CN104618092A - Information encryption method and system - Google Patents
Information encryption method and system Download PDFInfo
- Publication number
- CN104618092A CN104618092A CN201510003877.0A CN201510003877A CN104618092A CN 104618092 A CN104618092 A CN 104618092A CN 201510003877 A CN201510003877 A CN 201510003877A CN 104618092 A CN104618092 A CN 104618092A
- Authority
- CN
- China
- Prior art keywords
- output valve
- module
- score value
- value
- desired value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides an information encryption method and system. The method includes the steps: performing operation through a preset function according to a sub-key and a right partial value generated by a key generator to obtain a first output value; performing exclusive-or operation for the first output value and a left partial value to obtain a second output value; replacing the left partial value by the right partial value, replacing the right partial value by the second output value, and repeating the steps until reaching preset cycle times to obtain a left partial target value and a right partial target value; combining the left partial target value with the right partial target value and outputting a target ciphertext; dividing a plaintext into a left portion and a right portion with equal digits in advance. Different keys are generated by the aid of different plaintexts, unpredictability of real keys is realized, safety of an encryption algorithm is greatly improved, and excessive reduction of performances is avoided.
Description
Technical field
The invention belongs to field of communication security, particularly relate to a kind of information ciphering method and system.
Background technology
Des encryption algorithm is the product of answering the fast development of computer science and technology and generating, and in today of computing capability brilliance, the Cipher Strength of DES algorithm has not met our requirement, easily be subject to cracking of exhaustive attack, in history, the case that DES algorithm is cracked is also of common occurrence, also there is a lot of product substituting DES algorithm in modern society, except selecting the substitute of DES, can also select to improve this algorithm, to strengthen its Cipher Strength, make so easily not to be cracked.
The limitation of original cryptographic algorithm:
In des encryption algorithm, as long as primary key is constant, then each takes turns produced round key also can be the same, so just to assailant with very large security breaches, can plaintext attack method be passed through, get encryption key like a cork.
Existing DES algorithm improvement:
1, a heavy des encryption can be cracked easily, so just add a few re-encryption, such as now conventional triple des cryptographic algorithm, although resisted the attack of plaintext method preferably, but but pay the code of computing, its encryption difficulty, compared with common des encryption algorithm, will increase n-1 doubly (n is n re-encryption algorithm, such as 3 re-encryption algorithms will increase by 2 times difficulty than common des encryption algorithm).
The sub-key used when 2, changing every round transformation, makes the generation of sub-key not only relevant with initial key, also with expressly relevant.Its realization is on the basis of common DES algorithm, generating that step of sub-key, change sub-key generating function, the plaintext of the sub-key originally generated and last round of generation is carried out associative operation, makes sub-key become unpredictable, will effectively resist plaintext attack method like this, to guess that the method for key becomes possibility, its shortcoming is also apparent, and because round transformation each time all will regenerate a sub-key, its computational complexity also can increase to some extent.
Summary of the invention
The invention provides a kind of information ciphering method and system, to solve the problem.
The invention provides a kind of information ciphering method, said method comprises the following steps:
The sub-key generated according to key generator and right part score value, after carrying out computing, obtain the first output valve by preset function;
Described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeats above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value;
Combination left half desired value and right half desired value, export target ciphertext; Wherein, expressly the equal left and right two parts of figure place will be divided in advance.
The present invention also provides a kind of information encryption system, comprises and divides module, the first output valve module, the second output valve module, target part acquisition module, target ciphertext output module;
Wherein, described division module is connected with described second output valve module by described first output valve module; Described first output valve module is connected with described target part acquisition module by described second output valve module; Described second output valve module is connected with described target ciphertext output module by described target part acquisition module; Described division module is also connected with described target part acquisition module;
Described division module, for will being expressly divided into the equal left and right two parts of figure place and division result being notified described first output valve module, described target part acquisition module in advance
Described first output valve module, for the sub-key that generates according to key generator and right part score value, after carrying out computing, obtains the first output valve and described first output valve is sent to described second output valve module by preset function;
Described second output valve module, for described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described target part acquisition module, for described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeat above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value and described left half desired value and right half desired value are sent to described target ciphertext output module;
Described target ciphertext output module, for combining left half desired value and right half desired value, exports target ciphertext.
Compared to technology before, a kind of information ciphering method provided by the invention and system, adopt not isolog to generate the method for different key, realize the unpredictability of true key, substantially increase the fail safe of its cryptographic algorithm, meanwhile, also do not have too many reduction at aspect of performance.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Figure 1 shows that the information ciphering method flow chart of the embodiment of the present invention 1;
Figure 2 shows that the information ciphering method flow chart of the embodiment of the present invention 2;
Figure 3 shows that the information encryption system structure chart of the embodiment of the present invention 3.
Embodiment
Hereinafter also describe the present invention in detail with reference to accompanying drawing in conjunction with the embodiments.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
Des encryption algorithm is a kind of symmetric encipherment algorithm developed by IBM, and be one 16 Feis tel type structure password of taking turns, its block length is 64bi ts, and key length is also 64bi ts, and practical 56bi ts wherein has 8 as parity check.
Figure 1 shows that the information ciphering method flow chart of the embodiment of the present invention 1, comprise the following steps:
Step 101: expressly will be divided into the equal left and right two parts of figure place in advance;
Step 102: the sub-key generated according to key generator and right part score value, after carrying out computing, obtain the first output valve by preset function;
Step 103: described first output valve and left part score value are carried out XOR, obtains the second output valve;
Step 104: described right part score value is replaced left part score value, replaces right part score value by described second output valve, repeats above-mentioned step: 202-204, until preset loop number of times, obtains left half desired value and right half desired value;
Step 105: combination left half desired value and right half desired value, exports target ciphertext.
Figure 2 shows that the information ciphering method flow chart of the embodiment of the present invention 2, comprise the following steps:
Step 201: expressly will be divided into left and right two parts, left part score value is L0, and right part score value is R0, and wherein, L0 figure place is identical with R0 figure place.
Such as: 64bi ts is expressly divided into left and right two parts, and be respectively L0 and R0, wherein, L0 figure place and R0 figure place are 32bi ts.
Being the sequence in order to upset expressly group like this, is the equal of an initial simple encryption process.
Step 202: after the sub-key k1 that described R0 and key generator generate is carried out f functional operation, obtains f (R0, k1);
Step 203: described f (R0, k1) is carried out XOR with described L0, obtains
Step 204: described R0 is designated as L1 and replaces left part score value, simultaneously handle
be designated as R1 and replace right part score value, thus complete first round interative computation;
Step 205: repeat step 102-105, until circulate 16 times, obtains left half desired value R16, right half desired value L16;
Step 206: line ordering encryption of R16, L16 of acquisition grouping combination being gone forward side by side, exports target ciphertext.
Figure 3 shows that the information encryption system structure chart of the embodiment of the present invention 3, comprise and divide module, the first output valve module, the second output valve module, target part acquisition module, target ciphertext output module;
Wherein, described division module is connected with described second output valve module by described first output valve module; Described first output valve module is connected with described target part acquisition module by described second output valve module; Described second output valve module is connected with described target ciphertext output module by described target part acquisition module; Described division module is also connected with described target part acquisition module;
Described division module, for will being expressly divided into the equal left and right two parts of figure place and division result being notified described first output valve module, described target part acquisition module in advance
Described first output valve module, for the sub-key that generates according to key generator and right part score value, after carrying out computing, obtains the first output valve and described first output valve is sent to described second output valve module by preset function;
Described second output valve module, for described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described target part acquisition module, for described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeat above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value and described left half desired value and right half desired value are sent to described target ciphertext output module;
Described target ciphertext output module, for combining left half desired value and right half desired value, exports target ciphertext.
Compared to technology before, a kind of information ciphering method provided by the invention and system, adopt not isolog to generate the method for different key, realize the unpredictability of true key, substantially increase the fail safe of its cryptographic algorithm, meanwhile, also do not have too many reduction at aspect of performance.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (7)
1. an information ciphering method, is characterized in that, comprises the following steps:
The sub-key generated according to key generator and right part score value, after carrying out computing, obtain the first output valve by preset function;
Described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeats above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value;
Combination left half desired value and right half desired value, export target ciphertext; Wherein, expressly the equal left and right two parts of figure place will be divided in advance.
2. method according to claim 1, is characterized in that, if left part score value is L0, right part score value is R0, and the sub-key that key generator generates is k1, and preset function is f function, then the first output valve is f (R0, k1).
3. method according to claim 2, is characterized in that, described first output valve and left part score value are carried out XOR, and the second output valve process that obtains is:
Described f (R0, k1) is carried out XOR with described L0, and obtaining the second output valve is
4. method according to claim 3, is characterized in that, described right part score value is replaced left part score value, by the process that described second output valve replaces right part score value is:
Described R0 is designated as L1 and replaces left part score value, simultaneously handle
be designated as R1 and replace right part score value.
5. method according to claim 1, is characterized in that, preset loop number of times is 16.
6. method according to claim 1, is characterized in that, combination left half desired value and right half desired value, and the process exporting target ciphertext is:
Line ordering of the left half desired value of acquisition and the combination of right half desired value being gone forward side by side is encrypted, and exports target ciphertext.
7. an information encryption system, is characterized in that, comprises and divides module, the first output valve module, the second output valve module, target part acquisition module, target ciphertext output module;
Wherein, described division module is connected with described second output valve module by described first output valve module; Described first output valve module is connected with described target part acquisition module by described second output valve module; Described second output valve module is connected with described target ciphertext output module by described target part acquisition module; Described division module is also connected with described target part acquisition module;
Described division module, for will being expressly divided into the equal left and right two parts of figure place and division result being notified described first output valve module, described target part acquisition module in advance
Described first output valve module, for the sub-key that generates according to key generator and right part score value, after carrying out computing, obtains the first output valve and described first output valve is sent to described second output valve module by preset function;
Described second output valve module, for described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described target part acquisition module, for described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeat above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value and described left half desired value and right half desired value are sent to described target ciphertext output module;
Described target ciphertext output module, for combining left half desired value and right half desired value, exports target ciphertext.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510003877.0A CN104618092A (en) | 2015-01-05 | 2015-01-05 | Information encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510003877.0A CN104618092A (en) | 2015-01-05 | 2015-01-05 | Information encryption method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104618092A true CN104618092A (en) | 2015-05-13 |
Family
ID=53152387
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510003877.0A Pending CN104618092A (en) | 2015-01-05 | 2015-01-05 | Information encryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104618092A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108933655A (en) * | 2018-07-12 | 2018-12-04 | 江苏慧学堂系统工程有限公司 | A kind of computer network authentication system |
CN109617681A (en) * | 2018-12-06 | 2019-04-12 | 成都卫士通信息产业股份有限公司 | Encryption and decryption method and device, electronic equipment, computer readable storage medium |
CN111865591A (en) * | 2020-09-21 | 2020-10-30 | 北京华云安信息技术有限公司 | Symmetric encryption method, device, equipment and storage medium |
CN112866288A (en) * | 2021-03-01 | 2021-05-28 | 上海海事大学 | Data symmetric encryption method for double-plaintext transmission |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6570989B1 (en) * | 1998-04-27 | 2003-05-27 | Matsushita Electric Industrial Co., Ltd. | Cryptographic processing apparatus, cryptographic processing method, and storage medium storing cryptographic processing program for realizing high-speed cryptographic processing without impairing security |
CN101262341A (en) * | 2008-02-22 | 2008-09-10 | 北京航空航天大学 | A mixed encryption method in session system |
CN101952870A (en) * | 2008-01-21 | 2011-01-19 | 索尼公司 | Data converter, data conversion method, and computer program |
CN103905181A (en) * | 2014-03-22 | 2014-07-02 | 哈尔滨工程大学 | Improved RC5 encryption algorithm for secret key encryption |
-
2015
- 2015-01-05 CN CN201510003877.0A patent/CN104618092A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6570989B1 (en) * | 1998-04-27 | 2003-05-27 | Matsushita Electric Industrial Co., Ltd. | Cryptographic processing apparatus, cryptographic processing method, and storage medium storing cryptographic processing program for realizing high-speed cryptographic processing without impairing security |
CN101952870A (en) * | 2008-01-21 | 2011-01-19 | 索尼公司 | Data converter, data conversion method, and computer program |
CN101262341A (en) * | 2008-02-22 | 2008-09-10 | 北京航空航天大学 | A mixed encryption method in session system |
CN103905181A (en) * | 2014-03-22 | 2014-07-02 | 哈尔滨工程大学 | Improved RC5 encryption algorithm for secret key encryption |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108933655A (en) * | 2018-07-12 | 2018-12-04 | 江苏慧学堂系统工程有限公司 | A kind of computer network authentication system |
CN109617681A (en) * | 2018-12-06 | 2019-04-12 | 成都卫士通信息产业股份有限公司 | Encryption and decryption method and device, electronic equipment, computer readable storage medium |
CN111865591A (en) * | 2020-09-21 | 2020-10-30 | 北京华云安信息技术有限公司 | Symmetric encryption method, device, equipment and storage medium |
CN112866288A (en) * | 2021-03-01 | 2021-05-28 | 上海海事大学 | Data symmetric encryption method for double-plaintext transmission |
CN112866288B (en) * | 2021-03-01 | 2022-09-06 | 上海海事大学 | Data symmetric encryption method for double-plaintext transmission |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11546135B2 (en) | Key sequence generation for cryptographic operations | |
CN107147487B (en) | Symmetric key random block cipher | |
CN101383703B (en) | Dynamic ciphering method based on broad sense information field | |
CN106452791B (en) | quantum digital signature method without trust center | |
CN104618094B (en) | A kind of password Mask method strengthening anti-attack ability | |
CN110474761A (en) | One kind 16 takes turns SM4-256 whitepack password implementation method | |
CN112187461A (en) | Weapon equipment data hybrid encryption method based on encryption algorithm | |
CN105591734A (en) | White-box cryptograph non-linear encoding protection method based on table lookup | |
CN104618092A (en) | Information encryption method and system | |
CN110880967A (en) | Method for parallel encryption and decryption of multiple messages by adopting packet symmetric key algorithm | |
Bhattacharyya et al. | Secure message authentication against related-key attack | |
CN107277048A (en) | A kind of encrypting and decrypting method for communication authentication | |
Alemami et al. | Advanced approach for encryption using advanced encryption standard with chaotic map | |
CN113098675B (en) | Binary data encryption system and method based on polynomial complete homomorphism | |
CN105656622A (en) | White-box password nonlinear coding protection method based on combination of table look-up and disturbance scrambling | |
JunLi et al. | Email encryption system based on hybrid AES and ECC | |
CN108234108B (en) | High-efficiency de-ordering encryption method for weak leakage | |
CN110601817B (en) | Data processing method and device | |
Tang et al. | A one-time pad encryption algorithm based on one-way hash and conventional block cipher | |
Bhatt et al. | Advance security technique for format preserving encryption | |
CN104735652A (en) | Chaotic encryption method suitable for wireless sensor network | |
CN104579693A (en) | Embedded encryption method based on high-order second-order logistic mapping and embedded encryption device based on high-order second-order logistic mapping | |
KR20080044150A (en) | Apparatus and method for mapping out compressed function of a hash mode of operation for block cipher | |
CN101262334A (en) | Encryption method for Bluetooth data transmission | |
AB et al. | A New Security Mechanism for Secured Communications Using Steganography and CBA |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150513 |