CN104901811B - A kind of symmetric cryptography table and symmetric cipher - Google Patents

A kind of symmetric cryptography table and symmetric cipher Download PDF

Info

Publication number
CN104901811B
CN104901811B CN201510332692.4A CN201510332692A CN104901811B CN 104901811 B CN104901811 B CN 104901811B CN 201510332692 A CN201510332692 A CN 201510332692A CN 104901811 B CN104901811 B CN 104901811B
Authority
CN
China
Prior art keywords
fgf
icy
hcy
poor
wcy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510332692.4A
Other languages
Chinese (zh)
Other versions
CN104901811A (en
Inventor
褚万青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shin Hui Cheng credit management (Beijing) Co., Ltd.
Original Assignee
Shin Hui Cheng Credit Management (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shin Hui Cheng Credit Management (beijing) Co Ltd filed Critical Shin Hui Cheng Credit Management (beijing) Co Ltd
Priority to CN201510332692.4A priority Critical patent/CN104901811B/en
Publication of CN104901811A publication Critical patent/CN104901811A/en
Application granted granted Critical
Publication of CN104901811B publication Critical patent/CN104901811B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of symmetric cryptography tables;In table, all or part of code characters are in addition to corresponding common row, common column, also corresponding " random row and/or random column " (making the table be not easy to be cracked);A small number of rows and/or column, can be several continuous zero.The invention also discloses a kind of symmetric ciphers;Wherein, it is divided into plaintext character field in plain text, plaintext character field is divided into plaintext character group, plaintext character group is corresponding with element (one of row, column, area, table, poor element or more) in the table, simultaneously, the positive series connection (position where a upper element is related to the position where next element) of progress makes plaintext character field or tail formula is stayed to be encrypted to code characters in plain text (code characters correspond in plaintext character field or the last one interior plaintext character group of plaintext);Multicharacter plaintext can be encrypted to a code characters group, keep ciphertext brief by the symmetric cipher.

Description

A kind of symmetric cryptography table and symmetric cipher
Technical field
The present invention relates to symmetric cryptography more particularly to a kind of symmetric cryptography tables, a kind of symmetric cipher;Symmetric cipher is built It stands on the basis of symmetric cryptography table.
Background technique
Patent application " a kind of contraposition cryptographic system and a kind of direct communication method and a kind of indirect communication method " (201410211178.0) in:(1) cipher table Ac is a kind of symmetric cryptography table;(2) in Ac, plaintext character group Fvg is corresponded to Beginning character Ecbd, Ecbd correspond to special purpose system character group Xcih, thus Fvg be encrypted to ciphertext character group Fvg ' (Fvg '= Xcih, or related to Xcih);(3) in Ac, the common row Ic, common column Hc in special purpose system character are suitable according to size respectively Sequence arranges, so, i, h in special purpose system character Xcih be regular, nonrandom;Xcih corresponds to common row, public Column, but because not having " random row and/or random column " in Ac, none special purpose system character it is corresponding " random row and/ Or random column ";(4) BROAD SUMMARY of the contraposition cryptographic system is " contraposition ", for example, when encryption, it is (corresponding with bebinning character Fvg) j relevant, it is necessary to which that the position g with Fvg is aligned;(5) this can resist rearrangement, replacement, playback to bit encryption Attack, but be not easy to resist and delete attack.
About existing information safe practice.(1) for the safety of e-payment, it is often necessary to use random identifying code; For example, network booking, needs with the identifying code on computer, but tend not to prevent " ox " utilization from robbing the progress of ticket software Rob ticket behavior;(2) for example, when operation Internetbank, mobile phone note verification code that bank sends to bank card user, it is possible to by mobile phone Virus intercepts (shielding), is under the table forwarded on the mobile phone that offender specifies, and causes the stolen brush of the bank card of user;(3) Magnetic stripe bank card currently in use is easy by offender clone, steals and brush;(4) IC chip bank card market, supermarket in use, The password of input, which is easily stolen, to be peeped;(5) (public key encryption algorithm has been used for the USBKey of bank, such as U to rivest, shamir, adelman RSA Shield) key length have 1024 or 2048, it is relatively large to lead to calculate relatively slow or even power consumption, be only applicable to small data, Also not general (client for needing to download is relatively fixed, is not easy to mobile use);(6) bio-identification (fingerprint, face, iris) Not only technically there is limitation, but also true and false (identity that correspondent can only be identified) of Content of Communication cannot be identified;(7) intelligence Mobile phone two-dimension code pays (mobile payment), although convenient, payment cipher can be peeped by trojan horse or smart phone can quilt Trojan horse " abduction ";(8) to harassing and wrecking short message, especially fraud text message, the prior art causes to swindle short without what good method Letter is rampant.
Summary of the invention
Goal of the invention:For deficiency present in above-mentioned existing background technique or background technique, an object of the present invention It is to provide the symmetric cryptography table that one kind includes " random row and/or random column ";It is all or part of close in the symmetric cryptography table Code character is in addition to corresponding common row, common column, also corresponding " random row and/or random column ";" random row and/or random column " makes pair Cipher table is claimed to be not easy to be cracked.
The second object of the present invention is to, on the basis of the symmetric cryptography table, provide a kind of ciphertext it is brief, it is general , safer symmetric cipher, the symmetric cipher can not need it is described to bit encryption, identifying code can not needed.Its In, forward direction series connection, that is, the position where a upper element is related to the position where next element (that is, where next element Position, it is related to the position where a upper element);Wherein, on the basis of positive concatenated, plaintext character field Lf is stayed tail Formula is encrypted to code characters UfGf.
Technical solution:For achieving the above object, the first technical solution that the present invention uses for:
A kind of symmetric cryptography table, it is characterized in that:At least identical double (AI and AII) of symmetric cryptosystem A;In A There is C symmetric cryptography table, it is the symmetric cryptography table in A that each symmetric cryptography table, which has unique table numbering c, Ac,;There are Y in Ac Area, it is the area in Ac that, which there are unique area's number y, Acy in each area,;
In Acy, a total of Icy common row, the code characters of Hcy common column;Public row number is ncy, common column Number is wcy, and each code characters correspond to ncy, wcy;The total number of code characters is E, wherein each of e code characters (total line number of random row is also Icy, random column to code characters Z also corresponding " random row number icy and/or random column number hcy " Total columns be also Hcy), so, Z be represented as Xncywcyicy (Xncywcyicy corresponds to ncy, wcy, icy) or Xncywcyhcy (Xncywcyhcy corresponds to ncy, wcy, hcy) or Xncywcyicyhcy (Xncywcyicyhcy correspond to ncy, wcy,icy,hcy);To sum up, each code characters are represented as V, and V is Xncywcy (Xncywcy corresponds to ncy, wcy) or Z;
V is " one and the above Arabic numerals, one and the above Chinese character, one and above Korea's word, one and the above day One of language word, one or more letter, one and the above additional character (country or group are general) " or more;
It is at least all not identical between V;
C, Y, T, T ', Icy, Hcy, Bcy, B ' cy, E, e, Dcy, D ' cy are greater than the natural number equal to 1 respectively, and 1≤e≤ E,
" c=t 0 (1≤t≤T, t are natural numbers) or 1≤c≤C-T (C > T, c are natural numbers) " or " 1≤c≤C (c It is natural number) ",
" y=t ' a 0 (1≤t '≤T ', t ' are natural numbers) or 1≤y≤Y-T ' (Y > T ', y are natural numbers) " or " 1≤y ≤ Y (y is natural number) ",
" ncy=bcy 0 (1≤bcy≤Bcy, bcy are natural numbers) or 1≤ncy≤Icy-Bcy (Icy > Bcy, ncy It is natural number) " or " 1≤ncy≤Icy (ncy is natural number) ",
" cy 0 (1≤b ' cy≤B ' cy, b ' cy is natural number) of wcy=b ' or 1≤wcy≤Hcy-B ' cy (Hcy > B ' Cy, wcy are natural numbers) " or " 1≤wcy≤Hcy (wcy is natural number) ",
" icy=dcy 0 (1≤dcy≤Dcy, dcy are natural numbers) or 1≤icy≤Icy-Dcy (Icy > Dcy, icy It is natural number) " or " 1≤icy≤Icy (icy is natural number) ",
" cy 0 (1≤d ' cy≤D ' cy, d ' cy is natural number) of hcy=d ' or 1≤hcy≤Hcy-D ' cy (Hcy > D ' Cy, hcy are natural numbers) " or " 1≤hcy≤Hcy (hcy is natural number) ".
C corresponds to code characters Xc.
Y corresponds to code characters Xcy.
Ncy corresponds to code characters Xncy and/or wcy and corresponds to code characters Xwcy.
For achieving the above object, second of technical solution that the present invention uses for:
A kind of symmetric cipher, is characterized by following steps:
(1) there is foregoing symmetric cryptography table (being contained in symmetric cryptosystem A);
(2) according to program preset in AI, plaintext L is divided into F sections (L1, L2 ..., LF), and Lf is the plaintext word in L It accords with section (1≤f≤F), further, Lf is divided into Gf group (Lf1, Lf2 ..., LfGf), and Lfgf is the plaintext character in Lf Group (1≤gf≤Gf), F, f, Gf, gf are natural number respectively;
(3) according to program preset in AI:
①:Between Jfgf in Lfgf and AI, correspond to each other;Jfgf be c (fgf), | c is poor | (fgf), y (fgf), | y is poor | (fgf), ncy (fgf), | ncy is poor | (fgf), icy (fgf), | icy is poor | (fgf), | ncy-icy | (fgf), | icy-ncy | (fgf), wcy (fgf), | wcy is poor | (fgf), hcy (fgf), | hcy is poor | (fgf), | wcy-hcy | (fgf), | hcy-wcy | (fgf) one or more in;
Jfgf corresponds to Ufgf;Ufgf be Xc (fgf), Xcy (fgf), Xncy (fgf), Xwcy (fgf), Xncywcy (fgf), Xncywcyicy (fgf), Xncywcyhcy (fgf), one or more in Xncywcyicyhcy (fgf);
C, | c is poor | in one or more, be table element;Y, | y is poor | in one or more, be area's element;ncy,| Ncy is poor |, icy, | icy is poor |, | ncy-icy |, | icy-ncy | in one or more, be row element;Wcy, | wcy is poor |, Hcy, | hcy is poor |, | wcy-hcy |, | hcy-wcy | in one or more, be column element;| c is poor |, | y is poor |, | ncy is poor |, | Icy is poor |, | ncy-icy |, | icy-ncy |, | wcy is poor |, | hcy is poor |, | wcy-hcy |, | hcy-wcy | in one or more, It is poor element;
②:As Gf=1, because, gf=Gf=1, Lfgf=LfGf=Lf1=Lf, Ufgf=UfGf=Uf1, and because For, Lfgf corresponds to Jfgf, Jfgf and corresponds to Ufgf, so, Lf is directly encrypted to UfGf by AI;
③:As Gf >=2, Lfgf corresponds to Jfgf, and Jfgf corresponds to Ufgf, and Jfgf forward direction is connected serially to Jf (gf+1), 1≤ gf≤Gf-1;Forward direction series connection has one of following 10 kinds of forms or more:
1st kind, c (fgf) forward direction is connected serially to area's element [f (gf+1)] and/or " row element and/or column element " [f (gf+ 1)];
2nd kind, | c is poor | and (fgf) forward direction is connected serially to area's element [f (gf+1)] and/or " row element in subtrahend c (fgf) And/or column element " [f (gf+1)];
3rd kind, y (fgf) forward direction is connected serially to " row element and/or column element " [f (gf+1)];
4th kind, | y is poor | and (fgf) forward direction is connected serially to " row element and/or column element " [f (gf+1)] in subtrahend y (fgf);
5th kind, ranks forward direction series connection, that is, " row element (fgf) forward direction is connected serially to column element [f (gf+1)] " and/or " column Element (fgf) forward direction is connected serially to row element [f (gf+1)] ";
6th kind, in the non-same common row, column element (fgf) forward direction is connected serially to column element [f (gf+1)];
7th kind, in the non-same common column, row element (fgf) forward direction is connected serially to row element [f (gf+1)];
8th kind, row element (fgf) forward direction is connected serially to area's element [f (gf+1)];
9th kind, column element (fgf) forward direction is connected serially to area's element [f (gf+1)];
10th kind, area's element (fgf) forward direction is connected serially to area's element [f (gf+1)];
Jf (gf+1) is corresponding Lf (gf+1), and Jf (gf+1) is corresponding Uf (gf+1) ..., and so on, the positive string of Jf (Gf-1) It is coupled to JfGf, JfGf corresponds to LfGf, and JfGf corresponds to UfGf, then LfGf is encrypted to UfGf;Because the LfGf is under the jurisdiction of Lf, institute With the Lf is connected by forward direction by AI, tail is stayed to be encrypted to UfGf (" staying tail " is primarily referred to as retaining UfGf);
④:On the basis of Lf in 2. or 3., L is encrypted to ciphertext M by AI;
(4) M is sent to AII;
(5) to known plaintext L ' carry out encrypted authentication, [L ' is encrypted to ciphertext M ' rear (principle of encryption, phase to AII by AII It is same as the principle of AI encryption L), compare M ' and M whether identical (if they are the same, then AII demonstrates L ', shows that L ' is identical as L)], or AII is conditionally inversely connected, M is decrypted into L;
After (6) " Ufgf and/or UfGf " is used, abandoned by A (AI, AII) [on condition that:There is P symmetric cryptography table in A Subordinate list Qp, p be subordinate list number, Qp Qp1, Qp2 ..., QpRp, Qprp is the code characters in Qp, and Qprp becomes or participates in Or the code characters in " become+participate in " symmetric cryptography table;P, p, Rp, rp are greater than the natural number equal to 1,1≤p≤P, 1≤ Rp≤Rp] or its it is original where relative position change.
" preset program in AI " in the step (3), including:Pass through digit speech recognition table preset in AI, Lfgf quilt Be converted to " one and the above Arabic numerals, one and the above Chinese character, one and above Korea's word, one and the above Japanese word, One of one or more letter, one and above additional character (country or group are general) " or more.
" preset program in AI " in the step (3), including:Corresponded to each other between Lfgf and the Jfgf in AI, After Jfgf corresponds to Ufgf, segment or whole in Ufgf determine or participate in determine:Subtrahend element (fgf) in poor element (fgf) Or Jf (gf+1) (Gf >=2,1≤gf≤Gf-1) or J (f+1) 1, it is located at Ac " y ";" (1≤t "≤T, t " are natures to c "=t " a 0 Number) or 1≤c "≤C-T (C > T, c " it is natural number) " or " 1≤c "≤C (c " is natural number) ", " a 0 (1≤t " ' of y "=t " ' ≤ T ', t " ' be natural number) or 1≤y "≤Y-T ' (Y > T ', y " it is natural number) " or " 1≤y "≤Y (y " is natural number) ".
In the step (3) 3. in the 5th kind described in the series connection of ranks forward direction, there is one of following 12 kinds of situations Or more:
The first, ncy (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of ncy (fgf);
Second, | ncy is poor | and (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of subtrahend ncy (fgf);
The third, icy (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of icy (fgf);
4th kind, | icy is poor | and (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of subtrahend icy (fgf);
5th kind, | ncy-icy | (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of icy (fgf);
6th kind, | icy-ncy | (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of ncy (fgf);
7th kind, wcy (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of wcy (fgf);
8th kind, | wcy is poor | and (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of subtrahend wcy (fgf);
9th kind, hcy (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of hcy (fgf);
Tenth kind, | hcy is poor | and (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of subtrahend hcy (fgf);
Tenth is a kind of, | wcy-hcy | (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of hcy (fgf);
12nd kind, | hcy-wcy | (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of wcy (fgf).
In the step (3) 3. in the 5th kind described in the series connection of ranks forward direction, be that ranks intersect positive series connection.
Preset program in AI in the step (3), including:In Acy, in Ac, one of in A or more, After carrying out mathematical computations between different U ' fGf, split one of combination, displacement, pairing, replacement or more, obtained knot Fruit be in the step (3) 4. in " a part in M or M ";U ' fGf is that UfGf or U ' fGf is related to UfGf.
Beneficial effect:
Random row and/or random column have opposite secret;It is " random when there is plaintext character group to be related in plaintext character field When capable and/or random column " element, symmetric cryptography table is made to be difficult to be cracked.
Plaintext character group in plaintext character field can also relate to common column element, common row element, area's element, table element One of or more, effect is:Make that the selection of element is more diversified, complicates, meanwhile, also raising symmetric cryptography table makes Use efficiency.
Forward direction series connection is equivalent to from the gf element Jfgf (corresponding Lfgf) to relevant (gf+1) a element Jf (gf+ 1) [corresponding Lf (gf+1)], it is unidirectional to draw lines ..., and so on, it draws lines always to relevant element JfGf (corresponding LfGf), purpose It is to obtain code characters UfGf;Forward direction series connection, can make plaintext L be difficult to be rearranged, delete, replace, because, where a upper element Position be related to the position where next element, so, if Lfgf in Lf is reset or deleted or replace by attacker, Obtained code characters U " fGf is not equal to original UfGf, and occurs abnormal.
Ranks forward direction between row element and column element is connected, and is made symmetric cryptography table be difficult to be cracked, is improved encryption Safety;If in the same common row, the positive series connection of action column column, for example, " difference of random column " forward direction is connected serially to " at random Column ", the plaintext character group that may cause in plaintext by leaving no trace is deleted;If operating every trade in the same common column Forward direction series connection, for example, " difference of random row " forward direction is connected serially to " difference of random row ", may cause the plaintext character group quilt in plaintext It replaces with leaving no trace.
The main effect for staying tail formula to encrypt:(1) shorten ciphertext as far as possible, hacker is made to be difficult to carry out ciphertext only attack, be difficult to crack Symmetric cryptography table;For example, the code characters Ufgf used underground (1≤gf≤Gf-1), open code character UfGf or UFGF;(2) because the Ufgf is underground, so, after which is used, it can not be abandoned or not be transformed relative position, It has saved code characters or has reduced program operation.
" forward direction series connection " is for encrypting;What it is relative to " forward direction series connection " is " reverse series connection ", and " reverse series connection " is for decrypting; But be somebody's turn to do " inversely series connection " and have to comply with specific condition, not every " forward direction series connection " " can inversely connect ";It should Specifically condition is:Next element can only inversely be connected serially to an element, and next element cannot inversely be connected serially to other Element.
To sum up, symmetric cryptography table is difficult to be cracked;Meanwhile as previously mentioned, symmetric cryptography table is dynamically (to resist playback to attack Hit), so, half ciphertext or ciphertext for issuing originator, it is difficult to be replaced, reset, delete, Replay Attack.
Compared with comparing patent (201410211178.0):
In symmetric cryptography table of the present invention, a kind of selection is devised:C can be equal to t 0, y can be equal to a 0, ncy of t ' can B ' cy 0, icy can be equal to can be equal to dcy 0, hcy to be equal to bcy 0, wcy can be equal to d ' cy 0;The design's Benefit is:When plaintext character group Lfgf is one or more 0, " c or y or ncy or icy or wcy or hcy " can be used as element, Directly correspond to the Lfgf.
It compares in patent, plaintext character group only corresponds to bebinning character;In symmetric cipher of the present invention, plaintext character group is corresponding Jfgf, and the content that element J includes is more (for example, ncy, wcy, icy, hcy, y, c, poor element), so, with plaintext The range of choice of the corresponding character of character group expands, and is not limited solely to the bebinning character, enhances answering for encryption Polygamy, safety also improve the service efficiency of symmetric cryptography table.
It is compared with existing information safe practice:(1) present invention can not need identifying code;(2) ciphertext is brief;(3) general; (4) safer;(5) it is combined with third party's communication, can contain harassing and wrecking short message, especially containment fraud text message.
Detailed description of the invention:
Fig. 1 is a part of symmetric cryptography Table A 54 because, merely illustrated in Fig. 1 A54 common row 440,317,000, 280,281,282, merely illustrate common column 900,901,00,201,0,25;In A54, a total of 999 common row (I54= 999), 999 common columns (H54=999);Ellipsis (...) in the middle part of Fig. 1, longitudinal, indicate common column 00 and common column 201 it Between, there are also other common columns.
In Fig. 1, each code characters corresponding n54, w54 are not shown.
Fig. 2 is mainly a part of symmetric cryptography Table A 54 because, merely illustrated in Fig. 2 A54 common row 440,317, 000,280,281,282, merely illustrate common column 900,901,00,201,0,25;In A54, a total of 999 common row (I54 =999), 999 common columns (H54=999);Ellipsis (...) in the middle part of Fig. 2, longitudinal indicates common column 00 and common column 201 Between, there are also other common columns.
In Fig. 2, there is X5 at (1), have X54 at (2), to having Xw54 at (8) at (3), to having Xn54 at (14) at (9).
In Fig. 2, X ... refers to Xn54w54i54h54.
In Fig. 2, X ... (Xn54w54i54h54) corresponding n54, w54 are not shown.
Specific embodiment
In the following with reference to the drawings and specific embodiments, the present invention is furture elucidated, it should be understood that these embodiments are merely to illustrate The present invention rather than limit the scope of the invention, after the present invention has been read, this field related personnel, producer, mechanism pair The modification or modification, utilization of various equivalent forms of the invention, fall within range defined herein.
Example 1, if Fig. 1, A5 are the 5th symmetric cryptography tables (c=5) in A;A54 is that the 4th in symmetric cryptography Table A 5 is close Code area (c=5, y=4).
In Acy, a total of Icy common row, the code characters of Hcy common column;Public row number is ncy, common column Number is wcy, and each code characters correspond to ncy, wcy.In this example, in A54, a total of 999 common rows (I54=999), The code characters of 999 common columns (H54=999);It indulges to go, it is horizontal for column;Each common row has a public row number n54, For example, n54=..., 440,317,000,280,281,282 ...;It is each it is public show a public column number w54, for example, W54=..., 900,901,00 ..., 201,0,25 ...;For example, in A54, the corresponding common row 440 of code characters 123456789, Common column 900, code characters 246801357 corresponding common row 317, common column 901 ....
The total number of code characters is E, wherein also corresponding " the random row number of each code characters Z in e code characters Icy and/or random column number hcy " (total line number of random row is also Icy, and total columns of random column is also Hcy), so, Z quilt Be expressed as Xncywcyicy (Xncywcyicy corresponds to ncy, wcy, icy) or Xncywcyhcy (Xncywcyhcy correspond to ncy, Wcy, hcy) or Xncywcyicyhcy (Xncywcyicyhcy corresponds to ncy, wcy, icy, hcy).In this example, e=E;It is each close Code character Z is also corresponding " random row number icy and random column number hcy ";Total line number of random row is also 999 (I54=999), Total columns of random column is also 999 (H54=999);Z is represented as Xncywcyicyhcy.
For example, the corresponding common row 317 of code characters 246801357 is (that is, at this at common row 317, common column 901 N54=317), common column 901 (that is, w54=901 at this), also correspond to random row 515 (that is, i54=515 at this), with Machine column 989 arrange (that is, h54=989 at this), so, the code characters at this correspond to common row 317, common column 901, at random Row 515, random column 989, the code characters 246801357 at this are represented as X317901515989 (in Xncywcyicyhcy Ncy=n54=317, wcy=w54=901, icy=i54=515, hcy=h54=989).
To sum up, each code characters are represented as V, and V is Xncywcy (Xncywcy corresponds to ncy, wcy) or Z.In this example, V It is Z;Because Z is Xncywcyicyhcy, so, V is Xncywcyicyhcy;Further, V is Xn54w54i54h54.
In this example, in each common row, wcy, hcy are unique;In each common column, ncy, icy are unique.
In this example, in each common row, | the difference between two adjacent hcy of left and right | it is irregular.For example, in public affairs On concurrence 317, left and right adjacent " h54 (h54=707) at common row 317, common column 900 " and " common row 317, common column Absolute value of the difference (| hcy is poor |) between h54 (h54=989) at 901 " be 282 (=| 707-989 |), " left and right is adjacent " h54 (h54=989) at common row 317, common column 901 " and " h54 (h54=65) at common row 317, common column 00 " Between absolute value of the difference (| hcy is poor |) be 924 (=| 989-65 |).
In this example, in each common column, | the difference between two neighbouring icy | it is irregular.For example, in public affairs Altogether on column 901, neighbouring " i54 (i54=878) at common column 901, common row 280 " and " common column 901, common row Absolute value of the difference (| the difference of icy |) between i54 (i54=20) at 281 " be 858 (=| 878-20 |), it is neighbouring " i54 (i54=20) at common column 901, common row 281 " and " i54 (i54=00) at common column 901, common row 282 " Between absolute value of the difference (| the difference of icy |) be 20 (=| 20-00 |).Note:In the present invention, when 2 or more continuous 0 independences When as one or more in c, y, ncy, wcy, icy, hcy, numerically, 00=0,000=0,0000=0 ....
In this example, V (=Xn54w54i54h54) is one and the above Arabic numerals;Because of the limit by 1 size of attached drawing System, or for convenience of description, so, Xn54w54i54h54 all uses 9 Arabic numerals, without selecting less position Or more position Arabic numerals.
It is all not identical between code characters Xn54w54i54h54 in this example.
In this example, c, y, ncy, wcy, icy, hcy are one and the above Arabic numerals respectively.
In this example, " c=t 0 (1≤t≤T, t are natural numbers) or 1≤c≤C-T (C > T, c are natural numbers) ";In A In, it is assumed that C=999, T=3, then " c=t 0 (1≤t≤3, t are natural numbers) or 1≤c≤999-3 (c is natural number);Figure In 1, c=5 (1≤c≤C-T, that is, 1 <, 5 < 999-3), that is, merely illustrate No. 5 cipher table A5 in Fig. 1, be not shown in A complete The arranging situation (the case where wherein, there are the c=t 0) of 999 cipher tables in portion.
In this example, " (Y > T ', y are natures by y=t ' a 0 (1≤t '≤T ', t ' are natural numbers) or 1≤y≤Y-T ' Number) ";It is assumed that T '=3, Y=998, then " (y is nature by y=t ' a 0 (1≤t '≤3, t ' are natural numbers) or 1≤y≤998-3 Number);In Fig. 1, y=4 (1≤y≤Y-T ', that is, 1 <, 4 < 998-3), that is, the 4th password area in A5 is merely illustrated in Fig. 1 The arranging situation (wherein, a there are the y=t ' 0 the case where) of all 998 password areas is not shown in A5 in A54.
In this example, " ncy=bcy 0 (1≤bcy≤Bcy, bcy are natural numbers) or 1≤ncy≤Icy-Bcy (Icy > Bcy, ncy are natural numbers) ";In A54, I54=999, it is assumed that B54=3, then " n54=b54 0 (1≤b54≤3, b54 are Natural number) or 1≤n54≤999-3 (n54 is natural number).
In this example, " cy 0 (1≤b ' cy≤B ' cy, b ' cy is natural number) of wcy=b ' or 1≤wcy≤Hcy-B ' cy (Hcy > B ' cy, wcy are natural numbers) ";In A54, H54=999, it is assumed that B ' 54=3, then " 54 0 (1≤b ' of w54=b ' 54≤3, b ' 54 is natural number) or 1≤w54≤999-3 (w54 is natural number).
In this example, " icy=dcy 0 (1≤dcy≤Dcy, dcy are natural numbers) or 1≤icy≤Icy-Dcy (Icy > Dcy, icy are natural numbers) ";In A54, it is assumed that D54=3, then " i54=d54 0 (1≤d54≤3, d54 are natural numbers), Or 1≤i54≤999-3 (i54 is natural number).
In this example, " cy 0 (1≤d ' cy≤D ' cy, d ' cy is natural number) of hcy=d ' or 1≤hcy≤Hcy-D ' cy (Hcy > D ' cy, hcy are natural numbers) ";In A54, it is assumed that D ' 54=3, then " 54 0 (1≤d ' 54≤3, d ' 54 of h54=d ' It is natural number) or 1≤h54≤999-3 (h54 is natural number).
Example 2, it is assumed that the plaintext L to be encrypted is 00555.
(1) such as Fig. 2, have foregoing symmetric cryptography table (being contained in symmetric cryptosystem A, AI is identical with AII); A5 is No. 5 symmetric cryptography table in A, and A54 is No. 4 password area in A5.
(2) according to program preset in AI, plaintext L (00555) is divided into 1 section (L1), f=F=1;L1 is bright in L Chinese character section, further, L1 are divided into 2 groups (L11, L12), and L1g1 is the plaintext character group (1≤g1≤G1) in L1, Gf =G1=2;So 00555 (=L=L1) is divided into L11, L12;As gf=g1=1, Lfgf=Lfg1=L11=00; As gf=g1=2, LfGf=L1G1=Lfgf=Lfg1=L12=555.
(3) according to program preset in AI:
③:As Gf >=2, Lfgf corresponds to Jfgf.In this example, when f=1, gf=g1=1, it is described 1. in " Lfgf and AI In Jfgf between, correspond to each other ", refer to that " J11 in corresponding (mapping) A54 of L11 " (Lfgf is L11, and " Jfgf in AI " is The J11 in A54 in AI);It is assumed that it is common column wcy that the J11, which is column element (11), the column element, then the J11 is w54 (11);J11 in corresponding (mapping) A54 of L11 is exactly " L11 is corresponding (mapping) w54 (11) ";Because of L11=00, w54 (11)=00;It is assumed that the w54 (11) is at (5) in A54, that is, the w54 (w54=00) at this temporarily becomes w54 (11).
Jfgf corresponds to Ufgf.In this example, Ufgf is Xwcy (fgf), that is, U11 is (11) Xw54;J11 corresponds to U11, is exactly At (5) in A54, w54 (11) is corresponding Xw54 (11), that is, 00 corresponding 434343436;Should at (5) Xw54 (= 434343436) temporarily become Xw54 (11), Xw54 (11)=434343436.Note:In this example, " J11 corresponds to U11 " be not assorted Practical meaning is served only for demonstrating.
And Jfgf forward direction is connected serially to Jf (gf+1), 1≤gf≤Gf-1.In this example, forward direction series connection carries out as previously described " column element (fgf) forward direction is connected serially to row element [f (gf+1)] " in the 5th kind in 10 kinds of forms;Further, as previously described The 7th kind of situation described in, wcy (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of wcy (fgf);Still further, " being related to wcy (fgf) " refers to " being located at wcy (fgf) ", that is, wcy (fgf) forward direction is connected serially to the row element on wcy (fgf) [f(gf+1)];It is assumed that the row element is random row i54, then w54 (11) forward direction at (5) in A54, which is connected serially to, is located at I54 (12) on the w54 (11), that is, J12 is (12) i54.
Jf (gf+1) is corresponding Lf (gf+1), and Jf (gf+1) is corresponding Uf (gf+1) ..., and so on, the positive string of Jf (Gf-1) It is coupled to JfGf, JfGf corresponds to LfGf, and JfGf corresponds to UfGf, then LfGf is encrypted to UfGf;Because the LfGf is under the jurisdiction of Lf, institute With the Lf is connected by forward direction by AI, tail is stayed to be encrypted to UfGf (" staying tail " is primarily referred to as retaining UfGf).In this example, f=1, Gf=g1=1, Jf (Gf-1)=Jf (G1-1)=J1 (2-1)=Jfgf=J1g1=J11, JfGf=J1G1=Jf (gf+1)= Jf (g1+1)=J1 (1+1)=J12, LfGf=L1G1=Lf (gf+1)=Lf (g1+1)=L1 (1+1)=L12, UfGf= U1G1=Uf (gf+1)=Uf (g1+1)=U1 (1+1)=U12.
In this example, when gf+1=g1+1=1+1=2, it is described 1. in it is " mutually right between the Jfgf in Lfgf and AI Answer ", refer to:J12 corresponds to (mapping) L12.
In this example, " Jf (gf+1) is corresponding Lf (gf+1) " is exactly " JfGf corresponds to LfGf ", that is, corresponding (mapping) L12 of J12; Because J12 is (12) i54, so, corresponding (mapping) L12 of i54 (12);Because of L12=555, so, i54 (12)=555, That is, searched in common column 00, the i54=555 at discovery common column 00, common row 281, so, the i54 (=555) at this Temporarily become i54 (12);J12 corresponds to (mapping) L12, that is, 555 corresponding (mappings) 555.
In this example, " Jf (gf+1) is corresponding Uf (gf+1) " is exactly " JfGf corresponds to UfGf ", that is, J12 corresponds to U12;In this example, UfGf is Xncywcyicyhcy (fGf), that is, U12 is (12) Xn54w54i54h54;J12 corresponds to U12, be exactly common column 00, At common row 281, i54 (12) is corresponding X28100555616 (12);Because of the X28100555616 (12)=200044444, institute With " i54 (12) is corresponding X28100555616 (12) " is exactly " 555 corresponding 200044444 ";It should be noted that because, at this 555 temporarily become i54 (12), so, X28100555616 (i.e. 200044444) temporarily becomes X28100555616 at this (12);N54=281, w54=00 of the X28100555616 (12) in Xn54w54i54h54 (12), i54=555, H54=616.
It is emphasized that i54 (12) are located on w54 (11), the concatenated meaning of forward direction is embodied, that is, upper one Position where element w54 (11) is related to the position where next element i54 (12), either " next element i54 (12) It is related to upper one element w54 (11) ".
LfGf is encrypted to UfGf.In this example, L12 (555) is encrypted to 200044444.
Because the LfGf is under the jurisdiction of Lf, so, which is connected by forward direction by AI, tail is stayed to be encrypted to UfGf (" staying tail " It is primarily referred to as retaining UfGf).In this example, L12 (555) is under the jurisdiction of L1 (00555), so, which passes through forward direction by AI It connects, stay tail and be encrypted to 200044444 (=U12);Because LfGf is the tail portion of Lf, JfGf is the tail portion of Jf, and JfGf is corresponding UfGf, so, " staying tail " mainly retains UfGf (=U12), exactly retains 200044444.
④:On the basis of Lf in 2. or 3., L is encrypted to ciphertext M by AI.In this example, on the basis of L1 in 3., L is encrypted to ciphertext M by AI, that is, L=L1=00555,00555 (L) are encrypted to ciphertext 200044444 by AI;M=U12= X28100555616 (12)=200044444.
(4) M is sent to AII;In this example, half ciphertext (L+M) is sent to AII, that is, half ciphertext (00555+ 200044444) it is sent to AII.
(5) to known plaintext L ' carry out encrypted authentication, [L ' is encrypted to ciphertext M ' rear (principle of encryption, phase to AII by AII It is same as the principle of AI encryption L), compare M ' and M whether identical (if they are the same, then AII demonstrates L ', shows that L ' is identical as L)].This In example, 00555 known to AII (=L ');AII carries out encrypted authentication to 00555, and [identical as the principle of AI encryption 00555, AII will 00555 is encrypted to ciphertext M ', M '=200044444;M ' is identical as " M that AI is sent to AII ", then AII demonstrates 00555 (L ') shows that L ' is identical as L];That is, in the way that AI is sent to AII, half ciphertext (L+M) be not tampered with (for example, delete or Reset or replace), L ' is exactly L, and M ' is exactly M, so, AII has received L, and AII confirmed L.
After (6) " Ufgf and/or UfGf " is used, abandoned by A (AI, AII) [on condition that:There is P symmetric cryptography table in A Subordinate list Qp, p be subordinate list number, Qp Qp1, Qp2 ..., QpRp, Qprp is the code characters in Qp, and Qprp becomes or participates in Or the code characters in " become+participate in " symmetric cryptography table;P, p, Rp, rp are greater than the natural number equal to 1,1≤p≤P, 1≤ rp≤Rp].In this example, after UfGf (=U12=200044444) is used, abandoned by A (AI, AII), on condition that: 888899999 (assuming that the p=1 in Qprp, rp=r1=666, Qprp=Q1r1=Q1666=888899999) enter to A54 In common column 00, at common row 281,200044444 abandoned by A of substituting become the code characters in A54 X28100555616;Because of the substitute, A54 is that dynamically, A5 is dynamically that A is dynamic;This can dynamically resist weight Attack is put, and A54 is at least made to be difficult to be cracked.
Example 3, as Gf >=2 ..., forward direction series connection has one of following 10 kinds of forms and the above form.In this example, In 5th kind of form, row element (fgf) forward direction is connected serially to column element [f (gf+1)];Further, it is foregoing the third Described in situation, icy (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of icy (fgf).
Assuming that the plaintext L to be encrypted is 99888 (L=L1, L11=99, L12=888);L11 corresponds to (mapping) J11;It is false If J11=icy (11), then L11 is corresponding (mapping) icy (11), then (11)=99 icy.
Such as Fig. 2 (A54);It is assumed that icy (11) is located at (w54=900) in the common column 900 in A54, and searched for, is sent out At the present common column 900, common row 317, i54=99, so, the i54 at this temporarily becomes i54 (11), and i54 (11)= 99, L11 corresponding (mapping) i54 (11);Because the i54 at this temporarily becomes i54 (11), so, at this, n54 (= 317) it is related to temporarily becoming n54 (11), n54 (11)=317 with the i54 (11) at this, w54 (=900) is related to at this The i54 (11) at place and temporarily become w54 (11), w54 (11)=900, h54 (=707) is related to facing with the i54 (11) at this Shi Chengwei h54 (11), h54 (11)=707, Xn54w54i54h54 (=135792468) be related to the i54 (11) at this and Temporarily become Xn54w54i54h54 (11), Xn54w54i54h54 (11)=X31790099707 (11)=135792468.
For example, " being related to icy (fgf) " refers to " being located at ncy (fgf) ".In this example, " being related to i54 (11) ", which refers to, " to be located at N54 (11) ", then i54 (11) forward direction is connected serially to the column element [12] on n54 (11), that is, needs in common row 317, searches Rope goes out a column element, to correspond to (mapping) L12 (=888);Assuming that the column element is random column h54, through searching for, in common row 317, at common column 25, h54=888, then the h54 at this temporarily becomes h54 (12), h54 (12)=J12=888, h54 (12) Corresponding (mapping) L12;At the common row 317, common column 25, X3172545888 (=655528885) temporarily becomes X3172545888 (12), X3172545888 (12)=655528885, X3172545888 (12) derive from Xn54w54i54h54 (12) n54=317, w54=25, i54=45, h54=888 in;So i54 (11) forward direction is connected serially to and is related to i54's (11) H54 (12), that is, 99 forward directions are connected serially to 888 in common row 317 ..., and 99888 (L1) are connected by forward direction, stayed tail and encrypt At 655528885.
For example, " being related to icy (fgf) " refers to " cipher table relevant to wcy (11) ".In this example, " being related to i54 (11) " is Refer to " cipher table relevant to w54 (11) ";Because of w54 (11)=900, so, it is assumed that the relevant cipher table is No. 900 Symmetric cryptography Table A 900, then i54 (11) forward direction is connected serially to the column element in some common row in some area in A900 [12] ....
For example, " being related to icy (fgf) " refers to " area relevant to icy (11) ".In this example, " being related to i54 (11) " refers to " area relevant to i54 (11);Because of i54 (11)=99, so, it is assumed that the relevant area is No. 99 area A599 in A5, The then positive column element [12] ... being connected serially in some common row in A599 of i54 (11).
For example, " being related to icy (fgf) " refers to " common row relevant to hcy (11) ".In this example, " being related to i54 (11) " is Refer to " common row relevant to h54 (11) ";Because of h54 (11)=707, so, it is assumed that the relevant common row is in A54 Common row 707, then i54 (11) forward direction is connected serially to the column element [12] ... in the common row 707 in A54.
Example 4, foregoing 4th kind, | icy is poor | and (fgf) forward direction, which is connected serially to, is related to the column element [f of subtrahend icy (fgf) (gf+1)].In this example, it is assumed that the plaintext L to be encrypted is 20081 (L=L1, L11=200, L12=81);L11 is corresponding (mapping) J11, then J11=| icy is poor | (11)=| minuend icy (11)-subtrahend icy (11) |=200.
Such as Fig. 2 (A54);It is assumed that in common column 901 (w54=901), | i54 is poor | and (11)=| minuend i54 (11)- Subtrahend i54 (11) |=200;It assumes again that, the i54 (=333) at the common column 901, common row 440 temporarily becomes minuend i54 (11), minuend i54 (11)=333, then the common column 901, the i54 (=133) at common row 000 temporarily become subtrahend I54 (11), subtrahend i54 (11)=133;That is, | i54 is poor | and (11)=| 333-133 |=200;Also, the common column 901, N54 (=000) at common row 000 temporarily becomes subtrahend n54 (11), subtrahend n54 (11)=000;Subtrahend n54 (11) (=000) is related to the subtrahend i54 (11) (=133) at this.
In this example, " being related to subtrahend icy (fgf) " refers to " related to subtrahend icy (fgf) ", that is, | i54 is poor | and (11) are positive It is connected serially to column element (12) relevant to subtrahend i54 (11);Because subtrahend n54 (11) (=000) and subtrahend i54 (11) (= 133) related, so, | i54 is poor | and (11) (=200) forward direction is connected serially to the column element (12) in common row 000;That is, it needs to In common row 000, a column element is searched out, to correspond to (mapping) L12 (=81);It is assumed that the column element is | h54 is poor |, Then | h54 is poor | (12)=| minuend h54 (12)-subtrahend h54 (12) |=81;It assumes again that, at common row 000, common column 900 H54 (=81) temporarily becomes minuend h54 (12), minuend h54 (12)=81, then common row 000, at common column 201 H54 (=0) temporarily becomes subtrahend h54 (12), subtrahend h54 (12)=0;That is, J12=| h54 is poor | (12)=| 81-0 |=81, Should | h54 is poor | (12) (=81) corresponding (mapping) L12;So | i54 is poor | and (11) forward direction is connected serially in common row 000 | H54 is poor | and (12), that is, 200 forward directions are connected serially to 81 in common row 000.
Jfgf corresponds to Ufgf.In this example, J12 corresponds to U12, that is, | h54 is poor | (12) (=| minuend h54 (12)-subtrahend H54 (12) |) correspond to U12;Further, J12 corresponds to U12, is exactly subtrahend h54 (12) corresponding U12, that is, in common row 000, public affairs Altogether at column 201, subtrahend h54 (12) (=0) is corresponding X0002017730 (12), X0002017730 (the 12)=U12= 644418881;..., which is connected by forward direction, stays tail and be encrypted to 644418881 [=X0002017730 (12)].
Example 5, foregoing 5th kind, | ncy-icy | (fgf) forward direction, which is connected serially to, is related to the column element [f of icy (fgf) (gf+1)].In this example, it is assumed that the plaintext L to be encrypted is 52000 (L=L1, L11=52, L12=000);L11 is corresponding (mapping) J11, then J11=| ncy-icy | (11)=| ncy (11)-icy (11) |=52.
Such as Fig. 2 (A54);It is assumed that in common column 201 (w54=201), | n54-i54 | (11)=| n54 (11)-i54 (11) |=52;It assumes again that, the n54 (=282) at the common column 201, common row 282 temporarily becomes minuend n54 (11), should Minuend n54 (11)=282, then the common column 201, the i54 (=230) at common row 440 temporarily become subtrahend i54 (11), Subtrahend i54 (11)=230;That is, | n54-i54 | (11)=| 282-230 |=52;Also, in the common column 201, common row N54 at 440 temporarily becomes subtrahend n54 (11), subtrahend n54 (11)=440, subtrahend n54 (11) (=440) with at this The subtrahend i54 (11) (=230) at place is related.
In this example, " being related to icy (fgf) ", refer to " related to icy (fgf) ", that is, | n54-i54 | (11) forward direction is connected serially to Column element (12) relevant to subtrahend i54 (11);Because of subtrahend n54 (11) (=440) and the subtrahend i54 (11) (=230) phase It closes, so, | n54-i54 | (11) forward direction is connected serially to the column element (12) in common row 440;That is, it needs in common row 440 On, a column element is searched out, to correspond to (mapping) L12 (=000);Assuming that the column element is random column h54, through searching for, At common row 440, common column 901, h54=000, then the h54 at this temporarily becomes h54 (12), h54 (the 12)=J12= 000, the h54 (12) (=000) correspond to (mapping) L12;So | n54-i54 | (11) forward direction is connected serially in common row 440 H54 (12), that is, 52 forward directions are connected serially to 000 in common row 440 ..., 52000 (L1) by forward direction series connection, stay tail and It is encrypted to 789123456;This 789123456 is common row 440, the code characters at common column 901, the 789123456=U12 =X440901333000 (12).
Example 6, foregoing 6th kind, | icy-ncy | (fgf) forward direction, which is connected serially to, is related to the column element [f of ncy (fgf) (gf+1)].In this example, it is assumed that the plaintext L to be encrypted is 250901 (L=L1, L11=250, L12=901);L11 correspondence (is reflected Penetrate) J11, then J11=| icy-ncy | (11)=| icy (11)-ncy (11) |=250.
Such as Fig. 2 (A54);It is assumed that in the common column 25 (w54=25), | i54-n54 | (11)=| i54 (11)-n54 (11) |=250;It assumes again that, the i54 (=32) at the common column 25, common row 440 temporarily becomes minuend i54 (11), the quilt Subtrahend i54 (11)=32, then the common column 25, the n54 (=282) at common row 282 temporarily become subtrahend n54 (11), this subtracts Number n54 (11)=282;| i54-n54 | (11)=| 32-282 |=250.
In this example, " being related to ncy (fgf) " refers to " being located at ncy (fgf) ", that is, | i54-n54 | (11) forward direction is connected serially to position In the column element (12) on subtrahend n54 (11);That is, it needs to a column element (12) be searched out, to correspond in common row 282 (mapping) L12 (=901);It is assumed that the column element is common column w54, and through searching for, at common row 282, common column 901, w54 =901, then the w54 at this (=901) temporarily becomes w54 (12), w54 (the 12)=J12=901, the w54 (12) (=901) Corresponding (mapping) L12;So | i54-n54 | (11) forward direction is connected serially to the w54 (12) in common row 282, that is, 250 is positive It is connected serially to 901 be located in common row 282 ..., which is connected by forward direction, stays tail and be encrypted to 965373737;It should 965373737 be common row 282, the code characters at common column 901,965373737=U12=X28290100808 (12).
Example 7, foregoing 8th kind, | wcy is poor | and (fgf) forward direction, which is connected serially to, is related to the row element [f of subtrahend wcy (fgf) (gf+1)].In this example, it is assumed that the plaintext L to be encrypted is 700282 (L=L1, L11=700, L12=282);L11 correspondence (is reflected Penetrate) J11, then J11=| wcy is poor | (11)=| minuend wcy (11)-subtrahend wcy (11) |=700.
Such as Fig. 2 (A54);Because of J11=| w54 is poor | (11)=700, so, it is assumed that minuend w54 (11)=901, then Subtrahend w54 (11)=201, | w54 is poor | (11)=| minuend w54 (11)-subtrahend w54 (11) |=| 901-201 |=700.
In this example, " being related to subtrahend wcy (fgf) " refers to " being located at subtrahend wcy (fgf) ", that is, | w54 is poor | (11) positive string It is coupled to the row element (12) being located on subtrahend w54 (11);That is, it needs to a row element (12) is searched out in common column 201, To correspond to (mapping) L12 (=282);Assuming that the row element is common row n54, through searching for, in common column 201, common row 282 Place, n54=282, then the n54 at this temporarily becomes n54 (12), n54 (the 12)=J12=282, and the n54 (12) correspondence (is reflected Penetrate) L12;So | w54 is poor | and (11) forward direction is connected serially to the n54 (12) in common column 201, that is, 700 forward directions are connected serially to position 282 in common column 201 ..., which is connected by forward direction, stays tail and be encrypted to 777500099;It should 777500099 be common column 201, the code characters at common row 282,777500099=U12=X282201465 (12).
Example 8, as previously mentioned, being corresponded to each other between Lfgf and the Jfgf in AI, after the corresponding Ufgf of Jfgf, the segment in Ufgf Or all, it determines or participates in determine:Subtrahend element (fgf) in poor element (fgf) is located at Ac " y ".
Assuming that the plaintext L to be encrypted is 700282 (L=L1, L11=700, L12=282, f=1, gf=g1);G1=1 When, Lfgf=L1g1=L11, Jfgf=J1g1=J11, because, corresponding (mapping) J11, the L11=700 of L11, so, J11= 700;Assuming that J11=| wcy is poor | (11)=| minuend wcy (11)-subtrahend wcy (11) |=700;Assuming that minuend wcy (11) It is minuend w54 (11) (such as Fig. 2, A54), it is further assumed that minuend w54 (11)=901, then (11)=201, J11 subtrahend wcy =| wcy is poor | and (11)=| minuend w54 (11)-subtrahend wcy (11) |=| 901-201 |=700.
When g1=1, Ufgf=U1g1=U11;J11 corresponds to U11, that is, | wcy is poor | (11) (=| minuend w54 (11)-subtract Number wcy (11) |) correspond to U11;Because minuend w54 (11) is related to this | wcy is poor | (11);Again because of (4) in A54 Place, XW54 (=555554422) temporarily become XW54 (11), the XW54 (11)=555554422, minuend w54 (11) (= 901) corresponding XW54 (11) (=555554422), so, which is related to U11;That is, J11 is corresponding U11 is the equal of in this example that minuend w54 (11) (=901) are corresponding XW54 (11) (=555554422), further, Segment in the U11 is equivalent to be the segment in the XW54 (11) (=555554422).
Segment 22 (this 555554422 in two, end) in the XW54 (11) (=555554422) determines:Subtrahend wcy (11) it is located at A522 (c "=5, y "=segment=22 of A522 in Ac " y ");That is, " y "=22 " it is by the segment (=22) it determines, that is, the cipher table where subtrahend wcy (11) is still A5 (c "=5), but where subtrahend wcy (11) Area change (y "=22 ≠ 4), subtrahend wcy (11) is (11) subtrahend w522;That is, 201 (the w522=of common column in A522 201), temporarily become subtrahend w522 (11), subtrahend w522 (11)=201;Because J11 is related to the common column 901 in A54, also The common column 201 being related in A522, so, J11=| wcy is poor | (11)=| minuend w54 (11)-subtrahend w522 (11) |=| 901-201 |=700, that is to say, that the y=y "=22 in the y=4 in minuend wcy (11), subtrahend wcy (11).
..., | wcy is poor | and (11) (=700) forward direction is connected serially to the row element (12) (=282) on subtrahend w522 (11).
Example 9, as previously mentioned, being corresponded to each other between Lfgf and the Jfgf in AI, after the corresponding Ufgf of Jfgf, the segment in Ufgf Or all, it determines or participates in determine:Jf (gf+1) (Gf >=2,1≤gf≤Gf-1) is located at Ac " y ".
Assuming that the plaintext L to be encrypted is 99888 (L=L1, L11=99, L12=888, f=1, gf=g1=1), Lfgf =L1g1=L11, Jfgf=J1g1=J11, corresponding (mapping) J11 of L11;It is assumed that J11=icy (11), then (11)=99 icy.
Such as Fig. 2 (A54);It is assumed that the icy (11) is located at (w54=900) in the common column 900 in A54, and through searching for, It was found that at the common column 900, common row 317, i54=99, so, the i54 at this temporarily becomes i54 (11), J11=i54 (11)=99, that is, corresponding (mapping) i54 (11) of L11.
Ufgf=U1g1=U11;At common column 900, common row 317, U11=X31790099707 (11)= 135792468, J11 correspond to U11, that is, 99 corresponding 135792468.
Segment 13 (this 135792468 in front two) in the U11 (=135792468) determines:J12 is located at A513; J12 is derived from, Jf (gf+1)=J1 (g1+1)=J1 (1+1)=J12;C "=5, y " of the A513 in Ac " y "=should Segment=13, that is, " y "=13 " are determined by the segment (=13), that is, the cipher table where the J12 be still A5 (c "= 5), but the area where the J12 becomes A513 (y "=13 ≠ 4).
J12 corresponds to (mapping) L12, because, L12=888, so, J12=888;Assuming that the J12 is the i513 in A513 (12);Further, it is searched in A513, finds some common column, the i513=888 at some common row, then at this I513 temporarily becomes i513 (12), i513 (the 12)=J12=888;J12 corresponds to L12, is exactly the i513 (12) corresponding (mapping) L12;Assuming that the code characters at this are 616161616, then U12=616161616.
Meet the 7th kind in aforementioned 10 kinds of forms, in the non-same common column, row element (fgf) forward direction is connected serially to phase The row element [f (gf+1)] of pass, that is, i54 (11) forward direction is connected serially to relevant i513 (12).
J12 corresponds to U12, is exactly the corresponding U12 of the i513 (12), that is, 888 corresponding 616161616;..., 99888 (L1) quilt Forward direction series connection stays tail and is encrypted to 616161616 (=U12).
Example 10 is corresponded to each other, after the corresponding Ufgf of Jfgf, the piece in Ufgf between Lfgf and the Jfgf in AI according to aforementioned Section is whole, determines or participate in determine:J (f+1) 1 is located at Ac " y ".In this example, J (f+1) 1=J21.
Assuming that the plaintext L to be encrypted is collecting account 00555700282;The L is divided into 2 sections (L1, L2), F=2, L1, L2 is the plaintext character field in L, L1=00555, L2=700282.
Identical as L1 described in example 2, the L1 in this example is divided into 2 groups (L11, L12), f=1, Gf=G1=2, L11 (gf=g1=1), L12 (gf=g1=2) is the plaintext character group in L1, L11=00, L12=555.
Similarly with example 2, it is located at the w54 (11) in A54 at (5), forward direction is connected serially to the i54 (12) on the w54 (11); W54 (the 11)=J11=00, i54 (the 12)=J12=555 ..., L1 (=00555) are connected by forward direction, are stayed tail and be encrypted to 200044444 (=U12).
(20 be the first two in 200044444 for segment 1 (=20), segment 2 (=44) in the U12 (=200044444) Position, 44 be two, end in 200044444) it determines:J21 is located at A2044 (c "=segment 1=20, y "=segment 2=44), that is, " c "=20 " is determined by segment 1, " y "=44 " it is to be determined by segment 2.
In this example, f=1, f+1=1+1=2;G (f+1)=G2=2;L (f+1)=L2, J (f+1)=J2.
When g (f+1)=g2=1, L (f+1) g (f+1)=L21, J (f+1) g (f+1)=J21.
When g (f+1)=g2=2, L (f+1) g (f+1)=L22, J (f+1) g (f+1)=J22.
The L1 in L (f+1)=L2=example 7 in this example;Similarly with the L1 in example 7, the L2 in this example is divided into 2 groups (L21,L22);L21, L22 are the plaintext character group in L2, L21=700, L22=282.
Because J21 corresponds to (mapping) L21, L21=700, so, J21=700;Assuming that the whole in this example in A2044 Content is identical to the full content in example 7 in A54, then this example and example 7 similarly, in A2044, J21=| w2044 is poor | (21) =| minuend w2044 (21)-subtrahend w2044 (21) |=| 901-201 |=700 ..., | w2044 is poor | and (21) forward direction is connected serially to N2044 (22) in common column 201 in A2044, the n2044 (22)=282, that is, 700 forward directions, which are connected serially to, to be located at 282 in common column 201 in A2044;At common column 201, common row 282 in A2044, U22=X282201465 (22)=777500099, the n2044 (22) is corresponding X282201465 (22), that is, 282 corresponding 777500099;..., the L2 (= 700282) it connected by forward direction, stay tail and be encrypted to 777500099.
Because U1G1 (=U12=200044444) is not disclosed, (in this example, the effect of U12 is to determine that J21 is located at A2044), " on the basis of Lf in 3., L is encrypted to ciphertext M " by AI, that is, in 3. for 4. described in foregoing (3) L1, L2 on the basis of (i.e. ..., J11 forward direction is connected serially to J12 ..., and J12 forward direction is connected serially to J21 ..., and J21 forward direction is connected serially to J22 obtains U22 by J22), L (=00555700282) by AI by forward direction series connection, stay tail be encrypted to 777500099 (= UFGF=U2G2=U22=M), that is, 777500099 (=the U22) is retained as " tail " in " staying tail ";Although being somebody's turn to do " tail " It is L2 " tail " on surface, but in fact, being somebody's turn to do " tail " is L " tail ";777500099 (=the U22) is used as ciphertext M, is disclosed, It is equivalent to, on the basis of L1, L2 in 3., L is encrypted to ciphertext M by AI.
It is attached:On the basis of Lf in 3., L is encrypted to ciphertext M by AI.In this example, in A54, UfGf=U1G1=U12 =200044444, L1 (=00555) are connected by forward direction, are stayed tail and be encrypted to 200044444;Segment 1, segment 2 in U12, certainly It is fixed:J21 is located at A2044;UfGf=U2G2=U22=777500099, L2 (=700282) are connected by forward direction, are stayed tail and encrypt At 777500099;Further, according to aforementioned, in this example, in A, mathematical computations (U ' is carried out between different U ' fGf FGf=UfGf), obtaining the result is that in the step (3) 4. in M;Specifically, because, U12=200044444, U22 =777500099, so, M=U12+U22=200044444+777500099=977544543, that is, L1, L2 in 3. On the basis of, L is encrypted to ciphertext 977544543 (=M) by AI.
Example 11, it is assumed that L (=00555700282) is divided into 1 section (L1), f=F=1, L=L1, further, L1 (=00555700282) is divided into 4 groups (L11, L12, L13, L14), Gf=G1=4, L11=00, L12=555, L13= 700, L14=282.
According to preceding described, corresponded to each other between Lfgf and the Jfgf in AI, after the corresponding Ufgf of Jfgf, the segment in Ufgf, It determines:Jf (gf+1) is located at Ac " y ".In this example, f=1, as gf=g1=2, U12=200044444 in U12=example 10, Jf (gf+1)=J1 (g1+1)=J1 (2+1)=J13;That is, corresponded to each other between L12 and the J12 in AI, after the corresponding U12 of J12, Segment 1 (=20), segment 2 (=44) in U12 determine:J13 is located at A2044 (c "=20, y "=44).
J21 in the J13=example 10, the J22 in J14=example 10, the U22=in UfGf=U1G1=U14=example 10 777500099;..., which is connected by forward direction, stays tail and be encrypted to 777500099;L (=L1= 00555700282) ciphertext 777500099 (=M) is encrypted to by AI.
Example 12, as previously mentioned, in the step (3) 3. in the 5th kind described in ranks forward direction series connection, be ranks intersect Forward direction series connection.Assuming that the plaintext L to be encrypted is 9988800 (L=L1, L11=99, L12=888, L13=00).
Such as Fig. 2 (A54);As described in example 3, common column 900, the i54=99 at common row 317, the i54 at this temporarily become Corresponding (mapping) i54 (11) of i54 (11), i54 (the 11)=J11=99, L11;..., as described in example 3, the positive string of i54 (11) It is coupled to and is related to the h54 (12) of (11) i54, corresponding (mapping) L12 of h54 (the 12)=J12=888, the h54 (12), that is, 99 is positive It is connected serially to 888 be located in common row 317;Because at common row 317, common column 25, w54 (=25) and with here The h54 (12) is related, so, in this example, further, 888 [=h54 (12)] forward directions in common row 317 are connected serially to and are located at I54 (13) in common column 25, i54 (the 13)=J13=00, the i54 (13) is at common column 25, common row 281, the i54 (13) corresponding (mapping) L13;At the common column 25, common row 281, U13=666533339, J13 corresponds to U13, that is, 00 pair Answer 666533339;..., which is connected by forward direction, stays tail and be encrypted to 666533339.
In this example, ranks intersect positive series connection, refer to that row, column, row intersect positive series connection, that is, i54 (11), h54 (12), i54(13)。
Similarly, if the character in L1 is more, L1 can be divided into many groups, in Acy or in Ac or in A, carry out Ranks intersect positive series connection, for example, row, column, row, column, row, column ..., such as column and row, column and row, column ....
Example 13, it is assumed that user BBB possesses wrist scrambler 7, symmetric cryptosystem AI3 built in the wrist scrambler 7, interior Set camera;User CCC possesses wrist scrambler 8, symmetric cryptosystem AII6, built-in camera built in the wrist scrambler 8; In the server of the communications intermediary side VVV of authority, possess symmetric cryptosystem AII4, AI5;It is of the present invention built in AI3, AII4 Symmetric cryptography table, symmetric cipher, AI3, AII4 are identical;It is symmetric cryptography table of the present invention built in AI5, AII6, symmetrical Enciphered method, AI5, AII6 are identical.
The bank account of BBB is 9990000444505050508;The bank account of CCC is 6677880000003322115;BBB purchases commodities to CCC, and payment for goods is 345 yuan, and payment method is:BBB is remitted money by Internetbank to CCC 345 yuan;BBB logs in certain network platform, input " 6677880000003322115/345/ by computer or mobile phone 9990000444505050508 " (=plaintext L, that is, the content that this Internetbank is transferred accounts, that is, collecting account/money transfer amount/payment Account);The camera of BBB wrist scrambler 7 takes in the L in the display screen display of the computer or mobile phone of BBB;Wrist is close L is divided into L1, L2, L3, F=3, L1=collecting account=6677880000003322115, L2=remittance by the AI3 in code device 7 Amount of money=345, L3=Send only Account=9990000444505050508.
It is assumed that 6677880000003322115 (=L1) are connected by forward direction by AI3, tail are stayed to be encrypted to 111222333 (=U1G1), 345 (=L2) are connected by forward direction by AI3, tail are stayed to be encrypted to 333222111 (=U2G2), 9990000444505050508 (=L3) are connected by forward direction by AI3, tail are stayed to be encrypted to 555554444 (=U3G3);As before (mathematical computations, U ' fGf=UfGf are carried out between different U ' fGf), M7=U1G1+U2G2+U3G3=111222333 + 333222111+555554444=999998888, that is, L is encrypted to ciphertext 999998888 by AI3.
Half ciphertext 7=plaintext+ciphertext=L+M7;"6677880000003322115/345/ 9990000444505050508 "+999998888 (half ciphertexts 7) are sent to the AII4 in the server of VVV by BBB;AII4 pairs The plaintext L ' (=" 6677880000003322115/345/9990000444505050508 ") received carries out encrypted authentication [AII4 by L ' be encrypted to ciphertext M7 ' (encryption principle, be identical to AI3 encryption L principle), M7 '=999998888, by than Compared with M7 '=M7, then AII4 demonstrates L ', shows L '=L, that is, the plaintext that AII4 is received is not tampered in the way of transmission, Show that the ciphertext received is also not tampered with simultaneously].
AI5 in the server of the VVV, by L (" 6677880000003322115/345/ 9990000444505050508 ") 777776666 (=M8, encryption principles, similar to the principle of AI3 encryption L) are encrypted to; " 6677880000003322115/345/9990000444505050508 "+777776666 (half ciphertext 8 of=L+M8=) is by VVV It is sent to the computer or mobile phone of CCC.
The camera of CCC wrist scrambler 8 takes in the display screen display in the computer or mobile phone of CCC " 6677880000003322115/345/9990000444505050508 "+777776666 (=half ciphertext 8);Wrist scrambler AII6 in 8 carries out the plaintext L " (=" 6677880000003322115/345/9990000444505050508 ") received Encrypted authentication [L " is encrypted to ciphertext M8 ' (principle of encryption is identical to the principle of AI5 encryption L) by AII6, and M8 '= 777776666, by comparing, M8 '=M8, then AII6 demonstrates L ", shows L "=L, that is, the plaintext that AII6 is received is in transmission On the way, it is not tampered with, shows that the ciphertext received is also not tampered with simultaneously].
After CCC passes through the encrypted authentication, so that it may confirm that relevant financial institution (exists with BBB, VVV, CCC Cooperation agreement) this Internetbank remittance (=345 yuan) has been squeezed into the collecting account (=6677880000003322115) of CCC; CCC delivers to BBB.
Attached 1:How synchronization AI and AII between is guaranteed.For example, the wrist scrambler 7 of BBB breaks down, L cannot be added Close at ciphertext, then BBB is responsible for proactive contact VVV, then the AII4 of VVV does not need to carry out the encrypted authentication, with guarantee AI3 and Synchronization between AII4.For example, half ciphertext 7 send distorted on the way by attacker, cause the AII4 of VVV can not be successfully into The row encrypted authentication, then VVV is responsible for proactive contact BBB, it is desirable that half ciphertext 7 is informed VVV by BBB, so that the AII4 of VVV is carried out The encrypted authentication, to guarantee the synchronization between AII4 and AI3.
With it is upper similarly, when the AI5 in the server of VVV break down or half ciphertext 8 send on the way by attacker's It destroys, causes the AII6 of CCC can not be successfully and carry out the encrypted authentication, the process for causing this Internetbank to be transferred accounts is imperfect, then VVV It is responsible for proactive contact CCC or CCC and is responsible for proactive contact VVV ..., guarantees the synchronization between AII6 and AI5.
Attached 2:For example, f=F=1, L1=L=66778800000033221153459990000444505050508, L1 In preceding 19 bit digital be collecting account, the 20th in L1 to the 22nd bit digital is money transfer amount, latter 19 the (the 23rd in L1 Position is to the 41st) number is Send only Account;It is assumed that the L1 by AI3 by forward direction series connection, stay tail be encrypted to 989898987 (= U1G1), then M7=989898987 (=U1G1);It is assumed that the L1 is connected by forward direction by AI5, tail is stayed to be encrypted to 343434348 (=U1G1), then M8=343434348.
Attached 3:Because having carried out direct communication between BBB and VVV, direct communication has been carried out between VVV and CCC, so, Between BBB and CCC, indirect communication (intermediary that VVV is this indirect communication) has been carried out.
Attached 4:If VVV and certain described network platform are networked, BBB when carrying out this Internetbank remittance in the network platform, VVV with network platform networking can be with online browse to L, then M7 can be sent to VVV and (no longer need to send half close by BBB Text is 7);If CCC and the network platform are networked, " BBB and/or VVV " carries out this Internetbank remittance process in the network platform When, the CCC with network platform networking can be with online browse to L, then M8 can be sent to CCC and (no longer need to send half by VVV Ciphertext 8).
Example 14, BBB and VVV direct communication.It is assumed that user BBB possesses wrist scrambler 7, it is right built in the wrist scrambler 7 Claim cryptographic system AI3, built-in camera, symmetric cryptography table of the present invention, symmetric cipher, the wrist password built in AI3 Device 7 is bundled with the bank card number (9990000444505050508) of BBB;Supermarket CCC possesses POS machine, which is bundled with The bank account (6677880000003322115) of CCC;In the server of intermediary or financial institution VVV, possess symmetrical close Symmetric cryptography table of the present invention, symmetric cipher built in code system AII4, AII4;AI3, AII4 are identical;BBB is at CCC Shopping, the shopping amount of money is 225 yuan, and payment method is:Cashier of the BBB in CCC, cCredit card payment.
The bank card of BBB is inserted into the POS machine of CCC;Meanwhile the BBB camera of wrist scrambler 7, take in the CCC's The 225 (=shopping amount of money=L1=L) of the display screen display of cashier;It is assumed that 225 (L1) is by wrist scrambler 7 AI3 is connected by forward direction, tail is stayed to be encrypted to 111222444 (=U1G1), then M7=111222444, that is, L is encrypted to by AI3 Ciphertext 111222444.
225+111222444 (half ciphertext 7) is sent to the AII4 in the server of VVV by BBB;AII4 is to the plaintext received L ' (=225) progress encrypted authentication [L ' is encrypted to ciphertext M7 ' (encryption principle is identical to the principle of AI3 encryption L) by AII4, M7 '=111222444, by comparing, M7 '=M7, then AII4 demonstrates L ', shows L '=L, that is, the plaintext that AII4 is received exists It in the way of transmission, is not tampered with, shows that the ciphertext received is also not tampered with simultaneously].
The server of VVV is controlled, directly or indirectly the POS machine of CCC, and the sound for making it issue " drop " (shows that BBB has succeeded 225 yuan of payment), and show the printed words of " 225 yuan of successful payment ";That is, the server of VVV is directly or indirectly by the bank of BBB Block 225 yuan on (9990000444505050508), transfers in the bank account (6677880000003322115) of CCC; The cashier of CCC allows BBB to take goods, leave CCC.
It is somebody's turn to do the benefit of " direct communication+POS machine ":(1) BBB can be prevented in supermarket's cCredit card payment, bank card password quilt Bystander peeps, or is peeped by the POS machine that offender has moved trick;(2) receipt that BBB is provided in CCC can not needed Or it signs on sales slip.
Attached 1:For example, (assuming that POS machine is attacked by trojan horse, the shopping amount of money is transferred to illegal for the sake of security Bank account, and the POS machine also normally issues the sound of " drop ", shows the printed words of " 225 yuan of successful payment "), bright The bank account of CCC is added in literary L.(the purchase of display screen display 225/6677880000003322115 of the cashier of the CCC The object amount of money/CCC bank account) after, the camera of BBB wrist scrambler 7 takes in the display screen display of the cashier The 225/6677880000003322115 (=shopping amount of money/CCC bank account=L1=L);It is assumed that this 225/ 6677880000003322115 (L1) are connected by forward direction by the AI3 in wrist scrambler 7, tail are stayed to be encrypted to 111222555 (=U1G1), then M7=111222555, that is, L is encrypted to ciphertext 111222555 by AI3;225/6677880000003322115 + 111222555 (half ciphertexts 7) are sent to the AII4 in the server of VVV by BBB;AII4 is to the plaintext L ' (=225/ received 6677880000003322115) encrypted authentication ... is carried out.
Attached 2:Direct communication+ATM machine.For example, symmetric cryptosystem AI3, built-in camera shooting built in the wrist scrambler 7 of BBB Head, BBB withdraw the money at certain ATM machine, and CCC is the ATM machine, possess in the server of intermediary or financial institution VVV symmetrical close Code system AII4, AI3, AII4 are identical, and the server of VVV is controlled, directly or indirectly the ATM machine ....It should " direct communication+ATM The benefit of machine ":It can prevent BBB at the ATM machine when plug-in card withdrawal, bank card password is peeped by bystander, or prevents ATM Machine is mounted with to peep device by offender, and the bank card password of user is caused to be peeped.
Example 15, the present invention is used not only for e-payment, is also used to the text communication of general text communication or secret.It is false If a side BBB of communication possesses wrist scrambler 7,7 built-in camera of wrist scrambler, built-in symmetric cryptosystem AI3 (built-in of the present invention symmetric cryptography table, symmetric cipher);The also built-in digital conversion table of the AI3.
For example, one corresponds between Chinese character and set of number in the digit speech recognition table;Wherein, Chinese character " bright " is right Answer 12345, Chinese character " day " corresponding 23456, Chinese character "ON" corresponding 34567, Chinese character " meeting " correspondence 45678, additional character "." corresponding 56789。
It is assumed that Chinese character plaintext L is that " tomorrow has a meeting.";L1=L, L1 are divided into 5 plaintext character groups, and L11=is bright, L12= It, L13=is opened, L14=meeting, L15 be ".";As previously mentioned, L11 is converted by the Chinese character " bright " in the digit speech recognition table 12345;L12 is converted into 23456 by the Chinese character " day " in the digit speech recognition table;L13 passes through the Chinese in the digit speech recognition table Word "ON", is converted into 34567;L14 is converted into 45678 by the Chinese character " meeting " in the digit speech recognition table;L15 passes through the number Code conversion table in additional character ".", it is converted into 56789.
By the digit speech recognition table, AI3 will " tomorrow has a meeting." (Chinese character plaintext L) be converted to 1234523456345674567856789 (digital plaintext L);1234523456345674567856789 (L) is passed through by AI3 Forward direction series connection stays tail and is encrypted to 333333336 (=M);BBB is by " 1234523456345674567856789+ 333333336 " (digital plaintext L+ ciphertext M) are sent to DDD.
Another party DDD of communication possess symmetric cryptosystem AII4 (built-in symmetric cryptography table of the present invention, it is symmetrical plus Close method), AI3, AII4 are identical;The also built-in digit speech recognition table same as AI3 of AII4.
The AII4 of DDD carries out encrypted authentication ... to known plaintext L ' (=1234523456345674567856789); It, will according to the digit speech recognition table in the AII4 after AII4 passes through the encrypted authentication 1234523456345674567856789 (digital plaintext L) be converted to " tomorrow meeting." (Chinese character plaintext L);That is, BBB will be digital Plaintext L is notified of DDD, and DDD is demonstrated by the encrypted authentication:The digital plaintext L ' received is not tampered with, and L ' is identical as L; DDD passes through identical digit speech recognition table again, and digital plaintext L is decrypted as Chinese character plaintext L;That is, BBB has carried out secret lead to DDD (BBB secret is notified of DDD to letter, and the content of notice is:Tomorrow has a meeting.).
Although the digit speech recognition table be it is secret, due to utilization of the invention, which is more difficult to by not The attack of trace slash, safety are higher.
It is attached:If the digit speech recognition table is that dynamic (for example, 12345 corresponding Chinese character " bright ", but this 12345 is primary Use, in communication next time, according to the digit speech recognition table, 55551 corresponding Chinese character " bright "), then the secret of the confidential corespondence Property higher (content of plaintext L is difficult to be cracked).
Example 16 communicates (BBB is a side, and CCC is another party, and VVV is third party) by third party, prevents fraud text message. It is assumed that user BBB possesses wrist scrambler 7,7 built-in camera of wrist scrambler, built-in symmetric cryptosystem AI3;User CCC possesses wrist scrambler 8,8 built-in camera of wrist scrambler, built-in symmetric cryptosystem AII6,;In the communication of authority In the server of Jie side VVV, possess symmetric cryptosystem AII4, AI5;Identical (the institute of the present invention built in AI3, AII4 of AI3, AII4 Symmetric cryptography table, symmetric cipher, the digit speech recognition table 7 stated);AI5, AII6 are identical (of the present invention built in AI5, AII6 Symmetric cryptography table, symmetric cipher, digit speech recognition table 8).
BBB intends issuing character message " remitted money 2,000 " to CCC;Its step are as follows:
According to the digit speech recognition table 7 built in AI3, AI3 is converted to " remitted money 2,000 " (Chinese character plaintext L) 00012003400560078009 (digital plaintext L);00012003400560078009 (L) is connected by forward direction by AI3, is stayed Tail and be encrypted to 666666663 (=M);BBB will " remitted money 2,000+666666663 " (half ciphertext=Chinese character plaintext L+ ciphertext M7) it is sent to VVV.
According to the digit speech recognition table 7 built in AII4, AII4 is converted to known Chinese character plaintext L ' (=remitted money 2,000) 00012003400560078009 (digital plaintext L ');AII4 adds 00012003400560078009 (digital plaintext L ') Close verifying ....
After AII4 passes through the encrypted authentication, according to the digit speech recognition table 8 built in AI5, AI5 will " have remitted money 2,000 " (Chinese character plaintext L) is converted to 10203040506070809090 (digital plaintext L);10203040506070809090 is (digital bright Literary L) connected by AI5 by forward direction, tail is stayed to be encrypted to);VVV will " remitted money 2,000+222222228 " (half ciphertext=Chinese character Plaintext L+ ciphertext M8) it is sent to CCC.
According to the digit speech recognition table 8 built in AII6, AII6 is converted to known Chinese character plaintext L " (=remitted money 2,000) 10203040506070809090 (digital plaintext L ");AII6 adds 10203040506070809090 (digital plaintext L ") Close verifying ...;After AII6 passes through the encrypted authentication, the short message " remitted money 2,000 " that confirmation BBB is issued to CCC be really, It is not that swindle molecule is issued by pseudo-base station.
It is attached:If CCC is ordinary people, BBB is public unit (pressing for payment of water rate, the electricity charge, natural gas expense, broadband access fee etc.) Or telecom operators' (pressing for payment of telephone charge, cell-phone fee, broadband access fee etc., issue the advertisement of cell-phone fee set meal) or Express firm The party (for example, relatives, classmate, colleague, leader) of (urging neck mail) government bodies or CCC, which possesses password Device 7 (is not necessarily wrist);By third party communication (that is, the BBB possesses the AI3, VVV possess the AII4, AI5, CCC possess the AII6), then it can contain rampant, startling fraud text message, protect the money earned by hard toil of CCC;Reason It is that, if swindle molecule does not obtain the scrambler 7 that the BBB possesses, VVV can not be its intermediary, carry out third party's communication, Swindle molecule can not just pretend to be the BBB;Character message is sent out to CCC still through pseudo-base station if swindling molecule, CCC can set it Pay no attention to because, in the short message without number in plain text;Numeric messaging is sent out to CCC if swindling molecule, but CCC can not be successfully ground The encrypted authentication is carried out in plain text to the number in the numeric messaging.
Explanation about the technical solution:
About ncy, wcy.Because the length of attached drawing is limited, in attached drawing 1, attached drawing 2, the corresponding n54 of each code characters, W54 is not shown in the accompanying drawings, but is existing;For example, in attached drawing 1, attached drawing 2, at common row 440, common column 900, Code characters 123456789 correspond to common row 440 (n54=440), common column 900 (w54=900), still, because attached drawing 1, The length of attached drawing 2 is limited, and " n54=440 ", " w54=900 " are not shown at the common row 440, common column 900.
About icy, hcy.For example, in the A54 of such as Fig. 1, a total of 999 common rows of code characters, 999 it is public Column, that is, I54=999, H54=999;In each common column in 999 common columns, by 999 digital groups (0,00,000, 1, it 2,3 ..., 995,996) is not arranged successively according to size order, without regular arrangement, but according to random order Arrangement generates i54;Code characters and i54 are corresponded;Each i54 is equal to some digital group in this 999 digital groups, That is, " difference between two neighbouring icy " is irregular in each common column.
Similarly, in each common row in 999 common rows, by 999 digital groups (0,00,000,1,2,3 ..., 995,996) it not according to size order arrangement, without regular arrangement, but is arranged according to random order, generates h54; Code characters and h54 are corresponded;Each h54 is equal to some digital group in this 999 digital groups, that is, each public On row, " difference between two adjacent hcy of left and right " is irregular.
In embodiments of the present invention, icy=number group, hcy=number group, still, however not excluded that icy, hcy are " one respectively A and above Chinese character, one and above Korea's word, one and the above Japanese word, one or more letter, one or more it is special One of symbol (country or group are general) " or more.
About " c=t 0 (1≤t≤T, t are natural numbers) or 1≤c≤C-T (C > T, c are natural numbers) " or " 1≤c≤ C (c is natural number) ".For example, having 5 symmetric cryptography tables (C=5), T=3;As t=1, c=t 0=1 0=0, that is, Ac =A0;As t=2, c=t 0=2 0=00, that is, Ac=A00;As t=3, c=t 0=3 0=000, that is, Ac =A000;When c=1 (c < 5-3), Ac=A1;When c=2 (1 < c, c=5-3), Ac=A2.
For example, when no any one c=t 0,1≤c≤C (c is natural number);Assuming that there is 3 symmetric cryptography table (C= 3), when c=1, Ac=A1;When c=2, Ac=A2;When c=3, Ac=A3.
Y, the value of ncy, wcy, icy, hcy, similarly with c;For example, " ncy=bcy 0 (1≤bcy≤Bcy, bcy are certainly So number) or 1≤ncy≤Icy-Bcy (Icy > Bcy, ncy are natural numbers) ", that is, as shown in figure 1, B54=3, n54=b54 a 0 (1≤b54≤3, b54 are natural numbers) or 1≤n54≤999-3 (I54=999, B54=3,999 > 3, n54 are natural numbers); Specifically, at (11) in Fig. 1, because, b54=3, so, n54=b54 0=3 0=000 at this, that is, at this Common row be 000.
About symmetric cryptography table, AI and AII.The symmetric cryptography table is a part of key (key is symmetric key); AI and AII is identical, and synchronous (for example, event synchronization).
About Xc.At (1) in Fig. 2 (A54), c=5, Xc=X5=787878784, the corresponding code characters of 5 (=c) 787878784。
About Xcy.At (2) in Fig. 2 (A54), c=5, y=4, Xcy=X54=262626267,4 (=y) are corresponded to Code characters 262626267.
About " ncy corresponds to code characters Xncy and/or wcy and corresponds to code characters Xwcy ".In the embodiment of the present invention, ncy Corresponding code characters Xncy and wcy correspond to code characters Xwcy;For example, as at (9) in Fig. 2 (A54), ncy=n54= 440, Xncy=Xn54=222233331, here, n54 corresponds to Xn54, that is, 440 corresponding code characters 222233331;Example Such as, as at (3) in Fig. 2 (A54), wcy=w54=900, Xwcy=Xw54=666633322, here, w54 are corresponding Xw54, that is, 900 corresponding code characters 666633322.
About Jfgf be c (fgf), | c is poor | (fgf), y (fgf) ..., | wcy-hcy | (fgf), | hcy-wcy | in (fgf) One or more.... in one or more, refer to:Between Jfgf in Lfgf and AI, it may be possible to correspond, also having can It can the corresponding multiple Jfgf of a plaintext character group (Lfgf).
Because, it is possible to a Lfgf corresponds to multiple Jfgf, and because Jfgf corresponds to Ufgf, so, Ufgf is Xc (fgf), Xcy (fgf) ..., one or more in Xncywcyicyhcy (fgf);That is, one plaintext character group (one Lfgf a code characters may) be encrypted to, it is also possible to be encrypted to multiple code characters.
About Gf=1.For example, f=2, gf=g2=Gf=G2=1, Lfgf=LfGf=L21=Lf=L2.
It is assumed that L21=5, L21 correspond to (mapping) J21, then J21=5;It is assumed that J21=c21, then c21=5;Such as Fig. 2 (A54) at (1) in, Jfgf corresponds to Ufgf, Ufgf=UfGf=U21=787878784, that is, J21 corresponds to U21, that is, c21 pairs Answer U21, that is, 5 corresponding 787878784;So L21 is encrypted to 787878784 by AI;And because of L21=L2, so, L2 (= 5) 787878784 (=UfGf=Ufgf=U21) are directly encrypted to by AI.
It is assumed that L21=4 ...;It is assumed that J21=y21, then y21=4;At (2) in Fig. 2 (A54), U21= 262626267 ..., L2 (=4) are directly encrypted to 262626267 (=UfGf=Ufgf=U21) by AI.
It is assumed that L21=900 ...;It is assumed that J21=w54 (21), then (21)=900 w54;Such as (3) in Fig. 2 (A54) Place, U21=666633322 ..., L2 (=900) are directly encrypted to 666633322 (=UfGf=Ufgf=U21) by AI.
It is assumed that L21=440 ...;It is assumed that J21=n54 (21), then (21)=440 n54;Such as (9) in Fig. 2 (A54) Place, U21=222233331 ..., L2 (=440) are directly encrypted to 222233331 (=UfGf=Ufgf=U21) by AI.
It is assumed that L21=103 ...;It is assumed that J21=i54 (21), then (21)=103 i54;Such as Fig. 2 (A54), it is assumed that The i54 (21) is searched in common column 900, is searched for, and is found at common column 900, common row 440, i54=103, then the i54 (=103) temporarily become i54 (21);The i54 (21) corresponds to U21, and the U21=123456789 ..., L2 (=103) are directly by AI It is encrypted to 123456789 (=UfGf=Ufgf=U21).
It is assumed that L21=888 ...;It is assumed that J21=h54 (21), then (21)=888 h54;Such as Fig. 2 (A54), it is assumed that The h54 (21) is searched in common row 440, is searched for, and is found at common row 440, common column 900, h54=888, then the h54 (=888) temporarily become h54 (21);The h54 (21) corresponds to U21, and the U21=123456789 ..., L2 (=888) are directly by AI It is encrypted to 123456789 (=UfGf=Ufgf=U21).
Foregoing 1st kind, c (fgf) forward direction is connected serially to area's element [f (gf+1)] and/or " row element and/or column are wanted Element " [f (gf+1)].Area's element [f (gf+1)] must be between the c (fgf), and there are logical communication links, for example, area's element is subordinate to Belong to the c;For example, on the basis of " row element and/or the column element " is under the jurisdiction of area's element, area's element is under the jurisdiction of the c, C (fgf) can directly forward direction be connected serially to " row element and/or column element " [f (gf+1)].
Foregoing 2nd kind, | c is poor | (fgf) forward direction be connected serially to area's element [f (gf+1)] in subtrahend c (fgf) and/ Or " row element and/or column element " [f (gf+1)].Area's element [f (gf+1)] must be with this | and c is poor | and between (fgf), exists and patrol Collect connection, that is, area's element is under the jurisdiction of subtrahend c;At this, " row element and/or column element " is under the jurisdiction of area's element, the area wants Element is under the jurisdiction of on the basis of subtrahend c, | c is poor | (fgf) can directly forward direction be connected serially to " row element and/or column element " [f (gf+ 1)]。
Foregoing 3rd kind, y (fgf) forward direction is connected serially to " row element and/or column element " [f (gf+1)].It should be " capable to want Element and/or column element " [f (gf+1)] must be between the y (fgf), and there are logical communication links, that is, " row element and/or column are wanted for this Element " is under the jurisdiction of the y.
Foregoing 4th kind, | y is poor | and (fgf) forward direction is connected serially to " row element and/or column element " in subtrahend y (fgf) [f(gf+1)." row element and/or the column element " [f (gf+1) must be with this | and y is poor | and between (fgf), there are logical communication links, that is, It is somebody's turn to do " row element and/or column element " and is under the jurisdiction of subtrahend y.
Foregoing 7th kind, in the non-same common column, row element (fgf) forward direction is connected serially to row element [f (gf+ 1)].As described in example 9, i54 (11) forward direction is connected serially to i513 (12).
Foregoing 6th kind, in the non-same common row, column element (fgf) forward direction is connected serially to column element [f (gf+ 1)].Similarly with foregoing 7th kind.
Foregoing 8th kind, row element (fgf) forward direction is connected serially to area's element [f (gf+1)].Area's element [f (gf+ 1)] must be between the row element (fgf), there are logical communication links;For example, the row element is under the jurisdiction of area's element.
Foregoing 9th kind, column element (fgf) forward direction is connected serially to area's element [f (gf+1)].Area's element [f (gf+ 1)] must be between the column element (fgf), there are logical communication links;For example, the column element is under the jurisdiction of area's element.
Foregoing 10th kind, area's element (fgf) forward direction is connected serially to area's element [f (gf+1)].Area's element [f (gf+ 1)] must be between area's element (fgf), there are logical communication links;Such as:Assume initially that L=L1=458, L11=4, L12= 58, then with the y (11)=4 of L11 mapping, the y (12)=58 mapped with L12;At (2) in such as Fig. 2 (A54), y (11)=4, Xcy (11)=X54 (11)=262626267, the segment 67 (two, the end in 262626267) in 262626267 determine: C "=segment=67 in Ac " y ";That is, y (11) forward direction is connected serially to the y (12) in A67 (c "=67), the y (12)=58, I.e. ..., 4 forward directions in A54 are connected serially to 58 in A67 ...;That is, passing through the segment 67 in X54 (11), A67, y (12) and y (11) there are logical communication links.
As previously described in (5), AII is to known plaintext L ' carry out encrypted authentication.Known plaintext L ', refers to:AII is Know L ', but AII does not know whether the L ' is identical as plaintext L, that is, AII does not know whether L, ciphertext M are usurped in the way of transmission Change, so, AII is known to be represented as L ' in plain text, and the ciphertext that AII is received is represented as M ';Plaintext L ' known to AII, may It is that AI is sent to AII, it is also possible to be that third party (such as bank, such as non-banking payment mechanism) is sent to AII's.
As previously described in (5) or AII conditionally inversely series connection, M is decrypted into L.For example, L=L1=4900, L11 =4, L12=900;L11 is corresponding (mapping) y (11), at (2) in Fig. 2 in A54, the y (11)=4;It is assumed that y (11) is just To being connected serially to column element [f (gf+1)], that is, 4 forward directions are connected serially to the common column 900 (W54=900) in A54, W54 (12)= The corresponding code characters 666633322 in 900, W54 (12) corresponding (mapping) L12, W54 (12);..., which is passed through by AI Forward direction series connection stays tail and is encrypted to ciphertext 666633322.
It is assumed that AII receives the ciphertext 666633322, but AII does not know L, then AII needs to decrypt the ciphertext 666633322;It is assumed that preset program includes:When decryption, code characters inverse correspondence Wcy.According to the preset program, AII is such as scheming Search in 2 (A54) finds that the code characters at (3) are 666633322;Because of the W54=900 at this, AII is learnt W54 (12)=900;Because W54 (12) corresponds to (mapping) L12, so, AII first decrypts L12=900;Because of the common column 900 are under the jurisdiction of A54, i.e., having ready conditions in described " conditionally reverse series connection ", so, the reverse concatenated direct target of AII is only It can be at (2) in A54;At this, y=4, so, AII learns y (11)=4;Because L11 is corresponding (mapping) y (11), institute To decrypt L11=4 after AII;That is, AII is conditionally inversely connected, is decrypted into 4900 (=L) by 666633322.
As previously described in (6), Qprp become participate in or " become+participate in " symmetric cryptography table in code characters.Example Such as, when some Qprp is related to the whole of some code characters, this is related to being " becoming ";For example, when some Qprp is related to some When segment in code characters, this is related to being " participation ";For example, there are two some code characters tools group (group 1, group 2), For some Qprp tool there are two group (group 3, group 4), group 3 becomes the group 1, and group 4 participates in the group 2, then Qprp " at For+participate in " code characters.
It changes about its relative position where original.For example, plaintext L1 is connected by forward direction by AI, tail is stayed to add It is close at U12 (=123456789), this 123456789 be located at as in Fig. 2 common row 440, at common column 900, the code characters 123456789 have been used;This 123456789 used after, by plug-in, be not abandoned, and be moved to public At row 440, common column 25 (original code characters press program again at this, are transferred to common row 440, at common column 900), that is, After the code characters 123456789 (=U12) are used, originally where relative position change, no longer with w54 (=900), i54 (=103), h54 (=888) are corresponding.
Preset digit speech recognition table in AI as previously described.For example, as described in example 15, in the digit speech recognition table, Chinese character with Number group corresponds, and additional character and number group correspond;When Lfgf is Chinese character or additional character, turned by the number Table is changed, which is converted into digital group, (reflects in order to correspond to each other between Lfgf and the Jfgf (Jfgf is digital group) in AI It penetrates).
For example, number group is corresponded with Chinese character in the digit speech recognition table, number group is corresponded with letter, number Group is corresponded with additional character;When icy, hcy be respectively " one and the above Chinese character, one or more letter, one or more One of additional character " or more, also, Lfgf be number group when, by the digit speech recognition table, which is converted into Chinese character or letter or additional character, in order to be corresponded to each other between Lfgf and the Jfgf (Jfgf is " icy and/or hcy ") in AI (mapping).
It is foregoing the first, ncy (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of ncy (fgf).With power Foregoing 7th kind, " wcy (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of wcy (fgf) " in example 2 it is same Reason.
Foregoing second, | ncy is poor | and (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+ of subtrahend ncy (fgf) 1)].With in foregoing 8th kind, example 7 " | wcy is poor | (fgf) forward direction, which is connected serially to, is related to the row element of subtrahend wcy (fgf) [f (gf+1)] " is similarly.
Foregoing 9th kind, hcy (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of hcy (fgf).With such as " icy (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of icy (fgf) " in preceding described the third, example 3 is similarly.
Foregoing ten kind, | hcy is poor | and (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+ of subtrahend hcy (fgf) 1)].With in foregoing 4th kind, example 4 " | icy is poor | (fgf) forward direction, which is connected serially to, is related to the column element of subtrahend icy (fgf) [f (gf+1)] " is similarly.
Foregoing tenth is a kind of, | wcy-hcy | (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+ of hcy (fgf) 1)].With in foregoing 5th kind, example 5 " | ncy-icy | (fgf) forward direction, which is connected serially to, is related to the column element [f of icy (fgf) (gf+1)] " similarly.
About foregoing 12nd kind, | hcy-wcy | (fgf) forward direction, which is connected serially to, is related to the row element [f of wcy (fgf) (gf+1)].With in foregoing 6th kind, example 6 " | icy-ncy | (fgf) forward direction, which is connected serially to, to be related to the column of ncy (fgf) and wants Plain [f (gf+1)] " is similarly.
As previously described, in Acy, in Ac, one of in A or more, mathematics meter is carried out between different U ' fGf It calculates.For example, plaintext L is divided into 2 sections (L1, L2);As described in example 10, L1 is encrypted to U1G1, L2 quilt by the element in A54 Element in A2044 is encrypted to U2G2 ..., that is, in A, carries out mathematical computations between different U ' fGf;If L1 is by A54 In element be encrypted to U1G1, L2 is encrypted to U2G2 by the element in A544 (c=5, y=44) ..., that is, in Ac, in difference U ' fGf between carry out mathematical computations;If L1 is encrypted to U1G1 by the element in A54, L2 is encrypted to by the element in A54 U2G2 ..., that is, in Acy, carry out mathematical computations between different U ' fGf.
About the wrist scrambler in embodiment.The wrist scrambler is not connected to internet, it is therefore an objective to prevent on internet Virus attack wrist scrambler built in symmetric cryptography table of the present invention;It is symmetric cryptography table of the present invention, symmetrical Enciphered method, the built-in communication terminal (for example, the mobile phone being connect with internet, computer etc.) in networking, but on condition that, the communication Terminal can resist the symmetric cryptography table of the present invention of the virus attack on internet.
Start position about Jf1.In order to guarantee that AI is synchronous with AII, can be determined by program built-in in A:Which position The element set is as element used by Jf1, and especially the element of which position is as element used by J11 (f=1).
It is brief about ciphertext.In the present invention, the method for keeping ciphertext brief has 3:
(1) Lf formula stays tail.As previously described in (3) it is 3. described " ..., the Lf by AI by positive series connection, stay tail to add It is close at UfGf (" staying tail " be primarily referred to as retain UfGf) ".
(2) as previously described, such as the paragraph 1 reciprocal of example 10.
(3) L formula stays tail, and such as the 2nd section of inverse of example 10.F≥2;As 1≤f≤F-1, as previously described " ..., in Ufgf Segment or whole determine or participate in determine:J (f+1) 1 is located at Ac " y " ", that is, as gf=Gf, UfGf is underground, but should Segment or whole in UfGf determine or participate in determine " J (f+1) 1 is located at Ac " y " ";..., final reservation and open UFGF, That is, in foregoing (3) it is 4. described " on the basis of Lf in 2. or 3., L is encrypted to ciphertext M " by AI, that is, 2. or 3. on the basis of Lf in, plaintext L is connected by forward direction by AI, tail is stayed to be encrypted to UFGF (=M).

Claims (4)

1. a kind of symmetric cipher, is characterized by following steps:
(1) there is a kind of symmetric cryptography table, at least identical double of the symmetric cryptosystem A of the symmetric cryptography table, i.e. AI And AII;There is C symmetric cryptography table in A, it is the symmetric cryptography table in A that each symmetric cryptography table, which has unique table numbering c, Ac,; There is Y area in Ac, it is the area in Ac that, which there are unique area's number y, Acy in each area,;
In Acy, a total of Icy common row, the code characters of Hcy common column;Public row number is ncy, public column number It is wcy, each code characters correspond to ncy, wcy;The total number of code characters is E, wherein each password in e code characters Character Z is also corresponding " random row number icy and/or random column number hcy ", and total line number of random row is Icy, total column of random column Number is Hcy, so Z is represented as Xncywcyicy or Xncywcyhcy or Xncywcyicyhcy, wherein Xncywcyicy is corresponding Ncy, wcy, icy, Xncywcyhcy correspond to ncy, wcy, hcy, and Xncywcyicyhcy corresponds to ncy, wcy, icy, hcy;To sum up, Each code characters are represented as V, and V is Xncywcy or Z, and wherein Xncywcy corresponds to ncy, wcy;
V is " one and the above Arabic numerals, one and the above Chinese character, one and above Korea's word, one and the above Japanese One of word, one or more letter, one and the above additional character ";
It is at least all not identical between the value element of V;
C, Y, T, T ', Icy, Hcy, Bcy, B ' cy, E, e, Dcy, D ' cy are greater than the natural number equal to 1 respectively, 1≤e≤E,
" c=t 0,1≤t≤T, t are natural numbers;Or 1≤c≤C-T, C > T, c are natural numbers " or " 1≤c≤C, c are natures Number ",
" y=t ' a 0,1≤t '≤T ', t ' are natural number or 1≤y≤Y-T ', and Y > T ', y are natural numbers " or " 1≤y≤Y, y It is natural number ",
" ncy=bcy 0,1≤bcy≤Bcy, bcy are natural number or 1≤ncy≤Icy-Bcy, and Icy > Bcy, ncy are natures Number " or " 1≤ncy≤Icy, ncy are natural numbers ",
" wcy=b ' cy 0,1≤b ' cy≤B ' cy, b ' cy is natural number or 1≤wcy≤Hcy-B ' cy, Hcy > B ' cy, wcy It is natural number " or " 1≤wcy≤Hcy, wcy are natural numbers ",
" icy=dcy 0,1≤dcy≤Dcy, dcy are natural number or 1≤icy≤Icy-Dcy, and Icy > Dcy, icy are natures Number " or " 1≤icy≤Icy, icy are natural numbers ",
" hcy=d ' cy 0,1≤d ' cy≤D ' cy, d ' cy is natural number or 1≤hcy≤Hcy-D ' cy, Hcy > D ' cy, hcy It is natural number, " or " 1≤hcy≤Hcy, hcy are natural numbers ";
(2) according to program preset in AI, plaintext L is divided into F sections:L1, L2 ..., LF, Lf is the plaintext character field in L, 1 ≤ f≤F, further, Lf are divided into Gf group:Lf1, Lf2 ..., LfGf, Lfgf is the plaintext character group in Lf, 1≤gf ≤ Gf, F, f, Gf, gf are natural number respectively;
(3) according to program preset in AI:
①:Between Jfgf in Lfgf and AI, correspond to each other;Jfgf be c (fgf), | c is poor | (fgf), y (fgf), | y is poor | (fgf), ncy (fgf), | ncy is poor | (fgf), icy (fgf), | icy is poor | (fgf), | ncy-icy | (fgf), | icy-ncy | (fgf), wcy (fgf), | wcy is poor | (fgf), hcy (fgf), | hcy is poor | (fgf), | wcy-hcy | (fgf), | hcy-wcy | (fgf) one in;
Jfgf corresponds to Ufgf;Ufgf be Xc (fgf), Xcy (fgf), Xncy (fgf), Xwcy (fgf), Xncywcy (fgf), Xncywcyicy (fgf), Xncywcyhcy (fgf), one in Xncywcyicyhcy (fgf);
C, | c is poor |, it is table element;Y, | y is poor |, it is area's element;Ncy, | ncy is poor |, icy, | icy is poor |, | ncy-icy |, | icy- Ncy |, it is row element;Wcy, | wcy is poor |, hcy, | hcy is poor |, | wcy-hcy |, | hcy-wcy |, be column element;| c is poor |, | y is poor |, | ncy is poor |, | icy is poor |, | ncy-icy |, | icy-ncy |, | wcy is poor |, | hcy is poor |, | wcy-hcy |, | hcy-wcy |, be Poor element;| c is poor |, | y is poor |, | ncy is poor |, | icy is poor |, | wcy is poor |, | hcy is poor | respectively indicate in cipher table phase in row or column Difference between neighbour is original;
②:As Gf=1, because, gf=Gf=1, Lfgf=LfGf=Lf1=Lf, Ufgf=UfGf=Uf1, and because, Lfgf corresponds to Jfgf, Jfgf and corresponds to Ufgf, so, Lf is directly encrypted to UfGf by AI;
③:As Gf >=2, Lfgf corresponds to Jfgf, and Jfgf corresponds to Ufgf, and Jfgf forward direction is connected serially to Jf (gf+1), and 1≤gf≤ Gf-1;Forward direction series connection has one of following 10 kinds of forms:
1st kind, c (fgf) forward direction is connected serially to area's element [f (gf+1)] or " row element and column element " [f (gf+1)];
2nd kind, | c is poor | and (fgf) forward direction is connected serially to area's element [f (gf+1)] or " row element and column element " in subtrahend c (fgf) [f(gf+1)];
3rd kind, y (fgf) forward direction is connected serially to " row element and column element " [f (gf+1)];
4th kind, | y is poor | and (fgf) forward direction is connected serially to " row element and column element " [f (gf+1)] in subtrahend y (fgf);
5th kind, ranks forward direction series connection, that is, " row element (fgf) forward direction is connected serially to column element [f (gf+1)] " or " column element (fgf) forward direction is connected serially to row element [f (gf+1)] ";
6th kind, in the non-same common row, column element (fgf) forward direction is connected serially to column element [f (gf+1)];
7th kind, in the non-same common column, row element (fgf) forward direction is connected serially to row element [f (gf+1)];
8th kind, row element (fgf) forward direction is connected serially to area's element [f (gf+1)];
9th kind, column element (fgf) forward direction is connected serially to area's element [f (gf+1)];
10th kind, area's element (fgf) forward direction is connected serially to area's element [f (gf+1)];
Jf (gf+1) is corresponding Lf (gf+1), and Jf (gf+1) is corresponding Uf (gf+1) ..., and so on, Jf (Gf-1) forward direction is connected serially to JfGf, JfGf correspond to LfGf, and JfGf corresponds to UfGf, then LfGf is encrypted to UfGf;Because the LfGf is under the jurisdiction of Lf, so, it should Lf is connected by forward direction by AI, tail is stayed to be encrypted to UfGf;
④:On the basis of Lf in 2. or 3., L is encrypted to ciphertext M by AI;
(4) M is sent to AII;
(5) AII is to known plaintext L ' carry out encrypted authentication, and whether after L ' is encrypted to ciphertext M ' by AII, it is identical to compare M ' and M, If they are the same, then AII demonstrates L ', shows that L ' is identical as L or AII is conditionally inversely connected, M is decrypted into L;
(6) it after " Ufgf and/or UfGf " is used, is abandoned by A, on condition that:There are the subordinate list Qp, p of P symmetric cryptography table to be in A Subordinate list number, Qp Qp1, Qp2 ..., QpRp, Qprp is the code characters in Qp, and Qprp becomes or participates in or " becoming+participation " Code characters in symmetric cryptography table;P, p, Rp, rp are greater than the natural number equal to 1,1≤p≤P, 1≤rp≤Rp or its original Relative position where coming changes;Wherein, Ufgf and UfGf is respectively code characters.
2. symmetric cipher according to claim 1, it is characterised in that:" preset program in AI " in the step (3), Including:By digit speech recognition table preset in AI, Lfgf is converted into " one and the above Arabic numerals, one and the above Chinese One in word, one and above Korea's word, one and the above Japanese word, one or more letter, one and the above additional character " Kind.
3. symmetric cipher according to claim 1, it is characterised in that:" preset journey in A I in the step (3) Sequence ", including:It is corresponded to each other between Lfgf and the Jfgf in AI, after the corresponding Ufgf of Jfgf, segment or whole in Ufgf, decision Or it participates in determining:Subtrahend element (fgf) or Jf (gf+1), Gf >=2,1≤gf≤Gf-1 or J (f+1) 1 in poor element (fgf), Positioned at Ac " y ";" c "=t " a 0,1≤t "≤T, t " being natural number or 1≤c "≤C-T, C > T, c " they are natural numbers " or " 1≤ C "≤C, c " are natural numbers ", " y "=t " ' a 0,1≤t " '≤T ', t " ' be natural number or 1≤y "≤Y-T ', Y > T ', y " are Natural number " or " 1≤y "≤Y, y " are natural numbers ".
4. symmetric cipher according to claim 1, it is characterised in that:In the step (3) 3. in the 5th kind described in The series connection of ranks forward direction is that ranks intersect positive series connection.
CN201510332692.4A 2015-06-12 2015-06-12 A kind of symmetric cryptography table and symmetric cipher Expired - Fee Related CN104901811B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510332692.4A CN104901811B (en) 2015-06-12 2015-06-12 A kind of symmetric cryptography table and symmetric cipher

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510332692.4A CN104901811B (en) 2015-06-12 2015-06-12 A kind of symmetric cryptography table and symmetric cipher

Publications (2)

Publication Number Publication Date
CN104901811A CN104901811A (en) 2015-09-09
CN104901811B true CN104901811B (en) 2018-11-16

Family

ID=54034215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510332692.4A Expired - Fee Related CN104901811B (en) 2015-06-12 2015-06-12 A kind of symmetric cryptography table and symmetric cipher

Country Status (1)

Country Link
CN (1) CN104901811B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911716B (en) * 2017-04-14 2020-05-01 中国民航大学 RSA-Hill mixed encryption method based on plaintext random segmentation
CN110704854B (en) * 2019-09-27 2021-11-09 上海易点时空网络有限公司 Stream type encryption method aiming at text data reserved format

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1486556A (en) * 2000-11-21 2004-03-31 凯克里普特有限公司 A communication system with ciphering key generation
CN101355422A (en) * 2008-07-16 2009-01-28 冯振周 Novel authentication mechanism for encrypting vector
CN101753292A (en) * 2008-12-15 2010-06-23 汤姆森许可贸易公司 Methods and devices for a chained encryption mode

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10129285C2 (en) * 2001-06-18 2003-01-09 Hans-Joachim Mueschenborn Encryption procedure with arbitrary selectable one-time keys

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1486556A (en) * 2000-11-21 2004-03-31 凯克里普特有限公司 A communication system with ciphering key generation
CN101355422A (en) * 2008-07-16 2009-01-28 冯振周 Novel authentication mechanism for encrypting vector
CN101753292A (en) * 2008-12-15 2010-06-23 汤姆森许可贸易公司 Methods and devices for a chained encryption mode

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
三类典型混合对称密码算法的安全性分析;张凯;《中国优秀硕士学位论文全文数据库 信息科技辑》;20140215(第02期);全文 *
基于分布式计算的对称密码算法的暴力破解;张丽丽;《中国优秀硕士学位论文全文数据库 信息科技辑》;20090215(第02期);全文 *

Also Published As

Publication number Publication date
CN104901811A (en) 2015-09-09

Similar Documents

Publication Publication Date Title
US7844550B2 (en) Method and device for generating a single-use financial account number
US7853529B1 (en) Method and device for generating a single-use financial account number
CA1315367C (en) Management of cryptographic keys
US20070074273A1 (en) Method and device for increasing security during data transfer
CN105453483A (en) Image based key derivation function
CN104992119B (en) A kind of safe transmission method and system of sensitive information Anti-theft
NZ247734A (en) Securing data transmissions with verifiable digital signatures
CN106327723B (en) A kind of mPOS transaction systems based on intelligent platform
CN1638331A (en) Pin verification using cipher block chaining
US20150006404A1 (en) Cryptographic Authentication And Identification Method Using Real-Time Encryption
CN107333262A (en) A kind of system and method based on CN39 code authentication phone numbers
CN107180342A (en) A kind of guard method of block chain private key, apparatus and system
CN106682903A (en) Feedback verification method of bank payment permission authentication information
CN111047305A (en) Private key storage and mnemonic method for encrypted digital currency wallet based on digital watermarking technology
CN109981290A (en) The communication system and method close based on no certificate label under a kind of intelligent medical environment
CN105205944A (en) Self-service deposit and withdrawal system based on intelligent terminal
WO2006117806A2 (en) Bilaterally generated encryption key system
CN104901811B (en) A kind of symmetric cryptography table and symmetric cipher
CN107733936A (en) A kind of encryption method of mobile data
CN107689867B (en) Key protection method and system under open environment
CN110543781A (en) Method for realizing financial security transaction based on block chain
KR0137535B1 (en) Identifying method using smart card
CN107317679B (en) Method and system for preventing fraud after identity cards are lost
GB2267631A (en) Data communication system
CN104123487B (en) Cipher-code input method, mobile device, crypto terminal and password input system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20180530

Address after: 226661 No. 123 South Street, Qu Tang Town, Haian, Nantong, Jiangsu

Applicant after: Jing Zhuqiang

Address before: 211500 605, room 10, Longhai garden, 100 East Garden Road, Xiong Zhou Town, Liuhe District, Nanjing, Jiangsu.

Applicant before: Chu Wanqing

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20181009

Address after: 100022 No. 01, B-1001 indoor 01, building SOHO23 building, 39 East Third Ring Road, Chaoyang District, Beijing.

Applicant after: Shin Hui Cheng credit management (Beijing) Co., Ltd.

Address before: 226661 No. 123 South Street, Qu Tang Town, Haian, Nantong, Jiangsu

Applicant before: Jing Zhuqiang

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181116

Termination date: 20200612

CF01 Termination of patent right due to non-payment of annual fee