activity context that physics reconstruct and logical reconstruction obtain; What produce has chaotic characteristic with the isometric pseudo noise code of plaintext, has solved the periodic problem of traditional secrete key flow generator preferably;
(3) broad sense information field can obtain any a plurality of activity context through physics reconstruct and logical reconstruction; And select and use one of them; The adjustability of parameter relates to permutation and combination (exhaustive attack space) problem in restructuring procedure, and existing research shows that exhaustive this conversion is a np hard problem; Track ring transformation that simultaneity factor is carried out in dynamic buffer and stream encryption etc. are nonlinear transformation, and therefore anti-conventional cryptanalysis ability is strong;
(4) encryption and decryption DYNAMIC PROCESS buffer size of the present invention is variable, and the formation of track ring transformation matrix is the track decision when producing key fully, has good scramble diffusion property, has realized one-time pad.
Description of drawings
Fig. 1 is the structural representation of system of the present invention;
Fig. 2 is the workflow of system of the present invention.
Embodiment
Below in conjunction with embodiment and accompanying drawing, the present invention is done to specify further, but execution mode of the present invention is not limited thereto.
Embodiment
Shown in Figure 1 for the present invention is based on the concrete structure of dynamic stream ciphering system of broad sense information field, comprise the pseudo-noise code generator that is connected, adding the close system of Xie Zi based on broad sense information field;
Wherein, The encryption and decryption subsystem comprises dynamic buffer size Control module, track ring transformation matrix generation module, stream encryption module, stream deciphering module; Said dynamic buffer size Control module is with after track ring transformation matrix generation module is connected, and track ring transformation matrix generation module is connected with stream encryption module, stream deciphering module respectively;
Pseudo-noise code generator based on broad sense information field comprises IV generation module, IV normalization module, m module, about fasciculation processing module, the key length judge module that connects successively; Said m module also is connected with the activity context generation module simultaneously, and said activity context generation module comprises physics reconstructed module and the logical reconstruction module that is connected.Wherein, m is that key produces algorithm; IV is an initial address message, i.e. the seed of algorithm requirement;
Simultaneously; Said pseudo-noise code generator based on broad sense information field respectively with the encryption and decryption subsystem in dynamic buffer size Control module, stream encryption module and stream deciphering module be connected, said stream encryption module with flow deciphering module and also link to each other with the m module through a call entry simultaneously;
Can be expressed as binary-coded data arbitrarily in the computer, be referred to as IF.
Utilize above-mentioned stream encryption system based on broad sense information field to realize the method for encryption and decryption, as shown in Figure 2, comprise ciphering process and decrypting process, ciphering process is specific as follows:
(1) the activity context generation module becomes activity context to this subspace logical reconstruction then through the physics reconstruct of selected IF being obtained certain sub spaces of IF;
(2) the IV generation module produces initial address message (IV), and the IV normalization module becomes the binary address string of confirming length to IV compression or stretching, and it is divided into the n piece:
X 1 X 2 X n
As the dimension of the n in activity context logical bit address;
(3) the m module is carried out the space tracking migration to dimension logical bit address of the n in the activity context and physical space; And in each address transfer; From activity context, separating out the long bit string in k position incorporates in the key sequence; In order to obtain migration address, the about fasciculation of difference of the frequency of the maximum of k position bit string value and minimum value is handled before about fasciculation processing module basis, obtains a correction value; Incorporate correction value into address sequence by the m module then, obtain new n dimension migration address through translation, and the reservation traveling locus is used for constructing in the future track ring transformation matrix;
(4) the key length judge module judges according to preset parameter whether the length of key is enough, if not enough, then repeats step (3) operation, if enough, then exports key;
(5) dynamic buffer size Control module Dynamic Selection dynamic buffer size, the scope of dynamic buffer is chosen in interval [a, b].Producing length by the pseudo-noise code generator based on broad sense information field is the bit string of a byte or word, and the value of establishing bit string is BV, the big or small BuffL=a+ of dynamic buffer (BV mod (b-a)) byte.
(6) generate track ring transformation matrix module the migration address that step (3) produces is numbered (numbering is since 0) by producing precedence, obtain track address sequence { P j(j=0,1 ..., BuffL-1).Then by each P jSize sorts, if P jCome the i position, then be designated as V i=j i(be labeled as j to j simultaneously i), thereby obtain sequence { V i(i=0,1 ..., BuffL-1).V i=j iRepresent j in the dynamic buffering piece iIndividual byte content transforms on i the byte location of ciphertext.V is exactly a track ring transformation matrix, makes this transformation matrix become monocycle through constraint, guarantees that all addresses all exchange processing.
(7) plaintext is pressed the intercepting successively of defined dynamic buffer size, and put into dynamic buffer.
(8) the stream encryption module is carried out evolution and step-by-step and key XOR by track ring transformation matrix.By continue based on the pseudo-noise code generator of broad sense information field to produce the key K of the pseudo noise code of BuffL byte long as the current dynamic buffer of encryption=(K (0), K (1) ..., K (BuffL-1)).The plaintext of note in the dynamic buffer be A=(A (0), A (1) ..., A (BuffL-1)), encrypt the corresponding ciphertext in back and be A '=(A ' (0), A ' (1) ..., A ' is (BuffL-1)), K (i) wherein, A (i), A ' (i) account for a byte.To V i(i=0,1 ..., BuffL-1), order
Figure GSB00000673225200101
Calculated all A ' (i) after, return A '.
(9) if expressly unencryption finishes, return (7), otherwise, encrypt and finish, return ciphertext.
In the said method; The m ternary of step (1), (2), (3) described IF, IV, m module coordinates to be implemented in the migration of activity context space tracking; In each transition process, separate out k position key; Revise traveling locus simultaneously, till the key length that generates or traveling locus address number meet the demands.
In the said method; The said IV of step (2) is by one in system random number (SR), internal system time (ST), the given content (SC) or any multinomial composition; Wherein SR, ST obtain through call function, realize randomness and the uniqueness of IV, and given content is by the personalization of the given realization of user IV.IV will partly transmit as the information header of ciphertext.
In the said method, the effect of the said physics reconstruct of step (1) selected broad sense information field (IF) be constructed with certain dispersion, in physically visible subspace; Logical reconstruction then is the logical space that is mapped as the subspace that is obtained by physics reconstruct the n dimension, has discreteness and randomness; Normalization IV is certain any address in this higher-dimension logical space, the initial address that carries out the space tracking migration after also being.
In the said method, the described IF of step (1) can be the data of any type, is to be Binary Zero, 1 bit string of any length of unit with the byte in essence, thinks that it is end to end.IF can be produced by algorithm, generates like chaos/mixed chaos system, also one section code of image, text or internal memory etc.Can be to its label, so that use.
In the said method, the structure of the described activity context of step (1) under selected broad sense information field has as giving a definition:
ABG-code IF-code [S 1/L 1][,S 2/L 2]…[S i/L i]… D 1,D 2,D 3[,D 4[,…]]
Wherein:
ABG-code: activity context number, be convenient to quote through code name;
IF-code: broad sense information field number;
[S 1/ L 1] [, S 2/ L 2] ... [S i/ L i] ...: the physics reconstruction parameter, can select arbitrarily, consequently produce the physics subspace of confirming.S wherein iBe skew, L iBe length, expression decimally.Unit during physics reconstruct is a byte;
D 1, D 2, D 3[, D 4[... ]]: logical reconstruction parameter, D iBe dimension definition, decimal representation provides this and ties up maximum subscript value, can choose wantonly in the bracket, and its unit is the position during logical reconstruction.The result of logical reconstruction produces the activity context of confirming.
In the said method, the described activity context generation module of step (1) carries out physics reconstruct to this selected IF, is realized by the physics reconstructed module that specifically its concrete operations are following:
If the physics reconstruction parameter is empty, physics subspace that then constitutes and selected information field are of equal value; If physics reconstruction parameter non-NULL is then chosen one group of physics reconstruction parameter [S successively i/ L i], from the S of broad sense information field or intermediate object program iIt is L that byte plays intercepted length i0,1 string of byte long is as effective information.Physics reconstruct can be extended to the information of a broad sense information field physical message piece of a plurality of different activity contexts;
In physics reconstruct, introduce one group of discretization rule, algorithm, reach unidirectional and calculate, the target of high degree of isolation property and discretization, therefore,, make physics reconstruct have following characteristics through definition rule:
A, a reconstruct might make certain byte value produce multiple variation, satisfy unidirectional computability;
B, reconstruct keep stochastic behaviour, the ratio as 0,1;
The physical structure that c, reconstruct produce intermediate object program or activity context satisfies unidirectional calculating, does not have inverse function, can't reversely obtain the result on upper strata, has high degree of isolation property.
In the said method, the described activity context generation module of step (1) carries out logical reconstruction to the IF through physics reconstruct and obtains activity context, is realized by the logical reconstruction module that specifically its concrete operations are following:
Is the linear space conversion of the byte of one dimension the position logical space of any multidimensional, is reconstructed into D to the one-dimensional data that is obtained by physics reconstruct 1* D 2* ... * D nBlock of information, then each corresponding address, and all available (y in each address 1, y 2..., y n) expression, and D 1, D 2..., D nIt is each maximum subscript value of tieing up of appointing in advance.
For example definition:
4 Sample.txt [34/256],[568/512] 456,355,756
It is 4 activity context that code name is chosen in expression.Obtain this activity context, need carry out physics and logical reconstruction then with the file of file Sample.txt by name as broad sense information field.Physics reconstruction parameter [34/256], [568/512] are represented to choose the binary string of 256 and 512 byte longs respectively from the 34th byte and the 568th byte, and be merged into one long be 768 bytes (6144 s') binary string.Logical reconstruction these 6144 long binary strings be mapped to 3 the dimension the space, the maximum subscript value of every dimension is respectively 456,355 and 756.
The decrypting process of decrypting subsystem is with the ciphering process difference of encryption subsystem: the step of stream deciphering is different with the computing formula of stream encryption.Decrypting process is specific as follows:
(1) the activity context generation module becomes activity context to this subspace logical reconstruction then through the physics reconstruct of selected IF being obtained certain sub spaces of IF;
(2) the IV generation module reads initial address message (IV) from the cipher-text information head, and the IV normalization module becomes the binary address string of confirming length to IV compression or stretching, and it is divided into the n piece:
X 1 X 2 X n
As the dimension of the n in activity context logical bit address;
(3) the m module is carried out the space tracking migration to dimension logical bit address of the n in the activity context and physical space; And in each address transfer; From activity context, separating out the long bit string in k position incorporates in the key sequence; In order to obtain migration address, the about fasciculation of difference of the frequency of the maximum of k position bit string value and minimum value is handled before about fasciculation processing module basis, obtains a correction value; Incorporate correction value into address sequence by the m module then, obtain new n dimension migration address through translation, and the reservation traveling locus is used for constructing in the future track ring transformation matrix;
(4) the key length judge module judges according to preset parameter whether the length of key is enough, if not enough, then repeats step (3) operation, if enough, then exports key;
(5) dynamic buffer size Control module Dynamic Selection dynamic buffer size, the scope of dynamic buffer is chosen in interval [a, b].Producing length by the pseudo-noise code generator based on broad sense information field is the bit string of a byte or word.If the value of bit string is BV, the big or small BuffL=a+ of dynamic buffer (BV mod (b-a)) byte.
(6) generate track ring transformation matrix module the migration address that step (12) produces is numbered (numbering is since 0) by producing precedence, obtain track address sequence { P j(j=0,1 ..., BuffL-1).Then by each P iSize sorts, if P iCome the i position, then be designated as V i=j i(be labeled as j to j simultaneously i), thereby obtain sequence { V i(i=0,1 ..., BuffL-1).V i=j iRepresent j in the dynamic buffering piece iIndividual byte content transforms on i the byte location of ciphertext.V is exactly a track ring transformation matrix, makes this transformation matrix become monocycle through constraint, guarantees that all addresses all exchange processing.
(7) ciphertext is pressed the intercepting successively of defined dynamic buffer size, and put into dynamic buffer.
(8) the stream deciphering module carries out evolution and step-by-step and key XOR by track ring transformation matrix.By the pseudo noise code that continues to produce BuffL byte long based on the pseudo-noise code generator of broad sense information field as the key K of deciphering current dynamic buffer=(K (0), K (1) ..., K (BuffL-1)).The ciphertext of note in the dynamic buffer be A '=(A ' (0), A ' (1) ..., A ' is (BuffL-1)), the deciphering back is corresponding expressly be A=(A (0), A (1) ..., A (BuffL-1)), K (i) wherein, A (i), A ' (i) account for a byte.To V i(i=0,1 ..., BuffL-1), order
Figure GSB00000673225200131
After having calculated all A (i), return A.
(9) if ciphertext is not deciphered and finished, return (7), otherwise deciphering finishes, and returns expressly.
In the said method; The m ternary of step (1), (2), (3) described IF, IV, m module coordinates to be implemented in the migration of activity context space tracking; In each transition process, separate out k position key; Revise traveling locus simultaneously, till the key length that generates or traveling locus address number meet the demands.
In the said method, the said IV of step (2) obtains from the cipher-text information head.
In the said method, the effect of the said physics reconstruct of step (1) selected broad sense information field (IF) be constructed with certain dispersion, in physically visible subspace; Logical reconstruction then is the logical space that is mapped as the subspace that is obtained by physics reconstruct the n dimension, has discreteness and randomness; Normalization IV is certain any address in this higher-dimension logical space, the initial address that carries out the space tracking migration after also being.
In the said method, the described IF of step (1) can be the data of any type, is to be Binary Zero, 1 bit string of any length of unit with the byte in essence, thinks that it is end to end.IF can be produced by algorithm, generates like chaos/mixed chaos system, also one section code of image, text or internal memory etc.Can be to its label, so that use.
In the said method, the structure of the described activity context of step (1) under selected broad sense information field has as giving a definition:
ABG-code IF-code [S 1/L 1][,S 2/L 2]…[S i/L i]… D 1,D 2,D 3[,D 4[,…]]
Wherein:
ABG-code: activity context number, be convenient to quote through code name;
IF-code: broad sense information field number;
[S 1/ L 1] [, S 2/ L 2] ... [S i/ L i] ...: the physics reconstruction parameter, can select arbitrarily, consequently produce the physics subspace of confirming.S wherein iBe skew, L iBe length, expression decimally.Unit during physics reconstruct is a byte;
D 1, D 2, D 3[, D 4[... ]]: logical reconstruction parameter, D iBe dimension definition, decimal representation provides this and ties up maximum subscript value, can choose wantonly in the bracket, and its unit is the position during logical reconstruction.The result of logical reconstruction produces the activity context of confirming.
In the said method, the described activity context generation module of step (1) carries out physics reconstruct to this selected IF, is realized by the physics reconstructed module that specifically its concrete operations are following:
If the physics reconstruction parameter is empty, physics subspace that then constitutes and selected information field are of equal value; If physics reconstruction parameter non-NULL is then chosen one group of physics reconstruction parameter [S successively i/ L i], from the S of broad sense information field or intermediate object program iIt is L that byte plays intercepted length i0,1 string of byte long is as effective information.Physics reconstruct can be extended to the information of a broad sense information field physical message piece of a plurality of different activity contexts;
In physics reconstruct, introduce one group of discretization rule, algorithm, reach unidirectional and calculate, the target of high degree of isolation property and discretization, therefore,, make physics reconstruct have following characteristics through definition rule:
A, a reconstruct might make certain byte value produce multiple variation, satisfy unidirectional computability;
B, reconstruct keep stochastic behaviour, the ratio as 0,1;
The physical structure that c, reconstruct produce intermediate object program or activity context satisfies unidirectional calculating, does not have inverse function, can't reversely obtain the result on upper strata, has high degree of isolation property.
In the said method, the described activity context generation module of step (1) carries out logical reconstruction to the IF through physics reconstruct and obtains activity context, is realized by the logical reconstruction module that specifically its concrete operations are following:
Is the linear space conversion of the byte of one dimension the position logical space of any multidimensional, is reconstructed into D to the one-dimensional data that is obtained by physics reconstruct 1* D 2* ... * D nBlock of information, then each corresponding address, and all available (y in each address 1, y 2..., y n) expression, and D 1, D 2..., D nIt is each maximum subscript value of tieing up of appointing in advance.
For example definition:
Figure GSB00000673225200141
It is 4 activity context that code name is chosen in expression.Obtain this activity context, need carry out physics and logical reconstruction then with the file of file Sample.txt by name as broad sense information field.Physics reconstruction parameter [34/256], [568/512] are represented to choose the binary string of 256 and 512 byte longs respectively from the 34th byte and the 568th byte, and be merged into one long be 768 bytes (6144 s') binary string.Logical reconstruction these 6144 long binary strings be mapped to 3 the dimension the space, the maximum subscript value of every dimension is respectively 456,355 and 756.
Tlv triple according to produced key by broad sense information field can know that trielement synergistic produces key, and is indispensable.The enciphering/deciphering both sides have identical activity context, are to arrange in advance by both party, do not participate in the transmittance process of information.Encryption side produces key according to the activity context of appointing in advance and encrypts, and passes to deciphering side to ciphertext and information header (comprising ABG number and IV) afterwards.The deciphering root is separated out real decruption key according to IV and is deciphered from common activity context.If can guarantee activity context safety, IV and m promptly expose does not influence fail safe yet.This moment, the key safety problem changed the activity context safety issue into.
The key of at present a lot of encryption systems is repeatedly used, thereby reduces the fail safe of system.The present invention can produce the key of any number random length in an activity context, realize one-time pad, thus the fail safe that improves system greatly.
The foregoing description is a preferred implementation of the present invention; But execution mode of the present invention is not restricted to the described embodiments; Other any do not deviate from change, the modification done under spirit of the present invention and the principle, substitutes, combination, simplify; All should be the substitute mode of equivalence, be included within protection scope of the present invention.

Claims (8)

1. based on the dynamic flow encipher-decipher method of broad sense information field, it is characterized in that: the dynamic flow encrypting and deciphering system based on broad sense information field of realizing this method comprises the pseudo-noise code generator based on broad sense information field, the encryption and decryption subsystem that is connected;
Wherein the encryption and decryption subsystem comprises dynamic buffer size Control module, track ring transformation matrix generation module, stream encryption module, stream deciphering module; Said dynamic buffer size Control module is with after track ring transformation matrix generation module is connected, and track ring transformation matrix generation module is connected with stream encryption module, stream deciphering module respectively;
The pseudo-noise code generator based on broad sense information field wherein comprises IV generation module, IV normalization module, m module, about fasciculation processing module, the key length judge module that connects successively, and said m module also is connected with the activity context generation module simultaneously; Wherein, m is that key produces algorithm; IV is an initial address message, i.e. the seed of algorithm requirement;
Simultaneously; Said pseudo-noise code generator based on broad sense information field respectively with the encryption and decryption subsystem in dynamic buffer size Control module, stream encryption module and stream deciphering module be connected, said stream encryption module with flow deciphering module and also link to each other with the m module through a call entry simultaneously;
Said activity context generation module comprises physics reconstructed module, the logical reconstruction module that is connected;
The present invention is based on the dynamic flow encipher-decipher method of broad sense information field, comprise ciphering process and decrypting process, ciphering process is specific as follows:
(1) the activity context generation module becomes activity context to this subspace logical reconstruction then through the physics reconstruct of selected IF being obtained certain sub spaces of IF; Wherein, IF identifies broad sense information field, is arbitrarily and can be expressed as binary-coded data;
(2) the IV generation module produces IV, and the IV normalization module becomes the binary address string of confirming length to IV compression or stretching, and it is divided into the n piece:
X 1 X 2 X n
As the dimension of the n in activity context logical bit address;
(3) the m module is carried out the space tracking migration to dimension logical bit address of the n in the activity context and physical space, and in each address transfer, from activity context, separates out the long bit string in k position and incorporate in the key sequence; In order to obtain migration address, the about fasciculation of difference of the frequency of the maximum of k position bit string value and minimum value is handled before about fasciculation processing module basis, obtains a correction value; Incorporate correction value into address sequence by the m module then, obtain new n dimension migration address through translation, and the reservation traveling locus is used for constructing in the future track ring transformation matrix;
(4) the key length judge module judges according to preset parameter whether the length of key is enough, if not enough, then repeats step (3) operation, if enough, then exports key;
(5) dynamic buffer size Control module choice of dynamical dynamic buffer size; The scope of dynamic buffer is at interval [a; B] in choose; Producing length by the pseudo-noise code generator based on broad sense information field is the bit string of a byte or word, and the value of establishing bit string is BV, the big or small BuffL=a+ of dynamic buffer (BV mod (b-a)) byte;
(6) generate track ring transformation matrix module the migration address that step (3) produces is numbered by producing precedence, numbering obtains track address sequence { P since 0 j(j=0,1 ..., BuffL-1); Then by each P jSize sorts, if P jCome the i position, then be designated as V i=j i, be labeled as j to j simultaneously iThereby, obtain sequence { V i(i=0,1 ..., BuffL-1), V i=j iRepresent j in the dynamic buffering piece iIndividual byte content transforms on i the byte location of ciphertext, and V is exactly a track ring transformation matrix, makes this transformation matrix become monocycle through constraint, guarantees that all addresses all exchange processing;
(7) plaintext is pressed the intercepting successively of defined dynamic buffer size, and put into dynamic buffer;
(8) the stream encryption module is carried out evolution and step-by-step and key XOR by track ring transformation matrix; Continue to produce the key K=(K (0) of the pseudo noise code of BuffL byte long by pseudo-noise code generator as the current dynamic buffer of encryption based on broad sense information field; K (1); ..., K (BuffL-1)); The plaintext of note in the dynamic buffer be A=(A (0), A (1) ..., A (BuffL-1)), encrypt the corresponding ciphertext in back and be A '=(A ' (0), A ' (1) ..., A ' is (BuffL-1)), K (i) wherein, A (i), A ' (i) account for a byte, to V i(i=0,1 ..., BuffL-1), order
Figure DEST_PATH_FSB00000673225100011
Calculated all A ' (i) after, return A ';
(9) if expressly unencryption finishes, return (7), otherwise, encrypt and finish, return ciphertext;
Decrypting process is specific as follows:
(10) the activity context generation module becomes activity context to this subspace logical reconstruction then through the physics reconstruct of selected IF being obtained certain sub spaces of IF;
(11) the IV generation module reads initial address message (IV) from the cipher-text information head, and the IV normalization module becomes the binary address string of confirming length to IV compression or stretching, and it is divided into the n piece:
X 1 X 2 X n
As the dimension of the n in activity context logical bit address;
(12) the m module is carried out the space tracking migration to dimension logical bit address of the n in the activity context and physical space; And in each address transfer; From activity context, separating out the long bit string in k position incorporates in the key sequence; In order to obtain migration address, the about fasciculation of difference of the frequency of the maximum of k position bit string value and minimum value is handled before about fasciculation processing module basis, obtains a correction value; Incorporate correction value into address sequence by the m module then, obtain new n dimension migration address through translation, and the reservation traveling locus is used for constructing in the future track ring transformation matrix;
(13) the key length judge module judges according to preset parameter whether the length of key is enough, if not enough, then repeats step (12) operation, if enough, then exports key;
(14) dynamic buffer size Control module choice of dynamical dynamic buffer size; The scope of dynamic buffer is at interval [a; B] in choose; Producing length by the pseudo-noise code generator based on broad sense information field is the bit string of a byte or word, and the value of establishing bit string is BV, the big or small BuffL=a+ of dynamic buffer (BV mod (b-a)) byte;
(15) generate track ring transformation matrix module the migration address that step (12) produces is numbered by producing precedence, numbering obtains track address sequence { P since 0 j(j=0,1 ..., BuffL-1); Then by each P jSize sorts, if P jCome the i position, then be designated as V i=j i, be labeled as j to j simultaneously iThereby, obtain sequence { V i(i=0,1 ..., BuffL-1), V i=j iRepresent j in the dynamic buffering piece iIndividual byte content transforms on i the byte location of ciphertext, and V is exactly a track ring transformation matrix, makes this transformation matrix become monocycle through constraint, all exchanges processing to guarantee all addresses;
(16) ciphertext is pressed the intercepting successively of defined dynamic buffer size, and put into dynamic buffer;
(17) the stream deciphering module carries out evolution and step-by-step and key XOR by track ring transformation matrix; Continue to produce the key K=(K (0) of the pseudo noise code of BuffL byte long by pseudo-noise code generator as the current dynamic buffer of deciphering based on broad sense information field; K (1); ..., K (BuffL-1)); The ciphertext of note in the dynamic buffer be A '=(A ' (0), A ' (1) ..., A ' is (BuffL-1)), corresponding expressly be A=(A (0), A (1) ..., A (BuffL-1)), K (i) wherein, A (i), A ' (i) account for a byte, to V i(i=0,1 ..., BuffL-1), order
Figure DEST_PATH_FSB00000673225100021
After having calculated all A (i), return A ';
(18) if ciphertext is not deciphered and finished, return (16), otherwise deciphering finishes, and returns expressly.
2. according to the said dynamic flow encipher-decipher method of claim 1 based on broad sense information field; It is characterized in that: the said IV of step (2) is by one in system random number, internal system time, the given content or any multinomial composition; Wherein system random number, internal system time obtain through call function; Realize randomness and the uniqueness of IV, given content is given by the user, realizes the personalization of IV; IV will transmit as the cipher-text information head part, and the IV in the step (11) obtains from the cipher-text information head.
3. according to the said dynamic flow encipher-decipher method based on broad sense information field of claim 1, it is characterized in that: step (1), (10) described IF are the data of any type, are to be Binary Zero, 1 bit string of any length of unit with the byte in essence.
4. according to the said dynamic flow encipher-decipher method based on broad sense information field of claim 1, it is characterized in that: step (1), (10) described IF are produced by algorithm, perhaps are one section code of image, text or internal memory.
5. according to the said dynamic flow encipher-decipher method based on broad sense information field of claim 1, it is characterized in that: step (1), the structure of (10) described activity context under selected broad sense information field have as giving a definition:
ABG-code IF-code [S 1/L 1][,S 2/L 2]…[S i/L i]… D 1,D 2,D 3[,D 4[,…]]
Wherein, ABG-code is an activity context number;
IF-code is a broad sense information field number;
[S 1/ L 1] [, S 2/ L 2] ... [S i/ L i] ... Be physics reconstruction parameter, wherein S iBe skew, L iBe length, the unit during physics reconstruct is a byte;
D 1, D 2, D 3[, D 4[... ]] be the logical reconstruction parameter, D iBe dimension definition.
6. according to the said dynamic flow encipher-decipher method of claim 5 based on broad sense information field; It is characterized in that: step (1), (10) described activity context generation module carry out physics reconstruct to this selected IF; Realize by the physics reconstructed module that specifically its concrete operations are following:
If the physics reconstruction parameter is empty, then activity context and selected broad sense information field are of equal value; If physics reconstruction parameter non-NULL is then chosen one group of physics reconstruction parameter [S successively i/ L i], be L from the Si byte intercepted length of broad sense information field or intermediate object program i0,1 string of byte long is as effective information.
7. according to the said dynamic flow encipher-decipher method of claim 5 based on broad sense information field; It is characterized in that: step (1), (10) described activity context generation module carry out logical reconstruction to the subspace that is obtained by physics reconstruct and obtain activity context; Realize by the logical reconstruction module that specifically its concrete operations are following:
The one-dimensional data that physics reconstruct is obtained is reconstructed into D 1* D 2* ... * D nBlock of information.
8. according to the said dynamic flow encipher-decipher method of claim 1 based on broad sense information field; It is characterized in that: the m ternary in step (1), (2), (3), (10), (11), (12) described IF, IV, the m module coordinates to be implemented in the migration of spatial context track; In each transition process, separate out k position key; Revise traveling locus simultaneously, till the key length that generates or traveling locus address number meet the demands.
CN2008102188166A 2008-10-31 2008-10-31 Dynamic stream ciphering and deciphering method based on broad sense information field Expired - Fee Related CN101394274B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102188166A CN101394274B (en) 2008-10-31 2008-10-31 Dynamic stream ciphering and deciphering method based on broad sense information field

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102188166A CN101394274B (en) 2008-10-31 2008-10-31 Dynamic stream ciphering and deciphering method based on broad sense information field

Publications (2)

Publication Number Publication Date
CN101394274A CN101394274A (en) 2009-03-25
CN101394274B true CN101394274B (en) 2012-02-29

Family

ID=40494374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102188166A Expired - Fee Related CN101394274B (en) 2008-10-31 2008-10-31 Dynamic stream ciphering and deciphering method based on broad sense information field

Country Status (1)

Country Link
CN (1) CN101394274B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469345A (en) * 2010-11-19 2012-05-23 康佳集团股份有限公司 Method for encrypting and decrypting multimedia-media data

Also Published As

Publication number Publication date
CN101394274A (en) 2009-03-25

Similar Documents

Publication Publication Date Title
EP3692681B1 (en) A system and method for quantum-safe authentication, encryption and decryption of information
CN101383703B (en) Dynamic ciphering method based on broad sense information field
Kumar et al. Development of modified AES algorithm for data security
CN101394268B (en) Advanced ciphering system and method based on broad sense information field
Ali et al. A novel improvement with an effective expansion to enhance the MD5 hash function for verification of a secure E-document
Noura et al. Lightweight stream cipher scheme for resource-constrained IoT devices
JPH1075240A (en) Method for protecting data transmission and device for ciphering or deciphering data
CN101814985B (en) Block cipher system using multi-chaotic mapping multi-dynamic S-box
CN106598882A (en) Secure memory data protection method and device
JP2008513811A (en) Calculation conversion method and system
Noura et al. Lightweight dynamic key-dependent and flexible cipher scheme for IoT devices
Bai et al. Scalable private decision tree evaluation with sublinear communication
Buell Modern symmetric ciphers—Des and Aes
CN101364868B (en) Pseudo-noise code generator based on broad sense information field and generating method thereof
Kasiran et al. Time performance analysis of advanced encryption standard and data encryption standard in data security transaction
CN101394274B (en) Dynamic stream ciphering and deciphering method based on broad sense information field
Gupta et al. C 3 T: Cloud based cyclic cryptographic technique and it’s comparative analysis with classical cipher techniques
Shoukat et al. Randomized substitution method for effectively secure block ciphers in IOT environment
CN201252558Y (en) Advanced encryption system based on generalized information domain
CN201286103Y (en) Dynamic stream ciphering system based on generalized information domain
Al-Attab et al. Lightweight effective encryption algorithm for securing data in cloud computing
Sharma et al. Comparative analysis of block key encryption algorithms
Pandey et al. An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14-Rounds
CN201256392Y (en) Dynamic ciphering system based on broad sense information field
Al-Kasasbeh A novel secure transposition cipher technique using arbitrary zigzag patterns

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120229

Termination date: 20141031

EXPY Termination of patent right or utility model