CN102811122A - Single-key public cryptosystem - Google Patents
Single-key public cryptosystem Download PDFInfo
- Publication number
- CN102811122A CN102811122A CN2011101517064A CN201110151706A CN102811122A CN 102811122 A CN102811122 A CN 102811122A CN 2011101517064 A CN2011101517064 A CN 2011101517064A CN 201110151706 A CN201110151706 A CN 201110151706A CN 102811122 A CN102811122 A CN 102811122A
- Authority
- CN
- China
- Prior art keywords
- key
- cryptosystem
- sort
- public
- plaintext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a single-key public cryptosystem. In the cryptosystem, a sender selects a serial number k first, then, extracts a scrambling key with the same length with a plaintext sequence m=m1, m2..., ms from R=(rk|k = 1, 2,..., n; n<infinity) for encryption operation to obtain a ciphertext c=msort(r), at last, sends k and c from a public channel to a receiver. According to the serial number k, the receiver extracts a scrambling key from R= (rk|k = 1, 2,..., n; n<infinity) for decryption operation to obtain a plaintext m=csort (sort(r)). The cryptosystem solves the problem of a large amount of key generation, storage and distribution in the traditional single-key system. Compared with the traditional single-key cryptosystem, the single-key public cryptosystem provided by the invention has a key that can be public, and compared with the traditional dual-key public cryptosystem, the single-key public cryptosystem provided by the invention has an encryption key and a decryption key which are the same to each other, thereby integrating the characteristics of the two cryptosystems. The single-key public cryptosystem has the largest advantage of easiness in realizing the 'once a crypto' encryption which cannot be decrypted in theory. The single-key public cryptosystem provided by the invention can be widely applied in various confidential departments and political, economical, cultural and social fields (such as e-government, e-commerce and other relevant fields) for serving the development of national economy, thereby having a broad application prospect in the market.
Description
Technical field
The present invention relates to the cryptological technique field, particularly a kind of single key open code system.
Background technology
The modern password system can be divided into conbined public or double key system and single key system two big classes.
The characteristics of conbined public or double key password are that different keys is used in encryption and decryption, and decruption key is maintained secrecy, and encryption key can openly be propagated and the not fail safe of entail dangers to cryptographic system, and the maximum shortcoming of dual key encryption algorithm is that arithmetic speed is slower; The fail safe of most of conbined public or double key system can be summed up as the three major types types such as intractability of discrete logarithm problem on intractability and the elliptic curve of discrete logarithm problem on the intractability, finite field of the plain resolution problem of big integer.Typical conbined public or double key algorithm has RSA, EIGamal and Menezes-Vanstone etc.
The characteristics of single key password are to encrypt or decipher all to use same key, and therefore, the fail safe of key is depended in the fail safe of this cryptographic system fully, if the key leakage, just then this cryptographic system would be broken.Typical single key algorithm has DES, AES and IDEA etc.
The advantage of single key password is a fast operation; But because communicating pair all uses identical key pair information (data) to carry out encryption and decryption; So in order to ensure safety; Communicating pair must use other safe lane to come distributed key, and method commonly used is to transmit key with special courier (or safe lane); Under computer network environment, people use the common signal channel of network to transmit encrypt file on the one hand, need other safe lane distributed key on the one hand again, this contradiction that just seems itself, and cost is quite expensive.
In addition; In single key system; When communicating pair transmits with single key AES information of carrying out at every turn; All need use the ignorant only key of other users, this number of keys that can make that communicating pair had becomes geometric growth, thereby brings the insoluble problems such as generation, storage and distribution of a large amount of keys.
Summary of the invention
Goal of the invention of the present invention is in order to overcome the defective that above prior art exists, a kind of novel single key open code system to be provided, compare with the single key cryptographic system of tradition, and its key can disclose; Compare with traditional conbined public or double key cryptographic system, its encrypt and decrypt key is identical, thereby has taken into account the characteristics of these two kinds of encryption systems.
In order to realize the foregoing invention purpose, the technical scheme that the present invention takes is: this list key open code system is to choose Gauss-markoff process to produce random sequence set R={r
k| k=1,2 ..., n; N<∞ }, the permutation cipher of encrypt and decrypt algorithm use " one-time pad ".
Transmit leg is at first selected a sequence number k, then from R={r
k| k=1,2 ..., n; N<∞ } the middle extraction and plaintext sequence m=m
1m
2M
sIsometric scramble key
Carry out cryptographic calculation and get ciphertext c=m
Sort (r)Send k and c to recipient from overt channel at last;
The recipient is according to sequence number k, from R={r
k| k=1,2 ..., n; N<∞ } the middle scramble key that extracts
Carry out decrypt operation and get expressly m=c
Sort (sort (r))
Specifically according to the following steps:
(1) generation of Gauss-Markov random sequence set
Gauss-Markov random sequence can be by recurrence formula x
i=ρ x
I-1+ ω
iProduce ω in the formula
iBe a zero-mean, independence and same (white) Gaussian stochastic variable that distributes, ρ confirms x
iAnd x
I-1Between a parameter of degree of correlation, promptly
σ
2It is variance;
Optional one group of ρ, x
0And t, can generate a Gauss-Markov random sequence x
1x
2X
t, make it equal r
1In like manner can get r
2, r
3..., constitute Gauss-Markov random sequence set R={r thus
k| k=1,2 ..., n; N<∞ };
(2) encrypt and decrypt algorithm
Optional a certain random sequence r
k∈ R is from r
kThe middle extraction and plaintext m=m
1m
2M
sIsometric one section of ∈ M
As the scramble key that plaintext m is carried out the encrypt and decrypt computing;
AES:
G be with
Subscript vector after middle element sorts from small to large, then ciphertext c=m
g∈ C, m
gElement among the expression plaintext m carries out in-place computation according to g;
Decipherment algorithm:
M=c expressly then
f
The advantage of the single key public encryption of the present invention system:
As long as a chooses different serial numbers k, encrypt just can accomplish " one-time pad ", know that by Shannon information theory this password can not be decoded in theory;
B, k and c can send from overt channel simultaneously; Even the disabled user has intercepted and captured k and c, under the situation of not knowing scramble key
, still can not recover expressly m.
Description of drawings
Fig. 1 is the schematic diagram of the single key open code of the present invention system;
Fig. 2 is the encrypt and decrypt figure as a result of original image.
Embodiment
Single key public encryption system of the present invention is made up of following five parts:
A. space M expressly: all set expressly;
B. cryptogram space C: the set of all ciphertexts;
C. key space R: the set of all keys (random sequence of the maintaining secrecy set R={r that the present invention utilizes communicating pair to own together
k| k=1,2 ..., n; N<∞ } constitute key space);
D. AES E: by the set of the enciphering transformation of cipher controlled;
E. decipherment algorithm D: by the set of the deciphering conversion of cipher controlled.
When carrying out secure communication, transmit leg is optional k random sequence r from the set R that maintains secrecy
kAs the key of communicating pair, carry out cryptographic calculation and get ciphertext
Send k and c to recipient from overt channel together then, the recipient extracts key r according to k from R
k, carry out decrypt operation and get expressly
Because the encryption and decryption computing only and r
kRelevant, irrelevant with k, so k can disclose, thereby obtain a kind of novel single key open code system, its principle is as shown in Figure 1.In the present invention, k only indicates the selected random sequence r of communicating pair
kSequence number, its encrypt and decrypt information is hidden in secret r fully
kIn, there is not direct relation with k, so k can transmit from overt channel in company with ciphertext c together; Therefore disabled user (assailant) is not if know r
kEven, intercepted and captured c and k, also be difficult to decoding and obtain expressly m.Random sequence r is depended in the fail safe of this system fully
kRandomness, complexity, be difficult to analytical and unpredictable property.
The implementation method of the single key open code of the present invention system:
Suppose that transmit leg will be that 256 * 256 the original image (shown in Fig. 2 (a)) of maintaining secrecy sends the recipient to through overt channel with a width of cloth size.
One, transmit leg is operated as follows:
Step1, optional ρ=0.2, x
0=0.5 substitution x
i=ρ x
I-1+ ω
i, generate random sequence r
1∈ R;
Step2, convert original image into expressly sequence m=m
1m
2M
65536, from r
1The middle extraction and the isometric scramble key of plaintext sequence m
Carry out cryptographic calculation and get encrypted result c=m
Sort (r)(shown in Fig. 2 (b));
Setp3, send k=1 and ciphertext c to recipient through overt channel.
Two, operate as follows the side of meeting and sending off:
Step1, according to k=1, from R, extract and the isometric scramble key of ciphertext sequence c
Carry out decrypt operation and get m '=c
Sort (sort (r))
Step2, convert m ' into 256 * 256 picture format and get decrypted result (shown in Fig. 2 (c)).
By knowing like Fig. 2, decrypted result (c) has been reduced to original image (a).
Claims (1)
1. single key open code system, it is characterized in that: transmit leg is at first selected a sequence number k, then from R={r
k| k=1,2 ..., n; N<∞ } the middle extraction and plaintext sequence m=m
1m
2M
sIsometric scramble key
Carry out cryptographic calculation and get ciphertext c=m
Sort (r)Send k and c to recipient from overt channel at last;
The recipient is according to sequence number k, from R={r
k| k=1,2 ..., n; N<∞ } the middle scramble key that extracts
Carry out decrypt operation and get expressly m=c
Sort (sort (r))
Specifically according to the following steps:
(1) generation of Gauss-Markov random sequence set
Gauss-Markov random sequence can be by recurrence formula x
i=ρ x
I-1+ ω
iProduce ω in the formula
iBe a zero-mean, independence and same (white) Gaussian stochastic variable that distributes, ρ confirms x
iAnd x
I-1Between a parameter of degree of correlation, promptly
σ
2It is variance;
Optional one group of ρ, x
0And t, can generate a Gauss-Markov random sequence x
1x
2X
t, make it equal r
1In like manner can get r
2, r
3..., constitute Gauss-Markov random sequence set R={r thus
k| k=1,2 ..., n; N<∞ };
(2) encrypt and decrypt algorithm
Optional a certain random sequence r
k∈ R is from r
kThe middle extraction and plaintext m=m
1m
2M
sIsometric one section of ∈ M
As the scramble key that plaintext m is carried out the encrypt and decrypt computing;
AES:
G be with
Subscript vector after middle element sorts from small to large, then ciphertext c=m
g∈ C, m
gElement among the expression plaintext m carries out in-place computation according to g;
Decipherment algorithm:
M=c expressly then
f
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101517064A CN102811122A (en) | 2011-06-02 | 2011-06-02 | Single-key public cryptosystem |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101517064A CN102811122A (en) | 2011-06-02 | 2011-06-02 | Single-key public cryptosystem |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102811122A true CN102811122A (en) | 2012-12-05 |
Family
ID=47234710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011101517064A Pending CN102811122A (en) | 2011-06-02 | 2011-06-02 | Single-key public cryptosystem |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102811122A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106100819A (en) * | 2016-06-02 | 2016-11-09 | 上海奕瑞光电子科技有限公司 | Image encrypting and decrypting system and image encrypting and decrypting method |
-
2011
- 2011-06-02 CN CN2011101517064A patent/CN102811122A/en active Pending
Non-Patent Citations (3)
Title |
---|
PROAKIS J G, SALEHI M.: "《现代通信系统使用MATLAB》", 30 November 2001 * |
杨华千: "基于混沌与代数群的分组密码算法研究", 《中国博士学位论文全文数据库》 * |
邹阿金,张雨浓,肖秀春: "Hermite混沌神经网络异步加密算法", 《智能系统学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106100819A (en) * | 2016-06-02 | 2016-11-09 | 上海奕瑞光电子科技有限公司 | Image encrypting and decrypting system and image encrypting and decrypting method |
CN106100819B (en) * | 2016-06-02 | 2019-09-13 | 上海奕瑞光电子科技股份有限公司 | Image encrypting and decrypting system and image encrypting and decrypting method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jeeva et al. | Comparative analysis of performance efficiency and security measures of some encryption algorithms | |
US9172529B2 (en) | Hybrid encryption schemes | |
Albahar et al. | Novel hybrid encryption algorithm based on aes, RSA, and twofish for bluetooth encryption | |
CN104836657A (en) | Identity anonymity-based broadcast encryption method having efficient decryption characteristic | |
CN104519071A (en) | Group encryption and decryption method and system with selection and exclusion functions | |
Chhabra et al. | Modified RSA algorithm: a secure approach | |
Thomas et al. | An encryption protocol for end-to-end secure transmission of SMS | |
Thein et al. | Comparative performance study on ordinary and chaos image encryption schemes | |
Abusukhon et al. | Secure network communication based on text-to-image encryption | |
CN102521785A (en) | Homomorphism image encryption and decryption method used for image sharing based on EC-ELGamal algorithm | |
CN101867471A (en) | Irrational number based DES authentication encryption algorithm | |
CN101882996B (en) | Information encryption and decryption method in distributed system based on identity | |
Singh et al. | Comparative study of DES, 3DES, AES and RSA | |
Mahalakshmi et al. | Image encryption method using differential expansion technique, AES and RSA algorithm | |
Li et al. | Mathematical model and framework of physical layer encryption for wireless communications | |
EP2571192A1 (en) | Hybrid encryption schemes | |
Gobi et al. | A comparative study on the performance and the security of RSA and ECC algorithm | |
Prasanthi et al. | Hybrid approach for securing the IoT devices | |
CN101702116A (en) | Pseudorandom sequence generating method based on progressive deterministic random | |
KR100388059B1 (en) | Data encryption system and its method using asymmetric key encryption algorithm | |
Srihith et al. | Locking down big data: a comprehensive survey of data encryption methods | |
Zhang | Comments on “Color image encryption using Choquet fuzzy integral and hyper chaotic system” | |
CN102811122A (en) | Single-key public cryptosystem | |
Dũng | Variant of OTP Cipher with Symmetric Key Solution | |
Kandul et al. | Steganography with cryptography in android |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20121205 |