CN105897420B - A kind of atom caryogram cryptographic system and direct communication method and indirect communication method - Google Patents

A kind of atom caryogram cryptographic system and direct communication method and indirect communication method Download PDF

Info

Publication number
CN105897420B
CN105897420B CN201410685848.2A CN201410685848A CN105897420B CN 105897420 B CN105897420 B CN 105897420B CN 201410685848 A CN201410685848 A CN 201410685848A CN 105897420 B CN105897420 B CN 105897420B
Authority
CN
China
Prior art keywords
ciphertext
node
dcm
group
natural number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410685848.2A
Other languages
Chinese (zh)
Other versions
CN105897420A (en
Inventor
褚万青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410685848.2A priority Critical patent/CN105897420B/en
Publication of CN105897420A publication Critical patent/CN105897420A/en
Application granted granted Critical
Publication of CN105897420B publication Critical patent/CN105897420B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

Present invention mainly discloses a kind of atom caryogram cryptographic systems.(1) in each cipher table, in addition to Dc grades of nodes, other nodes can directly fission out several nodes;(2) when encrypting, the character group arranged from left to right in some plaintext character field, with in some cipher table from dc grades to d ' c grades progressive interdependent node, it corresponds (mapping), also, dc grades of nodes must be that (dc-1) grade node is directly fissioned;(3) because the node of the last character group mapping in some plaintext character field corresponds to code characters group EEEEE, so, which is stayed tail formula, fusion formula to be encrypted to EEEEE.The invention also includes a kind of calculation position method, dynamics to select cipher table method, hides ciphertext character group method, the matched writing system method of creation.The present invention is highly-safe, versatility is good, conducive to e-payment, text communication, the full content even in video/audio, is encrypted.

Description

A kind of atom caryogram cryptographic system and direct communication method and indirect communication method
Technical field
The present invention relates to a kind of cryptographic system, especially a kind of atom caryogram cryptographic system similar to symmetric cryptography, with And method, the method for indirect communication method of the direct communication based on the atom caryogram cryptographic system.
Background technique
Password is broadly divided into symmetric cryptography and asymmetric cryptography.Symmetric cryptography, such as the permutation cipher in classical code, replacement Password (substitution password), such as block cipher (DES, AES) or stream cipher (RC4 etc.);Symmetric cryptography is suitable for long article, short Text, but have deficiency;For example, block cipher or stream cipher need to calculate, stream cipher is insensitive to being inserted into and modifying, and is grouped close CBC, CFB, OFB in code are unfavorable for parallel computation, and the replication problem in the ECB in block cipher is (right if repeated in plain text The ciphertext answered can also repeat) and ciphertext content be easy to be replaced, reset, delete, resetting;For example, single table in substitution password Password is substituted in encryption and decryption, using fixed substitution tables (substitution tables or substitution table be exactly key), to the institute in plaintext There is letter all using a fixed mapping, and the frequency distribution for single-letter occur is identical with ciphertext, it is difficult to resist frequency Analysis;For example, there is reuse in Vernam password (one time cryptosystem belongs to the multilist substitution password in substitution password) The same key encrypts different plaintexts and is easy the problem of being cracked;So generally speaking, comparatively, it is at least symmetrical close The safety of code is not also enough height.
When carrying out Web bank's clearing, some consumers have used public key encryption algorithm, and (RSA belongs to non-for the country at present Symmetric cryptography is used for various USBKey, such as U-shield), still: (1) USBKey is only applicable to the short essay of small data, because RSA's is close Key length has 1024 or 2048, so, the calculation amount of long article is with regard to big;(2) not general, for example, a U-shield only correspond to one Desktop computer;(3) also frequently by the threat of trojan horse, such as U-shield use after, pull out, may be existed by hacker not in time Line remote control is transferred accounts;(4) (private key in such as RSA Algorithm is used for the number of symmetric cryptography when RSA and symmetric cryptography are used in combination Signature), it is also necessary to the symmetric cryptography is often replaced.
Because of deficiency existing for the asymmetric cryptography, there are also the consumers of flood tide using symmetric cryptography or not to have at present Have and use password: (1) using symmetrical, static identification cipher, (such as bankbook password, bank card password, online password, unlocking are close Code etc.), but the identification cipher can only indicate the identity of consumer, cannot prevent the true friendship between consumer and financial institution Easy content is artificially distorted (such as collecting account is tampered), or cannot prevent the actual wishes of consumer violated (such as Unlocking cipher is peeped, is usurped), also identification cipher is also as static state (i.e. relatively constant), and often in ATM or POS machine is online, is illegally peeped, is usurped.(2) when carrying out Web bank's clearing, some consumers use symmetrical dynamic mouth Enable password, but safety, convenience are also less desirable;Some consumers use symmetrical mobile phone note verification code, but are easy It is peeped or is retained by mobile phone viruses and is stolen.(3) what ordinary consumer often carried out make a phone call, QQ communication, wechat, hand Machine short message, scan the two-dimensional code or enterprise between stored on the communication terminal that can be surfed the Internet in online business relations or user Information etc. does not encrypt (not using password) typically in plain text, caused by consequence be: (1) be easily stolen and peep or distort; (2) it scans virulent two dimensional code and has gone up " fishing " website;(3) it is easy (pseudo- by " fishing " or harassing of advertisement of pseudo-base station Base station sends SMS to particular person or unspecified person);(4) it is easy to allow telecommunication fraud molecule by hair SMS, or leads to It crosses fuzzy identity or is conversed by change of voice software, the friend or relatives of the consumer that disguises oneself as or government offices or public thing Industry unit, it is therefore an objective to make consumer be taken in and remit money or provide bank card password.
Summary of the invention
Goal of the invention: being directed to the above-mentioned problems of the prior art, deficiency, and the purpose of the present invention is mainly to provide a kind of new Cryptographic system A, A be it is dynamic, general, suitable for long article and short essay, safety is very high, can prevent trojan horse Invade (such as A is built in independent, non-networked wrist scrambler) of simultaneously remote control;At least identical double of A;Just In direct communication, such as the unlocking to coded lock;Convenient for indirect communication, for example, originator possesses A, indirect destination possesses A ' (A ' ≠ A), originator are write to each other by possessing the third-party intermediation of A, A ' with indirect destination.
A further object of the invention --- the telecommunication fraud that containment emerges one after another, protection individual privacy (such as to text Communication encryption, such as the login password of online is encrypted, or by typewriting, encrypting on non-online hardware), guarantee electronics The safety (Internetbank, swipe the card, ATM withdraws the money etc.) of payment, in favor of building to work as the flourish world.
Technical solution: for achieving the above object, a kind of the first technical solution that the present invention uses are as follows: atom caryogram Cryptographic system, it is characterised in that following component parts:
(1) at least identical double subsystem of atom caryogram cryptographic system A, A I and A II;There is C cipher table in A (A1, A2 ..., AC), Ac is cipher table, 1≤c≤C;Ac originates from " core " of Ac, and being somebody's turn to do " core " is first order node;The first order Node not exclusively fissions and generates H2 second level node, and h2 is 1 --- when taking any one natural number between H2, Bcxh2yh2zh2 is a second level node in the H2 second level node, also, the Bcxh2yh2zh2 corresponds to cipher word Symbol group Ecfxh2yh2zh2;The Bcxh2yh2zh2 not exclusively fissions and generates H3 third level node, and h3 is 1 --- between H3 When taking any one natural number, Bcxh3yh3zh3 is a third level node in the H3 third level node, also, should Bcxh3yh3zh3 corresponds to code characters group Ecfxh3yh3zh3, which belongs to what this was not exclusively fissioned Bcxh2yh2zh2 ..., and so on, Bcxh (dc-1) yh (dc-1) zh (dc-1) not exclusively fission and generate Hdc the Dc grades of nodes, 2≤dc≤Dc, hdc is 1 --- and when taking any one natural number between Hdc, Bcxhdcyhdczhdc is the Hdc Dc grades of nodes in dc grades of nodes, also, the Bcxhdcyhdczhdc corresponds to code characters group Ecfxhdcyhdczhdc, wherein fxhdcyhdczhdc is 1 --- one and the above natural number are taken between Fxhdcyhdczhdc, The Bcxhdcyhdczhdc belongs to the Bcxh not exclusively to fission (dc-1) yh (dc-1) zh (dc-1);C,c, Fxhdcyhdczhdc, Fxhdcyhdczhdc are greater than the natural number equal to 1 respectively, and Dc is the total quantity of the grade of node, dc, Dc, Hdc are greater than the natural number equal to 2 respectively;All code characters groups are unique in A;There is no subordinate list in A, alternatively, A In have G subordinate list (K1, K2 ..., KG), Kg is subordinate list, have in 1≤g≤G, Kg Jg code characters group (Kg1, Kg2 ..., KgJg), Kgjg is code characters group, 1≤jg≤Jg, when g is 1 --- between G, jg 1 --- taken respectively between Jg one and When the above natural number, Kgjg will become or participate in or become and participate in Ecfxhdcyhdczhdc in A, and G, g, jg, Jg are big respectively In the natural number for being equal to 1;
(2) according to program preset in A I, plaintext L is divided into M sections, be respectively L1, L2 ..., LM, Lm is in L Plaintext character field, 1≤m≤M;Further, Lm is divided into Nm group, Lm1, Lm2 ..., LmNm, Lmnm is the character in Lm Group, 1≤nm≤Nm;M is 1 --- one and the above natural number are taken between M ', M ', M, m, Nm, nm are greater than oneself equal to 1 respectively So number;
(3) according to program preset in A I, Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm in Acm, and nm is corresponding Dcm, wherein Nm corresponds to d ' cm, then LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd ' Cmyhd ' cmzhd ' cm, then Lm is mapped, tail formula is stayed to be encrypted to the Ecmfxhd ' cmyhd ' cmzhd ' cm, this stays tail formula to encrypt phase When in the fusion of core;When nm corresponds to dcm, nm, dcm difference are from small to large, that is, when Lmnm mapping is corresponding After Bcmxhdcmyhdcmzhdcm, following the character group Lm (nm+1) after Lmnm closely, to map the Bcmxhdcmyhdcmzhdcm direct Or Bcmxh (dcm+i) yh (dcm+i) zh (dcm+i) for fissioning out indirectly;Cm is 1 --- taken between C one or more from So number, d ' cm is under the jurisdiction of dcm, and dcm, d ' cm are respectively 2 --- and it takes one between Dcm and the above natural number, i is greater than equal to 1 Natural number, (dcm+i) is 3 --- one and the above natural number are taken between Dcm;
(4) further, L is encrypted to ciphertext dd by A I;
(5) L is encrypted to ciphertext dd by A II, which is identical to the encryption principle that A I encrypts the L, alternatively, A II Ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm in ciphertext dd is decrypted into plaintext character field Lm, that is, ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm should after mapping the code characters group Ecmfxhdcmyhdcmzhdcm in Acm Ecmfxhdcmyhdcmzhdcm inverse correspondence node Bcmxhdcmyhdcmzhdcm, the Bcmxhdcmyhdcmzhdcm and LmNm phase Mapping, also, since the Bcmxhdcmyhdcmzhdcm, to (dcm-i) grade node-home, obtain node Bcmxh (dcm- I) yh (dcm-i) zh (dcm-i), Bcmxh (dcm-i) yh (dcm-i) zh (dcm-i) and Lm (Nm-1) phase mapping ..., with This analogizes, and belongs to node Bcmxhd " cmyhdc " mzhd " cm always, and " cm's Bcmxhd " cmyhdc " mzhd sets each other off with Lm1 Penetrate, be finally sequentially connected in series Bcmxhdcmyhdcmzhdcm, Bcmxh (dcm-i) yh (dcm-i) zh (dcm-i) ..., Cm, then Lm is resumed Bcmxhd " cmyhdc " mzhd ", and then L is resumed;M is under the jurisdiction of dcm to dc ", and " m exists respectively by (dcm-i), dc 2 --- one and the above natural number are taken between Dcm;
(6) after code characters group Ecmfxhd ' cmyhd ' cmzhd ' cm is used, originally the relative position at place occurs Change, alternatively, it is abandoned by A I, A II, that is, when G is greater than the natural number equal to 1, Kgjg become participate in or become and Participate in Ecfxhdcyhdczhdc in A;That is, A I, A II are synchronous dynamics.
Bcxhdcyhdczhdc in the component part (1) is one and the above Arabic numerals, one and the above word Female, one and the above Chinese character, one or more in the general additional character in concerned countries or area or group, one and the above court One of fresh word, one and the above Japanese word or more.
Hdc in the component part (1) dc grade nodes are that spherical and/or hemispherical is distributed, the node, close Code character group is three-dimensional, so, which is indicated with Bcxhdcyhdczhdc, i.e., there is the node X-coordinate, Y-coordinate, Z to sit Mark, the code characters group indicate that x ' hdc belongs to X-coordinate, y ' hdc belongs to Y-coordinate, z ' hdc belongs to Ecfx ' hdcy ' hdcz ' hdc In Z coordinate.
Hdc dc grades of nodes in the component part (1), tree form distribution is on x/y plane, i.e., the x/y plane is related to x Axis, y-axis, the node be it is two-dimensional, code characters group is three-dimensional, so, which is indicated with Bcxhdcyhdc, i.e. the section Point has X-coordinate, Y-coordinate, which is indicated with Ecfxhdcyhdczhdc, i.e. the Ecfxhdcyhdczhdc have with The no Z coordinate of the identical X-coordinate of the node, Y-coordinate identical with the node, the node.
Preset program in the component part (3), including calculate position, contraposition;Position Wm=m+M+y in the calculation position, Wm --- one and the above natural number being taken between C, y=0 or y are 1 --- 2, one and the above natural number are taken between (C-2M), or Person, Wm=(C+z)-m-M, Wm is 1, and --- one and the above natural number being taken between C, z=0 or z are 1 --- takes between (M+1) One and the above natural number;Mmax be can by the maximum quantity of the plaintext character field of A primary encryption, 2Mmax=C, or (2Mmax+1)=C, M is 1 --- one and the above natural number are taken between Mmax;The contraposition refers to that Wm and cm is corresponded, then Lm and Acm is corresponded, and further, Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm in Acm.
Preset program in the component part (3), comprising: as the M >=2, LmNm Mapping B cmxhd ' cmyhd ' Cmzhd ' cm, and then after LmNm corresponds to Ecmfxhd ' cmyhd ' cmzhd ' cm, the section where the Bcmxhd ' cmyhd ' cmzhd ' cm Unique volume that uniquely number, the Bcmxhd ' cmyhd ' cmzhd ' cm have in Acm that point set zoarium has in Acm Number, one of the Ecmfxhd ' cmyhd ' cmzhd ' cm or more, determine or participate in determine c (m+1), and then L (m+1) n (m+ 1) corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) in Ac (m+1) is mapped;C (m+1) is 1 --- it is taken between C One and the above natural number, 2≤dc (m+1)≤Dc (m+1).
In the component part (4), comprising: between ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm and/or close Between Chinese character group Ecmfxhd ' cmyhd ' cmzhd ' cm and preset dynamic password, mathematical computations are carried out, combination is split, moves It is obtaining the result is that a part in ciphertext dd or ciphertext dd behind one of position, pairing, replacement or more.
The one and above letter, is ee different letters in the original writing system of one kind, and ee is greater than In 2 natural number;The original writing system corresponds to a kind of or more existing writing system in the world, that is, every ff letter An alphabetical section is constituted, ff is 1 --- one and the above natural number, not identical, each word between each letter section are taken between ee Parent segment fixedly or dynamically corresponding existing in the world one and the above Chinese character, one or more letter, one and the above Ah Arabic numbers, one or more in the general additional character in concerned countries or area or group, one and above Korea's word, one And one of above Japanese word or more.
Second of technical solution that the present invention uses are as follows: a kind of direct communication method includes the following steps:
(1) make atom caryogram cryptographic system A I 1 as claimed in any one of claims 1 to 8, A II 2, A I 1 with A II 2 is identical;One side AAA of communication possesses A I 1, and another party BBB of communication possesses A II 2;
(2) after plaintext L is encrypted to ciphertext gg using A I 1 by AAA, half ciphertext hh or gg, hh=L+gg are sent to BBB; It after BBB collects mail, uses A II 2 " L in confirmation hh, or decryption gg and then L are restored ", wherein should " confirmation L in hh " Refer to, the L in hh is encrypted to ciphertext ii by A II 2, whether the gg that compares in ii and hh is identical, and if they are the same, then BBB confirms hh In L or A II 2 gg in hh is decrypted into jj, the L that compares in jj and hh it is whether identical, if they are the same, then BBB confirms in hh L.
The third technical solution that the present invention uses are as follows: a kind of indirect communication method includes the following steps:
(1) production atom caryogram cryptographic system A I 3 as claimed in any one of claims 1 to 8, A II 4, A I 5, A II 6, A I 3 is identical as A II 4, and A I 5 is identical as A II 6;One side CCC of communication possesses A I 3, the party intermediary of communication VVV possesses A II 4, A I 5, and another party DDD of communication possesses A II 6;
(2) after plaintext L ' is encrypted to ciphertext kk using A I 3 by CCC, to VVV send half ciphertext pp or kk, pp=L '+ kk;VVV collect mail after, using A II 4 " confirmation pp in L ', or decryption kk, and then L ' be restored ", wherein should " confirmation pp In L ' " refer to, the L ' in pp is encrypted to ciphertext qq by A II 4, and whether the kk compared in qq and pp identical, if they are the same, then Whether the L ' that the kk in pp is decrypted into rr by L ' or A II 4 in VVV confirmation pp, compares in rr and pp is identical, if they are the same, then VVV confirms the L ' in pp;
After plaintext L ' is encrypted to ciphertext ss using A I 5 by VVV, half ciphertext tt or ss, tt=L '+ss are sent to DDD; DDD collect mail after, using A II 6 " confirmation tt in L ', or decryption ss, and then L ' be restored ", wherein should " confirmation tt in L ' " refers to that the L ' in tt is encrypted to ciphertext uu by A II 6, and whether the ss compared in uu and tt is identical, and if they are the same, then VVV is true Recognize the L ' in tt or A II 6 ss in tt is decrypted into ww, the L ' that compares in ww and tt it is whether identical, if they are the same, then VVV is true Recognize the L ' in tt.
The utility model has the advantages that
Core of the invention content first is that: since the first order node in each cipher table up, until the (Dc-1) grade node terminates, and each node is incomplete fission node, several next stage nodes of directly fissioning out;Cause This, since third level node up, each node directly belongs to some node in even higher level of node.
So after Lmnm Mapping B cmxhdcmyhdcmzhdcm, following the character group Lm (nm+ after Lmnm closely in encryption 1) when Mapping B cmxh (dcm+i) yh (dcm+i) zh (dcm+i), key point is, Bcmxh (dcm+i) yh (dcm+i) zh (dcm+i), it is necessary to be that the Bcmxhdcmyhdcmzhdcm directly or indirectly fissions out;In decryption, from Bcmxhdcmyhdcmzhdcm (with Lmnm phase mapping) obtains node Bcmxh (dcm-i) yh to (dcm-i) grade node-home (dcm-i) zh (dcm-i) [with Lm (nm-1) phase mapping], key point is, the Bcmxhdcmyhdcmzhdcm, it is necessary to be direct Or Bcmxh (dcm-i) yh (dcm-i) zh (dcm-i) is belonged to indirectly.
Core content second is that: each node have plane coordinates or spatial coordinate, wherein when each node has When spatial coordinate, then node is more difficult to be cracked;Each node corresponds to one and the above code characters group, because of code characters Group has spatial coordinate, and code characters group is made to be more difficult to be cracked;That is, cipher table has stereochemical structure, cipher table is Three-dimensional, it is difficult to it is cracked.
Core content third is that: the calculation position, contraposition, on the basis of resistance is deleted, also resist reset.
Core content fourth is that: be related to multiple cipher tables encryption when, dynamically select multiple cipher tables, make the selection of cipher table It is relevant with more randomness, also, between the multiple cipher tables dynamically selected;More innovatively, it is selected in dynamic more On the basis of a cipher table, plaintext L can be encrypted to the very short ciphertext of length, benefit is: (1) for example, such as following 7 institutes of example It states, plaintext L is encrypted to 555525555255552 (EcMfxhd ' cMyhd ' cMzhd ' cM, i.e. ciphertext dd), that is, plaintext L is added A code characters group in close the last one cipher table in several relevant cipher tables, then the ciphertext can not exist It is rearranged, deletes problem;(2) if code characters group is all disposable (after being used, being abandoned), if with having The ciphertext of dry ciphertext character group is compared, then has saved a code characters group (cipher word in the last one described cipher table Symbol group EcMfxhd ' cMyhd ' cMzhd ' cM after being used, is abandoned, and in other cipher tables in several described cipher tables The code characters group Ecmfxhd ' cmyhd ' cmzhd ' cm being involved, can not be abandoned by A, but change its it is original where Relative position);(3) plaintext L can be the audio and/or video of big data quantity, that is, can by the audio of big data quantity and/ Or video, it is encrypted to the ciphertext being only made of a ciphertext character group, and form half ciphertext, send, is then convenient for destination Confirm the audio and/or video either with or without being replaced, reset, delete.
Core content fifth is that: it is described between ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm, and/or ... it Between, carry out mathematical computations, split combination ..., help to resist ciphertext only attack (because ciphertext character group is stashed), into And defend replacement;Meanwhile if as soon as ciphertext dd is a ciphertext character group, there is no reset, delete problem.
Core content sixth is that: the original writing system expands the scope of application of atom caryogram cryptographic system.
In addition, being not necessarily one-to-one correspondence when nm corresponds to dcm;For example, the m in Nm takes a sub-value when Nm corresponds to d ' cm, Cm in d ' cm takes secondary and values above, that is, a LmNm can map multiple Bcmxhd ' cmyhd ' cmzhd ' cm, obtain multiple Ecmfxhd ' cmyhd ' cmzhd ' cm, so that ciphertext be made to be more difficult to be replaced.
In addition, Bcmxhd ' cmyhd ' cmzhd ' cm corresponds to Ecmfxhd ' cmyhd ' cmzhd ' cm, it is not necessarily an a pair It answers;For example, according to preset program, fxhdcyhdczhdc is desirable when Fxhdcyhdczhdc is greater than 1 natural number 1 --- two between Fxhdcyhdczhdc and numbers above, that is, a node Bcmxhd ' cmyhd ' cmzhd ' being mapped Cm can correspond to multiple Ecmfxhd ' cmyhd ' cmzhd ' cm, so that ciphertext character group be made to be more difficult to be replaced.
The defensive replacement (distorting) of the present invention.For example, (password is pair under the premise of the password of addresser has been cracked Position password, but be not this patent atom caryogram password), it will be substituted in plain text " day after tomorrow goes " in plain text " today goes ";But it uses After atom caryogram cryptographic system, if fake producer attempts to replace, it is necessary to close to replace with a code characters group (corresponding " rear ") Original ciphertext character group (corresponding " the present ") in text, due to the code characters group in atom caryogram cryptographic system, it is difficult to it is cracked, To be difficult to be replaced.
For example, each code characters group is 15 bit digitals, 15 bit digitals are exactly 100,000,000,000,000, that is to say, that are being slightly less than hundred In trillion different code characters groups, more than 100 ten thousand or more different passwords are randomly choosed for each cipher table (Dc=7) Character group, so, it is the equal of 1/100000000th that (1), which selects more than 100 ten thousand in being slightly less than 100,000,000,000,000, for each cipher table, Ratio;(2) fake producer is in order to replace some code characters group, in more than 100 ten thousand or more, guesses on one probability is Hundred a ten thousandths;(3) even if fake producer has guessed some code characters group in some cipher table, due in some cipher table Dc=7, it is therefore difficult to know the node in some code characters group and some cipher table on which rank of node set body It is corresponding;(4) due to node set body more than one (dc is bigger, and the quantity of node set body at the same level is more) at the same level, so, It is difficult to know some code characters group, it is corresponding with the node on which node set body in node set body at the same level;(5) Since on different node set bodies, putting in order for node be not all identical, it is therefore difficult to know some code characters Group is corresponding with which node on some node set body;(6) when should which node correspond to several code characters groups Ecfxhdcyhdczhdc, that is, when on Fxhdcyhdczhdc >=2, be then difficult to know some code characters group where it In code characters group aggregate tagmeme (1,2 ..., Fxhdcyhdczhdc, be exactly the sequence on a code characters group aggregate Position arrangement).
Because code characters group has spatial coordinate, that is, indicate that the spatial position of code characters group is (empty with spatial coordinate Between dimension), so, unless fake producer is aware of the spatial coordinate of some code characters group, that corresponding node Plane coordinates or spatial coordinate, otherwise, even if fake producer has guessed some code characters group, fake producer is also difficult to know this certain Which node is a code characters group correspond to, or is difficult to know code characters group set of some the code characters group where it Tagmeme (because having guessed wrong tagmeme, also will appear weak point) in body.
(pretending to be) is forged in defence.For example, cheat pretends to be the QQ number code of addresser, transmitted to the relative of addresser, says that " I am anxious Need to spend money ", allow receiver to hasten to some account remittance;And use atom caryogram cryptosystem encryption QQ information, then the cheat It can not succeed, because, after which must successfully usurp the atom caryogram password password device that addresser possesses, encryption QQ letter It ceases, transmit, VVV just can carry out intermediary (transmitting to the relative of addresser) for cheat;For example, cheat to pretend to be government offices, to Some citizen transmits (swindle), and cheat must successfully usurp the atom caryogram password password device that government offices possess and otherwise deceive Son has no idea to pretend to be government offices, because VVV can not carry out intermediary (transmitting to some citizen) for you.
Defending against network starts a rumour (because of online often anonymity, belong to a kind of special forgery).For example, signing in advance It concludes an agreement, agreement regulation: when online dispatch, follow-up, it is necessary to (pass through VVV using personal atom caryogram password password device encryption Intermediary);This measure is convenient for tracing the source started a rumour, containment the starting a rumour, mislead the people, destroying of " network navy ", random state.
Defend general playback.For example, in real life, for convenient for memory, vast majority of people is provided with static state, digit Limited identification cipher (bank card password, password lock cipher etc.), if criminal to carry out Replay Attack, for example, silver-colored Capable regulation is that daily trial and error number is no more than 2 times, then for criminal in 2 trial and errors allowed daily, input is different Numeric string or digital string, until having one day, hit it finally, then the password is cracked by criminal;But if using former Daughter nucleus type cryptosystem encryption, due to its be it is dynamic, one-time pad (indicates that the ciphertext character group of identification cipher is used Afterwards, abandon or change relative position by A), it is synchronous that (A I is synchronous with A II, that is, the continuous more days trial and errors of A I can be led A II synchronous operation is caused, and then A II can issue alert news), make criminal that can not crack identification cipher by Replay Attack.
Also a kind of " abnormal type is reset " (a kind of behavior sabotaged) can be defendd by the calculation position, contraposition;For example, broken Bad person is directed to the atom caryogram password password device (A I) of some number, has arbitrarily compiled 15 bit digitals as ciphertext (assuming that should 15 bit digitals are a code characters group in some cipher table in the atom caryogram password password device by chance), and send The number of the ciphertext, the atom caryogram password password device, so that atom caryogram cryptographic system is gone wrong, (A I is not transmitted, and A II but receives transmitting for A I, also the operation of progress next step and cause that A I and A II's is asynchronous);But because the calculation position, Contraposition is checked on, (this 15 when direct destination (A II) calculates position (M=1, m=1, y=0, m+M+y=1+1+0=2), contraposition Number should correspond to cipher table A2), unless 15 bit digital also happens to be a code characters group in A2, otherwise occur different Often.
Defence is reset.For example, fake producer has reset plaintext character field in half ciphertext, ciphertext character group, direct destination When encrypting, confirming the plaintext in half ciphertext, since identical plaintext character field maps in different cipher tables, obtain Ecmfxhd ' cmyhd ' cmzhd ' cm is different (because all code characters groups are unique, some cipher word in A Symbol group is only uniquely present in some cipher table), so, some plaintext character field is rearranged, aligns, reflects with new cipher table After penetrating, new ciphertext is obtained, original ciphertext in the new ciphertext and half ciphertext is inevitable not to be consistent.For example, when ciphertext is independent In use, fake producer has reset the ciphertext character group in ciphertext, but because some ciphertext character group in ciphertext is rearranged after, sequence Position is changed, so, when direct destination decrypts, which should align with new cipher table, similarly, Necessarily occur abnormal.
The present invention is highly-safe.Cipher system requirement: 1, key is real random sequence;2, key length is more than or equal to Length of the plaintext;3, each key only uses primary (one-time pad).The key of this patent atom caryogram cryptographic system, mainly password Table;In cipher table, between node and node relevant, not at the same level, there is the relationship of three-dimensional, complicated fission or ownership; Code characters group in cipher table is real random sequence, and is three-dimensional random sequence (because code characters group has Spatial coordinate).The content (length) of cipher table is more than or equal to length of the plaintext.Due to the presence of the subordinate list of cipher table, can allow is made Used code characters group is abandoned, and each key (cipher table) is made to be dynamic, one-time pad.
The present invention is general, conveniently: (1) not only for encrypting short essay (such as identification cipher, unlocking cipher), but also for encrypting length Whole finance account in text, such as e-payment, text whole in transaction amount, such as Content of Communication, such as to call The encrypted acknowledgment of (audio), picture (video).(2) both for stationary electronic device (such as fixed desktop computer, have it is close The safety box of code lock), and it is used for mobile device;Such as the engineering machinery moved, such as mobile phone, that is, guaranteeing to completely cut off handset sickness Under the premise of poison, atom caryogram cryptographic system is built-in in mobile phone;Such as object wearing device, that is, atom caryogram cryptographic system can It is built in object wearing device, such as wrist scrambler, the wrist scrambler and internet are not connected to, are sick with the wooden horse from internet Poison has physical isolation;The defect (such as U-shield) being related to there is no USBKey, that is, USBKey needs first to download a client software, And it is not easy to mobile use.(3) (such as described original writing system) applied widely.
To sum up, the present invention is defensive replaces, forges, resetting, resetting, deleting, highly-safe, general, conveniently.
Detailed description of the invention:
Fig. 1 is tree-like cipher table A6 (cm=c1=6 in Acm);Hdcm dcm grades of nodes, tree form distribution are flat in xy On face, then in Fig. 1: Hd6 d6 grades of nodes, for tree form distribution on x/y plane, node Bcmxhdcmyhdcm is node B6xhd6yhd6, code characters group Ecmfxhdcmyhdcmzhdcm are code characters group E6fxhd6yhd6zhd6.
In Fig. 1, " core of A6 " is equivalent to the tree root of tree-like A6, and " core of A6 " is equivalent to the first order node of A6.
In Fig. 1,10 the 2nd grade of node B6xh2yh2 (d6=2, hd6=h2 in Hd6=H2=10, B6xhd6yhd6, Successively 9,2,1,6,4,7,0,5,3,8), be distributed on the trunk of tree-like A6 (trunk is second level node set body), come Derived from the fission of " core of A6 ";The E6fxhd6yhd6zhd6 is E6fxh2yh2zh2, and B6xh2yh2 is corresponding E6fxh2yh2zh2。
B6x9y9=3 (h2=9) in 10 the 2nd grade of node B6xh2yh2, the 2nd grade of node B6x9y9 are corresponding E6fx9y9z9 (h2=9 in E6fxh2yh2zh2);As fx9y9z9=1, E6fx9y9z9 is E61, which is 123456789044444。
In Fig. 1,10 3rd level node B6xh3yh3 (d6=3, hd6=h3 in Hd6=H3=10, B6xhd6yhd6, Successively 5,2,6,8,0,3,4,1,9,7), be distributed on a branch of tree-like A6 that (branch is third level node set Body), from above-mentioned 2nd grade of node B6x9y9 fission (that is, any one node in 10 3rd level node B6xh3yh3, Belong to the B6x9y9);E6fxhd6yhd6zhd6 is E6fxh3yh3zh3, and B6xh3yh3 corresponds to E6fxh3yh3zh3.
B6x5y5=0 (h3=5) in 10 3rd level node B6xh3yh3, the 3rd level node B6x5y5 are corresponding E6fx5y5z5 (h3=5 in E6fxh3yh3zh3);As fx5y5z5=1, E6fx5y5z5 is E61, which is 678901234588888。
In Fig. 1,10 the 4th grade of node B6xh4yh4 (d6=4, hd6=h4 in Hd6=H4=10, B6xhd6yhd6, Successively 6,5,1,0,9,2,4,3,7,8), be distributed on a branch of tree-like A6 that (branch is fourth stage node set Body), from above-mentioned 3rd level node B6x5y5 fission (that is, any one node in 10 the 4th grade of node B6xh4yh4, Belong to the B6x5y5);E6fxhd6yhd6zhd6 is E6fxh4yh4zh4, and B6xh4yh4 corresponds to E6fxh4yh4zh4.
B6x7y7=4 (h4=7) in 10 the 4th grade of node B6xh4yh4, the 4th grade of node B6x7y7 are corresponding E6fx7y7z7 (h4=7 in E6fxh4yh4zh4);As fx7y7z7=1, E6fx7y7z7 is E61, which is 222232222322223。
Condition by drawing attached drawing is limited, so, there is the omission point in Fig. 1;In Fig. 1, the vertical point that omits is indicated The fission of node B6xh3yh3, level, which omits point, indicates the fission of node B6xh2yh2, and inclined omission point indicates and node The corresponding E6fxh2yh2zh2 of B6xh2yh2, E6fxh3yh3zh3 corresponding with node B6xh3yh3 and B6xh4yh4 phase Corresponding E6fxh4yh4zh4;Inclined omission point is also shown that code characters group perpendicular to the X/Y plane where node, that is, A6 It is three-dimensional.
Specific embodiment
In the following with reference to the drawings and specific embodiments, the present invention is furture elucidated, it should be understood that these embodiments are merely to illustrate The present invention rather than limit the scope of the invention, after the present invention has been read, this field related personnel, producer, mechanism pair The modification and/or utilization of various equivalent forms of the invention fall within herein described technical solution limited range.
Example 1, the first step are that plaintext L is divided (quartile) at M sections of plaintext character fields (L1, L2 ..., LM) (1≤m≤M).
Second step is the calculating (i.e. calculation position) of position;In the calculation position position 5Wm=m+M+y [Wm is 2 --- one is taken between C And the above natural number, y=0 or y are 1 --- and one and the above natural number are taken between (C-2M)] or Wm=(C+z)-m-M [Wm 1 --- one and the above natural number are taken between C, z=0 or z are 1 --- one and the above natural number are taken between (M+1)]; Mmax is can be by the maximum quantity of the plaintext character field of A primary encryption, 2Mmax=C, or (2Mmax+1)=C, and M is 1 --- One and the above natural number are taken between Mmax.
In this example, y=0 or z=1, total quantity C=2000, the 2Mmax=C=2000 of cipher table, then Mmax=1000; So Wm=m+M, Wm are 2 --- one and the above natural number are taken between 2000;Or Wm=(C+z)-m-M, Wm is 1 --- One and the above natural number are taken between 2000.
Third step is contraposition;Wm and cm is corresponded, then Lm and Acm is corresponded;That is, the cm in Wm and Acm, respectively from It is small to arrange to longer spread or from big to small, and corresponded (contraposition), then Lm and Acm are corresponded (contraposition).
For example, the first step, L is divided into 1 section (L1), then L1 is exactly L (M=1, m=1).Second step calculates position;W1=m+M =1+1=2 or W1=(C+z)-m-M=(2000+1) -1-1=1999.Third step, contraposition;C1 in W1 (=2) and Ac1 (=2) are aligned, then L1 and A2 is aligned, that is, L1 is encrypted with cipher table A2;Or in W1 (=1999) and Ac1 C1 (=1999) is aligned, then L1 and A1999 is aligned, that is, L1 is encrypted with cipher table A1999.
For example, the first step, L is divided into 3 sections (L1, L2, L3) (M=3,1≤m≤M), then L1, L2, L3 are in L respectively Plaintext character field.Second step calculates position;Because M=3, m are 1,2,3, so W1=1+3=4, W2=2+3=5, W3=3+3 =6 or W1=2000+1-1-3=1997, W2=2000+1-2-3=1996, W3=2000+1-3-3=1995.Third step, Contraposition;Wm (being equal to 4,5,6) is arranged from small to large respectively with the cm (being equal to 4,5,6) in Acm, and is corresponded, then L1 It is aligned with A4, L2 is aligned with A5, and L3 is aligned with A6, that is, L1 is encrypted with cipher table A4, L2 cipher table A5 is encrypted, and L3 is encrypted with cipher table A6;Or in Wm (be equal to 1997,1996,1995) and Acm cm (be equal to 1997, 1996,1995) it respectively from big to small arranges, and is corresponded, then L1 and A1997 is aligned, and L2 and A1996 are carried out pair Position, L3 are aligned with A1995, that is, L1 is encrypted with cipher table A1997, and L2 is encrypted with cipher table A1996, and L3 is used Cipher table A1995 is encrypted.
For example, the first step, L is divided into 1000 sections (L1, L2 ..., L1000) (M=Mmax=1000,1≤m≤M), Then L1, L2 ..., L1000 be plaintext character field in L respectively.Second step calculates position;Because M=1000, m are 1,2 ..., 1000, thus Wm be equal to 1+1000 (=1001), 2+1000 (=1002) ..., 1000+1000 (=2000) or Wm be equal to 2000+1-1-1000 (=1000), 2000+1-2-1000 (=999) ..., 2000+1-1000-1000 (=1).Third step, Contraposition;Wm (be equal to 1001,1002 ..., 2000) with Acm in cm (be equal to 1001,1002 ..., 2000), respectively from it is small to Longer spread, and being corresponded, then L1 and A1001 is aligned, and L2 is aligned with A1002 ..., L1000 and A2000 Aligned, that is, L1 is encrypted with cipher table A1001, and L2 is encrypted with cipher table A1002 ..., L1000 cipher table A2000 is encrypted;Or Wm (be equal to 1000,999 ..., 1) with Acm in cm (be equal to 1000,999 ..., 1) respectively from big To minispread, and corresponded, then L1 and A1000 is aligned, and L2 is aligned with A999 ..., L1000 and A1 into Row contraposition, that is, L1 is encrypted with cipher table A1000, and L2 is encrypted with cipher table A999 ..., L1000 cipher table A1 It is encrypted.
In addition, plaintext L is encrypted to ciphertext dd, is sent to A II by A I, and under the premise of ciphertext dd can be decrypted, A The dd can be divided (quartile) into same amount of ciphertext character group, calculation position, contraposition, mapping, decryption by II.For example, when encryption, A Plaintext L is divided into 3 plaintext character field L1, L2, L3 (M=3) by I;After A II receives ciphertext dd, dd is divided into 3 by A II A ciphertext character group (dd1, dd2, dd3), m=1,2,3, M=3, ddm are ciphertext character groups in ciphertext dd.Carry out again calculation position, Contraposition (identical as the calculation position in encryption, contraposition principle);For example, calculating position with the addition, that is, dd1 and A4 contraposition (is solved with A4 It is close) so L1 be resumed, dd2 and A5 contraposition (being decrypted with A5) and then L2 is resumed, dd3 and A6 align (being decrypted with A6), into And L3 is resumed;And then L is resumed.
It is described calculate position, contraposition main purpose (or great advantage) be: atom caryogram cryptographic system be used for encrypt or When decryption, by the calculation position, contraposition, half ciphertext or ciphertext for issuing fake producer (or saboteur) to originator, Wu Fajin What row left no trace deletes, and can't reset.
Example 2, for example, step 1, certain consumer CCC (originator possesses A I 3) (collects mail on the net to on-line shop DDD indirectly Side, possesses A II 6, A 6 ≠ A of II I 3) shopping, and paid in advance by Internetbank to DDD, Payment Amount is 34 yuan of people Coin;The bank account of DDD is 304565 (assuming that the digit of bank account is 6), and the bank account of CCC is 456078, then originally Plaintext L in example is 30456534456078 (first 6 are collecting account, and centre is transaction amount, and latter 6 are Send only Account), That is, the L is the full content of this e-payment (e-Bank payment).
Position, contraposition are calculated in step 2, segmentation (quartile).According to program preset in A I 3, L be divided into M sections [L1, L2 ..., LM], Lm is the plaintext character field (1≤m≤M) in L;In this example, collecting account 304565 is divided into 2 sections, hands over The easy amount of money (money transfer amount) 34 is divided into 1 section, and Send only Account 456078 is divided into 2 sections, so, which is divided into 5 sections of (M =5, m be 1,2,3,4,5), that is, it be 565, L3 be 34, L4 be 456, L5 is 078 that L1, which is 304, L2,.
Similarly with the calculation position (addition) of example 1, contraposition, because of m=1, M=5, y=0, L1 and A6 (such as Fig. 1) are carried out Contraposition, that is, L1 is carried out with cipher table A6 to bit encryption;M=2, M=5, y=0, so, L2 carries out contraposition with cipher table A7 and adds It is close;M=3, M=5, y=0, so L3 is carried out with cipher table A8 to bit encryption;M=4, M=5, y=0, so, L4 cipher table A9 is carried out to bit encryption;M=5, M=5, y=0, so, L5 is carried out with cipher table A10 to bit encryption.
The attached drawing of cipher table A7, A8, A9, A10 are not shown, the structure type of the attached drawing of A7, A8, A9, A10, identical as A6; But on the putting in order of the node on each node set body, whole is not identical with A6 respectively by A7, A8, A9, A10, and It is all not identical between A7, A8, A9, A10;It is not identical between all code characters groups, that is, each code characters group is in A In be unique.
Step 3, grouping, mapping.Lm is divided into Nm group [Lm1, Lm2 ..., LmNm], and Lmnm is the plaintext character in Lm Group (1≤nm≤Nm);In this example, specific grouping is:
L1 is divided into 3 groups (m=1, Nm=N1=3, nm=n1), that is, L11 (n1=1)=3, L12 (n1=2)=0, L13 (n1=N1=3)=4.
L2 is divided into 3 groups (m=2, Nm=N2=3, nm=n2), that is, L21 (n2=1)=5, L22 (n2=2)=6, L23 (n2=N2=3)=5.
L3 is divided into 2 groups (m=3, Nm=N3=2, nm=n3), that is, and L31 (n3=1)=3, L32 (n3=N3=2)= 4。
L4 is divided into 3 groups (m=4, Nm=N4=3, nm=n4), that is, L41 (n4=1)=4, L42 (n4=2)=5, L43 (n4=N4=3)=6.
L5 is divided into 3 groups (m=5, Nm=N5=3, nm=n5), that is, L51 (n5=1)=0, L52 (n5=2)=7, L53 (n5=N5=3)=8.
According to program preset in A I, Lmnm map corresponding Bcmxhdcmyhdcmzhdcm in Acm (nm corresponds to dcm, Wherein, Nm corresponds to d ' cm, then LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd ' cmyhd ' Cmzhd ' cm), then Lm is mapped, stays tail formula encryption (fusion) at the Ecmfxhd ' cmyhd ' cmzhd ' cm;When nm corresponds to dcm, Nm, dcm difference are from small to large, that is, after Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm, follow the character after Lmnm closely Group Lm (nm+1) maps Bcmxh (dcm+i) yh (dcm+i) that the Bcmxhdcmyhdcmzhdcm directly or indirectly fissions out zh(dcm+i).I=1 in this example.
As Fig. 1, L1n1 map corresponding B6xhd6yhd6 in A6;M=1, Lm=L1, nm=n1, cm=c1=6, Acm= Ac1=A6, Bcm=Bc1=B6, dcm=dc1=d6, d ' cm=d ' c1=d ' 6, Nm=N1, n1 corresponds to d6, wherein N1 is corresponding D ' 6, then L1N1 Mapping B 6xhd ' 6yhd ' 6, and then L1N1 corresponds to E6fxhd ' 6yhd ' 6zhd ' 6.Specifically, as follows:
Such as Fig. 1, because the n1 (=1) in L1n1 is corresponding d6 (=2), the B6xhd6yhd6 with L11 phase mapping is (10 second level node B6xh2yh2 are shown in Fig. 1 for some node in 10 second level node B6xh2yh2 shown in FIG. 1 Second level node set body on, be successively 9,2,1,6,4,7,0,5,3,8);Again because of 10 second level nodes Node B6x9y9=3 (h2=9) in B6xh2yh2, so L11 (=3) maps second level node B6x9y9 (number 3).
Such as Fig. 1, because the n1 (=2) in L1n1 is corresponding d6 (=3), the B6xhd6yhd6 with L12 phase mapping is (10 third level node B6xh3yh3 are shown in Fig. 1 for some node in 10 third level nodes B6xh3yh3 shown in FIG. 1 Third level node set body on, be successively 5,2,6,8,0,3,4,1,9,7, the third level node set body and the above-mentioned second level Node B6x9y9 is connected directly, that is, 10 third level node B6xh3yh3 are that second level node B6x9y9 directly fissions Out);It is reflected again because of the node B6x5y5=0 (h3=5) in 10 third level node B6xh3yh3, L12 (=0) Penetrate third level node B6x5y5 (B6x5y5, i.e. number 0 are that second level node B6x9y9 directly fissions out).
Such as Fig. 1, because the n1 (=N1=3) in L1n1 is corresponding d ' 6 (=D6=4), with L13 phase mapping B6xhd ' 6yhd ' 6 is some node (10 fourth stage node in 10 fourth stage nodes B6xh4yh4 shown in FIG. 1 It is successively 6,5,1,0,9,2,4,3,7,8 on fourth stage node set body B6xh4yh4 shown in Fig. 1, the fourth stage node Aggregate is connected directly with above-mentioned third level node B6x5y5, that is, 10 fourth stage node B6xh4yh4 are the third level Node B6x5y5 directly fissions out);Again because of the node B6x7y7=4 (h4 in 10 fourth stage node B6xh4yh4 =7), so L13 (=4) maps fourth stage node B6x7y7, (B6x7y7, i.e. number 4, belong to the B6xhd ' in this example 6yhd ' 6, meanwhile, which is that third level node B6x5y5 directly fissions out), and then L13 corresponds to E6fx7y7z7, Corresponding to E61 because of the fx7y7z7=1 in this example, L13 again, (E61 is code characters group 222232222322223, should 222232222322223 belong to E6fxhd ' 6yhd ' 6zhd ' 6) in this example;Then L1 (304) is mapped, stays the encryption of tail formula (poly- Become) at 222232222322223 (i.e. E61).
Similarly, L2n2 maps corresponding B7xhd7yhd7 in A7;M=2, cm=c2=7, Nm=N2, n2 correspond to d7, In, N2 corresponds to d ' 7, then L2N2 Mapping B 7xhd ' 7yhd ' 7, and then L2N2 corresponds to E7fxhd ' 7yhd ' 7zhd ' 7;Specifically, such as Under:
Because the n2 (=1) in L2n2 is corresponding d7 (=2), the B7xhd7yhd7 with L21 phase mapping is 10 second Some node ... in grade node B7xh2yh2;Again because of the B7x10y10=5 in 10 second level node B6xh2yh2 (h2=10), so L21 (=5) maps second level node B7x10y10 (number 5).
Because n2 (=2) in L2n2 is corresponding d7 (=3), the B7xhd7yhd7 with L22 phase phase mapping is 10 the Some node ... in three-level node B7xh3yh3;Again because of the B7x4y4=6 in 10 third level node B7xh3yh3 (h3=4), so L22 (=6) maps third level node B7x4y4, (B7x4y4, i.e. number 6, are above-mentioned second level nodes B7x10y10 directly fissions out).
Because the n2 (=N2=3) in L2n2 is corresponding d ' 7 (=D7=4), the B7xhd ' 7yhd ' with L23 phase mapping 7 be some node ... in 10 fourth stage node B7xh4yh4;Again because in 10 fourth stage node B7xh4yh4 B7x8y8=5 (h4=8), so L23 (=5) maps fourth stage node B7x8y8, (B7x8y8, i.e. number 5, belong to this example In B7xhd ' 7yhd ' 7, meanwhile, the B7x8y8 be above-mentioned third level node B7x4y4 directly fission come out), and then L23 pairs E7fx8y8z8 is answered, and because of the fx8y8z8=1 in this example, L23 corresponds to E71, and (E71 is code characters group 333343333433334, this 333343333433334 belongs to E7fxhd ' 7yhd ' 7zhd ' 7) in this example;Then L2 be mapped, Stay tail formula encryption (fusion) at 333343333433334 (i.e. E71).
Similarly, L3n3 maps corresponding B8xhd8yhd8 in A8;M=3, cm=c3=8, Nm=N3, n3 correspond to d8, In, N3 corresponds to d ' 8, then L3N3 Mapping B 8xhd ' 8yhd ' 8, and then L3N3 corresponds to E8fxhd ' 8yhd ' 8zhd ' 8;Specifically, such as Under:
Because n3 (=1) in L3n3 corresponding d8 (=2) ..., L31 (=3) maps second level node B8x4y4 (number 3).
Because the n3 (=N2=2) in L3n3 is corresponding d ' 8 (=3), the B8xhd ' 8yhd ' 8 with L32 phase mapping is Some node ... in 10 third level node B8xh3yh3;Again because in 10 third level node B8xh3yh3 B8x9y9=4 (h3=9), so L32 (=4) maps third level node B8x9y9, (B8x9y9, i.e. number 4, belong to this example In B8xhd ' 8yhd ' 8, meanwhile, the B8x9y9 be above-mentioned second level node B8x4y4 directly fission come out), and then L32 pairs E8fx9y9z9 is answered, and because of the fx9y9z9=1 in this example, L32 corresponds to E81, and (E81 is code characters group 444454444544445, this 444454444544445 belongs to E8fxhd ' 8yhd ' 8zhd ' 8) in this example;Then L3 be mapped, Stay tail formula encryption (fusion) at 444454444544445 (i.e. E81).It should be noted that D8=4.
Similarly, L4n4 maps corresponding B9xhd9yhd9 in A9;M=4, cm=c4=9, Nm=N4, n4 correspond to d9, In, N4 corresponds to d ' 9, then L4N4 Mapping B 9xhd ' 9yhd ' 9, and then L4N4 corresponds to E9fxhd ' 9yhd ' 9zhd ' 9;Specifically, such as Under:
Because the n4 (=1) in L4n4 is corresponding d9 (=2) ...;So L41 (=4) maps second level node B9x6y6 (number 4).
Because the n4 (=2) in L4n4 is corresponding d9 (=3) ...;So L42 (=5) maps third level node B9x1y1 (number 5) (B9x1y1 is that above-mentioned second level node B9x6y6 directly fissions out).
Because the n4 (=N4=3) in L4n4 is corresponding d ' 9 (=D9=4), the B9xhd ' 9yhd ' with L43 phase mapping 9 be some node ... in 10 fourth stage node B9xh4yh4;Again because in 10 fourth stage node B9xh4yh4 B9x2y2=6 (h4=2) ..., so, L43 (=6) maps fourth stage node B9x2y2, and (B9x2y2, i.e. number 6, are these B9xhd ' 9yhd ' 9 in example, meanwhile, which is that above-mentioned third level node B9x1y1 directly fissions out), and then L43 Corresponding E9fx2y2z2, and because of the fx2y2z2=1 in this example, L43 corresponds to E91, and (E91 is code characters group 555565555655556, this 555565555655556 be E9fxhd ' 9yhd ' 9zhd ' 9) in this example;Then L4 is mapped, stays Tail formula encrypts (fusion) into 555565555655556 (i.e. E91).
Similarly, L5n5 maps corresponding B10xhd10yhd10 in A10;M=5, cm=c5=10, Nm=N5, n5 are corresponding D10, wherein N5 corresponds to d ' 10, then L5N5 Mapping B 10xhd ' 10yhd ' 10, and then L5N5 corresponds to E10fxhd ' 10yhd ' 10zhd′10;Specifically, as follows:
Because the n5 (=1) in L5n5 is corresponding d10 (=2) ...;So L51 (=0) maps second level node B10x8y8 (number 0).
Because the n5 (=2) in L5n5 is corresponding d10 (=3) ...;So L52 (=7) maps third level node B10x7y7 (number 7) (B10x7y7 is that above-mentioned second level node B10x8y8 directly fissions out).
Because the n5 (=N5=3) in L5n5 is corresponding d ' 10 (=D10=4), the B10xhd ' with L53 phase mapping 10yhd ' 10 is some node ... in 10 fourth stage node B10xh4yh4;Again because of 10 fourth stage nodes B10x5y5=8 (h4=5) in B10xh4yh4, thus L53 (=8) map fourth stage node B10x5y5 (B10x5y5, That is number 8, is the B10xhd ' 10yhd ' 10 in this example, meanwhile, which is that above-mentioned third level node B10x7y7 is directly split Become out), and then L53 corresponds to E10fx5y5z5, and corresponding to E101 because of the fx5y5z5=1 in this example, L53 (should E101 is code characters group 666676666766667, this 666676666766667 is E10fxhd ' 10yhd ' in this example 10zhd′10);Then L5 is mapped, stays tail formula encryption (fusion) at 666676666766667 (i.e. E101).
Step 4, further, L (30456534456078) are encrypted to ciphertext dd by A I 3, which is 222232222322223/333343333433334/444454444544445/555565555655556/ 666676666766667。
Still further, forming half ciphertext on the basis of the ciphertext dd;Half ciphertext is: (30456534456078)+(222232222322223/333343333433334/444454444544445/ 555565555655556/666676666766667), that is, half ciphertext is (L+dd).
To the communications intermediary side VVV of authority, (VVV possesses A II 4, A I 5, A II 4=A I 3, A I to consumer CCC 5=A II 6) send half ciphertext (L+dd), the number 4545 of scrambler A I 3.
Step 5, if consumer CCC registered the bank account of oneself at VVV, VVV will also first check CCC and send Half ciphertext in Send only Account, whether be consistent with the bank account that it is registered at VVV (with anti-counterfeiting);After confirmation, 4545 (numbers of scrambler A I 3) that VVV is sent according to CCC, recall A II 4.
VVV encrypts with A II 4, confirms and plaintext L:A II 4 L is encrypted to ciphertext dd ' (encryption principle is identical to A I The principle of 3 encryption L), and whether compare the ciphertext dd that the ciphertext dd ' and A I 3 that A II 4 is encrypted to is encrypted to identical;In this example Identical, then L obtains the confirmation of VVV.
Or VVV is decrypted with A II 4, is confirmed that the ciphertext in half ciphertext is grouped (quartile) by plaintext L:A II 4 (from left to right, 15 Arabic numerals are a ciphertext character group), the 5 ciphertext character groups that will be obtained after grouping, with A II A6, A7, A8, A9, A10 in 4 are corresponded, are aligned and (calculate the principle of position, contraposition, be identical to the principle of example 1), map (the 1st ciphertext character group 222232222322223 map code characters group in A6 ..., the 5th ciphertext character group 666676666766667 mapping A10 in code characters group), decryption, obtain plaintext character field, further, obtain in plain text, Compare plaintext that A II 4 is decrypted again and whether L is identical;Identical in this example, then L obtains the confirmation of VVV.
It is [close that ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm in ciphertext dd is decrypted into plaintext character field Lm by A II Chinese character group Ecmfxhd ' cmyhd ' cmzhd ' cm should after mapping the code characters group Ecmfxhdcmyhdcmzhdcm in Acm Ecmfxhdcmyhdcmzhdcm inverse correspondence node Bcmxhdcmyhdcmzhdcm (with LmNm phase mapping), from this Bcmxhdcmyhdcmzhdcm starts, and to (dcm-i) grade node-home, obtains node Bcmxh (dcm-i) yh (dcm-i) zn (dcm-i) [with Lm (Nm-1) phase mapping] ..., and so on, belong to always node Bcmxhd " cmyhdc " mzhd " cm (with Lm1 phase mapping), finally it is sequentially connected in series Bcmxhdcmyhdcmzhdcm, Bcmxh (dcm-i) yh (dcm-i) zh (dcm- I) ..., cm, then Lm is resumed Bcmxhd " cmyhdc " mzhd "], and then L be resumed.In this example, i=1;It is specific decrypted Journey is as follows:
As plaintext character field L1 (304) is encrypted to ciphertext character group 222232222322223 by Fig. 1, A I 3;A II 4 With the ciphertext character group 222232222322223, (search) code characters group is mapped in the A6 in A II 4 222232222322223 (=E6fx7y7z7=E61), 222232222322223 inverse correspondence fourth stage node B6x7y7 (= 4) (with L13 phase mapping), since fourth stage node B6x7y7, to third level node-home, not exclusively fissioned Three-level node B6x5y5 (=0) (with L12 phase mapping);Again since third level node B6x5y5, to second level node-home, (with L11 phase mapping, which is exactly the Bcmxhd " to the second level node B6x9y9 (=3) not exclusively to be fissioned cmyhdc″m zhd″cm);Finally be sequentially connected in series this 4,0,3, then L1 (304) is resumed.
Similarly, A II 4 decrypts ciphertext character group 333343333433334 ..., L2 (565) by the A7 in A II 4 It is resumed.
Similarly, A II 4 decrypts ciphertext character group 444454444544445 ..., L3 (34) quilt by the A8 in A II 4 Restore.
Similarly, A II 4 decrypts ciphertext character group 555565555655556 ..., L4 (456) by the A9 in A II 4 It is resumed.
Similarly, A II 4 decrypts ciphertext character group 666676666766667 ..., L5 (078) by the A10 in A II 4 It is resumed.
Step 6, in A I 3, A II 4, code characters group 222232222322223,333343333433334, 444454444544445, it 555565555655556,666676666766667 is abandoned by A.222202222022220 (K11, it is false If the g=1 in Kgjg, then Kg is K1, and jg is j1, j1=1) it replaces 222232222322223, become the E61, 333303333033330 (K12, j1=2) replace 333343333433334, become the E71, and 444404444044440 (K13, j1=3) replaces 444454444544445, becomes the E81, and 555505555055550 (K14, j1=4) are replaced 555565555655556, become the E91,666606666066660 (K15, j1=5) replace 666676666766667, at For the E101;That is, A I 3, A II 4 are dynamic.
Step 7, VVV and JRJG (" China Unionpay " or relevant bank or relevant payment mechanism or relevant financial machine Structure) connection, (if consumer did not register the bank account of oneself at VVV, the JRJG handle is needed in JRJG agreement Close or cooperate with VVV, to check the Send only Account in half ciphertext that CCC is sent, whether oneself), and operated Complete after this e-Bank payment that (" 34 yuans " in the bank account of consumer CCC are transferred on-line shop DDD's by the JRJG In bank account), after L is encrypted to ciphertext dd " using A I 5 by VVV, the dd " is sent to DDD;After DDD receives the dd ", use A II 6 decrypts the dd " (L is restored), then DDD firmly believes that the fund of this online shopping is transferred bank self by the JRJG In account, DDD starts to deliver to CCC.Also, A I 5, A II 6 are dynamic, that is, used code characters group is put It abandons.Here, there is a premise, DDD registered the bank account (6 associated of A II with DDD) of oneself at VVV, so as to Collecting account (bank account of DDD) in half ciphertext that VVV is sent according to CCC, which is recalled.
In addition, the consumer CCC can also be by the order number of this online shopping, the name of oneself, telephone number, place of acceptance The bank account of location and the DDD, payment amount, the bank account of CCC together, are encrypted to ciphertext using A I 3, and should Ciphertext or half ciphertext by the ciphertext as component part, are sent to VVV, VVV decrypts the ciphertext, or confirms in half ciphertext It after plaintext, re-encrypts, be sent to DDD.
If trojan horse deletes half ciphertext (L+dd);For example, by 5 plaintext character fields Lm, 5 ciphertext words Symbol group ddm is deleted to 1 plaintext character field L1,1 ciphertext character group dd1 (L1 corresponds to dd1), but when due to encrypting, confirming, A The L1 is calculated position (M=1, m=1, y=0, W1=m+M+y=1+1+0=2) by II, (ciphertext comes from for the ciphertext that maps, be encrypted to In A2), not equal to dd1 (dd1 from A6, because of M=5, m=1, y=0, W1=m+M+y=1+5+0=6), and produce Contradictory (because code characters group all in A is unique);Alternatively, calculating position method according to example 1 when decryption, confirmation (addition), dd1 should corresponding A 2, however, a code characters group Ecmfxhd ' cmyhd ' cmzhd ' with the dd1 phase mapping Cm is appeared in A6, and produces the contradiction of A2 and A6.
It is assumed that trojan horse remains the plaintext character field (L1, L2, L3) of front three, the ciphertext character group of front three (dd1, dd2, dd3), two plaintext character fields below, two ciphertext character groups delete below, also, L1 and L3 is adjusted mutually (dd1 becomes new for change place (L1 becomes the third plaintext character group L " ' 3 in new plaintext), dd1 and the mutual reversing of position of dd3 Ciphertext in third ciphertext character group dd " ' 3), and then L " ' 3, dd " ' 3 corresponding cipher table A6 (M=3, m=3, y=0, m+ It M+y=3+3+0=6), then is not in weak point, because L " ' 3, dd " ' 3 is natively corresponded to when encrypted acknowledgment or decryption confirm A6, that is, original M=5, g=1, y=0, m+M+y=5+1+0=6;But second former, former third plaintext character group (L2, L3), and second former, former third ciphertext character group (dd2, dd3) will be inevitable in encrypted acknowledgment or decryption confirmation It will appear weak point.
It should be noted that faking since the digit of bank account is usually specific, (such as 22) that each side is generally acknowledged A possibility that person deletes the e-Bank payment (belonging to e-payment) is little, this example only with the e-Bank payment come into Row explanation;In practice, completely can by the e-payment, change into it is unrelated with e-payment, limited without digit or number of words Word content or identification cipher of system etc., to securely communicate.
If fake producer resets five plaintext character fields in half ciphertext, five ciphertext character groups put in order (such as original L1 and original L2 are exchanged and so that former L2 is become new L1, original L1 and become new L2, and 222232222322223 Hes 333343333433334 exchange), then the A II 4 of VVV is according to the principle of example 1, and normally the plaintext in double of ciphertext carries out institute It states segmentation, calculate position, contraposition, and map, encrypt, then the ciphertext that A II 4 is encrypted to affirms not phase with the ciphertext that A I 3 is encrypted to With (such as after original L2 becomes new L1, the ciphertext character group that new L1 is encrypted to, certainly not 333343333433334, because It is unique for code characters group all in A);Or A II 4 decrypts ciphertext (grouping, calculation in half ciphertext in which can not be successfully It after position, contraposition, maps, searched for less than code characters group 333343333433334 in A6, map, searched for less than close in A7 Code character group 222232222322223).
In addition, if A II 4 to the ciphertext block after, without the calculation position, contraposition (in A search with ciphertext word The code characters group of symbol group phase mapping, rather than contraposition search is carried out in A6, A7, A8, A9, A10), can also be decrypted, Confirmation, that is, after grouping, mapping, decryption, whether verifying and one-to-one five cipher tables of ciphertext character group are also pressed According to tactic (because ciphertext character group arranges from small to large) from small to large, and verifying five cipher tables is not It is A6, A7, A8, A9, A10.In fact, decryption when, when code characters group all in A is unique, either first contraposition, after Mapping still first maps, carries out the verifying afterwards, is the one thing in fact;Because verify five cipher tables be A6, A7, A8, A9, A10 are equivalent to the calculation position, verify what whether five cipher tables arranged from small to large, are equivalent to the contraposition.
In addition, in the component part (4), comprising: between Ecmfxhd ' cmyhd ' cmzhd ' cm, carry out mathematics meter It is obtaining the result is that ciphertext dd after calculation;That is, between Ecmfxhd ' cmyhd ' cmzhd ' cm, progress mathematical computations (such as be added Or subtract each other), a sum is obtained, using the sum as ciphertext dd;For example, in this example, by 222232222322223+ 333343333433334+444454444544445+555565555655556+66667666 6766667, obtained sum are 2222272222722225, then it regard the sum 2222272222722225 as ciphertext dd;Further, by plaintext L (30456534456078)+the dd (2222272222722225), obtains half ciphertext (30456534456078/ 2222272222722225), which is sent to VVV (in this example, plaintext L in half ciphertext can only carries out encrypting really Recognize).Also, 5 code characters groups (222232222322223,333343333433334,444454444544445, 555565555655556,666676666766667), because being hidden, being not exposed to except A, this 5 Code characters group can not be abandoned by A, but change its originally in A where relative position.
Example 3, because the memory space of hardware is limited, for example, when having 26 English words on every level-one node set body When female (Dc >=7) or a Chinese character up to ten thousand (Dc >=3), then require hardware that there is the memory space of flood tide;So in order to expand atom The scope of application of caryogram cryptographic system, the special original a kind of writing system yuan of the present invention, in order to will be existing in the world Writing system, such as one of Chinese character, Chinese words, additional character, letter, alphabetical group (such as English word) or more, turn The alphabetical section being changed in yuan.
For example, yuan has 6 different letters (ee=6), they are Q, R, S, T, U, V;Every 6 letters constitute a word Parent segment ZZZ (ff=6, that is, ff is 1 --- it is taken between ee 6), then it is a different to share 46656 (=6 × 6 × 6 × 6 × 6 × 6) ZZZ。
For another example yuan corresponds to GB2312-80 character set (chinese national standard character set), that is, ZZZ it is corresponding one and with One in upper Chinese character, one or more letter, one and the above Arabic numerals, one and the above additional character (China is general) Kind or more.Such as, in 46656 different ZZZ, 40,000 ZZZ can at least be selected at random, the Chinese character different from 40,000, Chinese words are corresponded;Such as, QQQQQQ (one of ZZZ) is corresponding with Chinese character " people ", and QQQQQR and Chinese words are " public The people " are corresponding.Such as, in 46656 different ZZZ, 6656 ZZZ can be selected at random, with 6656 letters and alphabetical group, number Word and digital group, additional character etc., are corresponded;Such as, QQQQRR is corresponding with English alphabet " m ", QQQRRR and Arab Digital " 5 " or digital group " 333 " are corresponding, and QQRRRR and additional character ", " (comma) are corresponding.
For another example yuan corresponds to English-speaking country's standard character collection, that is, ZZZ corresponding one or more letter, one or more One of Arabic numerals, one and the above additional character (English area is general) or more;Such as, not at described 46656 In same ZZZ, 40,000 ZZZ can be at least selected at random, and the English word different from 40,000, English phrase are corresponded; Such as, QRRRRR is corresponding with English word " sea " (ocean);Such as, in 46656 different ZZZ, 6656 can be selected at random ZZZ is corresponded with 6656 numbers, digital group, additional character.
Example 4, for example, the information that addresser will issue receiver is in plain text " today ";Pass through the conversion table (example in A I 3 Such as, in the conversion table, the alphabetical section ZZZ in yuan described in a Chinese characters up to ten thousand and example 3 is corresponded), A I 3 is by plaintext character Section " the present " is converted to the alphabetical section QRSTUV in yuan, and plaintext character field " day " is converted to the alphabetical section RSTUVQ in yuan, Then " today " is converted into QRSTUVRSTUVQ (plaintext L).
According to program preset in A I 3, it is that (first bright by QRSTUV which, which is divided (quartile) into 2 sections (L1, L2), L1, Text parent segment), L2 is RSTUVQ (the alphabetical section of second plaintext).L1 is divided into 6 groups alphabetical (Q, R, S, T, U, V), that is, L11= Q, L12=R, L13=S, L14=T, L15=U, L16=V;L2 is divided into 6 groups alphabetical (R, S, T, U, V, Q), that is, L21=R, L22=S, L23=T, L24=U, L25=V, L26=Q.
With in example 1 calculation position, contraposition similarly, L1 is with cipher table A3 to bit encryption, and L2 is with cipher table A4 to bit encryption.
Similarly with the encryption in example 2, L1 mapped with A3, be encrypted to ciphertext character group 777787777877778, it will with A4 L2 mapping is encrypted to ciphertext character group 888898888988889, further, forms ciphertext 777787777877778/ 888898888988889。
The ciphertext 777787777877778/888898888988889 is issued VVV (party intermediary of communication) by addresser; It is same with the calculation position in example 1, contraposition after the ciphertext is divided into 2 sections (15 bit digitals are a ciphertext character group) with A II 4 by VVV Decryption in reason and example 2 similarly, is mapped, first ciphertext character group 777787777877778 of decryption with the A3 in A II 4, QRSTUV is resumed, with second the A4 mapping in A II 4, decryption ciphertext character group 888898888988889, RSTUVQ quilt Restore;VVV passes through the conversion of the conversion table in A II 4 again, and QRSTUV is converted into " the present ", and RSTUVQ is converted into " day ", into One step, " today " is resumed in plain text, and VVV learns " today ";..., similarly, the another set of atom caryogram cryptographic system of VVV (being decrypted by the conversion of the alphabetical section in the plaintext character field and the yuan and VVV encryption, receiver), with the collection of letters People is contacted, and is informed " today ".
It should be noted that the Dc=4 in example 2, Dc=7 in this example, but the principle of cipher table is identical, mapping, encryption It is identical with the principle of mapping, decryption.
Example 5, certain consumer possess atom caryogram cryptographic system A I 1, atom caryogram cryptographic system A built in certain electronic lock II 2 (A II 2=A I 1), 987065 be the random code of real-time display on the display screen of the electronic lock, which is the electricity Son lock this unlock unlocking cipher (random code that the electronic lock is unlocked next time, majority be not this 987065), and A I 1, Dc >=7 in the cipher table in A II 2.
The first step, the consumer input the random code 987065 into A I 1 by the camera to match with A I 1 (plaintext L), the L are divided into 1 section (L1) by A I 1, that is, L1 is exactly L (M=1, m=1);Second step calculates position, contraposition, with example 1 Calculation position, contraposition similarly, encrypt the L1 with the A2 in A I 1;Third step, the L1 are divided into 6 groups, that is, L11=9, L12=8, L13=7, L14=0, L15=6, L16=5;Similarly, L1 is mapped, is encrypted by the A2 in A I 1 for encryption in 4th step, with example 2 At ciphertext character group E2fxhd ' 2yhd ' 2zhd ' 2 (i.e. ciphertext dd);5th step, ciphertext dd input the electricity by infrared or radio frequency Son lock A II 2 in, in example 1 calculation position, contraposition similarly, similarly with the decryption in example 2, the dd by A II 2 A2 solve Close to be consistent at 987065 with the random code of real-time display, which is opened.
The unlocking of the electronic lock belongs to the direct communication;It is related to single table, that is, pertain only to a cipher table.
Similarly, other identification ciphers (such as bankbook password, bank card password, e-Bank payment password, modification logging) The form of random code can be used, that is, holder can not need preset geostationary (static) in relevant terminal Identification cipher (obviously, remembers bad holder and also just eliminates the worry for remembering various identification ciphers), but logical Portable atom caryogram password password device is crossed, by the indirect communication, to carry out relevant operation (ATM withdrawal, brush Card, online shopping log in website etc.).
Example 6, some common symmetric cryptography of originator, will be encrypted to ciphertext 1 in plain text;Atom caryogram cryptographic system is used again The key JK of the common symmetric cryptography is encrypted to ciphertext 2 by A I;Ciphertext 1, ciphertext 2 are sent to destination by originator, should It is JK that destination, which is decrypted to ciphertext 2, learns the key of the symmetric cryptography with atom caryogram cryptographic system A II, further according to this Key JK is decrypted ciphertext 1, learns the plaintext.
Example 7, as the M >=2, LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd ' After cmyhd ' cmzhd ' cm, which participates in determining c (m+1), and then L (m+1) n (m+1) maps Corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) in Ac (m+1).
For example, plaintext L be divided into M sections [L1, L2, L3 ..., L (M-1), LM], m is 1,2,3 ..., (M-1), M.
When m=1, L1 is divided into 6 groups (L11, L12, L13, L14, L15, L16), that is, the n1 in L1n1 is 1,2,3,4,5, 6, L1N1 be exactly L16 (n1=N1=6);Assuming that program preset in A is: L1n1 maps corresponding in A55 B55xhd55yhd55zhd55 (cm=c1=55 in the m=1 in Lmnm, Acm, Bcmxhdcmyhdcmzhdcm), wherein L1N1 Mapping B 55xhd ' 55yhd ' 55zhd ' 55, L1N1 corresponds to E55fxhd ' 55yhd ' 55zhd ' 55 (777777777777777);
It is calculated by the E55fxhd ' 55yhd ' 55zhd ' 55 (777777777777777) and dynamic password to determine C2 [m=1 in c (m+1)].According to program preset in A, the P dynamic password in A is " E55fxhd ' 55yhd ' at this time 55zhd ' 55 is divided by 111111111111111 ", that is, 777777777777777 ÷ 111111111111111=7, that is to say, that The c2=7;In turn, L2n2 maps corresponding B7xhd7yhd7zhd7 in A7, i.e., in described L (m+1) n (m+1) mapping Ac (m+1) [m=1, m+1=2, c (m+1)=c2=7, the m (=1) are corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) Refer to the tagmeme of upper plaintext character field L1], wherein L2N2 Mapping B 7xhd ' 7yhd ' 7zhd ' 7, L2N2 corresponds to E7fxhd ' 7yhd′7zhd′7(888838888388883);
It is calculated by the E7fxhd ' 7yhd ' 7zhd ' 7 (888838888388883) and (P+1) a dynamic password To determine c3 [m=2 in c (m+1)];According to program preset in A, which is " E7fxhd ' 7yhd ' 7zhd ' 7 is divided by 77774777747777 ", that is, 888838888388883 ÷ 77774777747777=11.43 (it rounds up, No more than 4 digits), further, the decimal point in 11.43 is taken away, makes 11.43 to become 1143 (because of the cipher table in A Quantity C=10000), and then corresponding B1143xhd1143yhd1143zhd1143, i.e., the described L (m+ in L3n3 mapping A1143 1) n (m+1) maps corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) [m=2, m+1=3, c (m in Ac (m+1) + 1)=c3=1143, the m (=2) refer to the tagmeme of a plaintext character field L2], wherein L3N3 Mapping B 1143xhd ' 1143yhd ' 1143zhd ' 1143, L3N3 correspond to E1145fxhd ' 1143yhd ' 1143zhd ' 1143 (999949999499994);..., and so on, until corresponding BcMxhdcMyhdcMzhdcM in LMnM mapping AcM, i.e., Corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) in L (m+1) n (m+1) mapping Ac (m+1) [m=M-1, M+1=M, c (m+1)=cM, the m (=M-1) refer to the tagmeme of a plaintext character field L (M-1)], wherein LMNM mapping BcMxhd ' cMyhd ' cMzhd ' cM, LMNM correspond to EcMfxhd ' cMyhd ' cMzhd ' cM (555525555255552);So should L is encrypted to 555525555255552 (EcMfxhd ' cMyhd ' cMzhd ' cM, i.e. ciphertext dd).
When being related to two or more cipher table, compared with example 2, the advantages of this example is very short (such as the above-mentioned ciphertext of ciphertext 555525555255552, which is a ciphertext character group), that is, example 2 is that Lm is encrypted to Ecmfxhd ' cmyhd ' Cmzhd ' cm (further, by 5 Ecmfxhd ' cmyhd ' cmzhd ' cm arranged in sequence, formation ciphertext), this example is that L is direct It is encrypted to EcMfxhd ' cMyhd ' cMzhd ' cM (ciphertext dd);The shortcomings that this example, is not illustrated how to ciphertext EcMfxhd ' (so ciphertext dd described in this example can be used as the ciphertext in half ciphertext) is decrypted in cMyhd ' cMzhd ' cM, and example 2 further relates to Ciphertext is decrypted and (so the ciphertext of example 2 can be used as the ciphertext in half ciphertext, also be can be used alone).
This example is not related to the calculation position.But this example safety with higher, it is more difficult to it replaces, reset, delete, reset, Cause are as follows: (1) plaintext character group Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm, generates Ecmfxhd ' cmyhd ' cmzhd ' Cm, then determined Ac (m+1) by Ecmfxhd ' cmyhd ' cmzhd ' cm participation, and then generate Ec (m+1) fxhd ' c (m+1) yhd ' c (m+1) zhd ' c (m+1) ..., that is, because Ecmfxhd ' cmyhd ' cmzhd ' cm be random (for the people except A), institute It is also random with the cipher table Ac (m+1) being selected;(2) because the same plaintext character field corresponds to different cipher tables, meeting Different Ecmfxhd ' cmyhd ' cmzhd ' cm is generated, so, cipher table is selected at random, and safety is higher.
When atom caryogram cryptographic system is used to encrypt plaintext L (audio and/or the video) of big data quantity, this example can be used Principle, which is encrypted to very short ciphertext (such as only one ciphertext character group), further, the L and the ciphertext are constituted Half ciphertext, in order to which destination encrypts the plaintext L in half ciphertext, confirms.
Example 8, as the M >=2, LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd ' After cmyhd ' cmzhd ' cm, which determines c (m+1), and then L (m+1) n (m+1) maps Ac (m+ 1) corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) in.For example, cm=15, E15fxhd ' 15yhd ' 15zhd ' 15 be 456056706780789;This 456056706780789 is split, four figures 0789 will be split out thereafter, determines c (m+1), that is, 0789=c (m+1);So corresponding in L (m+1) n (m+1) mapping A0789 B0789xhd0789yhd0789zhd0789。
It is the explanation about technical solution and embodiment below.
Memory capacity about hardware.For example, each cipher table has 7 grades of nodes (Dc=7), since the second level, every grade There is 10 different numbers (0 --- 9 random alignment) on node set body, then each cipher table there are more than 100 ten thousand nodes, false If the corresponding 1 code characters group of each node, then have more than 100 ten thousand code characters groups;If each code characters group has 15 Number, then each cipher table occupies more than 1,500 ten thousand bytes;If there is 1,000 different cipher tables, then the storage of hardware is needed Capacity is not less than 1.5 G;If there is 10,000 different cipher tables, then need the memory capacity of hardware not less than 15 G;If There are 1,000 different cipher tables, the corresponding 10 code characters groups of each node then need the memory capacity of hardware not less than 15 G;If there is 10,000 different cipher tables, the corresponding 10 code characters groups of each node, then the memory capacity of hardware should not be low In 150 G.
About atom caryogram cipher table.The cipher table is similar to the family tree of our mankind;For example, the first generation is first ancestor's c (phase When " core ", the first order node in Ac);First ancestor has given birth to 10 sons, and (every son is the equal of a second level node Bcxh2yh2zh2, dc=2), after growing to manhood, every son all gets married, breaks up the family, individually living or going abroad to seek one's livelihood (to be occupied in other places Firmly), that is, every son has an address (being equivalent to x coordinate, y-coordinate, z coordinate), and every son has one and with subscript Know object (such as silver bracelet, a silver bracelet are equivalent to a code characters group Ecfxh2yh2zh2), all silver bracelets (10 Or more) between, it is different;Every son has given birth to 10 sons again, then first ancestor c has 100 grandsons, and each grandson is The third generation (each grandson is the equal of the third level node Bcxh3yh3zh3, dc=3) of first ancestor family, each grandson ties It weds, break up the family, individually living or living in other places, that is, each grandson has an address (to be equivalent to x coordinate, y-coordinate, z to sit Mark), each grandson has one and the above silver bracelet (silver bracelet is equivalent to a code characters group Ecfxh3yh3zh3), It is different between all silver bracelets (100 or more);..., and so on, until the 7th generation of first ancestor c family (dc=Dc=7, the Dc are the total quantitys of the grade of node, at this point, the Dc shows that six generations were multiplied for by first ancestor c family, that is, first ancestor c In family's a total of seven generation, which is the total quantity in " generation ").
In a total of 1,000,000 the 7th generations, (in 10 × 10 × 10 × 10 × 10 × 10=1 × 10^6, each the 7th generation, were suitable Then the 7th grade of node Bcxh7yh7zh7);In 1000000 the 7th generations, in each the 7th generation, gets married, breaks up the family, individually It lives or lives in other places, that is, in each the 7th generation, there is an address (being equivalent to x coordinate, y-coordinate, z coordinate), each , there were one and the above silver bracelet (silver bracelet is equivalent to a code characters group Ecfxh7yh7zh7) in 7th generation, all It is different between silver bracelet (1,000,000 or more);On each node set body, long children's arrangement between brother is suitable Sequence is not all identical.
The family tree of the first ancestor c is family tree as a kind of ideal world;From the second generation, every generation of the family tree it is every One branch all grows to manhood and (does not die young), all gets married and gets married, gives birth to son (all 10 raw), a pickup generation, burning incense is continuous, son Sun Mantang extremely rarely completes producing a male heir to continue the family line for task.
The first ancestor c has several brothers, each brother also has a family tree (with the structure type in first ancestor's c family tree It is identical, but particular content is had any different, and for example, silver bracelet, i.e. code characters group is not identical;For example, in each node set body On, the length children between brother puts in order all not identical);The family tree (being equivalent to a cipher table) of each first ancestor is independent , have a style of one's own;That is, make between different first ancestor families, have occurred dynamic connection (be equivalent to different cipher tables it Between, dynamic connection has occurred).
About " atomic nucleus "." fission " in atom caryogram cryptographic system, the nuclear fission being equivalent in atom bomb; " fusion " in atom caryogram cryptographic system, the nuclear fusion being equivalent in hydrogen bomb;So the present invention is named as atom Caryogram cryptographic system.
About at least identical double subsystem of A, A I and A II.Identical double subsystem refers to A II and A I It is identical;Because A II and A I must be identical, so, A II and A I must be synchronized in terms of content in running, are the equal of Event synchronization.
Stationary problem about A I and A II:
(1) the atom caryogram cryptographic system requires to synchronize, and the cipher table in cipher table and A II in mainly A I is wanted It is synchronous;If asynchronous, A I and A II are no longer identical, even if not malfunctioned using primary, secondary, are used often, just It will necessarily malfunction;Most simple, most effective method, be by the constant reply of the content of direct receiver, indirect receiver come Solve stationary problem.
For example, addresser CCC contraposition cryptographic system A I 3, by " agreement is signed a contract " encryption, is sent to the direct collection of letters People VVV (party intermediary), VVV immediately with contraposition cryptographic system A II 4, to decryption, learn content " agreement is signed a contract " after, Immediately with contraposition cryptographic system A I 5, by " agreement is signed a contract " encryption, it is sent to indirect receiver DDD;Meanwhile VVV is immediately With A II 4, " agreement is signed a contract " is encrypted again, new ciphertext (because A I, A II are dynamic) is formed, replys To CCC;CCC uses A I 3 immediately, and the new ciphertext that VVV is sent is decrypted, and " agreement is signed a contract " restores, then shows VVV The information (synchronized) of CCC sending is accurately had received, (this reply is not replaced or distorted to content by trojan horse Facilitate the content that CCC sends out oneself to check, prevent oneself from sending out wrong because of careless);Meanwhile for VVV For, also indicate that CCC has had received the reply of VVV, because if CCC does not receive the reply of VVV immediately, being certain to Immediately with the service platform of VVV, phone contact is carried out, to keep A II 4 synchronous with A I's 3.
Similarly, the letter that DDD can also be sent with contraposition cryptographic system A II 6, decryption VVV, " agreement is signed a contract " restores; " agreement is signed a contract " is encrypted with A II 6 again again, forms new ciphertext, is replied to VVV;Similarly, VVV can also be used Cryptographic system A I 5 is aligned, the reply of DDD is decrypted, " agreement is signed a contract " restores, then shows that DDD is accurately received Information (synchronized) that VVV is issued, content are not replaced or distort (this reply also contributes to VVV and checked);Together When, for DDD, if VVV does not receive the reply of DDD immediately, it is certain to carry out phone contact with DDD immediately, with Keep A II 6 synchronous with A I's 5.
Above-mentioned reply can also solve a kind of security risk --- intermittent retention.What is meant by intermittent retention? for example, hair Believe that people sends the documents for the first time, is " disagreeing " in plain text, by the contraposition cryptographic system A I 3 of oneself, encrypts, be sent to VVV, but It is stealthily to be retained by trojan horse, VVV is not received, which, which does not also know, is trapped;It is assumed that the addresser is quickly It changes mind again, second of dispatch, is " agreement " in plain text, by the encryption of contraposition cryptographic system A I 3 of oneself, is sent to VVV still, and is stealthily retained (addresser does not also know) by the trojan horse;Then, which will be retained For the first time dispatch (" disagreeing "), issue VVV, caused by consequence be that indirect receiver is apprised of, addresser " disagrees ";Such as Fruit uses the above-mentioned method responded immediately to, then can prevent the intermittent retention.
Above-mentioned reply, the hidden danger that retention can also be solved, reset.What is meant by retention, reset? for example, addresser sends out for the first time Text contains " 567234 " (collecting account) in plaintext, is encrypted to the half close of first time by the contraposition cryptographic system A I 3 of oneself Text is sent to VVV, still, is stealthily retained by trojan horse;Addresser sends the documents for the second time, (receives in plaintext containing " 900100 " Money account), secondary half ciphertext is encrypted to by the contraposition cryptographic system A I 3 of oneself, is sent to VVV, and by wooden horse disease Poison stealthily retains;Trojan horse is by the ciphertext character group of the expression 567 in half ciphertext of first time and secondary half ciphertext In expression 100 ciphertext character group, reset the ciphertext KKKKK of (combination) Cheng Xin, (this 567100 for the new plaintext 567100 of correspondence It is the bank account that trojan horse possesses), and form half ciphertext (567100+KKKKK), be sent to VVV;Caused by consequence be, The money of addresser is transferred in the bank account 567100 possessed to trojan horse;If using the above-mentioned method responded immediately to, The retention, rearrangement can then be prevented.
(2) e-payment is gone on smoothly, and also can solve the stationary problem of A I and A II.For example, consumer is in supermarket Swipe the card when doing shopping, it is assumed that consumer with portable contraposition cryptographic system A I 3, by the bank account of supermarket, the shopping amount of money, This shopping serial number, consumer bank card account, encrypted, formed half ciphertext, be sent to relevant VVV, carry out The indirect communication (..., VVV cooperates after the operation such as being verified, being transferred accounts to relevant bank, passes through contraposition cryptographic system A I 5, (half ciphertext) is transmitted to supermarket;Supermarket is encrypted, is confirmed by aligning cryptographic system A II 6, the plaintext in double of ciphertext Or decryption, confirmation, confirmation is errorless, then shows that this shopping money has been transferred accounts to the bank account of supermarket, and then supermarket agrees to disappear Expense person's picking leaves supermarket.Although not using the method for above-mentioned reply, going on smoothly for e-payment shopping can also To guarantee the synchronization between A I and A II.
About containment telecommunication fraud.On condition that sign the agreement in advance, agreement regulation: a citizen or mechanism (bank, The units such as association, company, website, hospital, school, water supply, power supply, gas supply) or a government offices, it is accused to another citizen When knowing information, atom caryogram password password device will be used, and pass through VVV intermediary.
About one or more.It is exactly more than one (containing one).
About component part (1) xhdcyhdczhdc.The xhdcyhdczhdc is spatial coordinate;It should Xhdc in xhdcyhdczhdc can be longitude, the how many degree (°) of number in latitude;Yhdc in the xhdcyhdczhdc, Can be is longitude, how much how many points (') in latitude;Zhdc in the xhdcyhdczhdc, can be is longitude, in latitude How much how many seconds (").
In specific use, code characters group have to not necessarily use spatial coordinate;For example, in tree-like cipher table, After carrying out Unified number to node, code characters group respectively, code characters group is arranged on X/Y plane, then the cipher word Symbol group does not have spatial coordinate, only has plane coordinates (x, y) can also be with.
About incomplete fission.This not exclusively refers to without all fissions.
About putting in order for node.Between node set body not at the same level and/or between node set body at the same level, section The whole that puts in order of node on point set zoarium is identical.
About becoming or participate in or become and participate in.For example, having two or more independent small in a code characters group Group, wherein after having a group to be used, being abandoned, a Kgjg is given in original position, then a Kgjg is exactly institute State participation;For example, in a code characters group, without independent group, a code characters group used after, be abandoned, A Kgjg is given in its original position, then a Kgjg is exactly described becomes;For example, the jg in the Kgjg, 1 --- Between Jg, two natural numbers are taken, one of them is to become, the other is participating in, then becomes and participates in described in generation.
About component part (2) the plaintext L.Plaintext L, refers to: for A I, A II, which is in plain text;Relatively For people or encryption apparatus except A I, A II, which is not necessarily in plain text, for example, Lm is the original text system Alphabetical section in system.
About character group.Character group has a word or symbol, or has two or more word and/or symbol;Word refers to word One of female, number, text or more, symbol refers to one of additional character (country or group are general), picture Or more.
About staying tail formula described in component part (3).The tail in tail is stayed, refers to LmNm;Stay tail formula encryption=fusion.
About mapping.Mapping is exactly identical or corresponding.
About the i.It is directly to fission as the i=1 in (dcm+i);It is to fission indirectly when i >=2;For example, i=2 When, it indicates: the node jjjjj in dcm grades, several (dcm+1) grade nodes of directly fissioning out, from several (dcm + 1) the node jjjjj in grade node, several (dcm+2) grade nodes of directly fissioning out.
About cm.Why the Ac in component part (1) being become into Acm, does Dc become Dcm? the reason is that: convenient for citing.Example Such as, in example 2, L1n1 maps corresponding B6xhd6yhd6zhd6 in A6, that is, m=1, nm=n1 in Lmnm, m=1 in Acm, Cm=c1=6 in cm=c1=6, Bcmxhdcmyhdcmzhdcm, dcm=dc1=d6;L2n2 maps corresponding in A7 B7xhd7yhd7zhd7.......It does so, just highlights: different Lmnm, corresponding different Acm.
About d ' cm.The Bcmxhdcmyhdcmzhdcm mapped by LmNm, is exactly Bcmxhd ' cmyhd ' cmzhd ' cm, institute With d ' cm is under the jurisdiction of dcm;Meanwhile Bcmxhd ' cmyhd ' cmzhd ' cm corresponds to Ecmfxhd ' cmyhd ' cmzhd ' cm.
About (dcm-i) described in component part (5).It is directly to belong to as the i=1 in (dcm-i);When i >=2, between being Connect ownership.
It changes about the relative position where it is original described in component part (6).The relative position, for example, certain It after a code characters group is used, is not abandoned by A, according to program preset in A, which has been moved over to separately At one position, or node corresponding with some code characters group has been moved over at another position and (has carried out a new section Point, corresponding), that is, the relative position between some code characters group and original corresponding node is changed.
After being used about code characters group Ecmfxhd ' cmyhd ' cmzhd ' cm, is abandoned by A I, A II or it is original The relative position at place changes.Ecmfxhd ' cmyhd ' cmzhd ' the cm, refers to all Ecmfxhd ' being previously used Cmyhd ' cmzhd ' cm can also refer to a part in the Ecmfxhd ' cmyhd ' cmzhd ' cm being previously used, or even refer to one It is a, such as EcMfxhd ' cMyhd ' cMzhd ' cM.
About the one and above Arabic numerals, one or more letter, one and the above Chinese character, one or more Additional character (country or group are general), one and above Korea's word, one and the above Japanese word.The additional character, It does not include this and the above Arabic numerals, one or more letter, one and above Korea's word, one and the above Japanese Word.
About the primary encryption.For example, certain article is divided into 1500 plaintext character fields, but only 2000 close When code table (C=2Mmax, Mmax=1000), that is, what if once can only at most encrypt 1000 plaintext character fields? method It is, such as by 1000 before in 1500 plaintext character fields, as plaintext L, to carry out the calculations position, contraposition, mapping, add Close, which is to encrypt for the first time;By 500 behind in 1500 plaintext character fields, as second plaintext L, then carry out The calculation position, contraposition, mapping, encryption, the encryption are second of encryptions;So when divided number of segment is greater than Mmax in plain text, The primary encryption is primary in encryption by several times.
About y 1 --- one and the above natural number are taken between (C-2M).For example, y=C-2M;As m=1, w1=m+ M+y=1+M+ (C-2M)=C-M+1;As m=M, wM=m+M+y=M+M+ (C-2M)=C.
About z 1 --- one and the above natural number are taken between (M+1).For example, z=M+1, and M=Mmax;Work as m= When 1, w1=(C+z)-m-M=(C+M+1) -1-M=C;As m=M=Mmax, wM=(C+z)-m-M=(C+M+1)-Mmax- Mmax=(C-2Mmax)+M+1 is (if 2Mmax=C, wM=M+1;If 2Mmax+1=C, wM=1+M+1).
The unique volume having in Acm about the node set body where the described Bcmxhd ' cmyhd ' cmzhd ' cm Number, unique number ... for having in Acm of the Bcmxhd ' cmyhd ' cmzhd ' cm, determine or participate in determine c (m+ 1) ....For example, unique number that the node set body where the Bcmxhd ' cmyhd ' cmzhd ' cm has in Acm, or Unique number that the Bcmxhd ' cmyhd ' cmzhd ' cm has in Acm, is 567804567034560, by this Last 4-digit number 4560 in 567804567034560, splits out, and determines the tagmeme of Next Password table, that is, and c (m+1)= 4560。
About fractionation combination, displacement, pairing, replacement.For example, first split between ciphertext character group, rear combination, Form ciphertext dd;For example, being shifted between ciphertext character group, ciphertext dd is formed;For example, by a ciphertext character group with After one preset dynamic password pairing, the ciphertext character group is represented with the dynamic password, forms a part in ciphertext dd;Example Such as, a ciphertext character group is replaced with a dynamic password, forms a part in ciphertext dd.
The conversion table described in example 4.Assuming that conversion table is dynamic, for example, in yuan described in a Chinese character up to ten thousand and example 3 Alphabetical section ZZZ correspond, which is dynamic, that is, according to preset program, relevant one-to-one correspondence is previously used Once, change primary (being not necessarily all one-to-one correspondence all to change);Assuming that conversion table be it is static, for example, a Chinese up to ten thousand Alphabetical section ZZZ in yuan described in word and example 3 is corresponded, which is static, relatively constant.
About contraposition.Because in component part (3), Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm (nm in Acm Corresponding dcm), which is first contraposition (nm corresponds to dcm), maps afterwards, so, atom caryogram password of the present invention, and it is a kind of right Position password;Atom caryogram cryptographic system of the present invention and a kind of contraposition cryptographic system.

Claims (10)

1. a kind of atom caryogram cryptographic system, it is characterised in that following component parts:
(1) at least identical double subsystem of atom caryogram cryptographic system A, A I and A II;Have in A C cipher table (A1, A2 ..., AC), Ac is cipher table, 1≤c≤C;Ac originates from " core " of Ac, and being somebody's turn to do " core " is first order node;First order node Not exclusively fission and generate H2 second level node, h2 is 1 --- when taking any one natural number between H2, Bcxh2yh2zh2 is A second level node in the H2 second level node, also, the Bcxh2yh2zh2 corresponds to code characters group Ecfxh2yh2zh2;The Bcxh2yh2zh2 not exclusively fissions and generates H3 third level node, and h3 is 1 --- and it takes and appoints between H3 When one natural number, Bcxh3yh3zh3 is a third level node in the H3 third level node, also, should Bcxh3yh3zh3 corresponds to code characters group Ecfxh3yh3zh3, which belongs to what this was not exclusively fissioned Bcxh2yh2zh2 ..., and so on, Bcxh (dc-1) yh (dc-1) zh (dc-1) not exclusively fission and generate Hdc the Dc grades of nodes, 2≤dc≤Dc, hdc is 1 --- and when taking any one natural number between Hdc, Bcxhdcyhdczhdc is the Hdc Dc grades of nodes in dc grades of nodes, also, the Bcxhdcyhdczhdc corresponds to code characters group Ecfxhdcyhdczhdc, wherein fxhdcyhdczhdc is 1 --- one and the above natural number are taken between Fxhdcyhdczhdc, The Bcxhdcyhdczhdc belongs to the Bcxh not exclusively to fission (dc-1) yh (dc-1) zh (dc-1);C,c, Fxhdcyhdczhdc, Fxhdcyhdczhdc are greater than the natural number equal to 1 respectively, and Dc is the total quantity of the grade of node, dc, Dc, Hdc are greater than the natural number equal to 2 respectively;All code characters groups are unique in A;There is no subordinate list in A, alternatively, A In have G subordinate list (K1, K2 ..., KG), Kg is subordinate list, have in 1≤g≤G, Kg Jg code characters group (Kg1, Kg2 ..., KgJg), Kgjg is code characters group, 1≤jg≤Jg, when g is 1 --- between G, jg 1 --- taken respectively between Jg one and When the above natural number, Kgjg will become or participate in or become and participate in Ecfxhdcyhdczhdc in A, and G, g, jg, Jg are big respectively In the natural number for being equal to 1;
(2) according to program preset in A I, plaintext L is divided into M sections, L1, L2 ..., LM, Lm is the plaintext character field in L, 1≤m≤M;Further, Lm is divided into Nm group, Lm1, Lm2 ..., LmNm, Lmnm is the character group in Lm, 1≤nm≤ Nm;M is 1 --- one and the above natural number are taken between M ', M ', M, m, Nm, nm are greater than the natural number equal to 1 respectively;
(3) according to program preset in A I, Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm in Acm, and nm corresponds to dcm, In, Nm corresponds to d ' cm, then LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd ' cmyhd ' Cmzhd ' cm, then Lm is mapped, tail formula is stayed to be encrypted to the Ecmfxhd ' cmyhd ' cmzhd ' cm, this stays the encryption of tail formula to be equivalent to core Fusion;When nm corresponds to dcm, nm, dcm difference are from small to large, that is, when Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm Afterwards, it follows the character group Lm (nm+1) after Lmnm closely and maps the Bcmxhdcmyhdcmzhdcm and directly or indirectly fission and come out Bcmxh(dcm+i)yh(dcm+i)zh(dcm+i);Cm is 1 --- one and the above natural number are taken between C, d ' cm is under the jurisdiction of Dcm, dcm, d ' cm are respectively 2 --- one and the above natural number are taken between Dcm, i is greater than the natural number equal to 1, (dcm+i) 3 --- one and the above natural number are taken between Dcm;
(4) further, L is encrypted to ciphertext dd by A I;
(5) L is encrypted to ciphertext dd by A II, which is identical to the encryption principle that A I encrypts the L, alternatively, A II will be close Ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm in literary dd is decrypted into plaintext character field Lm, that is, ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm should after mapping the code characters group Ecmfxhdcmyhdcmzhdcm in Acm Ecmfxhdcmyhdcmzhdcm inverse correspondence node Bcmxhdcmyhdcmzhdcm, the Bcmxhdcmyhdcmzhdcm and LmNm phase Mapping, also, since the Bcmxhdcmyhdcmzhdcm, to (dcm-i) grade node-home, obtain node Bcmxh (dcm- I) yh (dcm-i) zh (dcm-i), Bcmxh (dcm-i) yh (dcm-i) zh (dcm-i) and Lm (Nm-1) phase mapping ..., with This analogizes, and belongs to node Bcmxhd " cmyhdc " mzhd " cm always, and " cm's Bcmxhd " cmyhdc " mzhd sets each other off with Lm1 Penetrate, be finally sequentially connected in series Bcmxhdcmyhdcmzhdcm, Bcmxh (dcm-i) yh (dcm-i) zh (dcm-i) ..., Cm, then Lm is resumed Bcmxhd " cmyhdc " mzhd ", and then L is resumed;M is under the jurisdiction of dcm to dc ", and " m exists respectively by (dcm-i), dc 2 --- one and the above natural number are taken between Dcm;
(6) after code characters group Ecmfxhd ' cmyhd ' cmzhd ' cm is used, originally the relative position at place changes, Alternatively, it is abandoned by A I, A II, that is, when G is greater than the natural number equal to 1, Kgjg becomes or participates in or become and participate in A Middle Ecfxhdcyhdczhdc;That is, A I, A II are synchronous dynamics.
2. atom caryogram cryptographic system according to claim 1, it is characterised in that: in the component part (1) Bcxhdcyhdczhdc, be one and the above Arabic numerals, one or more letter, one and the above Chinese character, one and with On in the general additional character in concerned countries or area or group, one and above Korea's word, one and the above Japanese word It is a kind of or more.
3. atom caryogram cryptographic system according to claim 1, it is characterised in that: Hdc in the component part (1) the Dc grades of nodes are the distributions of spherical and/or hemispherical, and the node, code characters group are three-dimensional, so, which uses Bcxhdcyhdczhdc indicates that is, the node has X-coordinate, Y-coordinate, Z coordinate, code characters group Ecfx ' hdcy ' Hdcz ' hdc indicates that x ' hdc belongs to X-coordinate, y ' hdc belongs to Y-coordinate, z ' hdc belongs to Z coordinate.
4. atom caryogram cryptographic system according to claim 1, it is characterised in that: Hdc in the component part (1) the Dc grades of nodes, tree form distribution is on x/y plane, i.e., the x/y plane is related to x-axis, y-axis, and the node is two-dimensional, code characters group It is three-dimensional, so, which is indicated with Bcxhdcyhdc, i.e., the node has X-coordinate, Y-coordinate, which uses Ecfxhdcyhdczhdc indicates that the i.e. Ecfxhdcyhdczhdc has X-coordinate identical with the node, identical with the node The no Z coordinate of Y-coordinate, the node.
5. atom caryogram cryptographic system according to claim 1, it is characterised in that: preset in the component part (3) Program, including calculate position, contraposition;Position Wm=m+M+y in the calculation position, Wm is 2 --- one and the above natural number, y=are taken between C 0 or y is 1 --- one and the above natural number are taken between (C-2M), alternatively, Wm=(C+z)-m-M, Wm is 1 --- it is taken between C One and the above natural number, z=0 or z are 1 --- one and the above natural number are taken between (M+1);Mmax is can be primary by A The maximum quantity of the plaintext character field of encryption, 2Mmax=C, or (2Mmax+1)=C, M is 1 --- taken between Mmax one and with Upper natural number;The contraposition, refers to Wm and cm --- corresponding, then Lm and Acm is corresponded, and further, Lmnm maps phase in Acm The Bcmxhdcmyhdcmzhdcm answered.
6. atom caryogram cryptographic system according to claim 1, it is characterised in that: preset in the component part (3) Program, comprising: as the M >=2, LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd ' After cmyhd ' cmzhd ' cm, unique volume that the node set body where the Bcmxhd ' cmyhd ' cmzhd ' cm has in Acm Number, the Bcmxhd ' cmyhd ' cmzhd ' cm have in Acm unique number, in the Ecmfxhd ' cmyhd ' cmzhd ' cm One kind or more, determine or participate in determine c (m+1), and then corresponding Bc (m+1) in L (m+1) n (m+1) mapping Ac (m+1) xhdc(m+1)yhdc(m+1)zhdc(m+1);C (m+1) is 1 --- take one and the above natural number between C, 2≤dc (m+1)≤ Dc(m+1)。
7. atom caryogram cryptographic system according to claim 1, it is characterised in that: in the component part (4), comprising: Between ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm and/or ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm with Between preset dynamic password, after carrying out one of mathematical computations, fractionation combination, displacement, pairing, replacement or more, obtain The result is that a part in ciphertext dd or ciphertext dd.
8. atom caryogram cryptographic system according to claim 2, it is characterised in that: the one and above letter is a kind of Ee different letters in original writing system, ee are greater than the natural number equal to 2;The original writing system, it is corresponding A kind of or more existing writing system in the world, that is, every ff letter constitutes an alphabetical section, and ff is 1 --- it is taken between ee One and the above natural number, not identical between each letter section, fixedly or dynamically correspondence is existing in the world for each letter section One and the above Chinese character, one or more letter, one and the above Arabic numerals, one or more on concerned countries or ground One of the general additional character in area or group, one and above Korea's word, one and the above Japanese word or more.
9. a kind of direct communication method, includes the following steps:
(1) production atom caryogram cryptographic system A I 1 as claimed in any one of claims 1 to 8, A II 2, A I 1 and A II 2 is identical;One side AAA of communication possesses A I 1, and another party BBB of communication possesses A II 2;
(2) after plaintext L is encrypted to ciphertext gg using A I 1 by AAA, half ciphertext hh or gg, hh=L+gg are sent to BBB;BBB is received After letter, use A II 2 " L in confirmation hh, or decryption gg and then L are restored ", wherein should " confirmation L in hh " refer to, Whether the gg that the L in hh is encrypted to ciphertext ii by A II 2, compares in ii and hh is identical, and if they are the same, then BBB confirms the L in hh, Or the gg in hh is decrypted into jj by A II 2, whether the L that compares in jj and hh is identical, if they are the same, then BBB confirms the L in hh.
10. a kind of indirect communication method, includes the following steps:
(1) production atom caryogram cryptographic system A I 3 as claimed in any one of claims 1 to 8, A II 4, A I 5, A II 6, A I 3 are identical as A II 4, and A I 5 is identical as A II 6;One side CCC of communication possesses A I 3, the party intermediary VVV of communication Possess A II 4, A I 5, another party DDD of communication possesses A II 6;
(2) after plaintext L ' is encrypted to ciphertext kk using A I 3 by CCC, half ciphertext pp or kk, pp=L '+kk are sent to VVV;VVV It after the collection of letters, uses A II 4 " L ' in confirmation pp, or decryption kk and then L ' are restored ", wherein should " confirmation L ' in pp " Refer to, the L ' in pp is encrypted to ciphertext qq by A II 4, and whether the kk compared in qq and pp is identical, and if they are the same, then VVV confirms pp In L ' or A II 4 kk in pp is decrypted into rr, the L ' that compares in rr and pp it is whether identical, if they are the same, then VVV confirms pp In L ';
After plaintext L ' is encrypted to ciphertext ss using A I 5 by VVV, half ciphertext tt or ss, tt=L '+ss are sent to DDD;DDD is received After letter, use A II 6 " L ' in confirmation tt, or decryption ss and then L ' are restored ", wherein should " confirmation L ' in tt " be Refer to, the L ' in tt is encrypted to ciphertext uu by A II 6, and whether the ss compared in uu and tt is identical, and if they are the same, then VVV confirms in tt L ' or A II 6 ss in tt is decrypted into ww, the L ' that compares in ww and tt it is whether identical, if they are the same, then VVV confirms in tt L '.
CN201410685848.2A 2014-11-21 A kind of atom caryogram cryptographic system and direct communication method and indirect communication method Active CN105897420B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410685848.2A CN105897420B (en) 2014-11-21 A kind of atom caryogram cryptographic system and direct communication method and indirect communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410685848.2A CN105897420B (en) 2014-11-21 A kind of atom caryogram cryptographic system and direct communication method and indirect communication method

Publications (2)

Publication Number Publication Date
CN105897420A CN105897420A (en) 2016-08-24
CN105897420B true CN105897420B (en) 2019-07-16

Family

ID=

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101527629A (en) * 2002-03-21 2009-09-09 株式会社Ntt都科摩 Hierarchical identity-based encryption and signature schemes
CN102611558A (en) * 2012-04-27 2012-07-25 西安电子科技大学 Magic square-based secret key distribution and identity authentication method of electronic account administrated by multi-users commonly
CN103973435A (en) * 2014-05-09 2014-08-06 褚万青 Alignment password system, direct communication method and indirect communication method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101527629A (en) * 2002-03-21 2009-09-09 株式会社Ntt都科摩 Hierarchical identity-based encryption and signature schemes
CN102611558A (en) * 2012-04-27 2012-07-25 西安电子科技大学 Magic square-based secret key distribution and identity authentication method of electronic account administrated by multi-users commonly
CN103973435A (en) * 2014-05-09 2014-08-06 褚万青 Alignment password system, direct communication method and indirect communication method

Similar Documents

Publication Publication Date Title
Zhang et al. Research on a covert communication model realized by using smart contracts in blockchain environment
CN107682308A (en) The electronic evidence preservation system for Channel Technology of being dived based on block chain
CN107301521A (en) Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
CN102033901B (en) Citizen information management system method
CN108964905A (en) A kind of safe and efficient block chain implementation method
CN109410076A (en) Agricultural product based on block chain technology, which are traced to the source, insures public service platform
CN110033258A (en) Business datum encryption method and device based on block chain
CN103490889B (en) A kind of infinite length key internet communication encryption method
CN101999132A (en) A strong authentication token generating one-time passwords and signatures upon server credential verification
CN110086626A (en) Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair
CN109815051A (en) The data processing method and system of block chain
CN107333262A (en) A kind of system and method based on CN39 code authentication phone numbers
CN113781073B (en) Subsidizing method capable of hiding real names based on matrix alliance chain
CN111654363A (en) Alliance chain privacy protection method based on group signature and homomorphic encryption
CN110503290A (en) The twin volume data management method of number towards product lifecycle
CN109447807A (en) The weak center's trust data management system and method for the total score double-strand of digital bank
CN109660359A (en) Generate the method, equipment and the method for generating the credible address of HD wallet of HD wallet business card
CN107154850A (en) A kind of processing method and processing device of block chain data
CN110263573A (en) Representation method based on block chain personal identification
CN115242371A (en) Method, device and system for calculating set intersection and cardinality of differential privacy protection
CN108696508A (en) System and method based on CN39 code authentication resident identification card numbers
CN106921677A (en) A kind of multiple encryption system of block chain houseclearing
Buccafurri et al. Ethereum Transactions and Smart Contracts among Secure Identities.
CN102185696A (en) Mobile phone user authentication method without trusted third party on basis of handwriting characteristics
CN107733936A (en) A kind of encryption method of mobile data

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant