Summary of the invention
Goal of the invention:For deficiency present in above-mentioned existing background technique or background technique, an object of the present invention
It is to provide the symmetric cryptography table that one kind includes " random row and/or random column ";It is all or part of close in the symmetric cryptography table
Code character is in addition to corresponding common row, common column, also corresponding " random row and/or random column ";" random row and/or random column " makes pair
Cipher table is claimed to be not easy to be cracked.
The second object of the present invention is to, on the basis of the symmetric cryptography table, provide a kind of ciphertext it is brief, it is general
, safer symmetric cipher, the symmetric cipher can not need it is described to bit encryption, identifying code can not needed.Its
In, forward direction series connection, that is, the position where a upper element is related to the position where next element (that is, where next element
Position, it is related to the position where a upper element);Wherein, on the basis of positive concatenated, plaintext character field Lf is stayed tail
Formula is encrypted to code characters UfGf.
Technical solution:For achieving the above object, the first technical solution that the present invention uses for:
A kind of symmetric cryptography table, it is characterized in that:At least identical double (AI and AII) of symmetric cryptosystem A;In A
There is C symmetric cryptography table, it is the symmetric cryptography table in A that each symmetric cryptography table, which has unique table numbering c, Ac,;There are Y in Ac
Area, it is the area in Ac that, which there are unique area's number y, Acy in each area,;
In Acy, a total of Icy common row, the code characters of Hcy common column;Public row number is ncy, common column
Number is wcy, and each code characters correspond to ncy, wcy;The total number of code characters is E, wherein each of e code characters
(total line number of random row is also Icy, random column to code characters Z also corresponding " random row number icy and/or random column number hcy "
Total columns be also Hcy), so, Z be represented as Xncywcyicy (Xncywcyicy corresponds to ncy, wcy, icy) or
Xncywcyhcy (Xncywcyhcy corresponds to ncy, wcy, hcy) or Xncywcyicyhcy (Xncywcyicyhcy correspond to ncy,
wcy,icy,hcy);To sum up, each code characters are represented as V, and V is Xncywcy (Xncywcy corresponds to ncy, wcy) or Z;
V is " one and the above Arabic numerals, one and the above Chinese character, one and above Korea's word, one and the above day
One of language word, one or more letter, one and the above additional character (country or group are general) " or more;
It is at least all not identical between V;
C, Y, T, T ', Icy, Hcy, Bcy, B ' cy, E, e, Dcy, D ' cy are greater than the natural number equal to 1 respectively, and 1≤e≤
E,
" c=t 0 (1≤t≤T, t are natural numbers) or 1≤c≤C-T (C > T, c are natural numbers) " or " 1≤c≤C (c
It is natural number) ",
" y=t ' a 0 (1≤t '≤T ', t ' are natural numbers) or 1≤y≤Y-T ' (Y > T ', y are natural numbers) " or " 1≤y
≤ Y (y is natural number) ",
" ncy=bcy 0 (1≤bcy≤Bcy, bcy are natural numbers) or 1≤ncy≤Icy-Bcy (Icy > Bcy, ncy
It is natural number) " or " 1≤ncy≤Icy (ncy is natural number) ",
" cy 0 (1≤b ' cy≤B ' cy, b ' cy is natural number) of wcy=b ' or 1≤wcy≤Hcy-B ' cy (Hcy > B '
Cy, wcy are natural numbers) " or " 1≤wcy≤Hcy (wcy is natural number) ",
" icy=dcy 0 (1≤dcy≤Dcy, dcy are natural numbers) or 1≤icy≤Icy-Dcy (Icy > Dcy, icy
It is natural number) " or " 1≤icy≤Icy (icy is natural number) ",
" cy 0 (1≤d ' cy≤D ' cy, d ' cy is natural number) of hcy=d ' or 1≤hcy≤Hcy-D ' cy (Hcy > D '
Cy, hcy are natural numbers) " or " 1≤hcy≤Hcy (hcy is natural number) ".
C corresponds to code characters Xc.
Y corresponds to code characters Xcy.
Ncy corresponds to code characters Xncy and/or wcy and corresponds to code characters Xwcy.
For achieving the above object, second of technical solution that the present invention uses for:
A kind of symmetric cipher, is characterized by following steps:
(1) there is foregoing symmetric cryptography table (being contained in symmetric cryptosystem A);
(2) according to program preset in AI, plaintext L is divided into F sections (L1, L2 ..., LF), and Lf is the plaintext word in L
It accords with section (1≤f≤F), further, Lf is divided into Gf group (Lf1, Lf2 ..., LfGf), and Lfgf is the plaintext character in Lf
Group (1≤gf≤Gf), F, f, Gf, gf are natural number respectively;
(3) according to program preset in AI:
①:Between Jfgf in Lfgf and AI, correspond to each other;Jfgf be c (fgf), | c is poor | (fgf), y (fgf), | y is poor |
(fgf), ncy (fgf), | ncy is poor | (fgf), icy (fgf), | icy is poor | (fgf), | ncy-icy | (fgf), | icy-ncy |
(fgf), wcy (fgf), | wcy is poor | (fgf), hcy (fgf), | hcy is poor | (fgf), | wcy-hcy | (fgf), | hcy-wcy |
(fgf) one or more in;
Jfgf corresponds to Ufgf;Ufgf be Xc (fgf), Xcy (fgf), Xncy (fgf), Xwcy (fgf), Xncywcy (fgf),
Xncywcyicy (fgf), Xncywcyhcy (fgf), one or more in Xncywcyicyhcy (fgf);
C, | c is poor | in one or more, be table element;Y, | y is poor | in one or more, be area's element;ncy,|
Ncy is poor |, icy, | icy is poor |, | ncy-icy |, | icy-ncy | in one or more, be row element;Wcy, | wcy is poor |,
Hcy, | hcy is poor |, | wcy-hcy |, | hcy-wcy | in one or more, be column element;| c is poor |, | y is poor |, | ncy is poor |, |
Icy is poor |, | ncy-icy |, | icy-ncy |, | wcy is poor |, | hcy is poor |, | wcy-hcy |, | hcy-wcy | in one or more,
It is poor element;
②:As Gf=1, because, gf=Gf=1, Lfgf=LfGf=Lf1=Lf, Ufgf=UfGf=Uf1, and because
For, Lfgf corresponds to Jfgf, Jfgf and corresponds to Ufgf, so, Lf is directly encrypted to UfGf by AI;
③:As Gf >=2, Lfgf corresponds to Jfgf, and Jfgf corresponds to Ufgf, and Jfgf forward direction is connected serially to Jf (gf+1), 1≤
gf≤Gf-1;Forward direction series connection has one of following 10 kinds of forms or more:
1st kind, c (fgf) forward direction is connected serially to area's element [f (gf+1)] and/or " row element and/or column element " [f (gf+
1)];
2nd kind, | c is poor | and (fgf) forward direction is connected serially to area's element [f (gf+1)] and/or " row element in subtrahend c (fgf)
And/or column element " [f (gf+1)];
3rd kind, y (fgf) forward direction is connected serially to " row element and/or column element " [f (gf+1)];
4th kind, | y is poor | and (fgf) forward direction is connected serially to " row element and/or column element " [f (gf+1)] in subtrahend y (fgf);
5th kind, ranks forward direction series connection, that is, " row element (fgf) forward direction is connected serially to column element [f (gf+1)] " and/or " column
Element (fgf) forward direction is connected serially to row element [f (gf+1)] ";
6th kind, in the non-same common row, column element (fgf) forward direction is connected serially to column element [f (gf+1)];
7th kind, in the non-same common column, row element (fgf) forward direction is connected serially to row element [f (gf+1)];
8th kind, row element (fgf) forward direction is connected serially to area's element [f (gf+1)];
9th kind, column element (fgf) forward direction is connected serially to area's element [f (gf+1)];
10th kind, area's element (fgf) forward direction is connected serially to area's element [f (gf+1)];
Jf (gf+1) is corresponding Lf (gf+1), and Jf (gf+1) is corresponding Uf (gf+1) ..., and so on, the positive string of Jf (Gf-1)
It is coupled to JfGf, JfGf corresponds to LfGf, and JfGf corresponds to UfGf, then LfGf is encrypted to UfGf;Because the LfGf is under the jurisdiction of Lf, institute
With the Lf is connected by forward direction by AI, tail is stayed to be encrypted to UfGf (" staying tail " is primarily referred to as retaining UfGf);
④:On the basis of Lf in 2. or 3., L is encrypted to ciphertext M by AI;
(4) M is sent to AII;
(5) to known plaintext L ' carry out encrypted authentication, [L ' is encrypted to ciphertext M ' rear (principle of encryption, phase to AII by AII
It is same as the principle of AI encryption L), compare M ' and M whether identical (if they are the same, then AII demonstrates L ', shows that L ' is identical as L)], or
AII is conditionally inversely connected, M is decrypted into L;
After (6) " Ufgf and/or UfGf " is used, abandoned by A (AI, AII) [on condition that:There is P symmetric cryptography table in A
Subordinate list Qp, p be subordinate list number, Qp Qp1, Qp2 ..., QpRp, Qprp is the code characters in Qp, and Qprp becomes or participates in
Or the code characters in " become+participate in " symmetric cryptography table;P, p, Rp, rp are greater than the natural number equal to 1,1≤p≤P, 1≤
Rp≤Rp] or its it is original where relative position change.
" preset program in AI " in the step (3), including:Pass through digit speech recognition table preset in AI, Lfgf quilt
Be converted to " one and the above Arabic numerals, one and the above Chinese character, one and above Korea's word, one and the above Japanese word,
One of one or more letter, one and above additional character (country or group are general) " or more.
" preset program in AI " in the step (3), including:Corresponded to each other between Lfgf and the Jfgf in AI,
After Jfgf corresponds to Ufgf, segment or whole in Ufgf determine or participate in determine:Subtrahend element (fgf) in poor element (fgf)
Or Jf (gf+1) (Gf >=2,1≤gf≤Gf-1) or J (f+1) 1, it is located at Ac " y ";" (1≤t "≤T, t " are natures to c "=t " a 0
Number) or 1≤c "≤C-T (C > T, c " it is natural number) " or " 1≤c "≤C (c " is natural number) ", " a 0 (1≤t " ' of y "=t " '
≤ T ', t " ' be natural number) or 1≤y "≤Y-T ' (Y > T ', y " it is natural number) " or " 1≤y "≤Y (y " is natural number) ".
In the step (3) 3. in the 5th kind described in the series connection of ranks forward direction, there is one of following 12 kinds of situations
Or more:
The first, ncy (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of ncy (fgf);
Second, | ncy is poor | and (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of subtrahend ncy (fgf);
The third, icy (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of icy (fgf);
4th kind, | icy is poor | and (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of subtrahend icy (fgf);
5th kind, | ncy-icy | (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of icy (fgf);
6th kind, | icy-ncy | (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of ncy (fgf);
7th kind, wcy (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of wcy (fgf);
8th kind, | wcy is poor | and (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of subtrahend wcy (fgf);
9th kind, hcy (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of hcy (fgf);
Tenth kind, | hcy is poor | and (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of subtrahend hcy (fgf);
Tenth is a kind of, | wcy-hcy | (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of hcy (fgf);
12nd kind, | hcy-wcy | (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of wcy (fgf).
In the step (3) 3. in the 5th kind described in the series connection of ranks forward direction, be that ranks intersect positive series connection.
Preset program in AI in the step (3), including:In Acy, in Ac, one of in A or more,
After carrying out mathematical computations between different U ' fGf, split one of combination, displacement, pairing, replacement or more, obtained knot
Fruit be in the step (3) 4. in " a part in M or M ";U ' fGf is that UfGf or U ' fGf is related to UfGf.
Beneficial effect:
Random row and/or random column have opposite secret;It is " random when there is plaintext character group to be related in plaintext character field
When capable and/or random column " element, symmetric cryptography table is made to be difficult to be cracked.
Plaintext character group in plaintext character field can also relate to common column element, common row element, area's element, table element
One of or more, effect is:Make that the selection of element is more diversified, complicates, meanwhile, also raising symmetric cryptography table makes
Use efficiency.
Forward direction series connection is equivalent to from the gf element Jfgf (corresponding Lfgf) to relevant (gf+1) a element Jf (gf+
1) [corresponding Lf (gf+1)], it is unidirectional to draw lines ..., and so on, it draws lines always to relevant element JfGf (corresponding LfGf), purpose
It is to obtain code characters UfGf;Forward direction series connection, can make plaintext L be difficult to be rearranged, delete, replace, because, where a upper element
Position be related to the position where next element, so, if Lfgf in Lf is reset or deleted or replace by attacker,
Obtained code characters U " fGf is not equal to original UfGf, and occurs abnormal.
Ranks forward direction between row element and column element is connected, and is made symmetric cryptography table be difficult to be cracked, is improved encryption
Safety;If in the same common row, the positive series connection of action column column, for example, " difference of random column " forward direction is connected serially to " at random
Column ", the plaintext character group that may cause in plaintext by leaving no trace is deleted;If operating every trade in the same common column
Forward direction series connection, for example, " difference of random row " forward direction is connected serially to " difference of random row ", may cause the plaintext character group quilt in plaintext
It replaces with leaving no trace.
The main effect for staying tail formula to encrypt:(1) shorten ciphertext as far as possible, hacker is made to be difficult to carry out ciphertext only attack, be difficult to crack
Symmetric cryptography table;For example, the code characters Ufgf used underground (1≤gf≤Gf-1), open code character UfGf or
UFGF;(2) because the Ufgf is underground, so, after which is used, it can not be abandoned or not be transformed relative position,
It has saved code characters or has reduced program operation.
" forward direction series connection " is for encrypting;What it is relative to " forward direction series connection " is " reverse series connection ", and " reverse series connection " is for decrypting;
But be somebody's turn to do " inversely series connection " and have to comply with specific condition, not every " forward direction series connection " " can inversely connect ";It should
Specifically condition is:Next element can only inversely be connected serially to an element, and next element cannot inversely be connected serially to other
Element.
To sum up, symmetric cryptography table is difficult to be cracked;Meanwhile as previously mentioned, symmetric cryptography table is dynamically (to resist playback to attack
Hit), so, half ciphertext or ciphertext for issuing originator, it is difficult to be replaced, reset, delete, Replay Attack.
Compared with comparing patent (201410211178.0):
In symmetric cryptography table of the present invention, a kind of selection is devised:C can be equal to t 0, y can be equal to a 0, ncy of t ' can
B ' cy 0, icy can be equal to can be equal to dcy 0, hcy to be equal to bcy 0, wcy can be equal to d ' cy 0;The design's
Benefit is:When plaintext character group Lfgf is one or more 0, " c or y or ncy or icy or wcy or hcy " can be used as element,
Directly correspond to the Lfgf.
It compares in patent, plaintext character group only corresponds to bebinning character;In symmetric cipher of the present invention, plaintext character group is corresponding
Jfgf, and the content that element J includes is more (for example, ncy, wcy, icy, hcy, y, c, poor element), so, with plaintext
The range of choice of the corresponding character of character group expands, and is not limited solely to the bebinning character, enhances answering for encryption
Polygamy, safety also improve the service efficiency of symmetric cryptography table.
It is compared with existing information safe practice:(1) present invention can not need identifying code;(2) ciphertext is brief;(3) general;
(4) safer;(5) it is combined with third party's communication, can contain harassing and wrecking short message, especially containment fraud text message.
Specific embodiment
In the following with reference to the drawings and specific embodiments, the present invention is furture elucidated, it should be understood that these embodiments are merely to illustrate
The present invention rather than limit the scope of the invention, after the present invention has been read, this field related personnel, producer, mechanism pair
The modification or modification, utilization of various equivalent forms of the invention, fall within range defined herein.
Example 1, if Fig. 1, A5 are the 5th symmetric cryptography tables (c=5) in A;A54 is that the 4th in symmetric cryptography Table A 5 is close
Code area (c=5, y=4).
In Acy, a total of Icy common row, the code characters of Hcy common column;Public row number is ncy, common column
Number is wcy, and each code characters correspond to ncy, wcy.In this example, in A54, a total of 999 common rows (I54=999),
The code characters of 999 common columns (H54=999);It indulges to go, it is horizontal for column;Each common row has a public row number n54,
For example, n54=..., 440,317,000,280,281,282 ...;It is each it is public show a public column number w54, for example,
W54=..., 900,901,00 ..., 201,0,25 ...;For example, in A54, the corresponding common row 440 of code characters 123456789,
Common column 900, code characters 246801357 corresponding common row 317, common column 901 ....
The total number of code characters is E, wherein also corresponding " the random row number of each code characters Z in e code characters
Icy and/or random column number hcy " (total line number of random row is also Icy, and total columns of random column is also Hcy), so, Z quilt
Be expressed as Xncywcyicy (Xncywcyicy corresponds to ncy, wcy, icy) or Xncywcyhcy (Xncywcyhcy correspond to ncy,
Wcy, hcy) or Xncywcyicyhcy (Xncywcyicyhcy corresponds to ncy, wcy, icy, hcy).In this example, e=E;It is each close
Code character Z is also corresponding " random row number icy and random column number hcy ";Total line number of random row is also 999 (I54=999),
Total columns of random column is also 999 (H54=999);Z is represented as Xncywcyicyhcy.
For example, the corresponding common row 317 of code characters 246801357 is (that is, at this at common row 317, common column 901
N54=317), common column 901 (that is, w54=901 at this), also correspond to random row 515 (that is, i54=515 at this), with
Machine column 989 arrange (that is, h54=989 at this), so, the code characters at this correspond to common row 317, common column 901, at random
Row 515, random column 989, the code characters 246801357 at this are represented as X317901515989 (in Xncywcyicyhcy
Ncy=n54=317, wcy=w54=901, icy=i54=515, hcy=h54=989).
To sum up, each code characters are represented as V, and V is Xncywcy (Xncywcy corresponds to ncy, wcy) or Z.In this example, V
It is Z;Because Z is Xncywcyicyhcy, so, V is Xncywcyicyhcy;Further, V is Xn54w54i54h54.
In this example, in each common row, wcy, hcy are unique;In each common column, ncy, icy are unique.
In this example, in each common row, | the difference between two adjacent hcy of left and right | it is irregular.For example, in public affairs
On concurrence 317, left and right adjacent " h54 (h54=707) at common row 317, common column 900 " and " common row 317, common column
Absolute value of the difference (| hcy is poor |) between h54 (h54=989) at 901 " be 282 (=| 707-989 |), " left and right is adjacent
" h54 (h54=989) at common row 317, common column 901 " and " h54 (h54=65) at common row 317, common column 00 "
Between absolute value of the difference (| hcy is poor |) be 924 (=| 989-65 |).
In this example, in each common column, | the difference between two neighbouring icy | it is irregular.For example, in public affairs
Altogether on column 901, neighbouring " i54 (i54=878) at common column 901, common row 280 " and " common column 901, common row
Absolute value of the difference (| the difference of icy |) between i54 (i54=20) at 281 " be 858 (=| 878-20 |), it is neighbouring
" i54 (i54=20) at common column 901, common row 281 " and " i54 (i54=00) at common column 901, common row 282 "
Between absolute value of the difference (| the difference of icy |) be 20 (=| 20-00 |).Note:In the present invention, when 2 or more continuous 0 independences
When as one or more in c, y, ncy, wcy, icy, hcy, numerically, 00=0,000=0,0000=0 ....
In this example, V (=Xn54w54i54h54) is one and the above Arabic numerals;Because of the limit by 1 size of attached drawing
System, or for convenience of description, so, Xn54w54i54h54 all uses 9 Arabic numerals, without selecting less position
Or more position Arabic numerals.
It is all not identical between code characters Xn54w54i54h54 in this example.
In this example, c, y, ncy, wcy, icy, hcy are one and the above Arabic numerals respectively.
In this example, " c=t 0 (1≤t≤T, t are natural numbers) or 1≤c≤C-T (C > T, c are natural numbers) ";In A
In, it is assumed that C=999, T=3, then " c=t 0 (1≤t≤3, t are natural numbers) or 1≤c≤999-3 (c is natural number);Figure
In 1, c=5 (1≤c≤C-T, that is, 1 <, 5 < 999-3), that is, merely illustrate No. 5 cipher table A5 in Fig. 1, be not shown in A complete
The arranging situation (the case where wherein, there are the c=t 0) of 999 cipher tables in portion.
In this example, " (Y > T ', y are natures by y=t ' a 0 (1≤t '≤T ', t ' are natural numbers) or 1≤y≤Y-T '
Number) ";It is assumed that T '=3, Y=998, then " (y is nature by y=t ' a 0 (1≤t '≤3, t ' are natural numbers) or 1≤y≤998-3
Number);In Fig. 1, y=4 (1≤y≤Y-T ', that is, 1 <, 4 < 998-3), that is, the 4th password area in A5 is merely illustrated in Fig. 1
The arranging situation (wherein, a there are the y=t ' 0 the case where) of all 998 password areas is not shown in A5 in A54.
In this example, " ncy=bcy 0 (1≤bcy≤Bcy, bcy are natural numbers) or 1≤ncy≤Icy-Bcy (Icy >
Bcy, ncy are natural numbers) ";In A54, I54=999, it is assumed that B54=3, then " n54=b54 0 (1≤b54≤3, b54 are
Natural number) or 1≤n54≤999-3 (n54 is natural number).
In this example, " cy 0 (1≤b ' cy≤B ' cy, b ' cy is natural number) of wcy=b ' or 1≤wcy≤Hcy-B ' cy
(Hcy > B ' cy, wcy are natural numbers) ";In A54, H54=999, it is assumed that B ' 54=3, then " 54 0 (1≤b ' of w54=b '
54≤3, b ' 54 is natural number) or 1≤w54≤999-3 (w54 is natural number).
In this example, " icy=dcy 0 (1≤dcy≤Dcy, dcy are natural numbers) or 1≤icy≤Icy-Dcy (Icy >
Dcy, icy are natural numbers) ";In A54, it is assumed that D54=3, then " i54=d54 0 (1≤d54≤3, d54 are natural numbers),
Or 1≤i54≤999-3 (i54 is natural number).
In this example, " cy 0 (1≤d ' cy≤D ' cy, d ' cy is natural number) of hcy=d ' or 1≤hcy≤Hcy-D ' cy
(Hcy > D ' cy, hcy are natural numbers) ";In A54, it is assumed that D ' 54=3, then " 54 0 (1≤d ' 54≤3, d ' 54 of h54=d '
It is natural number) or 1≤h54≤999-3 (h54 is natural number).
Example 2, it is assumed that the plaintext L to be encrypted is 00555.
(1) such as Fig. 2, have foregoing symmetric cryptography table (being contained in symmetric cryptosystem A, AI is identical with AII);
A5 is No. 5 symmetric cryptography table in A, and A54 is No. 4 password area in A5.
(2) according to program preset in AI, plaintext L (00555) is divided into 1 section (L1), f=F=1;L1 is bright in L
Chinese character section, further, L1 are divided into 2 groups (L11, L12), and L1g1 is the plaintext character group (1≤g1≤G1) in L1, Gf
=G1=2;So 00555 (=L=L1) is divided into L11, L12;As gf=g1=1, Lfgf=Lfg1=L11=00;
As gf=g1=2, LfGf=L1G1=Lfgf=Lfg1=L12=555.
(3) according to program preset in AI:
③:As Gf >=2, Lfgf corresponds to Jfgf.In this example, when f=1, gf=g1=1, it is described 1. in " Lfgf and AI
In Jfgf between, correspond to each other ", refer to that " J11 in corresponding (mapping) A54 of L11 " (Lfgf is L11, and " Jfgf in AI " is
The J11 in A54 in AI);It is assumed that it is common column wcy that the J11, which is column element (11), the column element, then the J11 is w54
(11);J11 in corresponding (mapping) A54 of L11 is exactly " L11 is corresponding (mapping) w54 (11) ";Because of L11=00, w54
(11)=00;It is assumed that the w54 (11) is at (5) in A54, that is, the w54 (w54=00) at this temporarily becomes w54 (11).
Jfgf corresponds to Ufgf.In this example, Ufgf is Xwcy (fgf), that is, U11 is (11) Xw54;J11 corresponds to U11, is exactly
At (5) in A54, w54 (11) is corresponding Xw54 (11), that is, 00 corresponding 434343436;Should at (5) Xw54 (=
434343436) temporarily become Xw54 (11), Xw54 (11)=434343436.Note:In this example, " J11 corresponds to U11 " be not assorted
Practical meaning is served only for demonstrating.
And Jfgf forward direction is connected serially to Jf (gf+1), 1≤gf≤Gf-1.In this example, forward direction series connection carries out as previously described
" column element (fgf) forward direction is connected serially to row element [f (gf+1)] " in the 5th kind in 10 kinds of forms;Further, as previously described
The 7th kind of situation described in, wcy (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of wcy (fgf);Still further,
" being related to wcy (fgf) " refers to " being located at wcy (fgf) ", that is, wcy (fgf) forward direction is connected serially to the row element on wcy (fgf)
[f(gf+1)];It is assumed that the row element is random row i54, then w54 (11) forward direction at (5) in A54, which is connected serially to, is located at
I54 (12) on the w54 (11), that is, J12 is (12) i54.
Jf (gf+1) is corresponding Lf (gf+1), and Jf (gf+1) is corresponding Uf (gf+1) ..., and so on, the positive string of Jf (Gf-1)
It is coupled to JfGf, JfGf corresponds to LfGf, and JfGf corresponds to UfGf, then LfGf is encrypted to UfGf;Because the LfGf is under the jurisdiction of Lf, institute
With the Lf is connected by forward direction by AI, tail is stayed to be encrypted to UfGf (" staying tail " is primarily referred to as retaining UfGf).In this example, f=1,
Gf=g1=1, Jf (Gf-1)=Jf (G1-1)=J1 (2-1)=Jfgf=J1g1=J11, JfGf=J1G1=Jf (gf+1)=
Jf (g1+1)=J1 (1+1)=J12, LfGf=L1G1=Lf (gf+1)=Lf (g1+1)=L1 (1+1)=L12, UfGf=
U1G1=Uf (gf+1)=Uf (g1+1)=U1 (1+1)=U12.
In this example, when gf+1=g1+1=1+1=2, it is described 1. in it is " mutually right between the Jfgf in Lfgf and AI
Answer ", refer to:J12 corresponds to (mapping) L12.
In this example, " Jf (gf+1) is corresponding Lf (gf+1) " is exactly " JfGf corresponds to LfGf ", that is, corresponding (mapping) L12 of J12;
Because J12 is (12) i54, so, corresponding (mapping) L12 of i54 (12);Because of L12=555, so, i54 (12)=555,
That is, searched in common column 00, the i54=555 at discovery common column 00, common row 281, so, the i54 (=555) at this
Temporarily become i54 (12);J12 corresponds to (mapping) L12, that is, 555 corresponding (mappings) 555.
In this example, " Jf (gf+1) is corresponding Uf (gf+1) " is exactly " JfGf corresponds to UfGf ", that is, J12 corresponds to U12;In this example,
UfGf is Xncywcyicyhcy (fGf), that is, U12 is (12) Xn54w54i54h54;J12 corresponds to U12, be exactly common column 00,
At common row 281, i54 (12) is corresponding X28100555616 (12);Because of the X28100555616 (12)=200044444, institute
With " i54 (12) is corresponding X28100555616 (12) " is exactly " 555 corresponding 200044444 ";It should be noted that because, at this
555 temporarily become i54 (12), so, X28100555616 (i.e. 200044444) temporarily becomes X28100555616 at this
(12);N54=281, w54=00 of the X28100555616 (12) in Xn54w54i54h54 (12), i54=555,
H54=616.
It is emphasized that i54 (12) are located on w54 (11), the concatenated meaning of forward direction is embodied, that is, upper one
Position where element w54 (11) is related to the position where next element i54 (12), either " next element i54 (12)
It is related to upper one element w54 (11) ".
LfGf is encrypted to UfGf.In this example, L12 (555) is encrypted to 200044444.
Because the LfGf is under the jurisdiction of Lf, so, which is connected by forward direction by AI, tail is stayed to be encrypted to UfGf (" staying tail "
It is primarily referred to as retaining UfGf).In this example, L12 (555) is under the jurisdiction of L1 (00555), so, which passes through forward direction by AI
It connects, stay tail and be encrypted to 200044444 (=U12);Because LfGf is the tail portion of Lf, JfGf is the tail portion of Jf, and JfGf is corresponding
UfGf, so, " staying tail " mainly retains UfGf (=U12), exactly retains 200044444.
④:On the basis of Lf in 2. or 3., L is encrypted to ciphertext M by AI.In this example, on the basis of L1 in 3.,
L is encrypted to ciphertext M by AI, that is, L=L1=00555,00555 (L) are encrypted to ciphertext 200044444 by AI;M=U12=
X28100555616 (12)=200044444.
(4) M is sent to AII;In this example, half ciphertext (L+M) is sent to AII, that is, half ciphertext (00555+
200044444) it is sent to AII.
(5) to known plaintext L ' carry out encrypted authentication, [L ' is encrypted to ciphertext M ' rear (principle of encryption, phase to AII by AII
It is same as the principle of AI encryption L), compare M ' and M whether identical (if they are the same, then AII demonstrates L ', shows that L ' is identical as L)].This
In example, 00555 known to AII (=L ');AII carries out encrypted authentication to 00555, and [identical as the principle of AI encryption 00555, AII will
00555 is encrypted to ciphertext M ', M '=200044444;M ' is identical as " M that AI is sent to AII ", then AII demonstrates 00555
(L ') shows that L ' is identical as L];That is, in the way that AI is sent to AII, half ciphertext (L+M) be not tampered with (for example, delete or
Reset or replace), L ' is exactly L, and M ' is exactly M, so, AII has received L, and AII confirmed L.
After (6) " Ufgf and/or UfGf " is used, abandoned by A (AI, AII) [on condition that:There is P symmetric cryptography table in A
Subordinate list Qp, p be subordinate list number, Qp Qp1, Qp2 ..., QpRp, Qprp is the code characters in Qp, and Qprp becomes or participates in
Or the code characters in " become+participate in " symmetric cryptography table;P, p, Rp, rp are greater than the natural number equal to 1,1≤p≤P, 1≤
rp≤Rp].In this example, after UfGf (=U12=200044444) is used, abandoned by A (AI, AII), on condition that:
888899999 (assuming that the p=1 in Qprp, rp=r1=666, Qprp=Q1r1=Q1666=888899999) enter to A54
In common column 00, at common row 281,200044444 abandoned by A of substituting become the code characters in A54
X28100555616;Because of the substitute, A54 is that dynamically, A5 is dynamically that A is dynamic;This can dynamically resist weight
Attack is put, and A54 is at least made to be difficult to be cracked.
Example 3, as Gf >=2 ..., forward direction series connection has one of following 10 kinds of forms and the above form.In this example,
In 5th kind of form, row element (fgf) forward direction is connected serially to column element [f (gf+1)];Further, it is foregoing the third
Described in situation, icy (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of icy (fgf).
Assuming that the plaintext L to be encrypted is 99888 (L=L1, L11=99, L12=888);L11 corresponds to (mapping) J11;It is false
If J11=icy (11), then L11 is corresponding (mapping) icy (11), then (11)=99 icy.
Such as Fig. 2 (A54);It is assumed that icy (11) is located at (w54=900) in the common column 900 in A54, and searched for, is sent out
At the present common column 900, common row 317, i54=99, so, the i54 at this temporarily becomes i54 (11), and i54 (11)=
99, L11 corresponding (mapping) i54 (11);Because the i54 at this temporarily becomes i54 (11), so, at this, n54 (=
317) it is related to temporarily becoming n54 (11), n54 (11)=317 with the i54 (11) at this, w54 (=900) is related to at this
The i54 (11) at place and temporarily become w54 (11), w54 (11)=900, h54 (=707) is related to facing with the i54 (11) at this
Shi Chengwei h54 (11), h54 (11)=707, Xn54w54i54h54 (=135792468) be related to the i54 (11) at this and
Temporarily become Xn54w54i54h54 (11), Xn54w54i54h54 (11)=X31790099707 (11)=135792468.
For example, " being related to icy (fgf) " refers to " being located at ncy (fgf) ".In this example, " being related to i54 (11) ", which refers to, " to be located at
N54 (11) ", then i54 (11) forward direction is connected serially to the column element [12] on n54 (11), that is, needs in common row 317, searches
Rope goes out a column element, to correspond to (mapping) L12 (=888);Assuming that the column element is random column h54, through searching for, in common row
317, at common column 25, h54=888, then the h54 at this temporarily becomes h54 (12), h54 (12)=J12=888, h54 (12)
Corresponding (mapping) L12;At the common row 317, common column 25, X3172545888 (=655528885) temporarily becomes
X3172545888 (12), X3172545888 (12)=655528885, X3172545888 (12) derive from Xn54w54i54h54
(12) n54=317, w54=25, i54=45, h54=888 in;So i54 (11) forward direction is connected serially to and is related to i54's (11)
H54 (12), that is, 99 forward directions are connected serially to 888 in common row 317 ..., and 99888 (L1) are connected by forward direction, stayed tail and encrypt
At 655528885.
For example, " being related to icy (fgf) " refers to " cipher table relevant to wcy (11) ".In this example, " being related to i54 (11) " is
Refer to " cipher table relevant to w54 (11) ";Because of w54 (11)=900, so, it is assumed that the relevant cipher table is No. 900
Symmetric cryptography Table A 900, then i54 (11) forward direction is connected serially to the column element in some common row in some area in A900
[12] ....
For example, " being related to icy (fgf) " refers to " area relevant to icy (11) ".In this example, " being related to i54 (11) " refers to
" area relevant to i54 (11);Because of i54 (11)=99, so, it is assumed that the relevant area is No. 99 area A599 in A5,
The then positive column element [12] ... being connected serially in some common row in A599 of i54 (11).
For example, " being related to icy (fgf) " refers to " common row relevant to hcy (11) ".In this example, " being related to i54 (11) " is
Refer to " common row relevant to h54 (11) ";Because of h54 (11)=707, so, it is assumed that the relevant common row is in A54
Common row 707, then i54 (11) forward direction is connected serially to the column element [12] ... in the common row 707 in A54.
Example 4, foregoing 4th kind, | icy is poor | and (fgf) forward direction, which is connected serially to, is related to the column element [f of subtrahend icy (fgf)
(gf+1)].In this example, it is assumed that the plaintext L to be encrypted is 20081 (L=L1, L11=200, L12=81);L11 is corresponding (mapping)
J11, then J11=| icy is poor | (11)=| minuend icy (11)-subtrahend icy (11) |=200.
Such as Fig. 2 (A54);It is assumed that in common column 901 (w54=901), | i54 is poor | and (11)=| minuend i54 (11)-
Subtrahend i54 (11) |=200;It assumes again that, the i54 (=333) at the common column 901, common row 440 temporarily becomes minuend i54
(11), minuend i54 (11)=333, then the common column 901, the i54 (=133) at common row 000 temporarily become subtrahend
I54 (11), subtrahend i54 (11)=133;That is, | i54 is poor | and (11)=| 333-133 |=200;Also, the common column 901,
N54 (=000) at common row 000 temporarily becomes subtrahend n54 (11), subtrahend n54 (11)=000;Subtrahend n54 (11)
(=000) is related to the subtrahend i54 (11) (=133) at this.
In this example, " being related to subtrahend icy (fgf) " refers to " related to subtrahend icy (fgf) ", that is, | i54 is poor | and (11) are positive
It is connected serially to column element (12) relevant to subtrahend i54 (11);Because subtrahend n54 (11) (=000) and subtrahend i54 (11) (=
133) related, so, | i54 is poor | and (11) (=200) forward direction is connected serially to the column element (12) in common row 000;That is, it needs to
In common row 000, a column element is searched out, to correspond to (mapping) L12 (=81);It is assumed that the column element is | h54 is poor |,
Then | h54 is poor | (12)=| minuend h54 (12)-subtrahend h54 (12) |=81;It assumes again that, at common row 000, common column 900
H54 (=81) temporarily becomes minuend h54 (12), minuend h54 (12)=81, then common row 000, at common column 201
H54 (=0) temporarily becomes subtrahend h54 (12), subtrahend h54 (12)=0;That is, J12=| h54 is poor | (12)=| 81-0 |=81,
Should | h54 is poor | (12) (=81) corresponding (mapping) L12;So | i54 is poor | and (11) forward direction is connected serially in common row 000 |
H54 is poor | and (12), that is, 200 forward directions are connected serially to 81 in common row 000.
Jfgf corresponds to Ufgf.In this example, J12 corresponds to U12, that is, | h54 is poor | (12) (=| minuend h54 (12)-subtrahend
H54 (12) |) correspond to U12;Further, J12 corresponds to U12, is exactly subtrahend h54 (12) corresponding U12, that is, in common row 000, public affairs
Altogether at column 201, subtrahend h54 (12) (=0) is corresponding X0002017730 (12), X0002017730 (the 12)=U12=
644418881;..., which is connected by forward direction, stays tail and be encrypted to 644418881 [=X0002017730 (12)].
Example 5, foregoing 5th kind, | ncy-icy | (fgf) forward direction, which is connected serially to, is related to the column element [f of icy (fgf)
(gf+1)].In this example, it is assumed that the plaintext L to be encrypted is 52000 (L=L1, L11=52, L12=000);L11 is corresponding (mapping)
J11, then J11=| ncy-icy | (11)=| ncy (11)-icy (11) |=52.
Such as Fig. 2 (A54);It is assumed that in common column 201 (w54=201), | n54-i54 | (11)=| n54 (11)-i54
(11) |=52;It assumes again that, the n54 (=282) at the common column 201, common row 282 temporarily becomes minuend n54 (11), should
Minuend n54 (11)=282, then the common column 201, the i54 (=230) at common row 440 temporarily become subtrahend i54 (11),
Subtrahend i54 (11)=230;That is, | n54-i54 | (11)=| 282-230 |=52;Also, in the common column 201, common row
N54 at 440 temporarily becomes subtrahend n54 (11), subtrahend n54 (11)=440, subtrahend n54 (11) (=440) with at this
The subtrahend i54 (11) (=230) at place is related.
In this example, " being related to icy (fgf) ", refer to " related to icy (fgf) ", that is, | n54-i54 | (11) forward direction is connected serially to
Column element (12) relevant to subtrahend i54 (11);Because of subtrahend n54 (11) (=440) and the subtrahend i54 (11) (=230) phase
It closes, so, | n54-i54 | (11) forward direction is connected serially to the column element (12) in common row 440;That is, it needs in common row 440
On, a column element is searched out, to correspond to (mapping) L12 (=000);Assuming that the column element is random column h54, through searching for,
At common row 440, common column 901, h54=000, then the h54 at this temporarily becomes h54 (12), h54 (the 12)=J12=
000, the h54 (12) (=000) correspond to (mapping) L12;So | n54-i54 | (11) forward direction is connected serially in common row 440
H54 (12), that is, 52 forward directions are connected serially to 000 in common row 440 ..., 52000 (L1) by forward direction series connection, stay tail and
It is encrypted to 789123456;This 789123456 is common row 440, the code characters at common column 901, the 789123456=U12
=X440901333000 (12).
Example 6, foregoing 6th kind, | icy-ncy | (fgf) forward direction, which is connected serially to, is related to the column element [f of ncy (fgf)
(gf+1)].In this example, it is assumed that the plaintext L to be encrypted is 250901 (L=L1, L11=250, L12=901);L11 correspondence (is reflected
Penetrate) J11, then J11=| icy-ncy | (11)=| icy (11)-ncy (11) |=250.
Such as Fig. 2 (A54);It is assumed that in the common column 25 (w54=25), | i54-n54 | (11)=| i54 (11)-n54
(11) |=250;It assumes again that, the i54 (=32) at the common column 25, common row 440 temporarily becomes minuend i54 (11), the quilt
Subtrahend i54 (11)=32, then the common column 25, the n54 (=282) at common row 282 temporarily become subtrahend n54 (11), this subtracts
Number n54 (11)=282;| i54-n54 | (11)=| 32-282 |=250.
In this example, " being related to ncy (fgf) " refers to " being located at ncy (fgf) ", that is, | i54-n54 | (11) forward direction is connected serially to position
In the column element (12) on subtrahend n54 (11);That is, it needs to a column element (12) be searched out, to correspond in common row 282
(mapping) L12 (=901);It is assumed that the column element is common column w54, and through searching for, at common row 282, common column 901, w54
=901, then the w54 at this (=901) temporarily becomes w54 (12), w54 (the 12)=J12=901, the w54 (12) (=901)
Corresponding (mapping) L12;So | i54-n54 | (11) forward direction is connected serially to the w54 (12) in common row 282, that is, 250 is positive
It is connected serially to 901 be located in common row 282 ..., which is connected by forward direction, stays tail and be encrypted to 965373737;It should
965373737 be common row 282, the code characters at common column 901,965373737=U12=X28290100808 (12).
Example 7, foregoing 8th kind, | wcy is poor | and (fgf) forward direction, which is connected serially to, is related to the row element [f of subtrahend wcy (fgf)
(gf+1)].In this example, it is assumed that the plaintext L to be encrypted is 700282 (L=L1, L11=700, L12=282);L11 correspondence (is reflected
Penetrate) J11, then J11=| wcy is poor | (11)=| minuend wcy (11)-subtrahend wcy (11) |=700.
Such as Fig. 2 (A54);Because of J11=| w54 is poor | (11)=700, so, it is assumed that minuend w54 (11)=901, then
Subtrahend w54 (11)=201, | w54 is poor | (11)=| minuend w54 (11)-subtrahend w54 (11) |=| 901-201 |=700.
In this example, " being related to subtrahend wcy (fgf) " refers to " being located at subtrahend wcy (fgf) ", that is, | w54 is poor | (11) positive string
It is coupled to the row element (12) being located on subtrahend w54 (11);That is, it needs to a row element (12) is searched out in common column 201,
To correspond to (mapping) L12 (=282);Assuming that the row element is common row n54, through searching for, in common column 201, common row 282
Place, n54=282, then the n54 at this temporarily becomes n54 (12), n54 (the 12)=J12=282, and the n54 (12) correspondence (is reflected
Penetrate) L12;So | w54 is poor | and (11) forward direction is connected serially to the n54 (12) in common column 201, that is, 700 forward directions are connected serially to position
282 in common column 201 ..., which is connected by forward direction, stays tail and be encrypted to 777500099;It should
777500099 be common column 201, the code characters at common row 282,777500099=U12=X282201465 (12).
Example 8, as previously mentioned, being corresponded to each other between Lfgf and the Jfgf in AI, after the corresponding Ufgf of Jfgf, the segment in Ufgf
Or all, it determines or participates in determine:Subtrahend element (fgf) in poor element (fgf) is located at Ac " y ".
Assuming that the plaintext L to be encrypted is 700282 (L=L1, L11=700, L12=282, f=1, gf=g1);G1=1
When, Lfgf=L1g1=L11, Jfgf=J1g1=J11, because, corresponding (mapping) J11, the L11=700 of L11, so, J11=
700;Assuming that J11=| wcy is poor | (11)=| minuend wcy (11)-subtrahend wcy (11) |=700;Assuming that minuend wcy (11)
It is minuend w54 (11) (such as Fig. 2, A54), it is further assumed that minuend w54 (11)=901, then (11)=201, J11 subtrahend wcy
=| wcy is poor | and (11)=| minuend w54 (11)-subtrahend wcy (11) |=| 901-201 |=700.
When g1=1, Ufgf=U1g1=U11;J11 corresponds to U11, that is, | wcy is poor | (11) (=| minuend w54 (11)-subtract
Number wcy (11) |) correspond to U11;Because minuend w54 (11) is related to this | wcy is poor | (11);Again because of (4) in A54
Place, XW54 (=555554422) temporarily become XW54 (11), the XW54 (11)=555554422, minuend w54 (11) (=
901) corresponding XW54 (11) (=555554422), so, which is related to U11;That is, J11 is corresponding
U11 is the equal of in this example that minuend w54 (11) (=901) are corresponding XW54 (11) (=555554422), further,
Segment in the U11 is equivalent to be the segment in the XW54 (11) (=555554422).
Segment 22 (this 555554422 in two, end) in the XW54 (11) (=555554422) determines:Subtrahend wcy
(11) it is located at A522 (c "=5, y "=segment=22 of A522 in Ac " y ");That is, " y "=22 " it is by the segment
(=22) it determines, that is, the cipher table where subtrahend wcy (11) is still A5 (c "=5), but where subtrahend wcy (11)
Area change (y "=22 ≠ 4), subtrahend wcy (11) is (11) subtrahend w522;That is, 201 (the w522=of common column in A522
201), temporarily become subtrahend w522 (11), subtrahend w522 (11)=201;Because J11 is related to the common column 901 in A54, also
The common column 201 being related in A522, so, J11=| wcy is poor | (11)=| minuend w54 (11)-subtrahend w522 (11) |=|
901-201 |=700, that is to say, that the y=y "=22 in the y=4 in minuend wcy (11), subtrahend wcy (11).
..., | wcy is poor | and (11) (=700) forward direction is connected serially to the row element (12) (=282) on subtrahend w522 (11).
Example 9, as previously mentioned, being corresponded to each other between Lfgf and the Jfgf in AI, after the corresponding Ufgf of Jfgf, the segment in Ufgf
Or all, it determines or participates in determine:Jf (gf+1) (Gf >=2,1≤gf≤Gf-1) is located at Ac " y ".
Assuming that the plaintext L to be encrypted is 99888 (L=L1, L11=99, L12=888, f=1, gf=g1=1), Lfgf
=L1g1=L11, Jfgf=J1g1=J11, corresponding (mapping) J11 of L11;It is assumed that J11=icy (11), then (11)=99 icy.
Such as Fig. 2 (A54);It is assumed that the icy (11) is located at (w54=900) in the common column 900 in A54, and through searching for,
It was found that at the common column 900, common row 317, i54=99, so, the i54 at this temporarily becomes i54 (11), J11=i54
(11)=99, that is, corresponding (mapping) i54 (11) of L11.
Ufgf=U1g1=U11;At common column 900, common row 317, U11=X31790099707 (11)=
135792468, J11 correspond to U11, that is, 99 corresponding 135792468.
Segment 13 (this 135792468 in front two) in the U11 (=135792468) determines:J12 is located at A513;
J12 is derived from, Jf (gf+1)=J1 (g1+1)=J1 (1+1)=J12;C "=5, y " of the A513 in Ac " y "=should
Segment=13, that is, " y "=13 " are determined by the segment (=13), that is, the cipher table where the J12 be still A5 (c "=
5), but the area where the J12 becomes A513 (y "=13 ≠ 4).
J12 corresponds to (mapping) L12, because, L12=888, so, J12=888;Assuming that the J12 is the i513 in A513
(12);Further, it is searched in A513, finds some common column, the i513=888 at some common row, then at this
I513 temporarily becomes i513 (12), i513 (the 12)=J12=888;J12 corresponds to L12, is exactly the i513 (12) corresponding (mapping)
L12;Assuming that the code characters at this are 616161616, then U12=616161616.
Meet the 7th kind in aforementioned 10 kinds of forms, in the non-same common column, row element (fgf) forward direction is connected serially to phase
The row element [f (gf+1)] of pass, that is, i54 (11) forward direction is connected serially to relevant i513 (12).
J12 corresponds to U12, is exactly the corresponding U12 of the i513 (12), that is, 888 corresponding 616161616;..., 99888 (L1) quilt
Forward direction series connection stays tail and is encrypted to 616161616 (=U12).
Example 10 is corresponded to each other, after the corresponding Ufgf of Jfgf, the piece in Ufgf between Lfgf and the Jfgf in AI according to aforementioned
Section is whole, determines or participate in determine:J (f+1) 1 is located at Ac " y ".In this example, J (f+1) 1=J21.
Assuming that the plaintext L to be encrypted is collecting account 00555700282;The L is divided into 2 sections (L1, L2), F=2, L1,
L2 is the plaintext character field in L, L1=00555, L2=700282.
Identical as L1 described in example 2, the L1 in this example is divided into 2 groups (L11, L12), f=1, Gf=G1=2, L11
(gf=g1=1), L12 (gf=g1=2) is the plaintext character group in L1, L11=00, L12=555.
Similarly with example 2, it is located at the w54 (11) in A54 at (5), forward direction is connected serially to the i54 (12) on the w54 (11);
W54 (the 11)=J11=00, i54 (the 12)=J12=555 ..., L1 (=00555) are connected by forward direction, are stayed tail and be encrypted to
200044444 (=U12).
(20 be the first two in 200044444 for segment 1 (=20), segment 2 (=44) in the U12 (=200044444)
Position, 44 be two, end in 200044444) it determines:J21 is located at A2044 (c "=segment 1=20, y "=segment 2=44), that is,
" c "=20 " is determined by segment 1, " y "=44 " it is to be determined by segment 2.
In this example, f=1, f+1=1+1=2;G (f+1)=G2=2;L (f+1)=L2, J (f+1)=J2.
When g (f+1)=g2=1, L (f+1) g (f+1)=L21, J (f+1) g (f+1)=J21.
When g (f+1)=g2=2, L (f+1) g (f+1)=L22, J (f+1) g (f+1)=J22.
The L1 in L (f+1)=L2=example 7 in this example;Similarly with the L1 in example 7, the L2 in this example is divided into 2 groups
(L21,L22);L21, L22 are the plaintext character group in L2, L21=700, L22=282.
Because J21 corresponds to (mapping) L21, L21=700, so, J21=700;Assuming that the whole in this example in A2044
Content is identical to the full content in example 7 in A54, then this example and example 7 similarly, in A2044, J21=| w2044 is poor | (21)
=| minuend w2044 (21)-subtrahend w2044 (21) |=| 901-201 |=700 ..., | w2044 is poor | and (21) forward direction is connected serially to
N2044 (22) in common column 201 in A2044, the n2044 (22)=282, that is, 700 forward directions, which are connected serially to, to be located at
282 in common column 201 in A2044;At common column 201, common row 282 in A2044, U22=X282201465
(22)=777500099, the n2044 (22) is corresponding X282201465 (22), that is, 282 corresponding 777500099;..., the L2 (=
700282) it connected by forward direction, stay tail and be encrypted to 777500099.
Because U1G1 (=U12=200044444) is not disclosed, (in this example, the effect of U12 is to determine that J21 is located at
A2044), " on the basis of Lf in 3., L is encrypted to ciphertext M " by AI, that is, in 3. for 4. described in foregoing (3)
L1, L2 on the basis of (i.e. ..., J11 forward direction is connected serially to J12 ..., and J12 forward direction is connected serially to J21 ..., and J21 forward direction is connected serially to
J22 obtains U22 by J22), L (=00555700282) by AI by forward direction series connection, stay tail be encrypted to 777500099 (=
UFGF=U2G2=U22=M), that is, 777500099 (=the U22) is retained as " tail " in " staying tail ";Although being somebody's turn to do " tail "
It is L2 " tail " on surface, but in fact, being somebody's turn to do " tail " is L " tail ";777500099 (=the U22) is used as ciphertext M, is disclosed,
It is equivalent to, on the basis of L1, L2 in 3., L is encrypted to ciphertext M by AI.
It is attached:On the basis of Lf in 3., L is encrypted to ciphertext M by AI.In this example, in A54, UfGf=U1G1=U12
=200044444, L1 (=00555) are connected by forward direction, are stayed tail and be encrypted to 200044444;Segment 1, segment 2 in U12, certainly
It is fixed:J21 is located at A2044;UfGf=U2G2=U22=777500099, L2 (=700282) are connected by forward direction, are stayed tail and encrypt
At 777500099;Further, according to aforementioned, in this example, in A, mathematical computations (U ' is carried out between different U ' fGf
FGf=UfGf), obtaining the result is that in the step (3) 4. in M;Specifically, because, U12=200044444, U22
=777500099, so, M=U12+U22=200044444+777500099=977544543, that is, L1, L2 in 3.
On the basis of, L is encrypted to ciphertext 977544543 (=M) by AI.
Example 11, it is assumed that L (=00555700282) is divided into 1 section (L1), f=F=1, L=L1, further, L1
(=00555700282) is divided into 4 groups (L11, L12, L13, L14), Gf=G1=4, L11=00, L12=555, L13=
700, L14=282.
According to preceding described, corresponded to each other between Lfgf and the Jfgf in AI, after the corresponding Ufgf of Jfgf, the segment in Ufgf,
It determines:Jf (gf+1) is located at Ac " y ".In this example, f=1, as gf=g1=2, U12=200044444 in U12=example 10,
Jf (gf+1)=J1 (g1+1)=J1 (2+1)=J13;That is, corresponded to each other between L12 and the J12 in AI, after the corresponding U12 of J12,
Segment 1 (=20), segment 2 (=44) in U12 determine:J13 is located at A2044 (c "=20, y "=44).
J21 in the J13=example 10, the J22 in J14=example 10, the U22=in UfGf=U1G1=U14=example 10
777500099;..., which is connected by forward direction, stays tail and be encrypted to 777500099;L (=L1=
00555700282) ciphertext 777500099 (=M) is encrypted to by AI.
Example 12, as previously mentioned, in the step (3) 3. in the 5th kind described in ranks forward direction series connection, be ranks intersect
Forward direction series connection.Assuming that the plaintext L to be encrypted is 9988800 (L=L1, L11=99, L12=888, L13=00).
Such as Fig. 2 (A54);As described in example 3, common column 900, the i54=99 at common row 317, the i54 at this temporarily become
Corresponding (mapping) i54 (11) of i54 (11), i54 (the 11)=J11=99, L11;..., as described in example 3, the positive string of i54 (11)
It is coupled to and is related to the h54 (12) of (11) i54, corresponding (mapping) L12 of h54 (the 12)=J12=888, the h54 (12), that is, 99 is positive
It is connected serially to 888 be located in common row 317;Because at common row 317, common column 25, w54 (=25) and with here
The h54 (12) is related, so, in this example, further, 888 [=h54 (12)] forward directions in common row 317 are connected serially to and are located at
I54 (13) in common column 25, i54 (the 13)=J13=00, the i54 (13) is at common column 25, common row 281, the i54
(13) corresponding (mapping) L13;At the common column 25, common row 281, U13=666533339, J13 corresponds to U13, that is, 00 pair
Answer 666533339;..., which is connected by forward direction, stays tail and be encrypted to 666533339.
In this example, ranks intersect positive series connection, refer to that row, column, row intersect positive series connection, that is, i54 (11), h54 (12),
i54(13)。
Similarly, if the character in L1 is more, L1 can be divided into many groups, in Acy or in Ac or in A, carry out
Ranks intersect positive series connection, for example, row, column, row, column, row, column ..., such as column and row, column and row, column ....
Example 13, it is assumed that user BBB possesses wrist scrambler 7, symmetric cryptosystem AI3 built in the wrist scrambler 7, interior
Set camera;User CCC possesses wrist scrambler 8, symmetric cryptosystem AII6, built-in camera built in the wrist scrambler 8;
In the server of the communications intermediary side VVV of authority, possess symmetric cryptosystem AII4, AI5;It is of the present invention built in AI3, AII4
Symmetric cryptography table, symmetric cipher, AI3, AII4 are identical;It is symmetric cryptography table of the present invention built in AI5, AII6, symmetrical
Enciphered method, AI5, AII6 are identical.
The bank account of BBB is 9990000444505050508;The bank account of CCC is
6677880000003322115;BBB purchases commodities to CCC, and payment for goods is 345 yuan, and payment method is:BBB is remitted money by Internetbank to CCC
345 yuan;BBB logs in certain network platform, input " 6677880000003322115/345/ by computer or mobile phone
9990000444505050508 " (=plaintext L, that is, the content that this Internetbank is transferred accounts, that is, collecting account/money transfer amount/payment
Account);The camera of BBB wrist scrambler 7 takes in the L in the display screen display of the computer or mobile phone of BBB;Wrist is close
L is divided into L1, L2, L3, F=3, L1=collecting account=6677880000003322115, L2=remittance by the AI3 in code device 7
Amount of money=345, L3=Send only Account=9990000444505050508.
It is assumed that 6677880000003322115 (=L1) are connected by forward direction by AI3, tail are stayed to be encrypted to 111222333
(=U1G1), 345 (=L2) are connected by forward direction by AI3, tail are stayed to be encrypted to 333222111 (=U2G2),
9990000444505050508 (=L3) are connected by forward direction by AI3, tail are stayed to be encrypted to 555554444 (=U3G3);As before
(mathematical computations, U ' fGf=UfGf are carried out between different U ' fGf), M7=U1G1+U2G2+U3G3=111222333
+ 333222111+555554444=999998888, that is, L is encrypted to ciphertext 999998888 by AI3.
Half ciphertext 7=plaintext+ciphertext=L+M7;"6677880000003322115/345/
9990000444505050508 "+999998888 (half ciphertexts 7) are sent to the AII4 in the server of VVV by BBB;AII4 pairs
The plaintext L ' (=" 6677880000003322115/345/9990000444505050508 ") received carries out encrypted authentication
[AII4 by L ' be encrypted to ciphertext M7 ' (encryption principle, be identical to AI3 encryption L principle), M7 '=999998888, by than
Compared with M7 '=M7, then AII4 demonstrates L ', shows L '=L, that is, the plaintext that AII4 is received is not tampered in the way of transmission,
Show that the ciphertext received is also not tampered with simultaneously].
AI5 in the server of the VVV, by L (" 6677880000003322115/345/
9990000444505050508 ") 777776666 (=M8, encryption principles, similar to the principle of AI3 encryption L) are encrypted to;
" 6677880000003322115/345/9990000444505050508 "+777776666 (half ciphertext 8 of=L+M8=) is by VVV
It is sent to the computer or mobile phone of CCC.
The camera of CCC wrist scrambler 8 takes in the display screen display in the computer or mobile phone of CCC
" 6677880000003322115/345/9990000444505050508 "+777776666 (=half ciphertext 8);Wrist scrambler
AII6 in 8 carries out the plaintext L " (=" 6677880000003322115/345/9990000444505050508 ") received
Encrypted authentication [L " is encrypted to ciphertext M8 ' (principle of encryption is identical to the principle of AI5 encryption L) by AII6, and M8 '=
777776666, by comparing, M8 '=M8, then AII6 demonstrates L ", shows L "=L, that is, the plaintext that AII6 is received is in transmission
On the way, it is not tampered with, shows that the ciphertext received is also not tampered with simultaneously].
After CCC passes through the encrypted authentication, so that it may confirm that relevant financial institution (exists with BBB, VVV, CCC
Cooperation agreement) this Internetbank remittance (=345 yuan) has been squeezed into the collecting account (=6677880000003322115) of CCC;
CCC delivers to BBB.
Attached 1:How synchronization AI and AII between is guaranteed.For example, the wrist scrambler 7 of BBB breaks down, L cannot be added
Close at ciphertext, then BBB is responsible for proactive contact VVV, then the AII4 of VVV does not need to carry out the encrypted authentication, with guarantee AI3 and
Synchronization between AII4.For example, half ciphertext 7 send distorted on the way by attacker, cause the AII4 of VVV can not be successfully into
The row encrypted authentication, then VVV is responsible for proactive contact BBB, it is desirable that half ciphertext 7 is informed VVV by BBB, so that the AII4 of VVV is carried out
The encrypted authentication, to guarantee the synchronization between AII4 and AI3.
With it is upper similarly, when the AI5 in the server of VVV break down or half ciphertext 8 send on the way by attacker's
It destroys, causes the AII6 of CCC can not be successfully and carry out the encrypted authentication, the process for causing this Internetbank to be transferred accounts is imperfect, then VVV
It is responsible for proactive contact CCC or CCC and is responsible for proactive contact VVV ..., guarantees the synchronization between AII6 and AI5.
Attached 2:For example, f=F=1, L1=L=66778800000033221153459990000444505050508, L1
In preceding 19 bit digital be collecting account, the 20th in L1 to the 22nd bit digital is money transfer amount, latter 19 the (the 23rd in L1
Position is to the 41st) number is Send only Account;It is assumed that the L1 by AI3 by forward direction series connection, stay tail be encrypted to 989898987 (=
U1G1), then M7=989898987 (=U1G1);It is assumed that the L1 is connected by forward direction by AI5, tail is stayed to be encrypted to
343434348 (=U1G1), then M8=343434348.
Attached 3:Because having carried out direct communication between BBB and VVV, direct communication has been carried out between VVV and CCC, so,
Between BBB and CCC, indirect communication (intermediary that VVV is this indirect communication) has been carried out.
Attached 4:If VVV and certain described network platform are networked, BBB when carrying out this Internetbank remittance in the network platform,
VVV with network platform networking can be with online browse to L, then M7 can be sent to VVV and (no longer need to send half close by BBB
Text is 7);If CCC and the network platform are networked, " BBB and/or VVV " carries out this Internetbank remittance process in the network platform
When, the CCC with network platform networking can be with online browse to L, then M8 can be sent to CCC and (no longer need to send half by VVV
Ciphertext 8).
Example 14, BBB and VVV direct communication.It is assumed that user BBB possesses wrist scrambler 7, it is right built in the wrist scrambler 7
Claim cryptographic system AI3, built-in camera, symmetric cryptography table of the present invention, symmetric cipher, the wrist password built in AI3
Device 7 is bundled with the bank card number (9990000444505050508) of BBB;Supermarket CCC possesses POS machine, which is bundled with
The bank account (6677880000003322115) of CCC;In the server of intermediary or financial institution VVV, possess symmetrical close
Symmetric cryptography table of the present invention, symmetric cipher built in code system AII4, AII4;AI3, AII4 are identical;BBB is at CCC
Shopping, the shopping amount of money is 225 yuan, and payment method is:Cashier of the BBB in CCC, cCredit card payment.
The bank card of BBB is inserted into the POS machine of CCC;Meanwhile the BBB camera of wrist scrambler 7, take in the CCC's
The 225 (=shopping amount of money=L1=L) of the display screen display of cashier;It is assumed that 225 (L1) is by wrist scrambler 7
AI3 is connected by forward direction, tail is stayed to be encrypted to 111222444 (=U1G1), then M7=111222444, that is, L is encrypted to by AI3
Ciphertext 111222444.
225+111222444 (half ciphertext 7) is sent to the AII4 in the server of VVV by BBB;AII4 is to the plaintext received
L ' (=225) progress encrypted authentication [L ' is encrypted to ciphertext M7 ' (encryption principle is identical to the principle of AI3 encryption L) by AII4,
M7 '=111222444, by comparing, M7 '=M7, then AII4 demonstrates L ', shows L '=L, that is, the plaintext that AII4 is received exists
It in the way of transmission, is not tampered with, shows that the ciphertext received is also not tampered with simultaneously].
The server of VVV is controlled, directly or indirectly the POS machine of CCC, and the sound for making it issue " drop " (shows that BBB has succeeded
225 yuan of payment), and show the printed words of " 225 yuan of successful payment ";That is, the server of VVV is directly or indirectly by the bank of BBB
Block 225 yuan on (9990000444505050508), transfers in the bank account (6677880000003322115) of CCC;
The cashier of CCC allows BBB to take goods, leave CCC.
It is somebody's turn to do the benefit of " direct communication+POS machine ":(1) BBB can be prevented in supermarket's cCredit card payment, bank card password quilt
Bystander peeps, or is peeped by the POS machine that offender has moved trick;(2) receipt that BBB is provided in CCC can not needed
Or it signs on sales slip.
Attached 1:For example, (assuming that POS machine is attacked by trojan horse, the shopping amount of money is transferred to illegal for the sake of security
Bank account, and the POS machine also normally issues the sound of " drop ", shows the printed words of " 225 yuan of successful payment "), bright
The bank account of CCC is added in literary L.(the purchase of display screen display 225/6677880000003322115 of the cashier of the CCC
The object amount of money/CCC bank account) after, the camera of BBB wrist scrambler 7 takes in the display screen display of the cashier
The 225/6677880000003322115 (=shopping amount of money/CCC bank account=L1=L);It is assumed that this 225/
6677880000003322115 (L1) are connected by forward direction by the AI3 in wrist scrambler 7, tail are stayed to be encrypted to 111222555
(=U1G1), then M7=111222555, that is, L is encrypted to ciphertext 111222555 by AI3;225/6677880000003322115
+ 111222555 (half ciphertexts 7) are sent to the AII4 in the server of VVV by BBB;AII4 is to the plaintext L ' (=225/ received
6677880000003322115) encrypted authentication ... is carried out.
Attached 2:Direct communication+ATM machine.For example, symmetric cryptosystem AI3, built-in camera shooting built in the wrist scrambler 7 of BBB
Head, BBB withdraw the money at certain ATM machine, and CCC is the ATM machine, possess in the server of intermediary or financial institution VVV symmetrical close
Code system AII4, AI3, AII4 are identical, and the server of VVV is controlled, directly or indirectly the ATM machine ....It should " direct communication+ATM
The benefit of machine ":It can prevent BBB at the ATM machine when plug-in card withdrawal, bank card password is peeped by bystander, or prevents ATM
Machine is mounted with to peep device by offender, and the bank card password of user is caused to be peeped.
Example 15, the present invention is used not only for e-payment, is also used to the text communication of general text communication or secret.It is false
If a side BBB of communication possesses wrist scrambler 7,7 built-in camera of wrist scrambler, built-in symmetric cryptosystem AI3
(built-in of the present invention symmetric cryptography table, symmetric cipher);The also built-in digital conversion table of the AI3.
For example, one corresponds between Chinese character and set of number in the digit speech recognition table;Wherein, Chinese character " bright " is right
Answer 12345, Chinese character " day " corresponding 23456, Chinese character "ON" corresponding 34567, Chinese character " meeting " correspondence 45678, additional character "." corresponding
56789。
It is assumed that Chinese character plaintext L is that " tomorrow has a meeting.";L1=L, L1 are divided into 5 plaintext character groups, and L11=is bright, L12=
It, L13=is opened, L14=meeting, L15 be ".";As previously mentioned, L11 is converted by the Chinese character " bright " in the digit speech recognition table
12345;L12 is converted into 23456 by the Chinese character " day " in the digit speech recognition table;L13 passes through the Chinese in the digit speech recognition table
Word "ON", is converted into 34567;L14 is converted into 45678 by the Chinese character " meeting " in the digit speech recognition table;L15 passes through the number
Code conversion table in additional character ".", it is converted into 56789.
By the digit speech recognition table, AI3 will " tomorrow has a meeting." (Chinese character plaintext L) be converted to
1234523456345674567856789 (digital plaintext L);1234523456345674567856789 (L) is passed through by AI3
Forward direction series connection stays tail and is encrypted to 333333336 (=M);BBB is by " 1234523456345674567856789+
333333336 " (digital plaintext L+ ciphertext M) are sent to DDD.
Another party DDD of communication possess symmetric cryptosystem AII4 (built-in symmetric cryptography table of the present invention, it is symmetrical plus
Close method), AI3, AII4 are identical;The also built-in digit speech recognition table same as AI3 of AII4.
The AII4 of DDD carries out encrypted authentication ... to known plaintext L ' (=1234523456345674567856789);
It, will according to the digit speech recognition table in the AII4 after AII4 passes through the encrypted authentication
1234523456345674567856789 (digital plaintext L) be converted to " tomorrow meeting." (Chinese character plaintext L);That is, BBB will be digital
Plaintext L is notified of DDD, and DDD is demonstrated by the encrypted authentication:The digital plaintext L ' received is not tampered with, and L ' is identical as L;
DDD passes through identical digit speech recognition table again, and digital plaintext L is decrypted as Chinese character plaintext L;That is, BBB has carried out secret lead to DDD
(BBB secret is notified of DDD to letter, and the content of notice is:Tomorrow has a meeting.).
Although the digit speech recognition table be it is secret, due to utilization of the invention, which is more difficult to by not
The attack of trace slash, safety are higher.
It is attached:If the digit speech recognition table is that dynamic (for example, 12345 corresponding Chinese character " bright ", but this 12345 is primary
Use, in communication next time, according to the digit speech recognition table, 55551 corresponding Chinese character " bright "), then the secret of the confidential corespondence
Property higher (content of plaintext L is difficult to be cracked).
Example 16 communicates (BBB is a side, and CCC is another party, and VVV is third party) by third party, prevents fraud text message.
It is assumed that user BBB possesses wrist scrambler 7,7 built-in camera of wrist scrambler, built-in symmetric cryptosystem AI3;User
CCC possesses wrist scrambler 8,8 built-in camera of wrist scrambler, built-in symmetric cryptosystem AII6,;In the communication of authority
In the server of Jie side VVV, possess symmetric cryptosystem AII4, AI5;Identical (the institute of the present invention built in AI3, AII4 of AI3, AII4
Symmetric cryptography table, symmetric cipher, the digit speech recognition table 7 stated);AI5, AII6 are identical (of the present invention built in AI5, AII6
Symmetric cryptography table, symmetric cipher, digit speech recognition table 8).
BBB intends issuing character message " remitted money 2,000 " to CCC;Its step are as follows:
According to the digit speech recognition table 7 built in AI3, AI3 is converted to " remitted money 2,000 " (Chinese character plaintext L)
00012003400560078009 (digital plaintext L);00012003400560078009 (L) is connected by forward direction by AI3, is stayed
Tail and be encrypted to 666666663 (=M);BBB will " remitted money 2,000+666666663 " (half ciphertext=Chinese character plaintext L+ ciphertext
M7) it is sent to VVV.
According to the digit speech recognition table 7 built in AII4, AII4 is converted to known Chinese character plaintext L ' (=remitted money 2,000)
00012003400560078009 (digital plaintext L ');AII4 adds 00012003400560078009 (digital plaintext L ')
Close verifying ....
After AII4 passes through the encrypted authentication, according to the digit speech recognition table 8 built in AI5, AI5 will " have remitted money 2,000 "
(Chinese character plaintext L) is converted to 10203040506070809090 (digital plaintext L);10203040506070809090 is (digital bright
Literary L) connected by AI5 by forward direction, tail is stayed to be encrypted to);VVV will " remitted money 2,000+222222228 " (half ciphertext=Chinese character
Plaintext L+ ciphertext M8) it is sent to CCC.
According to the digit speech recognition table 8 built in AII6, AII6 is converted to known Chinese character plaintext L " (=remitted money 2,000)
10203040506070809090 (digital plaintext L ");AII6 adds 10203040506070809090 (digital plaintext L ")
Close verifying ...;After AII6 passes through the encrypted authentication, the short message " remitted money 2,000 " that confirmation BBB is issued to CCC be really,
It is not that swindle molecule is issued by pseudo-base station.
It is attached:If CCC is ordinary people, BBB is public unit (pressing for payment of water rate, the electricity charge, natural gas expense, broadband access fee etc.)
Or telecom operators' (pressing for payment of telephone charge, cell-phone fee, broadband access fee etc., issue the advertisement of cell-phone fee set meal) or Express firm
The party (for example, relatives, classmate, colleague, leader) of (urging neck mail) government bodies or CCC, which possesses password
Device 7 (is not necessarily wrist);By third party communication (that is, the BBB possesses the AI3, VVV possess the AII4,
AI5, CCC possess the AII6), then it can contain rampant, startling fraud text message, protect the money earned by hard toil of CCC;Reason
It is that, if swindle molecule does not obtain the scrambler 7 that the BBB possesses, VVV can not be its intermediary, carry out third party's communication,
Swindle molecule can not just pretend to be the BBB;Character message is sent out to CCC still through pseudo-base station if swindling molecule, CCC can set it
Pay no attention to because, in the short message without number in plain text;Numeric messaging is sent out to CCC if swindling molecule, but CCC can not be successfully ground
The encrypted authentication is carried out in plain text to the number in the numeric messaging.
Explanation about the technical solution:
About ncy, wcy.Because the length of attached drawing is limited, in attached drawing 1, attached drawing 2, the corresponding n54 of each code characters,
W54 is not shown in the accompanying drawings, but is existing;For example, in attached drawing 1, attached drawing 2, at common row 440, common column 900,
Code characters 123456789 correspond to common row 440 (n54=440), common column 900 (w54=900), still, because attached drawing 1,
The length of attached drawing 2 is limited, and " n54=440 ", " w54=900 " are not shown at the common row 440, common column 900.
About icy, hcy.For example, in the A54 of such as Fig. 1, a total of 999 common rows of code characters, 999 it is public
Column, that is, I54=999, H54=999;In each common column in 999 common columns, by 999 digital groups (0,00,000,
1, it 2,3 ..., 995,996) is not arranged successively according to size order, without regular arrangement, but according to random order
Arrangement generates i54;Code characters and i54 are corresponded;Each i54 is equal to some digital group in this 999 digital groups,
That is, " difference between two neighbouring icy " is irregular in each common column.
Similarly, in each common row in 999 common rows, by 999 digital groups (0,00,000,1,2,3 ...,
995,996) it not according to size order arrangement, without regular arrangement, but is arranged according to random order, generates h54;
Code characters and h54 are corresponded;Each h54 is equal to some digital group in this 999 digital groups, that is, each public
On row, " difference between two adjacent hcy of left and right " is irregular.
In embodiments of the present invention, icy=number group, hcy=number group, still, however not excluded that icy, hcy are " one respectively
A and above Chinese character, one and above Korea's word, one and the above Japanese word, one or more letter, one or more it is special
One of symbol (country or group are general) " or more.
About " c=t 0 (1≤t≤T, t are natural numbers) or 1≤c≤C-T (C > T, c are natural numbers) " or " 1≤c≤
C (c is natural number) ".For example, having 5 symmetric cryptography tables (C=5), T=3;As t=1, c=t 0=1 0=0, that is, Ac
=A0;As t=2, c=t 0=2 0=00, that is, Ac=A00;As t=3, c=t 0=3 0=000, that is, Ac
=A000;When c=1 (c < 5-3), Ac=A1;When c=2 (1 < c, c=5-3), Ac=A2.
For example, when no any one c=t 0,1≤c≤C (c is natural number);Assuming that there is 3 symmetric cryptography table (C=
3), when c=1, Ac=A1;When c=2, Ac=A2;When c=3, Ac=A3.
Y, the value of ncy, wcy, icy, hcy, similarly with c;For example, " ncy=bcy 0 (1≤bcy≤Bcy, bcy are certainly
So number) or 1≤ncy≤Icy-Bcy (Icy > Bcy, ncy are natural numbers) ", that is, as shown in figure 1, B54=3, n54=b54 a 0
(1≤b54≤3, b54 are natural numbers) or 1≤n54≤999-3 (I54=999, B54=3,999 > 3, n54 are natural numbers);
Specifically, at (11) in Fig. 1, because, b54=3, so, n54=b54 0=3 0=000 at this, that is, at this
Common row be 000.
About symmetric cryptography table, AI and AII.The symmetric cryptography table is a part of key (key is symmetric key);
AI and AII is identical, and synchronous (for example, event synchronization).
About Xc.At (1) in Fig. 2 (A54), c=5, Xc=X5=787878784, the corresponding code characters of 5 (=c)
787878784。
About Xcy.At (2) in Fig. 2 (A54), c=5, y=4, Xcy=X54=262626267,4 (=y) are corresponded to
Code characters 262626267.
About " ncy corresponds to code characters Xncy and/or wcy and corresponds to code characters Xwcy ".In the embodiment of the present invention, ncy
Corresponding code characters Xncy and wcy correspond to code characters Xwcy;For example, as at (9) in Fig. 2 (A54), ncy=n54=
440, Xncy=Xn54=222233331, here, n54 corresponds to Xn54, that is, 440 corresponding code characters 222233331;Example
Such as, as at (3) in Fig. 2 (A54), wcy=w54=900, Xwcy=Xw54=666633322, here, w54 are corresponding
Xw54, that is, 900 corresponding code characters 666633322.
About Jfgf be c (fgf), | c is poor | (fgf), y (fgf) ..., | wcy-hcy | (fgf), | hcy-wcy | in (fgf)
One or more.... in one or more, refer to:Between Jfgf in Lfgf and AI, it may be possible to correspond, also having can
It can the corresponding multiple Jfgf of a plaintext character group (Lfgf).
Because, it is possible to a Lfgf corresponds to multiple Jfgf, and because Jfgf corresponds to Ufgf, so, Ufgf is Xc
(fgf), Xcy (fgf) ..., one or more in Xncywcyicyhcy (fgf);That is, one plaintext character group (one
Lfgf a code characters may) be encrypted to, it is also possible to be encrypted to multiple code characters.
About Gf=1.For example, f=2, gf=g2=Gf=G2=1, Lfgf=LfGf=L21=Lf=L2.
It is assumed that L21=5, L21 correspond to (mapping) J21, then J21=5;It is assumed that J21=c21, then c21=5;Such as Fig. 2
(A54) at (1) in, Jfgf corresponds to Ufgf, Ufgf=UfGf=U21=787878784, that is, J21 corresponds to U21, that is, c21 pairs
Answer U21, that is, 5 corresponding 787878784;So L21 is encrypted to 787878784 by AI;And because of L21=L2, so, L2 (=
5) 787878784 (=UfGf=Ufgf=U21) are directly encrypted to by AI.
It is assumed that L21=4 ...;It is assumed that J21=y21, then y21=4;At (2) in Fig. 2 (A54), U21=
262626267 ..., L2 (=4) are directly encrypted to 262626267 (=UfGf=Ufgf=U21) by AI.
It is assumed that L21=900 ...;It is assumed that J21=w54 (21), then (21)=900 w54;Such as (3) in Fig. 2 (A54)
Place, U21=666633322 ..., L2 (=900) are directly encrypted to 666633322 (=UfGf=Ufgf=U21) by AI.
It is assumed that L21=440 ...;It is assumed that J21=n54 (21), then (21)=440 n54;Such as (9) in Fig. 2 (A54)
Place, U21=222233331 ..., L2 (=440) are directly encrypted to 222233331 (=UfGf=Ufgf=U21) by AI.
It is assumed that L21=103 ...;It is assumed that J21=i54 (21), then (21)=103 i54;Such as Fig. 2 (A54), it is assumed that
The i54 (21) is searched in common column 900, is searched for, and is found at common column 900, common row 440, i54=103, then the i54
(=103) temporarily become i54 (21);The i54 (21) corresponds to U21, and the U21=123456789 ..., L2 (=103) are directly by AI
It is encrypted to 123456789 (=UfGf=Ufgf=U21).
It is assumed that L21=888 ...;It is assumed that J21=h54 (21), then (21)=888 h54;Such as Fig. 2 (A54), it is assumed that
The h54 (21) is searched in common row 440, is searched for, and is found at common row 440, common column 900, h54=888, then the h54
(=888) temporarily become h54 (21);The h54 (21) corresponds to U21, and the U21=123456789 ..., L2 (=888) are directly by AI
It is encrypted to 123456789 (=UfGf=Ufgf=U21).
Foregoing 1st kind, c (fgf) forward direction is connected serially to area's element [f (gf+1)] and/or " row element and/or column are wanted
Element " [f (gf+1)].Area's element [f (gf+1)] must be between the c (fgf), and there are logical communication links, for example, area's element is subordinate to
Belong to the c;For example, on the basis of " row element and/or the column element " is under the jurisdiction of area's element, area's element is under the jurisdiction of the c,
C (fgf) can directly forward direction be connected serially to " row element and/or column element " [f (gf+1)].
Foregoing 2nd kind, | c is poor | (fgf) forward direction be connected serially to area's element [f (gf+1)] in subtrahend c (fgf) and/
Or " row element and/or column element " [f (gf+1)].Area's element [f (gf+1)] must be with this | and c is poor | and between (fgf), exists and patrol
Collect connection, that is, area's element is under the jurisdiction of subtrahend c;At this, " row element and/or column element " is under the jurisdiction of area's element, the area wants
Element is under the jurisdiction of on the basis of subtrahend c, | c is poor | (fgf) can directly forward direction be connected serially to " row element and/or column element " [f (gf+
1)]。
Foregoing 3rd kind, y (fgf) forward direction is connected serially to " row element and/or column element " [f (gf+1)].It should be " capable to want
Element and/or column element " [f (gf+1)] must be between the y (fgf), and there are logical communication links, that is, " row element and/or column are wanted for this
Element " is under the jurisdiction of the y.
Foregoing 4th kind, | y is poor | and (fgf) forward direction is connected serially to " row element and/or column element " in subtrahend y (fgf)
[f(gf+1)." row element and/or the column element " [f (gf+1) must be with this | and y is poor | and between (fgf), there are logical communication links, that is,
It is somebody's turn to do " row element and/or column element " and is under the jurisdiction of subtrahend y.
Foregoing 7th kind, in the non-same common column, row element (fgf) forward direction is connected serially to row element [f (gf+
1)].As described in example 9, i54 (11) forward direction is connected serially to i513 (12).
Foregoing 6th kind, in the non-same common row, column element (fgf) forward direction is connected serially to column element [f (gf+
1)].Similarly with foregoing 7th kind.
Foregoing 8th kind, row element (fgf) forward direction is connected serially to area's element [f (gf+1)].Area's element [f (gf+
1)] must be between the row element (fgf), there are logical communication links;For example, the row element is under the jurisdiction of area's element.
Foregoing 9th kind, column element (fgf) forward direction is connected serially to area's element [f (gf+1)].Area's element [f (gf+
1)] must be between the column element (fgf), there are logical communication links;For example, the column element is under the jurisdiction of area's element.
Foregoing 10th kind, area's element (fgf) forward direction is connected serially to area's element [f (gf+1)].Area's element [f (gf+
1)] must be between area's element (fgf), there are logical communication links;Such as:Assume initially that L=L1=458, L11=4, L12=
58, then with the y (11)=4 of L11 mapping, the y (12)=58 mapped with L12;At (2) in such as Fig. 2 (A54), y (11)=4,
Xcy (11)=X54 (11)=262626267, the segment 67 (two, the end in 262626267) in 262626267 determine:
C "=segment=67 in Ac " y ";That is, y (11) forward direction is connected serially to the y (12) in A67 (c "=67), the y (12)=58,
I.e. ..., 4 forward directions in A54 are connected serially to 58 in A67 ...;That is, passing through the segment 67 in X54 (11), A67, y (12) and y
(11) there are logical communication links.
As previously described in (5), AII is to known plaintext L ' carry out encrypted authentication.Known plaintext L ', refers to:AII is
Know L ', but AII does not know whether the L ' is identical as plaintext L, that is, AII does not know whether L, ciphertext M are usurped in the way of transmission
Change, so, AII is known to be represented as L ' in plain text, and the ciphertext that AII is received is represented as M ';Plaintext L ' known to AII, may
It is that AI is sent to AII, it is also possible to be that third party (such as bank, such as non-banking payment mechanism) is sent to AII's.
As previously described in (5) or AII conditionally inversely series connection, M is decrypted into L.For example, L=L1=4900, L11
=4, L12=900;L11 is corresponding (mapping) y (11), at (2) in Fig. 2 in A54, the y (11)=4;It is assumed that y (11) is just
To being connected serially to column element [f (gf+1)], that is, 4 forward directions are connected serially to the common column 900 (W54=900) in A54, W54 (12)=
The corresponding code characters 666633322 in 900, W54 (12) corresponding (mapping) L12, W54 (12);..., which is passed through by AI
Forward direction series connection stays tail and is encrypted to ciphertext 666633322.
It is assumed that AII receives the ciphertext 666633322, but AII does not know L, then AII needs to decrypt the ciphertext
666633322;It is assumed that preset program includes:When decryption, code characters inverse correspondence Wcy.According to the preset program, AII is such as scheming
Search in 2 (A54) finds that the code characters at (3) are 666633322;Because of the W54=900 at this, AII is learnt
W54 (12)=900;Because W54 (12) corresponds to (mapping) L12, so, AII first decrypts L12=900;Because of the common column
900 are under the jurisdiction of A54, i.e., having ready conditions in described " conditionally reverse series connection ", so, the reverse concatenated direct target of AII is only
It can be at (2) in A54;At this, y=4, so, AII learns y (11)=4;Because L11 is corresponding (mapping) y (11), institute
To decrypt L11=4 after AII;That is, AII is conditionally inversely connected, is decrypted into 4900 (=L) by 666633322.
As previously described in (6), Qprp become participate in or " become+participate in " symmetric cryptography table in code characters.Example
Such as, when some Qprp is related to the whole of some code characters, this is related to being " becoming ";For example, when some Qprp is related to some
When segment in code characters, this is related to being " participation ";For example, there are two some code characters tools group (group 1, group 2),
For some Qprp tool there are two group (group 3, group 4), group 3 becomes the group 1, and group 4 participates in the group 2, then Qprp " at
For+participate in " code characters.
It changes about its relative position where original.For example, plaintext L1 is connected by forward direction by AI, tail is stayed to add
It is close at U12 (=123456789), this 123456789 be located at as in Fig. 2 common row 440, at common column 900, the code characters
123456789 have been used;This 123456789 used after, by plug-in, be not abandoned, and be moved to public
At row 440, common column 25 (original code characters press program again at this, are transferred to common row 440, at common column 900), that is,
After the code characters 123456789 (=U12) are used, originally where relative position change, no longer with w54
(=900), i54 (=103), h54 (=888) are corresponding.
Preset digit speech recognition table in AI as previously described.For example, as described in example 15, in the digit speech recognition table, Chinese character with
Number group corresponds, and additional character and number group correspond;When Lfgf is Chinese character or additional character, turned by the number
Table is changed, which is converted into digital group, (reflects in order to correspond to each other between Lfgf and the Jfgf (Jfgf is digital group) in AI
It penetrates).
For example, number group is corresponded with Chinese character in the digit speech recognition table, number group is corresponded with letter, number
Group is corresponded with additional character;When icy, hcy be respectively " one and the above Chinese character, one or more letter, one or more
One of additional character " or more, also, Lfgf be number group when, by the digit speech recognition table, which is converted into
Chinese character or letter or additional character, in order to be corresponded to each other between Lfgf and the Jfgf (Jfgf is " icy and/or hcy ") in AI
(mapping).
It is foregoing the first, ncy (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of ncy (fgf).With power
Foregoing 7th kind, " wcy (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of wcy (fgf) " in example 2 it is same
Reason.
Foregoing second, | ncy is poor | and (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+ of subtrahend ncy (fgf)
1)].With in foregoing 8th kind, example 7 " | wcy is poor | (fgf) forward direction, which is connected serially to, is related to the row element of subtrahend wcy (fgf)
[f (gf+1)] " is similarly.
Foregoing 9th kind, hcy (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+1)] of hcy (fgf).With such as
" icy (fgf) forward direction, which is connected serially to, is related to the column element [f (gf+1)] of icy (fgf) " in preceding described the third, example 3 is similarly.
Foregoing ten kind, | hcy is poor | and (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+ of subtrahend hcy (fgf)
1)].With in foregoing 4th kind, example 4 " | icy is poor | (fgf) forward direction, which is connected serially to, is related to the column element of subtrahend icy (fgf)
[f (gf+1)] " is similarly.
Foregoing tenth is a kind of, | wcy-hcy | (fgf) forward direction, which is connected serially to, is related to the row element [f (gf+ of hcy (fgf)
1)].With in foregoing 5th kind, example 5 " | ncy-icy | (fgf) forward direction, which is connected serially to, is related to the column element [f of icy (fgf)
(gf+1)] " similarly.
About foregoing 12nd kind, | hcy-wcy | (fgf) forward direction, which is connected serially to, is related to the row element [f of wcy (fgf)
(gf+1)].With in foregoing 6th kind, example 6 " | icy-ncy | (fgf) forward direction, which is connected serially to, to be related to the column of ncy (fgf) and wants
Plain [f (gf+1)] " is similarly.
As previously described, in Acy, in Ac, one of in A or more, mathematics meter is carried out between different U ' fGf
It calculates.For example, plaintext L is divided into 2 sections (L1, L2);As described in example 10, L1 is encrypted to U1G1, L2 quilt by the element in A54
Element in A2044 is encrypted to U2G2 ..., that is, in A, carries out mathematical computations between different U ' fGf;If L1 is by A54
In element be encrypted to U1G1, L2 is encrypted to U2G2 by the element in A544 (c=5, y=44) ..., that is, in Ac, in difference
U ' fGf between carry out mathematical computations;If L1 is encrypted to U1G1 by the element in A54, L2 is encrypted to by the element in A54
U2G2 ..., that is, in Acy, carry out mathematical computations between different U ' fGf.
About the wrist scrambler in embodiment.The wrist scrambler is not connected to internet, it is therefore an objective to prevent on internet
Virus attack wrist scrambler built in symmetric cryptography table of the present invention;It is symmetric cryptography table of the present invention, symmetrical
Enciphered method, the built-in communication terminal (for example, the mobile phone being connect with internet, computer etc.) in networking, but on condition that, the communication
Terminal can resist the symmetric cryptography table of the present invention of the virus attack on internet.
Start position about Jf1.In order to guarantee that AI is synchronous with AII, can be determined by program built-in in A:Which position
The element set is as element used by Jf1, and especially the element of which position is as element used by J11 (f=1).
It is brief about ciphertext.In the present invention, the method for keeping ciphertext brief has 3:
(1) Lf formula stays tail.As previously described in (3) it is 3. described " ..., the Lf by AI by positive series connection, stay tail to add
It is close at UfGf (" staying tail " be primarily referred to as retain UfGf) ".
(2) as previously described, such as the paragraph 1 reciprocal of example 10.
(3) L formula stays tail, and such as the 2nd section of inverse of example 10.F≥2;As 1≤f≤F-1, as previously described " ..., in Ufgf
Segment or whole determine or participate in determine:J (f+1) 1 is located at Ac " y " ", that is, as gf=Gf, UfGf is underground, but should
Segment or whole in UfGf determine or participate in determine " J (f+1) 1 is located at Ac " y " ";..., final reservation and open UFGF,
That is, in foregoing (3) it is 4. described " on the basis of Lf in 2. or 3., L is encrypted to ciphertext M " by AI, that is, 2. or
3. on the basis of Lf in, plaintext L is connected by forward direction by AI, tail is stayed to be encrypted to UFGF (=M).