CN102568062A - Encryption and decryption method for remote controller - Google Patents

Encryption and decryption method for remote controller Download PDF

Info

Publication number
CN102568062A
CN102568062A CN2011102991537A CN201110299153A CN102568062A CN 102568062 A CN102568062 A CN 102568062A CN 2011102991537 A CN2011102991537 A CN 2011102991537A CN 201110299153 A CN201110299153 A CN 201110299153A CN 102568062 A CN102568062 A CN 102568062A
Authority
CN
China
Prior art keywords
data
code
central
deciphering
central controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102991537A
Other languages
Chinese (zh)
Other versions
CN102568062B (en
Inventor
欧建平
秦浩
路影
陈文强
由毅
赵福全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Geely Holding Group Co Ltd
Zhejiang Geely Automobile Research Institute Co Ltd
Original Assignee
Zhejiang Geely Holding Group Co Ltd
Zhejiang Geely Automobile Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Geely Holding Group Co Ltd, Zhejiang Geely Automobile Research Institute Co Ltd filed Critical Zhejiang Geely Holding Group Co Ltd
Priority to CN201110299153.7A priority Critical patent/CN102568062B/en
Publication of CN102568062A publication Critical patent/CN102568062A/en
Application granted granted Critical
Publication of CN102568062B publication Critical patent/CN102568062B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to an encryption and decryption method for a remote controller with high security. The invention can solve the problem of low security in the prior art, the main points of a technical scheme are characterized in that the encryption and the decryption method of the remote controller comprises three phases of a learning phase, an encryption phase and a decryption execution phase. In the learning phase: a set sequence number and a non-linear transition table are stored in a first data memory and a second data memory; a random code S is generated by a central centralized control device according to program setting, then the encryption phase is provided; in the encryption phase: a read counting code, the sequence number and an operation code are arrayed in an order according to the program setting by a control chip to form an original data G0; a first encryption operation of the original data G0 and the non-linear transition table is carried out by the control chip to obtain a rolling code G1; a secondary encryption operation of the rolling code G1 and the random code S is carried out by the control chip to obtain a cryptograph F1, then the decryption execution phase is provided. The encryption and decryption method for the remote controller can enhance the security of the remote controller.

Description

The telepilot encrypting and decrypting method
Technical field
The present invention relates to a kind of encrypting and decrypting method, the encrypting and decrypting method that particularly a kind of suitable automobile remote-control device uses.
Background technology
At present the automobile remote-control device means of encrypting are divided into and adopt two kinds of hardware encipher and software cryptographies.These two kinds of encryptions all can adopt rolling code to prevent that telepilot is replicated, and reach higher security.Yet this higher security all is comparatively speaking, in case the algorithm of telepilot, parameter are divulged a secret, so same batch telepilot will be by whole decodings, duplicate, and as far as using the car owner of same batch of telepilot, all is a kind of potential threat.Also had this type of safety problem even extensively think the telepilot that safe employing AES encrypts now; That is because AES encrypts or other block encryption algorithm all exists key, plaintext and algorithm all to be grasped by telepilot manufacturer or programming personnel; Cause as long as the telepilot manufacturer or the programming personnel of beginning of production are leaked; Perhaps; When transmission security key and plaintext, intercepted and captured with same frequency by the lawless person, so same batch telepilot is easy to will be replicated, crack.
Chinese patent notification number CN2262322 Y; On September 10 1997 day for announcing, a kind of multi-path radio telepilot of multi-level encryption, a kind of multi-path radio telepilot of multi-level encryption are disclosed; Comprise remote control transmitter and receiver of remote-control sytem, described remote control transmitter comprises a radiating circuit; A transistor matrix coding circuit of forming by coding integrated circuit and peripheral cell thereof; Receiver of remote-control sytem comprises a receiving circuit of being made up of reception, amplification, demodulation, shaping unit; A decoding scheme; A random coded circuit of forming by switch integrated circuit, microprocessor and peripheral cell thereof; An on-off circuit of forming by transistor and peripheral cell thereof; With one by with the door integrated circuit, latch the state latch output trigger circuit that integrated circuit and peripheral cell are formed.This technical scheme also can provide than telepilot, but its fundamental purpose is to be " uniqueness " of telepilot so in case its algorithm, parameter that still has telepilot is divulged a secret, so same batch telepilot will be by whole decodings, the problem of duplicating.
Summary of the invention
Algorithm, the parameter of telepilot in the above-mentioned prior art are divulged a secret then so the telepilot password promptly is cracked in case the objective of the invention is to solve; The same batch of simultaneously nearly all problem that telepilot is also cracked simultaneously provides a kind of encrypting and decrypting method that just has than the automobile remote-control device.
The technical solution adopted for the present invention to solve the technical problems is: a kind of telepilot encrypting and decrypting method; The hardware foundation of said telepilot encrypting and decrypting method is automobile remote-control device and the central central controller that is complementary with the automobile remote-control device; Described automobile remote-control device comprises control chip; The telepilot encrypting and decrypting method comprises three phases: learning phase, encryption stage and deciphering execute phase, wherein
Described learning phase is carried out when using the automobile remote-control device, when central central controller is judged as first with the communication of automobile remote-control device, gets into learning phase,
In learning phase, central central controller produces a random code S according to program setting, and central central controller is preserved this random code S and carried out communication with the automobile remote-control device;
Encryption stage step: control chip produces corresponding operational code according to user's operation; Operational code and the sequence number that configures and non-linear conversion table through arrange in order with the first time cryptographic calculation obtain rolling code G1; Rolling code G1 and random code S do cryptographic calculation for the second time; Obtain ciphertext F1, control chip is to central central controller transmission ciphertext F1;
In in the deciphering execute phase, the centre central controller reads random code S, and ciphertext F1 is carried out the inverse operation of cryptographic calculation for the second time, draws rolling code G1; And then, draw operational code and sequence number according to data structure then to the inverse operation that rolling code G1 does the cryptographic calculation first time;
Central authorities' central controller judges according to sequence number whether ciphertext F1 is correct, the correct executable operations sign indicating number then of ciphertext F1 how, otherwise refuse the executable operations sign indicating number.
Through such setting, all leak by sequence number, the non-linear conversion table that manual work is set in process of production even guaranteed hardware environment of the present invention, can guarantee that still the hardware environment among the present invention can be by not imitated; Because having lacked random code S still can't accomplish the automobile remote-control device and duplicate; And random code S is produced by central central controller at random, thus random code S can't normally obtain by manual work, even and adopt extremity to obtain among the present invention some random code S in same batch of the hardware; But because each random code S is all inequality; So same batch product still can guarantee safety, improved security of the present invention, and the setting of random code S can be accomplished fully in other places in nonproductive source; During such as this telepilot of purchase; Start learning phase by the buyer,, also can't constitute a threat to security of the present invention even beginning of production malice is leaked like this.
As preferably; Be electrically connected with oscillatory circuit, key circuit and first data-carrier store on the control chip; Control chip is electrically connected with first communicator through first amplifying circuit, first coupled circuit successively; Control chip is electrically connected with second communicator through second amplifying circuit, second coupled circuit successively; Described central central controller is electrically connected with the 3rd communicator through the 3rd amplifying circuit, the 3rd coupled circuit successively, and described central central controller is electrically connected with the 4th communicator through the 4th amplifying circuit, the 4th coupled circuit successively, and described central central controller is electrically connected with second data-carrier store.Be provided with like this, guaranteed that first communicator and the 3rd communicator carry out communication, second communicator and the 4th communicator carry out communication, and frequency is different between first communicator and second communicator, the situation that synchronous signal is intercepted and captured can not occur.
As preferably, described telepilot encrypting and decrypting method learning phase step may further comprise the steps:
Learning phase step 1: sequence number that configures and non-linear conversion table are stored in first data-carrier store, second data-carrier store;
The learning phase step 2: central central controller produces a random code S according to program setting, and central central controller is preserved this random code S to the second data-carrier store and carried out communication through the 4th communicator and automobile remote-control device;
The learning phase step 3: the automobile remote-control device receives random code S through second communicator, and deposits this random code S in first data-carrier store;
The learning phase step 4: the telepilot encrypting and decrypting method is accomplished the learning phase step, gets into the encryption stage.
Be provided with like this, guaranteed that random code, sequence number and non-linear conversion table can be read by central central controller and control chip.
As preferably, the described encryption stage may further comprise the steps:
Encryption stage step 1: control chip produces corresponding operational code according to the user to the different operating of automobile remote-control device key circuit; And the every operation of key circuit once; Control chip reads a count code in promptly from the control chip register; Again deposit register in after then count code being added one, wait for when key circuit is operated once more, repeat to read;
Encryption stage step 2: control chip is arranged the current count code that reads, sequence number, operational code in order according to program setting and is constituted raw data G0;
Encryption stage step 3: control chip reads the non-linear conversion table from first data-carrier store, and control chip is done cryptographic calculation for the first time with raw data G0 and non-linear conversion table, obtains rolling code G1;
Encryption stage step 4: control chip reads random code S from first data-carrier store, and control chip is done cryptographic calculation for the second time with rolling code G1 and random code S, obtains ciphertext F1, and control chip transmits ciphertext F1 through first communicator to central central controller;
Encryption stage step 5: the telepilot encrypting and decrypting method is accomplished encryption stage step, gets into the deciphering execute phase.
Be provided with like this, guaranteed operational code, count code, sequence number through with the non-linear conversion table the first time cryptographic calculation and with the cryptographic calculation second time of random code, draw the ciphertext F1 of higher-security
As preferably, the described deciphering execute phase may further comprise the steps:
The deciphering execute phase one: central central controller receives ciphertext F1 through the 3rd communicator;
The deciphering execute phase two: central central controller reads random code S, and ciphertext F1 is carried out the inverse operation of cryptographic calculation for the second time, draws rolling code G1;
The deciphering execute phase three: central central controller reads the non-linear conversion table, and central central controller is carried out the inverse operation of cryptographic calculation for the first time according to the non-linear conversion table to rolling code G1, draws raw data G0;
The deciphering execute phase four: central central controller is separated read raw data G0 according to data structure, obtains deciphering back count code, deciphering back sequence number, operational code respectively;
The deciphering execute phase five: central central controller is checked sequence number; When deciphering back sequence number and be stored in second data-carrier store sequence number not simultaneously; Central authorities' central controller is judged this ciphertext F1 mistake, and refusal is carried out the deciphering execute phase six, when deciphering back sequence number is identical with sequence number in being stored in second data-carrier store; Central authorities' central controller 20 judges that this ciphertext F1 is correct, carries out the deciphering execute phase six;
Carry out the deciphering execute phase six: central central controller is checked deciphering back count code, and central central controller identification deciphering back count code is effective, then carry out the deciphering execute phase seven, otherwise refusal is carried out the deciphering execute phase seven;
Carry out the deciphering execute phase seven: central central controller will be deciphered the back count code and cover the count code in second data-carrier store, carry out action according to operational code simultaneously.
Be provided with like this, can decipher the executable operations sign indicating number effectively to ciphertext F1.
As preferably; The clear data length that the described first time, cryptographic calculation was set is more than or equal to the data length of raw data G0; Key data length is more than or equal to the data length of non-linear conversion table; The clear data length that the described second time, cryptographic calculation was set is more than or equal to the data length of rolling code G1; The key data length that described second time, cryptographic calculation was set is more than or equal to the data length of random code S, and before carrying out for the first time cryptographic calculation, the method that adopts data to fill converts the non-linear conversion table into respectively and meets key data and the clear data that the first time, cryptographic calculation required with raw data G0; Carry out the cryptographic calculation first time then; Before carrying out for the second time cryptographic calculation, adopt method that data fill respectively rolling code G1 and random code S to be converted into and meet key data and the clear data that cryptographic calculation for the second time requires, the method for said data filling does; Being carried out at need by program setting increases the fillibility data and reaches the method with setting data length on the data that data fill, said fillibility data are random number, data 0 or carry out in the data that data fill the extracting part divided data by need and do XOR and draw.Be provided with like this, guaranteed that the data length of plaintext and key can let each raw data that configures all participate in computing, improved security.
As preferably, in the described deciphering execute phase two: central central controller reads random code S, draws clear data after ciphertext F1 being carried out the inverse operation of cryptographic calculation for the second time, and central central controller draws rolling code G1 according to program setting deletion fillibility data; In the described deciphering execute phase three: central central controller reads the non-linear conversion table; Central authorities' central controller draws clear data after rolling code G1 being carried out the inverse operation of cryptographic calculation for the first time according to the non-linear conversion table, and central central controller draws raw data G0 according to program setting deletion fillibility data.Be provided with like this, deleted the fillibility data, accelerated arithmetic speed.
As preferably, described first time, cryptographic calculation adopted the des encryption algorithm, and described second time, cryptographic calculation adopted the AES AES.The DES algorithm is the DSE arithmetic in the cipher system, and the Data Encryption Standard that is otherwise known as is the DSE arithmetic AES of American I BM company development in 1972; Under satisfactory situation; Non-linear conversion table among the present invention is the key in the standard des encryption algorithm, and the raw data G0 among the present invention is the plaintext in the standard des encryption algorithm, and aes algorithm is a kind of block encryption standard that Federal Government adopts; Analyzed in many ways and widely the whole world use; Under satisfactory situation, the random code S among the present invention is the key in the standard A ES AES, and the rolling code G1 among the present invention is the plaintext in the standard A ES AES; Cryptographic calculation and cryptographic calculation employing for the second time for the first time is the different encrypted algorithm simultaneously, has reduced the possibility that cracks after divulging a secret.
As preferably, described first time, cryptographic calculation adopted the des encryption algorithm, and described second time, cryptographic calculation adopted the des encryption algorithm.Because plaintext, the ciphertext of des encryption algorithm all are 64, so the ciphertext of cryptographic calculation can reduce the process that data are filled directly as expressly participating in cryptographic calculation for the second time for the first time; Equally, because the DES algorithm be to hop algorithm, so when carrying out the DES decipherment algorithm, also need not get rid of invalid data, the extraction valid data have reduced the data-switching link.
As preferably; In the said execution deciphering execute phase six; When deciphering back counting code value adds 1 and smaller or equal to being stored in counting code value in second data-carrier store when adding ratings more than or equal to being stored in counting code value in the second data office storer; Central authorities' central controller identification deciphering back count code is effective, carry out the deciphering execute phase seven, otherwise refusal is carried out the deciphering execute phase seven.Be provided with like this, increased the verification of count code, further increased security; Wherein the setting of ratings can be by program setting greater than any integer of 1; Here can be set to ratings is 200, because pressing telepilot, general driving only needs once, but the generation in order to prevent repeatedly to repeat to press problems such as telepilot; Then can with ratings be provided with big slightly, be 200 can guarantee promptly that security can not duplicate repeatedly the problem that button promptly can't be operated yet so ratings is set.
The invention has the beneficial effects as follows: the present invention can improve the security of telepilot effectively; Even guaranteeing telepilot makes the source and divulges a secret; The present invention still can guarantee the high security of telepilot and not reproducible; Even have telepilot to be cracked, still higher-security can be arranged with batch telepilot with in batch telepilot.
Description of drawings
Fig. 1 is a kind of circuit theory diagrams of automobile remote-control device among the present invention;
Fig. 2 is a kind of circuit theory diagrams of central central controller among the present invention;
Fig. 3 is a kind of main flow chart of the present invention;
Fig. 4 is a kind of process flow diagram of learning phase among the present invention;
Fig. 5 is a kind of process flow diagram in the stage of encrypting among the present invention;
Fig. 6 is a kind of process flow diagram of deciphering execute phase among the present invention.
Among the figure: 10, control chip, 11, first data-carrier store, 12, first amplifying circuit, 13, first coupled circuit, 14, first communicator; 15, second amplifying circuit, 16, second coupled circuit, 17, second communicator, 18, key circuit, 19, oscillatory circuit; 20, central central controller, 21, second data-carrier store, the 22, the 3rd amplifying circuit, the 23, the 3rd coupled circuit; 24, the 3rd communicator, the 25, the 4th amplifying circuit, the 26, the 4th coupled circuit, the 27, the 4th communicator.
Embodiment
Pass through specific embodiment below, and combine accompanying drawing, technical scheme of the present invention is further specified.
Embodiment 1:
A kind of telepilot encrypting and decrypting method in order to realize the method, needs following hardware foundation (referring to accompanying drawing 1), comprises battery-powered automobile remote-control device and the central central controller 20 that is complementary with the automobile remote-control device.The automobile remote-control device comprises control chip 10, key circuit 18, oscillatory circuit 19, first data-carrier store 11, first amplifying circuit 12, first coupled circuit 13, first communicator, 14, the second amplifying circuits 15, second coupled circuit 16, second communicator 17.Key circuit 18, oscillatory circuit 19 and first data-carrier store 11 all are electrically connected with control chip 10; Control chip 10 is electrically connected with first communicator 14 through first amplifying circuit 12 and first coupled circuit 13 successively, and control chip 10 is electrically connected with second communicator 17 through second amplifying circuit 15 and second coupled circuit 16 successively.Be electrically connected with second data-carrier store 21 (referring to accompanying drawing 2) on central authorities' central controller 20; Central authorities' central controller 20 is electrically connected with the 3rd communicator 24 through the 3rd amplifying circuit 22 and the 3rd coupled circuit 23 successively, is electrically connected with the 4th communicator 27 through the 4th amplifying circuit 25 and the 4th coupled circuit 26 successively.Key circuit 18 is that the user is operated; 19 of oscillatory circuits provide frequency of operation; First data-carrier store 11, second data-carrier store 21 carry out data storage, and the control chip 10 in the present embodiment is for having the single-chip microcomputer of procedure stores function, and central central controller 20 be the central central controller of lucky company production; Central authorities' central controller 20 is installed in the car body and carries out communication with interior each equipment of car; Carry out communication through communicator between central authorities' central controller 20 and the control chip 10, first communicator 14 and the 3rd communicator 24 are the high frequency communicator, and second communicator 17 and the 4th communicator 27 are the low frequency communication device.
The present invention mainly comprises following three phases (referring to accompanying drawing 3): initialization S1, learning phase S3, encryption stage S4 and deciphering execute phase S5.
At first central central controller 20 carries out initialization S1; Confirm the stage according to judging that the register-bit of setting gets into: whether use S2 for the first time; Whether the first use in the present embodiment specifically is meant is first and the automobile remote-control device carries out communication, and the register-bit here can be carried out freely setting according to programming by central central controller 20.Communication this time is the first communication of central central controller 20 and automobile remote-control device according to this register-bit data judging when central central controller 20, and then the present invention gets into learning phase S3, and simultaneously, central central controller 20 will be preserved by the register-bit numerical value negate of program setting; Communication this time is not the first communication of central central controller 20 and automobile remote-control device according to this register-bit data judging when central central controller 20, and then the present invention gets into encryption stage S4.
Learning phase S3 may further comprise the steps:
Learning phase step 1 S31: sequence number that configures and non-linear conversion table are stored in first data-carrier store, second data-carrier store; Adopt central central controller 20 to carry out communication with the automobile remote-control device in the present embodiment through the 3rd communicator 24; Central authorities' central controller 20 will be stored in 21 li sequence numbers that configure of second data-carrier store and the non-linear conversion table transfers to the automobile remote-control device, and control chip 10 is stored into first data-carrier store 11 with sequence number and non-linear conversion table; Non-linear conversion table in the present embodiment is to meet 64 bit data that the des encryption algorithm secret key requires;
Learning phase step 2 S32: central central controller 20 produces a random code S according to program setting, and central central controller 20 is preserved this random code S to the second data-carrier store 21 and carried out communication through the 4th communicator 27 with the automobile remote-control device; The length of random code S is 256;
Learning phase step 3 S33: the automobile remote-control device receives random code S through second communicator 17, and deposits this random code S in first data-carrier store 11;
Learning phase step 4 S34: the telepilot encrypting and decrypting method is accomplished the learning phase step, gets into the encryption stage;
Described encryption stage S4 may further comprise the steps:
Encryption stage step 1 S41: control chip 10 produces corresponding operational code according to the user to the different operating of automobile remote-control device key circuit 18; And the every operation of key circuit once; Control chip 10 promptly reads the count code in control chip 10 registers; And deposit register again in after then count code being added one, wait for when key circuit 18 is operated once more, read; The operational code is here carried out freely setting according to programming by control chip 10, and the register-bit here can be carried out freely setting according to programming by control chip 10;
Encryption stage step 2 S42: control chip is arranged the current count code that reads, sequence number, operational code in order according to program setting and is constituted raw data G0; Carry out after raw data G0 is arranged by count code, sequence number, operational code in order in the present embodiment that shift operation constitutes; Raw data G0 is not enough 64; Carry out data and fill, supply, form 64 bit data that meet plaintext requirement in the des encryption algorithm by data 0.
Encryption stage step 3 S43: control chip 10 reads the non-linear conversion table from first data-carrier store 11, and control chip will be accomplished the raw data G0 and the non-linear conversion table of data filling and do cryptographic calculation for the first time, obtain rolling code G1; What cryptographic calculation adopted for the first time is the des encryption algorithm, and the non-linear conversion table is the key in the standard des encryption algorithm, and the raw data G0 among the present invention is the plaintext in the standard des encryption algorithm after data are filled, and the rolling code G1 that draws is 64.
Encryption stage step 4 S44: control chip reads random code S from first data-carrier store 11; Control chip is done cryptographic calculation for the second time with rolling code G1 and random code S; Obtain ciphertext F1, control chip transmits ciphertext F1 through first communicator to central central controller; Cryptographic calculation employing for the second time is aes algorithm in the present embodiment; Wherein the length as the random code S of key is 256; So the length of program setting key is 256; And can be set at 128,192 or 256 arbitrarily by program as rolling code G1 expressly, in the present embodiment, rolling code G1 forms 256 plaintexts that meet aes algorithm after data are filled; Wherein the fillibility data can also can be duplicated filling for data 0 filling or by rolling code G1 for random number, adopt data 0 to fill in the present embodiment.
Encryption stage step 5 S45: the telepilot encrypting and decrypting method is accomplished encryption stage step, gets into the deciphering execute phase;
Deciphering execute phase S5 may further comprise the steps:
Deciphering execute phase one S51: central central controller 20 receives ciphertext F1 through the 3rd communicator 24;
Deciphering execute phases two S52: central central controller 20 reads random code S, and ciphertext F1 is carried out the inverse operation of cryptographic calculation for the second time, draws rolling code G1; Be about to random code S as key, ciphertext F1 is carried out the AES decipherment algorithm, draw behind the padding data 256 plaintext, will inquire about according to desired location then, rolling code G1 is extracted, draw rolling code G1;
Deciphering execute phase Three S's 53: central central controller 20 reads the non-linear conversion table, and central central controller 20 is carried out the inverse operation of cryptographic calculation for the first time according to the non-linear conversion table to rolling code G1, draws raw data G0; Be central central controller 20 with rolling code G1 as ciphertext, the non-linear conversion table as key, is carried out the DES decipherment algorithm, after the plaintext that draws is done displacement and removed the calculating of filler, draw raw data G0
Deciphering execute phases four S54: central central controller 20 is separated read raw data G0 according to data structure, obtains deciphering back count code, deciphering back sequence number, operational code respectively; Central authorities' central controller 20 is read deciphering back count code, deciphering back sequence number, operational code according to order and the position of inserting data such as count code, sequence number, operational code;
Deciphering execute phases five S55: central central controller 20 is checked sequence number, gets into then and judges the stage: whether carry out deciphering execute phase step 6 S56; When deciphering back sequence number be stored in second data-carrier store 21 sequence number not simultaneously, central central controller 20 is judged this ciphertext F1 mistakes, refusal is carried out deciphering execute phases six S57, deciphering execute phase end S50; When deciphering back sequence number was identical with sequence number in being stored in second data-carrier store 21, central central controller 20 judged that this ciphertext F1 are correct, carries out and deciphers execute phases six S57;
Carry out deciphering execute phases six S57: central central controller 20 is checked deciphering back count code, gets into then and judges the stage: whether carry out deciphering execute phase step 7 S58; When deciphering back counting code value adds 1 and smaller or equal to being stored in counting code value in second data-carrier store 21 when adding 200 more than or equal to being stored in counting code value in the second data office storer 21; Central authorities' central controller 20 assert that deciphering back count code is effective; Carry out deciphering execute phases seven S59; Otherwise refusal is carried out deciphering execute phases seven S59, and the deciphering execute phase finishes S50;
Carry out deciphering execute phases seven S59: central central controller 20 will be deciphered back count code covering and be stored in the count code in second data-carrier store 21, carry out action according to operational code simultaneously.
Embodiment 2:
Basic hardware basis is identical with embodiment 1, difference be in, first communicator 14 and the 3rd communicator 24 are the low frequency communication device, second communicator 17 and the 4th communicator 27 are the high frequency communicator.
Embodiment 3:
Present embodiment and embodiment 1 are basic identical, and difference is in present embodiment random code S and meets 64 bit data that the DES algorithm secret key requires, and promptly comprises 56 key and 8 additional bit parity check positions, so also there is following difference:
The encryption stage step 4 S44 that do not coexist of first place: control chip reads random code S from first data-carrier store 11; Control chip is done cryptographic calculation for the second time with rolling code G1 and random code S; Obtain ciphertext F1, control chip transmits ciphertext F1 through first communicator to central central controller; Cryptographic calculation employing for the second time is the DES algorithm in the present embodiment; Wherein the length as the random code S of key is 64; And also be 64 as rolling code G1 expressly, so in the present embodiment, rolling code G1 does not need padding data can form 64 plaintexts that meet the DES algorithm.
Second place's difference is to decipher execute phases two S52: central central controller 20 reads random code S, and ciphertext F1 is carried out the inverse operation of cryptographic calculation for the second time, draws rolling code G1; Be about to random code S as key, ciphertext F1 is carried out the AES decipherment algorithm, draw and expressly need not extracted data and be 64 rolling code G1.
Embodiment 4:
Present embodiment and embodiment 1 are basic identical; Difference is in present embodiment; The clear data length of cryptographic calculation setting for the first time is greater than the data length of raw data G0; Key data length is more than or equal to the data length of non-linear conversion table, and the clear data length that the described second time, cryptographic calculation was set is greater than the data length of rolling code G1, and the key data length of cryptographic calculation setting for the second time is greater than the data length of random code S; Before carrying out the cryptographic calculation first time; Adopt method that data fill respectively non-linear conversion table and raw data G0 to be converted into and meet key data and the clear data that cryptographic calculation for the first time requires, carry out cryptographic calculation first time then, before the execution cryptographic calculation second time; Adopt method that data fill respectively rolling code G1 and random code S to be converted into and meet key data and the clear data that cryptographic calculation for the second time requires, the fillibility data in the present embodiment all are to carry out in the data of data filling the extracting part divided data by need to do XOR and draw.
Above-described embodiment is a kind of preferable scheme of the present invention, is not that the present invention is done any pro forma restriction, under the prerequisite that does not exceed the technical scheme that claim puts down in writing, also has other variant and remodeling.
  

Claims (10)

1. telepilot encrypting and decrypting method; It is characterized in that: the hardware foundation of said telepilot encrypting and decrypting method is automobile remote-control device and the central central controller (20) that is complementary with the automobile remote-control device; Described automobile remote-control device comprises control chip (10); The telepilot encrypting and decrypting method comprises three phases: learning phase, encryption stage and deciphering execute phase, wherein
Described learning phase is carried out when using the automobile remote-control device, when central central controller (20) is judged as first with the communication of automobile remote-control device, gets into learning phase,
In learning phase, central central controller (20) produces a random code S according to program setting, and central central controller (20) is preserved this random code S and carried out communication with the automobile remote-control device;
Encryption stage step: control chip (10) produces corresponding operational code according to user's operation; Operational code and the sequence number that configures and non-linear conversion table through arrange in order with the first time cryptographic calculation obtain rolling code G1; Rolling code G1 and random code S do cryptographic calculation for the second time; Obtain ciphertext F1, control chip (10) is to central central controller (20) transmission ciphertext F1;
In in the deciphering execute phase, centre central controller (20) reads random code S, and ciphertext F1 is carried out the inverse operation of cryptographic calculation for the second time, draws rolling code G1; And then, draw operational code and sequence number according to data structure then to the inverse operation that rolling code G1 does the cryptographic calculation first time;
Central authorities' central controllers (20) judge according to sequence number whether ciphertext F1 is correct, the correct executable operations sign indicating number then of ciphertext F1 how, otherwise refuse the executable operations sign indicating number.
2. telepilot encrypting and decrypting method according to claim 1; It is characterized in that: be electrically connected with first data-carrier store (11) on the control chip (10); Control chip (10) is electrically connected with first communicator (14) through first amplifying circuit (12), first coupled circuit (13) successively; Control chip (10) is electrically connected with second communicator (17) through second amplifying circuit (15), second coupled circuit (16) successively; Described central central controller (20) is electrically connected with the 3rd communicator (24) through the 3rd amplifying circuit (22), the 3rd coupled circuit (23) successively; Described central central controller (20) is electrically connected with the 4th communicator (27) through the 4th amplifying circuit (25), the 4th coupled circuit (26) successively, and described central central controller (20) is electrically connected with second data-carrier store (21).
3. telepilot encrypting and decrypting method according to claim 2 is characterized in that: described telepilot encrypting and decrypting method learning phase step,
May further comprise the steps:
Learning phase step 1: sequence number that configures and non-linear conversion table are stored into first data-carrier store (11), second data-carrier store (21) lining;
The learning phase step 2: central central controller (20) produces a random code S according to program setting, and central central controller (20) is preserved this random code S to the second data-carrier store (21) and carried out communication through the 4th communicator (27) and automobile remote-control device;
The learning phase step 3: the automobile remote-control device receives random code S through second communicator (17), and deposits this random code S in first data-carrier store (11);
The learning phase step 4: the telepilot encrypting and decrypting method is accomplished the learning phase step, gets into the encryption stage.
4. telepilot encrypting and decrypting method according to claim 2 is characterized in that: the described encryption stage may further comprise the steps:
Encryption stage step 1: control chip (10) produces corresponding operational code according to the user to the different operating of automobile remote-control device key circuit (18); And the every operation of key circuit (18) once; Control chip (10) reads a count code in promptly from control chip (10) register; Again deposit register in after then count code being added one, wait for that key circuit (18) when operating once more, repeats to read;
Encryption stage step 2: control chip (10) is arranged the current count code that reads, sequence number, operational code in order according to program setting and is constituted raw data G0;
Encryption stage step 3: control chip (10) reads the non-linear conversion table from first data-carrier store (11), and control chip (10) is done cryptographic calculation for the first time with raw data G0 and non-linear conversion table, obtains rolling code G1;
Encryption stage step 4: control chip (10) reads random code S from first data-carrier store (11); Control chip (10) is done cryptographic calculation for the second time with rolling code G1 and random code S; Obtain ciphertext F1, control chip (10) transmits ciphertext F1 through first communicator (14) to central central controller (20);
Encryption stage step 5: the telepilot encrypting and decrypting method is accomplished encryption stage step, gets into the deciphering execute phase.
5. telepilot encrypting and decrypting method according to claim 4 is characterized in that: the described deciphering execute phase may further comprise the steps:
The deciphering execute phase one: central central controller (20) receives ciphertext F1 through the 3rd communicator (24);
The deciphering execute phase two: central central controller (20) reads random code S, and ciphertext F1 is carried out the inverse operation of cryptographic calculation for the second time, draws rolling code G1;
The deciphering execute phase three: central central controller (20) reads the non-linear conversion table, and central central controller (20) is carried out the inverse operation of cryptographic calculation for the first time according to the non-linear conversion table to rolling code G1, draws raw data G0;
The deciphering execute phase four: central central controller (20) is separated read raw data G0 according to data structure, obtains deciphering back count code, deciphering back sequence number, operational code respectively;
The deciphering execute phase five: central central controller (20) is checked sequence number; When deciphering back sequence number and be stored in second data-carrier store (21) sequence number not simultaneously; Central authorities' central controllers (20) are judged this ciphertext F1 mistake, and refusal is carried out the deciphering execute phase six, when deciphering back sequence number is identical with sequence number in being stored in second data-carrier store (21); Central authorities' central controller (20) 20 judges that this ciphertext F1 is correct, carries out the deciphering execute phase six;
Carry out the deciphering execute phase six: central central controller (20) is checked deciphering back count code, and central central controller (20) assert that deciphering back count code is effective, then carry out the deciphering execute phase seven, otherwise refusal is carried out the deciphering execute phase seven;
Carry out the deciphering execute phase seven: central central controller (20) will be deciphered the back count code and cover the count code in second data-carrier store (21), carry out action according to operational code simultaneously.
6. telepilot encrypting and decrypting method according to claim 5; It is characterized in that: the clear data length that the described first time, cryptographic calculation was set is more than or equal to the data length of raw data G0; Key data length is more than or equal to the data length of non-linear conversion table; The clear data length that the described second time, cryptographic calculation was set is more than or equal to the data length of rolling code G1; The key data length that the described second time, cryptographic calculation was set is more than or equal to the data length of random code S; Before carrying out the cryptographic calculation first time; Adopt method that data fill respectively non-linear conversion table and raw data G0 to be converted into and meet key data and the clear data that cryptographic calculation for the first time requires, carry out cryptographic calculation first time then, before the execution cryptographic calculation first time; The method that adopts data to fill converts rolling code G1 and random code S into respectively and meets key data and the clear data that the second time, cryptographic calculation required; The method that said data are filled does, being carried out at need by program setting increases the fillibility data and reach the method with setting data length on the data that data fill, and said fillibility data are random number, data 0 or carry out in the data that data fill the extracting part divided data by need and do XOR and draw.
7. according to claim 5 or 6 described telepilot encrypting and decrypting methods; It is characterized in that: in the described deciphering execute phase two: central central controller (20) reads random code S; Draw clear data after the inverse operation to the ciphertext F1 execution cryptographic calculation second time, central central controller (20) draws rolling code G1 according to program setting deletion fillibility data; In the described deciphering execute phase three: central central controller (20) reads the non-linear conversion table; Central authorities' central controllers (20) draw clear data after rolling code G1 being carried out the inverse operation of cryptographic calculation for the first time according to the non-linear conversion table, and central central controller (20) draws raw data G0 according to program setting deletion fillibility data.
8. telepilot encrypting and decrypting method according to claim 1 is characterized in that: described cryptographic calculation employing first time des encryption algorithm, described cryptographic calculation employing second time AES AES.
9. according to claim 2 or 3 or 4 or 5 described telepilot encrypting and decrypting methods, it is characterized in that: described cryptographic calculation employing first time des encryption algorithm, described cryptographic calculation employing second time des encryption algorithm.
10. according to claim 2 or 3 or 4 or 5 described telepilot encrypting and decrypting methods; It is characterized in that: in the said execution deciphering execute phase six; When deciphering back counting code value adds 1 and smaller or equal to being stored in counting code value in second data-carrier store (21) when adding ratings more than or equal to being stored in counting code value in the second data office storer; Central authorities' central controllers (20) assert that deciphering back count code is effective, carry out the deciphering execute phase seven, otherwise refusal are carried out the deciphering execute phase seven.
CN201110299153.7A 2011-09-29 2011-09-29 Encryption and decryption method for remote controller Active CN102568062B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110299153.7A CN102568062B (en) 2011-09-29 2011-09-29 Encryption and decryption method for remote controller

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110299153.7A CN102568062B (en) 2011-09-29 2011-09-29 Encryption and decryption method for remote controller

Publications (2)

Publication Number Publication Date
CN102568062A true CN102568062A (en) 2012-07-11
CN102568062B CN102568062B (en) 2014-06-18

Family

ID=46413399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110299153.7A Active CN102568062B (en) 2011-09-29 2011-09-29 Encryption and decryption method for remote controller

Country Status (1)

Country Link
CN (1) CN102568062B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104851257A (en) * 2014-12-19 2015-08-19 北汽福田汽车股份有限公司 Remote controller and its method, equipment receiving remote controller message, method thereof and vehicle
CN105119900A (en) * 2015-07-17 2015-12-02 北京奇虎科技有限公司 Information secure transmission method, network access method and corresponding terminals
CN105120454A (en) * 2015-07-17 2015-12-02 北京奇虎科技有限公司 Information transmission method, network access method and corresponding terminals
CN106869616A (en) * 2017-03-05 2017-06-20 宁波亿拍客网络科技有限公司 A kind of dynamic puzzle-lock, dynamic cipher system and dynamic encryption and decryption system
CN107395603A (en) * 2017-07-28 2017-11-24 移康智能科技(上海)股份有限公司 The encryption and decryption method of control instruction transmission, terminal device/server
CN107393277A (en) * 2017-08-28 2017-11-24 江苏赫奕科技有限公司 Method of sending and receiving based on low-power consumption safe mode des encryption rolling code
CN107749795A (en) * 2017-10-13 2018-03-02 车展交通器材(台山)有限公司 A kind of vehicle remote control method of the secondary encryption based on rolling code
CN108492413A (en) * 2018-03-15 2018-09-04 广东西雅斯智能科技有限公司 Dynamic cipher generating method, password generator and coded lock
CN109286487A (en) * 2017-07-19 2019-01-29 杭州海康威视数字技术股份有限公司 The remote control method and system of a kind of electronic equipment
CN109416850A (en) * 2016-06-30 2019-03-01 集成装置技术公司 Wireless power digital phase-locking

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566347B (en) * 2017-08-10 2020-07-24 北京梆梆安全科技有限公司 Rolling code learning detection method and device, equipment and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5898397A (en) * 1996-01-16 1999-04-27 Stanley Home Automation Remote control transmitter and method of operation
US20050041813A1 (en) * 2003-08-19 2005-02-24 Forest Thomas M. Method, device, and system for secure motor vehicle remote keyless entry
CN101457610A (en) * 2009-01-05 2009-06-17 许李纳 Non-key system for automobile and communication encrypting method thereof
CN101662363A (en) * 2008-08-30 2010-03-03 怀化学院 Multi-layer rolling code encryption and decryption technology
CN101866534A (en) * 2010-01-29 2010-10-20 中南大学 Automobile remote-control key-free door control identity authentication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5898397A (en) * 1996-01-16 1999-04-27 Stanley Home Automation Remote control transmitter and method of operation
US20050041813A1 (en) * 2003-08-19 2005-02-24 Forest Thomas M. Method, device, and system for secure motor vehicle remote keyless entry
CN101662363A (en) * 2008-08-30 2010-03-03 怀化学院 Multi-layer rolling code encryption and decryption technology
CN101457610A (en) * 2009-01-05 2009-06-17 许李纳 Non-key system for automobile and communication encrypting method thereof
CN101866534A (en) * 2010-01-29 2010-10-20 中南大学 Automobile remote-control key-free door control identity authentication method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104851257A (en) * 2014-12-19 2015-08-19 北汽福田汽车股份有限公司 Remote controller and its method, equipment receiving remote controller message, method thereof and vehicle
CN105119900B (en) * 2015-07-17 2019-02-26 北京奇虎科技有限公司 Information secure transmission method, networking cut-in method and corresponding terminal
CN105119900A (en) * 2015-07-17 2015-12-02 北京奇虎科技有限公司 Information secure transmission method, network access method and corresponding terminals
CN105120454A (en) * 2015-07-17 2015-12-02 北京奇虎科技有限公司 Information transmission method, network access method and corresponding terminals
CN109416850B (en) * 2016-06-30 2022-06-17 集成装置技术公司 Wireless power supply digital lock
CN109416850A (en) * 2016-06-30 2019-03-01 集成装置技术公司 Wireless power digital phase-locking
CN106869616A (en) * 2017-03-05 2017-06-20 宁波亿拍客网络科技有限公司 A kind of dynamic puzzle-lock, dynamic cipher system and dynamic encryption and decryption system
CN109286487A (en) * 2017-07-19 2019-01-29 杭州海康威视数字技术股份有限公司 The remote control method and system of a kind of electronic equipment
CN109286487B (en) * 2017-07-19 2021-10-01 杭州海康威视数字技术股份有限公司 Remote control method and system for electronic equipment
CN107395603A (en) * 2017-07-28 2017-11-24 移康智能科技(上海)股份有限公司 The encryption and decryption method of control instruction transmission, terminal device/server
CN107393277A (en) * 2017-08-28 2017-11-24 江苏赫奕科技有限公司 Method of sending and receiving based on low-power consumption safe mode des encryption rolling code
CN107749795A (en) * 2017-10-13 2018-03-02 车展交通器材(台山)有限公司 A kind of vehicle remote control method of the secondary encryption based on rolling code
CN107749795B (en) * 2017-10-13 2021-03-30 车展交通器材(台山)有限公司 Automobile remote control method based on rolling code secondary encryption
CN108492413A (en) * 2018-03-15 2018-09-04 广东西雅斯智能科技有限公司 Dynamic cipher generating method, password generator and coded lock

Also Published As

Publication number Publication date
CN102568062B (en) 2014-06-18

Similar Documents

Publication Publication Date Title
CN102568062B (en) Encryption and decryption method for remote controller
CN102317904B (en) System and methods for encryption with authentication integrity
CN104410616B (en) data encryption, decryption, transmission method and system
KR950001729B1 (en) Method of secure remote access
CN205140035U (en) Mobile terminal and intelligent communication system who locks
JPS6014353B2 (en) digital signature device
RU2004127588A (en) SYSTEM AND METHOD OF ACOUSTIC TWO-FACTOR AUTHENTICATION
CN101043326B (en) Dynamic information encrypting system and method
RU2005104945A (en) EFFECTIVE ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS
CN102110319A (en) Wireless code hopping system, device and method for remote control door lock
CN101176329A (en) Communication protocol and electronic communication system, in particular authentication control system, as well as corresponding method
KR20160045752A (en) Identity authentication system, apparatus, and method, and identity authentication request apparatus
CN105006051A (en) Wireless communication method and system of intelligent remote control door lock
CN102833075A (en) Identity authentication and digital signature method based on three-layered overlapping type key management technology
CN104219044A (en) Key secret method for encrypting storing device
CN102598575B (en) Method and system for the accelerated decryption of cryptographically protected user data units
CN101265769B (en) Password distant control lock control system based on AES cryptographic algorithm and control method
CN105235642B (en) Control instruction executes safely method and main machine for car theft-proof device
CN106656489B (en) Mobile payment-oriented safety improvement method for information interaction between self-service selling equipment and server
CN101394398B (en) Content protecting method and system oriented to terminal digital interface
CN106385313A (en) Random cryptograph system based on grouping encryption algorithm and realization method thereof
CN107911354A (en) A kind of compound parallel data encryption method
CN107534558A (en) For the method and data highway system of the information security for protecting the data via data bus transmission
CN103414564A (en) Secrete key card, secrete key device and method for protecting private key
CN102903226B (en) Data transmission method for communication of intelligent electric meters

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant