CN102811122A - Single-key public cryptosystem - Google Patents

Single-key public cryptosystem Download PDF

Info

Publication number
CN102811122A
CN102811122A CN2011101517064A CN201110151706A CN102811122A CN 102811122 A CN102811122 A CN 102811122A CN 2011101517064 A CN2011101517064 A CN 2011101517064A CN 201110151706 A CN201110151706 A CN 201110151706A CN 102811122 A CN102811122 A CN 102811122A
Authority
CN
China
Prior art keywords
key
cryptosystem
sort
public
plaintext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101517064A
Other languages
Chinese (zh)
Inventor
邹阿金
谢仕义
刘勇华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Ocean University
Original Assignee
Guangdong Ocean University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Ocean University filed Critical Guangdong Ocean University
Priority to CN2011101517064A priority Critical patent/CN102811122A/en
Publication of CN102811122A publication Critical patent/CN102811122A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a single-key public cryptosystem. In the cryptosystem, a sender selects a serial number k first, then, extracts a scrambling key with the same length with a plaintext sequence m=m1, m2..., ms from R=(rk|k = 1, 2,..., n; n<infinity) for encryption operation to obtain a ciphertext c=msort(r), at last, sends k and c from a public channel to a receiver. According to the serial number k, the receiver extracts a scrambling key from R= (rk|k = 1, 2,..., n; n<infinity) for decryption operation to obtain a plaintext m=csort (sort(r)). The cryptosystem solves the problem of a large amount of key generation, storage and distribution in the traditional single-key system. Compared with the traditional single-key cryptosystem, the single-key public cryptosystem provided by the invention has a key that can be public, and compared with the traditional dual-key public cryptosystem, the single-key public cryptosystem provided by the invention has an encryption key and a decryption key which are the same to each other, thereby integrating the characteristics of the two cryptosystems. The single-key public cryptosystem has the largest advantage of easiness in realizing the 'once a crypto' encryption which cannot be decrypted in theory. The single-key public cryptosystem provided by the invention can be widely applied in various confidential departments and political, economical, cultural and social fields (such as e-government, e-commerce and other relevant fields) for serving the development of national economy, thereby having a broad application prospect in the market.

Description

Single key open code system
Technical field
The present invention relates to the cryptological technique field, particularly a kind of single key open code system.
Background technology
The modern password system can be divided into conbined public or double key system and single key system two big classes.
The characteristics of conbined public or double key password are that different keys is used in encryption and decryption, and decruption key is maintained secrecy, and encryption key can openly be propagated and the not fail safe of entail dangers to cryptographic system, and the maximum shortcoming of dual key encryption algorithm is that arithmetic speed is slower; The fail safe of most of conbined public or double key system can be summed up as the three major types types such as intractability of discrete logarithm problem on intractability and the elliptic curve of discrete logarithm problem on the intractability, finite field of the plain resolution problem of big integer.Typical conbined public or double key algorithm has RSA, EIGamal and Menezes-Vanstone etc.
The characteristics of single key password are to encrypt or decipher all to use same key, and therefore, the fail safe of key is depended in the fail safe of this cryptographic system fully, if the key leakage, just then this cryptographic system would be broken.Typical single key algorithm has DES, AES and IDEA etc.
The advantage of single key password is a fast operation; But because communicating pair all uses identical key pair information (data) to carry out encryption and decryption; So in order to ensure safety; Communicating pair must use other safe lane to come distributed key, and method commonly used is to transmit key with special courier (or safe lane); Under computer network environment, people use the common signal channel of network to transmit encrypt file on the one hand, need other safe lane distributed key on the one hand again, this contradiction that just seems itself, and cost is quite expensive.
In addition; In single key system; When communicating pair transmits with single key AES information of carrying out at every turn; All need use the ignorant only key of other users, this number of keys that can make that communicating pair had becomes geometric growth, thereby brings the insoluble problems such as generation, storage and distribution of a large amount of keys.
Summary of the invention
Goal of the invention of the present invention is in order to overcome the defective that above prior art exists, a kind of novel single key open code system to be provided, compare with the single key cryptographic system of tradition, and its key can disclose; Compare with traditional conbined public or double key cryptographic system, its encrypt and decrypt key is identical, thereby has taken into account the characteristics of these two kinds of encryption systems.
In order to realize the foregoing invention purpose, the technical scheme that the present invention takes is: this list key open code system is to choose Gauss-markoff process to produce random sequence set R={r k| k=1,2 ..., n; N<∞ }, the permutation cipher of encrypt and decrypt algorithm use " one-time pad ".
Transmit leg is at first selected a sequence number k, then from R={r k| k=1,2 ..., n; N<∞ } the middle extraction and plaintext sequence m=m 1m 2M sIsometric scramble key
Figure BSA00000512479400021
Carry out cryptographic calculation and get ciphertext c=m Sort (r)Send k and c to recipient from overt channel at last;
The recipient is according to sequence number k, from R={r k| k=1,2 ..., n; N<∞ } the middle scramble key that extracts
Figure BSA00000512479400022
Carry out decrypt operation and get expressly m=c Sort (sort (r))
Specifically according to the following steps:
(1) generation of Gauss-Markov random sequence set
Gauss-Markov random sequence can be by recurrence formula x i=ρ x I-1+ ω iProduce ω in the formula iBe a zero-mean, independence and same (white) Gaussian stochastic variable that distributes, ρ confirms x iAnd x I-1Between a parameter of degree of correlation, promptly
Figure BSA00000512479400023
σ 2It is variance;
Optional one group of ρ, x 0And t, can generate a Gauss-Markov random sequence x 1x 2X t, make it equal r 1In like manner can get r 2, r 3..., constitute Gauss-Markov random sequence set R={r thus k| k=1,2 ..., n; N<∞ };
(2) encrypt and decrypt algorithm
Optional a certain random sequence r k∈ R is from r kThe middle extraction and plaintext m=m 1m 2M sIsometric one section of ∈ M
Figure BSA00000512479400024
As the scramble key that plaintext m is carried out the encrypt and decrypt computing;
AES:
Figure BSA00000512479400025
G be with
Figure BSA00000512479400026
Subscript vector after middle element sorts from small to large, then ciphertext c=m g∈ C, m gElement among the expression plaintext m carries out in-place computation according to g;
Decipherment algorithm: f = Sort ( Sort ( r &OverBar; ) ) , M=c expressly then f
The advantage of the single key public encryption of the present invention system:
As long as a chooses different serial numbers k, encrypt just can accomplish " one-time pad ", know that by Shannon information theory this password can not be decoded in theory;
B, k and c can send from overt channel simultaneously; Even the disabled user has intercepted and captured k and c, under the situation of not knowing scramble key , still can not recover expressly m.
Description of drawings
Fig. 1 is the schematic diagram of the single key open code of the present invention system;
Fig. 2 is the encrypt and decrypt figure as a result of original image.
Embodiment
Single key public encryption system of the present invention is made up of following five parts:
A. space M expressly: all set expressly;
B. cryptogram space C: the set of all ciphertexts;
C. key space R: the set of all keys (random sequence of the maintaining secrecy set R={r that the present invention utilizes communicating pair to own together k| k=1,2 ..., n; N<∞ } constitute key space);
D. AES E: by the set of the enciphering transformation of cipher controlled;
E. decipherment algorithm D: by the set of the deciphering conversion of cipher controlled.
When carrying out secure communication, transmit leg is optional k random sequence r from the set R that maintains secrecy kAs the key of communicating pair, carry out cryptographic calculation and get ciphertext
Figure BSA00000512479400032
Send k and c to recipient from overt channel together then, the recipient extracts key r according to k from R k, carry out decrypt operation and get expressly Because the encryption and decryption computing only and r kRelevant, irrelevant with k, so k can disclose, thereby obtain a kind of novel single key open code system, its principle is as shown in Figure 1.In the present invention, k only indicates the selected random sequence r of communicating pair kSequence number, its encrypt and decrypt information is hidden in secret r fully kIn, there is not direct relation with k, so k can transmit from overt channel in company with ciphertext c together; Therefore disabled user (assailant) is not if know r kEven, intercepted and captured c and k, also be difficult to decoding and obtain expressly m.Random sequence r is depended in the fail safe of this system fully kRandomness, complexity, be difficult to analytical and unpredictable property.
The implementation method of the single key open code of the present invention system:
Suppose that transmit leg will be that 256 * 256 the original image (shown in Fig. 2 (a)) of maintaining secrecy sends the recipient to through overt channel with a width of cloth size.
One, transmit leg is operated as follows:
Step1, optional ρ=0.2, x 0=0.5 substitution x i=ρ x I-1+ ω i, generate random sequence r 1∈ R;
Step2, convert original image into expressly sequence m=m 1m 2M 65536, from r 1The middle extraction and the isometric scramble key of plaintext sequence m
Figure BSA00000512479400041
Carry out cryptographic calculation and get encrypted result c=m Sort (r)(shown in Fig. 2 (b));
Setp3, send k=1 and ciphertext c to recipient through overt channel.
Two, operate as follows the side of meeting and sending off:
Step1, according to k=1, from R, extract and the isometric scramble key of ciphertext sequence c
Figure BSA00000512479400042
Carry out decrypt operation and get m '=c Sort (sort (r))
Step2, convert m ' into 256 * 256 picture format and get decrypted result (shown in Fig. 2 (c)).
By knowing like Fig. 2, decrypted result (c) has been reduced to original image (a).

Claims (1)

1. single key open code system, it is characterized in that: transmit leg is at first selected a sequence number k, then from R={r k| k=1,2 ..., n; N<∞ } the middle extraction and plaintext sequence m=m 1m 2M sIsometric scramble key
Figure FSA00000512479300011
Carry out cryptographic calculation and get ciphertext c=m Sort (r)Send k and c to recipient from overt channel at last;
The recipient is according to sequence number k, from R={r k| k=1,2 ..., n; N<∞ } the middle scramble key that extracts Carry out decrypt operation and get expressly m=c Sort (sort (r))
Specifically according to the following steps:
(1) generation of Gauss-Markov random sequence set
Gauss-Markov random sequence can be by recurrence formula x i=ρ x I-1+ ω iProduce ω in the formula iBe a zero-mean, independence and same (white) Gaussian stochastic variable that distributes, ρ confirms x iAnd x I-1Between a parameter of degree of correlation, promptly
Figure FSA00000512479300013
σ 2It is variance;
Optional one group of ρ, x 0And t, can generate a Gauss-Markov random sequence x 1x 2X t, make it equal r 1In like manner can get r 2, r 3..., constitute Gauss-Markov random sequence set R={r thus k| k=1,2 ..., n; N<∞ };
(2) encrypt and decrypt algorithm
Optional a certain random sequence r k∈ R is from r kThe middle extraction and plaintext m=m 1m 2M sIsometric one section of ∈ M
Figure FSA00000512479300014
As the scramble key that plaintext m is carried out the encrypt and decrypt computing;
AES:
Figure FSA00000512479300015
G be with
Figure FSA00000512479300016
Subscript vector after middle element sorts from small to large, then ciphertext c=m g∈ C, m gElement among the expression plaintext m carries out in-place computation according to g;
Decipherment algorithm: f = Sort ( Sort ( r &OverBar; ) ) , M=c expressly then f
CN2011101517064A 2011-06-02 2011-06-02 Single-key public cryptosystem Pending CN102811122A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101517064A CN102811122A (en) 2011-06-02 2011-06-02 Single-key public cryptosystem

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101517064A CN102811122A (en) 2011-06-02 2011-06-02 Single-key public cryptosystem

Publications (1)

Publication Number Publication Date
CN102811122A true CN102811122A (en) 2012-12-05

Family

ID=47234710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101517064A Pending CN102811122A (en) 2011-06-02 2011-06-02 Single-key public cryptosystem

Country Status (1)

Country Link
CN (1) CN102811122A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100819A (en) * 2016-06-02 2016-11-09 上海奕瑞光电子科技有限公司 Image encrypting and decrypting system and image encrypting and decrypting method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
PROAKIS J G, SALEHI M.: "《现代通信系统使用MATLAB》", 30 November 2001 *
杨华千: "基于混沌与代数群的分组密码算法研究", 《中国博士学位论文全文数据库》 *
邹阿金,张雨浓,肖秀春: "Hermite混沌神经网络异步加密算法", 《智能系统学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100819A (en) * 2016-06-02 2016-11-09 上海奕瑞光电子科技有限公司 Image encrypting and decrypting system and image encrypting and decrypting method
CN106100819B (en) * 2016-06-02 2019-09-13 上海奕瑞光电子科技股份有限公司 Image encrypting and decrypting system and image encrypting and decrypting method

Similar Documents

Publication Publication Date Title
Jeeva et al. Comparative analysis of performance efficiency and security measures of some encryption algorithms
US9172529B2 (en) Hybrid encryption schemes
Albahar et al. Novel hybrid encryption algorithm based on aes, RSA, and twofish for bluetooth encryption
CN104836657A (en) Identity anonymity-based broadcast encryption method having efficient decryption characteristic
CN104519071A (en) Group encryption and decryption method and system with selection and exclusion functions
Chhabra et al. Modified RSA algorithm: a secure approach
Thomas et al. An encryption protocol for end-to-end secure transmission of SMS
Thein et al. Comparative performance study on ordinary and chaos image encryption schemes
Abusukhon et al. Secure network communication based on text-to-image encryption
CN102521785A (en) Homomorphism image encryption and decryption method used for image sharing based on EC-ELGamal algorithm
CN101867471A (en) Irrational number based DES authentication encryption algorithm
CN101882996B (en) Information encryption and decryption method in distributed system based on identity
Singh et al. Comparative study of DES, 3DES, AES and RSA
Mahalakshmi et al. Image encryption method using differential expansion technique, AES and RSA algorithm
Li et al. Mathematical model and framework of physical layer encryption for wireless communications
EP2571192A1 (en) Hybrid encryption schemes
Gobi et al. A comparative study on the performance and the security of RSA and ECC algorithm
Prasanthi et al. Hybrid approach for securing the IoT devices
CN101702116A (en) Pseudorandom sequence generating method based on progressive deterministic random
KR100388059B1 (en) Data encryption system and its method using asymmetric key encryption algorithm
Srihith et al. Locking down big data: a comprehensive survey of data encryption methods
Zhang Comments on “Color image encryption using Choquet fuzzy integral and hyper chaotic system”
CN102811122A (en) Single-key public cryptosystem
Dũng Variant of OTP Cipher with Symmetric Key Solution
Kandul et al. Steganography with cryptography in android

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121205