CN104618092A - Information encryption method and system - Google Patents

Information encryption method and system Download PDF

Info

Publication number
CN104618092A
CN104618092A CN201510003877.0A CN201510003877A CN104618092A CN 104618092 A CN104618092 A CN 104618092A CN 201510003877 A CN201510003877 A CN 201510003877A CN 104618092 A CN104618092 A CN 104618092A
Authority
CN
China
Prior art keywords
output valve
module
score value
value
desired value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510003877.0A
Other languages
Chinese (zh)
Inventor
武毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201510003877.0A priority Critical patent/CN104618092A/en
Publication of CN104618092A publication Critical patent/CN104618092A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides an information encryption method and system. The method includes the steps: performing operation through a preset function according to a sub-key and a right partial value generated by a key generator to obtain a first output value; performing exclusive-or operation for the first output value and a left partial value to obtain a second output value; replacing the left partial value by the right partial value, replacing the right partial value by the second output value, and repeating the steps until reaching preset cycle times to obtain a left partial target value and a right partial target value; combining the left partial target value with the right partial target value and outputting a target ciphertext; dividing a plaintext into a left portion and a right portion with equal digits in advance. Different keys are generated by the aid of different plaintexts, unpredictability of real keys is realized, safety of an encryption algorithm is greatly improved, and excessive reduction of performances is avoided.

Description

A kind of information ciphering method and system
Technical field
The invention belongs to field of communication security, particularly relate to a kind of information ciphering method and system.
Background technology
Des encryption algorithm is the product of answering the fast development of computer science and technology and generating, and in today of computing capability brilliance, the Cipher Strength of DES algorithm has not met our requirement, easily be subject to cracking of exhaustive attack, in history, the case that DES algorithm is cracked is also of common occurrence, also there is a lot of product substituting DES algorithm in modern society, except selecting the substitute of DES, can also select to improve this algorithm, to strengthen its Cipher Strength, make so easily not to be cracked.
The limitation of original cryptographic algorithm:
In des encryption algorithm, as long as primary key is constant, then each takes turns produced round key also can be the same, so just to assailant with very large security breaches, can plaintext attack method be passed through, get encryption key like a cork.
Existing DES algorithm improvement:
1, a heavy des encryption can be cracked easily, so just add a few re-encryption, such as now conventional triple des cryptographic algorithm, although resisted the attack of plaintext method preferably, but but pay the code of computing, its encryption difficulty, compared with common des encryption algorithm, will increase n-1 doubly (n is n re-encryption algorithm, such as 3 re-encryption algorithms will increase by 2 times difficulty than common des encryption algorithm).
The sub-key used when 2, changing every round transformation, makes the generation of sub-key not only relevant with initial key, also with expressly relevant.Its realization is on the basis of common DES algorithm, generating that step of sub-key, change sub-key generating function, the plaintext of the sub-key originally generated and last round of generation is carried out associative operation, makes sub-key become unpredictable, will effectively resist plaintext attack method like this, to guess that the method for key becomes possibility, its shortcoming is also apparent, and because round transformation each time all will regenerate a sub-key, its computational complexity also can increase to some extent.
Summary of the invention
The invention provides a kind of information ciphering method and system, to solve the problem.
The invention provides a kind of information ciphering method, said method comprises the following steps:
The sub-key generated according to key generator and right part score value, after carrying out computing, obtain the first output valve by preset function;
Described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeats above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value;
Combination left half desired value and right half desired value, export target ciphertext; Wherein, expressly the equal left and right two parts of figure place will be divided in advance.
The present invention also provides a kind of information encryption system, comprises and divides module, the first output valve module, the second output valve module, target part acquisition module, target ciphertext output module;
Wherein, described division module is connected with described second output valve module by described first output valve module; Described first output valve module is connected with described target part acquisition module by described second output valve module; Described second output valve module is connected with described target ciphertext output module by described target part acquisition module; Described division module is also connected with described target part acquisition module;
Described division module, for will being expressly divided into the equal left and right two parts of figure place and division result being notified described first output valve module, described target part acquisition module in advance
Described first output valve module, for the sub-key that generates according to key generator and right part score value, after carrying out computing, obtains the first output valve and described first output valve is sent to described second output valve module by preset function;
Described second output valve module, for described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described target part acquisition module, for described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeat above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value and described left half desired value and right half desired value are sent to described target ciphertext output module;
Described target ciphertext output module, for combining left half desired value and right half desired value, exports target ciphertext.
Compared to technology before, a kind of information ciphering method provided by the invention and system, adopt not isolog to generate the method for different key, realize the unpredictability of true key, substantially increase the fail safe of its cryptographic algorithm, meanwhile, also do not have too many reduction at aspect of performance.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Figure 1 shows that the information ciphering method flow chart of the embodiment of the present invention 1;
Figure 2 shows that the information ciphering method flow chart of the embodiment of the present invention 2;
Figure 3 shows that the information encryption system structure chart of the embodiment of the present invention 3.
Embodiment
Hereinafter also describe the present invention in detail with reference to accompanying drawing in conjunction with the embodiments.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
Des encryption algorithm is a kind of symmetric encipherment algorithm developed by IBM, and be one 16 Feis tel type structure password of taking turns, its block length is 64bi ts, and key length is also 64bi ts, and practical 56bi ts wherein has 8 as parity check.
Figure 1 shows that the information ciphering method flow chart of the embodiment of the present invention 1, comprise the following steps:
Step 101: expressly will be divided into the equal left and right two parts of figure place in advance;
Step 102: the sub-key generated according to key generator and right part score value, after carrying out computing, obtain the first output valve by preset function;
Step 103: described first output valve and left part score value are carried out XOR, obtains the second output valve;
Step 104: described right part score value is replaced left part score value, replaces right part score value by described second output valve, repeats above-mentioned step: 202-204, until preset loop number of times, obtains left half desired value and right half desired value;
Step 105: combination left half desired value and right half desired value, exports target ciphertext.
Figure 2 shows that the information ciphering method flow chart of the embodiment of the present invention 2, comprise the following steps:
Step 201: expressly will be divided into left and right two parts, left part score value is L0, and right part score value is R0, and wherein, L0 figure place is identical with R0 figure place.
Such as: 64bi ts is expressly divided into left and right two parts, and be respectively L0 and R0, wherein, L0 figure place and R0 figure place are 32bi ts.
Being the sequence in order to upset expressly group like this, is the equal of an initial simple encryption process.
Step 202: after the sub-key k1 that described R0 and key generator generate is carried out f functional operation, obtains f (R0, k1);
Step 203: described f (R0, k1) is carried out XOR with described L0, obtains
Step 204: described R0 is designated as L1 and replaces left part score value, simultaneously handle be designated as R1 and replace right part score value, thus complete first round interative computation;
Step 205: repeat step 102-105, until circulate 16 times, obtains left half desired value R16, right half desired value L16;
Step 206: line ordering encryption of R16, L16 of acquisition grouping combination being gone forward side by side, exports target ciphertext.
Figure 3 shows that the information encryption system structure chart of the embodiment of the present invention 3, comprise and divide module, the first output valve module, the second output valve module, target part acquisition module, target ciphertext output module;
Wherein, described division module is connected with described second output valve module by described first output valve module; Described first output valve module is connected with described target part acquisition module by described second output valve module; Described second output valve module is connected with described target ciphertext output module by described target part acquisition module; Described division module is also connected with described target part acquisition module;
Described division module, for will being expressly divided into the equal left and right two parts of figure place and division result being notified described first output valve module, described target part acquisition module in advance
Described first output valve module, for the sub-key that generates according to key generator and right part score value, after carrying out computing, obtains the first output valve and described first output valve is sent to described second output valve module by preset function;
Described second output valve module, for described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described target part acquisition module, for described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeat above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value and described left half desired value and right half desired value are sent to described target ciphertext output module;
Described target ciphertext output module, for combining left half desired value and right half desired value, exports target ciphertext.
Compared to technology before, a kind of information ciphering method provided by the invention and system, adopt not isolog to generate the method for different key, realize the unpredictability of true key, substantially increase the fail safe of its cryptographic algorithm, meanwhile, also do not have too many reduction at aspect of performance.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (7)

1. an information ciphering method, is characterized in that, comprises the following steps:
The sub-key generated according to key generator and right part score value, after carrying out computing, obtain the first output valve by preset function;
Described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeats above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value;
Combination left half desired value and right half desired value, export target ciphertext; Wherein, expressly the equal left and right two parts of figure place will be divided in advance.
2. method according to claim 1, is characterized in that, if left part score value is L0, right part score value is R0, and the sub-key that key generator generates is k1, and preset function is f function, then the first output valve is f (R0, k1).
3. method according to claim 2, is characterized in that, described first output valve and left part score value are carried out XOR, and the second output valve process that obtains is:
Described f (R0, k1) is carried out XOR with described L0, and obtaining the second output valve is
4. method according to claim 3, is characterized in that, described right part score value is replaced left part score value, by the process that described second output valve replaces right part score value is:
Described R0 is designated as L1 and replaces left part score value, simultaneously handle be designated as R1 and replace right part score value.
5. method according to claim 1, is characterized in that, preset loop number of times is 16.
6. method according to claim 1, is characterized in that, combination left half desired value and right half desired value, and the process exporting target ciphertext is:
Line ordering of the left half desired value of acquisition and the combination of right half desired value being gone forward side by side is encrypted, and exports target ciphertext.
7. an information encryption system, is characterized in that, comprises and divides module, the first output valve module, the second output valve module, target part acquisition module, target ciphertext output module;
Wherein, described division module is connected with described second output valve module by described first output valve module; Described first output valve module is connected with described target part acquisition module by described second output valve module; Described second output valve module is connected with described target ciphertext output module by described target part acquisition module; Described division module is also connected with described target part acquisition module;
Described division module, for will being expressly divided into the equal left and right two parts of figure place and division result being notified described first output valve module, described target part acquisition module in advance
Described first output valve module, for the sub-key that generates according to key generator and right part score value, after carrying out computing, obtains the first output valve and described first output valve is sent to described second output valve module by preset function;
Described second output valve module, for described first output valve and left part score value are carried out XOR, obtains the second output valve;
Described target part acquisition module, for described right part score value is replaced left part score value, described second output valve is replaced right part score value, repeat above-mentioned steps, until preset loop number of times, obtain left half desired value and right half desired value and described left half desired value and right half desired value are sent to described target ciphertext output module;
Described target ciphertext output module, for combining left half desired value and right half desired value, exports target ciphertext.
CN201510003877.0A 2015-01-05 2015-01-05 Information encryption method and system Pending CN104618092A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510003877.0A CN104618092A (en) 2015-01-05 2015-01-05 Information encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510003877.0A CN104618092A (en) 2015-01-05 2015-01-05 Information encryption method and system

Publications (1)

Publication Number Publication Date
CN104618092A true CN104618092A (en) 2015-05-13

Family

ID=53152387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510003877.0A Pending CN104618092A (en) 2015-01-05 2015-01-05 Information encryption method and system

Country Status (1)

Country Link
CN (1) CN104618092A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108933655A (en) * 2018-07-12 2018-12-04 江苏慧学堂系统工程有限公司 A kind of computer network authentication system
CN109617681A (en) * 2018-12-06 2019-04-12 成都卫士通信息产业股份有限公司 Encryption and decryption method and device, electronic equipment, computer readable storage medium
CN111865591A (en) * 2020-09-21 2020-10-30 北京华云安信息技术有限公司 Symmetric encryption method, device, equipment and storage medium
CN112866288A (en) * 2021-03-01 2021-05-28 上海海事大学 Data symmetric encryption method for double-plaintext transmission

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6570989B1 (en) * 1998-04-27 2003-05-27 Matsushita Electric Industrial Co., Ltd. Cryptographic processing apparatus, cryptographic processing method, and storage medium storing cryptographic processing program for realizing high-speed cryptographic processing without impairing security
CN101262341A (en) * 2008-02-22 2008-09-10 北京航空航天大学 A mixed encryption method in session system
CN101952870A (en) * 2008-01-21 2011-01-19 索尼公司 Data converter, data conversion method, and computer program
CN103905181A (en) * 2014-03-22 2014-07-02 哈尔滨工程大学 Improved RC5 encryption algorithm for secret key encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6570989B1 (en) * 1998-04-27 2003-05-27 Matsushita Electric Industrial Co., Ltd. Cryptographic processing apparatus, cryptographic processing method, and storage medium storing cryptographic processing program for realizing high-speed cryptographic processing without impairing security
CN101952870A (en) * 2008-01-21 2011-01-19 索尼公司 Data converter, data conversion method, and computer program
CN101262341A (en) * 2008-02-22 2008-09-10 北京航空航天大学 A mixed encryption method in session system
CN103905181A (en) * 2014-03-22 2014-07-02 哈尔滨工程大学 Improved RC5 encryption algorithm for secret key encryption

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108933655A (en) * 2018-07-12 2018-12-04 江苏慧学堂系统工程有限公司 A kind of computer network authentication system
CN109617681A (en) * 2018-12-06 2019-04-12 成都卫士通信息产业股份有限公司 Encryption and decryption method and device, electronic equipment, computer readable storage medium
CN111865591A (en) * 2020-09-21 2020-10-30 北京华云安信息技术有限公司 Symmetric encryption method, device, equipment and storage medium
CN112866288A (en) * 2021-03-01 2021-05-28 上海海事大学 Data symmetric encryption method for double-plaintext transmission
CN112866288B (en) * 2021-03-01 2022-09-06 上海海事大学 Data symmetric encryption method for double-plaintext transmission

Similar Documents

Publication Publication Date Title
US11546135B2 (en) Key sequence generation for cryptographic operations
CN107147487B (en) Symmetric key random block cipher
CN101383703B (en) Dynamic ciphering method based on broad sense information field
CN106452791B (en) quantum digital signature method without trust center
CN104618094B (en) A kind of password Mask method strengthening anti-attack ability
CN110474761A (en) One kind 16 takes turns SM4-256 whitepack password implementation method
CN112187461A (en) Weapon equipment data hybrid encryption method based on encryption algorithm
CN105591734A (en) White-box cryptograph non-linear encoding protection method based on table lookup
CN104618092A (en) Information encryption method and system
CN110880967A (en) Method for parallel encryption and decryption of multiple messages by adopting packet symmetric key algorithm
Bhattacharyya et al. Secure message authentication against related-key attack
CN107277048A (en) A kind of encrypting and decrypting method for communication authentication
Alemami et al. Advanced approach for encryption using advanced encryption standard with chaotic map
CN113098675B (en) Binary data encryption system and method based on polynomial complete homomorphism
CN105656622A (en) White-box password nonlinear coding protection method based on combination of table look-up and disturbance scrambling
JunLi et al. Email encryption system based on hybrid AES and ECC
CN108234108B (en) High-efficiency de-ordering encryption method for weak leakage
CN110601817B (en) Data processing method and device
Tang et al. A one-time pad encryption algorithm based on one-way hash and conventional block cipher
Bhatt et al. Advance security technique for format preserving encryption
CN104735652A (en) Chaotic encryption method suitable for wireless sensor network
CN104579693A (en) Embedded encryption method based on high-order second-order logistic mapping and embedded encryption device based on high-order second-order logistic mapping
KR20080044150A (en) Apparatus and method for mapping out compressed function of a hash mode of operation for block cipher
CN101262334A (en) Encryption method for Bluetooth data transmission
AB et al. A New Security Mechanism for Secured Communications Using Steganography and CBA

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150513