CN105897420B - A kind of atom caryogram cryptographic system and direct communication method and indirect communication method - Google Patents
A kind of atom caryogram cryptographic system and direct communication method and indirect communication method Download PDFInfo
- Publication number
- CN105897420B CN105897420B CN201410685848.2A CN201410685848A CN105897420B CN 105897420 B CN105897420 B CN 105897420B CN 201410685848 A CN201410685848 A CN 201410685848A CN 105897420 B CN105897420 B CN 105897420B
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- node
- dcm
- group
- natural number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 125000004429 atoms Chemical group 0.000 title claims abstract description 53
- 230000004992 fission Effects 0.000 claims abstract description 35
- 238000004364 calculation method Methods 0.000 claims abstract description 24
- 230000004927 fusion Effects 0.000 claims abstract description 11
- 230000000875 corresponding Effects 0.000 claims description 83
- 230000001360 synchronised Effects 0.000 claims description 11
- PUOAETJYKQITMO-FYJGNVAPSA-N (3E)-1-[1-(4-fluorophenyl)ethyl]-3-[[3-methoxy-4-(4-methylimidazol-1-yl)phenyl]methylidene]piperidin-2-one Chemical compound C=1C=C(N2C=C(C)N=C2)C(OC)=CC=1\C=C(C1=O)/CCCN1C(C)C1=CC=C(F)C=C1 PUOAETJYKQITMO-FYJGNVAPSA-N 0.000 claims description 6
- 238000009826 distribution Methods 0.000 claims description 5
- 238000004519 manufacturing process Methods 0.000 claims description 3
- 238000006073 displacement reaction Methods 0.000 claims description 2
- 238000005194 fractionation Methods 0.000 claims description 2
- 230000000750 progressive Effects 0.000 abstract 1
- BQCADISMDOOEFD-UHFFFAOYSA-N silver Chemical compound [Ag] BQCADISMDOOEFD-UHFFFAOYSA-N 0.000 description 10
- 239000004332 silver Substances 0.000 description 10
- 229910052709 silver Inorganic materials 0.000 description 10
- 238000006243 chemical reaction Methods 0.000 description 8
- 238000006467 substitution reaction Methods 0.000 description 7
- 230000014759 maintenance of location Effects 0.000 description 6
- 230000003068 static Effects 0.000 description 6
- 241000209202 Bromus secalinus Species 0.000 description 5
- 230000000717 retained Effects 0.000 description 5
- 239000002151 riboflavin Substances 0.000 description 4
- 231100000614 Poison Toxicity 0.000 description 3
- 210000000707 Wrist Anatomy 0.000 description 3
- 230000033228 biological regulation Effects 0.000 description 3
- 239000002574 poison Substances 0.000 description 3
- 210000004940 Nucleus Anatomy 0.000 description 2
- 101700050571 SUOX Proteins 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 2
- 102220367607 c.37C>T Human genes 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006011 modification reaction Methods 0.000 description 2
- 102220265514 rs1309896929 Human genes 0.000 description 2
- 102220058101 rs730881654 Human genes 0.000 description 2
- 102220062247 rs773918872 Human genes 0.000 description 2
- 102220222088 rs781696878 Human genes 0.000 description 2
- 102220095238 rs876660157 Human genes 0.000 description 2
- 230000011218 segmentation Effects 0.000 description 2
- 210000004247 Hand Anatomy 0.000 description 1
- 206010025482 Malaise Diseases 0.000 description 1
- 208000008425 Protein Deficiency Diseases 0.000 description 1
- OKUGPJPKMAEJOE-UHFFFAOYSA-N S-propyl dipropylcarbamothioate Chemical compound CCCSC(=O)N(CCC)CCC OKUGPJPKMAEJOE-UHFFFAOYSA-N 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 201000010099 disease Diseases 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 229920005618 ethylene copolymer bitumen Polymers 0.000 description 1
- 238000005755 formation reaction Methods 0.000 description 1
- 239000007789 gas Substances 0.000 description 1
- 229910052739 hydrogen Inorganic materials 0.000 description 1
- 239000001257 hydrogen Substances 0.000 description 1
- UFHFLCQGNIYNRP-UHFFFAOYSA-N hydrogen Chemical compound [H][H] UFHFLCQGNIYNRP-UHFFFAOYSA-N 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 244000144985 peep Species 0.000 description 1
- 230000000149 penetrating Effects 0.000 description 1
- 102220132469 rs114209691 Human genes 0.000 description 1
- 102220170293 rs146932796 Human genes 0.000 description 1
- 102220287733 rs1555526988 Human genes 0.000 description 1
- 102220101621 rs3852522 Human genes 0.000 description 1
- 102220062244 rs748527030 Human genes 0.000 description 1
- 102220122500 rs766642997 Human genes 0.000 description 1
- 102220283007 rs934176141 Human genes 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Abstract
Present invention mainly discloses a kind of atom caryogram cryptographic systems.(1) in each cipher table, in addition to Dc grades of nodes, other nodes can directly fission out several nodes;(2) when encrypting, the character group arranged from left to right in some plaintext character field, with in some cipher table from dc grades to d ' c grades progressive interdependent node, it corresponds (mapping), also, dc grades of nodes must be that (dc-1) grade node is directly fissioned;(3) because the node of the last character group mapping in some plaintext character field corresponds to code characters group EEEEE, so, which is stayed tail formula, fusion formula to be encrypted to EEEEE.The invention also includes a kind of calculation position method, dynamics to select cipher table method, hides ciphertext character group method, the matched writing system method of creation.The present invention is highly-safe, versatility is good, conducive to e-payment, text communication, the full content even in video/audio, is encrypted.
Description
Technical field
The present invention relates to a kind of cryptographic system, especially a kind of atom caryogram cryptographic system similar to symmetric cryptography, with
And method, the method for indirect communication method of the direct communication based on the atom caryogram cryptographic system.
Background technique
Password is broadly divided into symmetric cryptography and asymmetric cryptography.Symmetric cryptography, such as the permutation cipher in classical code, replacement
Password (substitution password), such as block cipher (DES, AES) or stream cipher (RC4 etc.);Symmetric cryptography is suitable for long article, short
Text, but have deficiency;For example, block cipher or stream cipher need to calculate, stream cipher is insensitive to being inserted into and modifying, and is grouped close
CBC, CFB, OFB in code are unfavorable for parallel computation, and the replication problem in the ECB in block cipher is (right if repeated in plain text
The ciphertext answered can also repeat) and ciphertext content be easy to be replaced, reset, delete, resetting;For example, single table in substitution password
Password is substituted in encryption and decryption, using fixed substitution tables (substitution tables or substitution table be exactly key), to the institute in plaintext
There is letter all using a fixed mapping, and the frequency distribution for single-letter occur is identical with ciphertext, it is difficult to resist frequency
Analysis;For example, there is reuse in Vernam password (one time cryptosystem belongs to the multilist substitution password in substitution password)
The same key encrypts different plaintexts and is easy the problem of being cracked;So generally speaking, comparatively, it is at least symmetrical close
The safety of code is not also enough height.
When carrying out Web bank's clearing, some consumers have used public key encryption algorithm, and (RSA belongs to non-for the country at present
Symmetric cryptography is used for various USBKey, such as U-shield), still: (1) USBKey is only applicable to the short essay of small data, because RSA's is close
Key length has 1024 or 2048, so, the calculation amount of long article is with regard to big;(2) not general, for example, a U-shield only correspond to one
Desktop computer;(3) also frequently by the threat of trojan horse, such as U-shield use after, pull out, may be existed by hacker not in time
Line remote control is transferred accounts;(4) (private key in such as RSA Algorithm is used for the number of symmetric cryptography when RSA and symmetric cryptography are used in combination
Signature), it is also necessary to the symmetric cryptography is often replaced.
Because of deficiency existing for the asymmetric cryptography, there are also the consumers of flood tide using symmetric cryptography or not to have at present
Have and use password: (1) using symmetrical, static identification cipher, (such as bankbook password, bank card password, online password, unlocking are close
Code etc.), but the identification cipher can only indicate the identity of consumer, cannot prevent the true friendship between consumer and financial institution
Easy content is artificially distorted (such as collecting account is tampered), or cannot prevent the actual wishes of consumer violated (such as
Unlocking cipher is peeped, is usurped), also identification cipher is also as static state (i.e. relatively constant), and often in ATM or
POS machine is online, is illegally peeped, is usurped.(2) when carrying out Web bank's clearing, some consumers use symmetrical dynamic mouth
Enable password, but safety, convenience are also less desirable;Some consumers use symmetrical mobile phone note verification code, but are easy
It is peeped or is retained by mobile phone viruses and is stolen.(3) what ordinary consumer often carried out make a phone call, QQ communication, wechat, hand
Machine short message, scan the two-dimensional code or enterprise between stored on the communication terminal that can be surfed the Internet in online business relations or user
Information etc. does not encrypt (not using password) typically in plain text, caused by consequence be: (1) be easily stolen and peep or distort;
(2) it scans virulent two dimensional code and has gone up " fishing " website;(3) it is easy (pseudo- by " fishing " or harassing of advertisement of pseudo-base station
Base station sends SMS to particular person or unspecified person);(4) it is easy to allow telecommunication fraud molecule by hair SMS, or leads to
It crosses fuzzy identity or is conversed by change of voice software, the friend or relatives of the consumer that disguises oneself as or government offices or public thing
Industry unit, it is therefore an objective to make consumer be taken in and remit money or provide bank card password.
Summary of the invention
Goal of the invention: being directed to the above-mentioned problems of the prior art, deficiency, and the purpose of the present invention is mainly to provide a kind of new
Cryptographic system A, A be it is dynamic, general, suitable for long article and short essay, safety is very high, can prevent trojan horse
Invade (such as A is built in independent, non-networked wrist scrambler) of simultaneously remote control;At least identical double of A;Just
In direct communication, such as the unlocking to coded lock;Convenient for indirect communication, for example, originator possesses A, indirect destination possesses A '
(A ' ≠ A), originator are write to each other by possessing the third-party intermediation of A, A ' with indirect destination.
A further object of the invention --- the telecommunication fraud that containment emerges one after another, protection individual privacy (such as to text
Communication encryption, such as the login password of online is encrypted, or by typewriting, encrypting on non-online hardware), guarantee electronics
The safety (Internetbank, swipe the card, ATM withdraws the money etc.) of payment, in favor of building to work as the flourish world.
Technical solution: for achieving the above object, a kind of the first technical solution that the present invention uses are as follows: atom caryogram
Cryptographic system, it is characterised in that following component parts:
(1) at least identical double subsystem of atom caryogram cryptographic system A, A I and A II;There is C cipher table in A
(A1, A2 ..., AC), Ac is cipher table, 1≤c≤C;Ac originates from " core " of Ac, and being somebody's turn to do " core " is first order node;The first order
Node not exclusively fissions and generates H2 second level node, and h2 is 1 --- when taking any one natural number between H2,
Bcxh2yh2zh2 is a second level node in the H2 second level node, also, the Bcxh2yh2zh2 corresponds to cipher word
Symbol group Ecfxh2yh2zh2;The Bcxh2yh2zh2 not exclusively fissions and generates H3 third level node, and h3 is 1 --- between H3
When taking any one natural number, Bcxh3yh3zh3 is a third level node in the H3 third level node, also, should
Bcxh3yh3zh3 corresponds to code characters group Ecfxh3yh3zh3, which belongs to what this was not exclusively fissioned
Bcxh2yh2zh2 ..., and so on, Bcxh (dc-1) yh (dc-1) zh (dc-1) not exclusively fission and generate Hdc the
Dc grades of nodes, 2≤dc≤Dc, hdc is 1 --- and when taking any one natural number between Hdc, Bcxhdcyhdczhdc is the Hdc
Dc grades of nodes in dc grades of nodes, also, the Bcxhdcyhdczhdc corresponds to code characters group
Ecfxhdcyhdczhdc, wherein fxhdcyhdczhdc is 1 --- one and the above natural number are taken between Fxhdcyhdczhdc,
The Bcxhdcyhdczhdc belongs to the Bcxh not exclusively to fission (dc-1) yh (dc-1) zh (dc-1);C,c,
Fxhdcyhdczhdc, Fxhdcyhdczhdc are greater than the natural number equal to 1 respectively, and Dc is the total quantity of the grade of node, dc,
Dc, Hdc are greater than the natural number equal to 2 respectively;All code characters groups are unique in A;There is no subordinate list in A, alternatively, A
In have G subordinate list (K1, K2 ..., KG), Kg is subordinate list, have in 1≤g≤G, Kg Jg code characters group (Kg1, Kg2 ...,
KgJg), Kgjg is code characters group, 1≤jg≤Jg, when g is 1 --- between G, jg 1 --- taken respectively between Jg one and
When the above natural number, Kgjg will become or participate in or become and participate in Ecfxhdcyhdczhdc in A, and G, g, jg, Jg are big respectively
In the natural number for being equal to 1;
(2) according to program preset in A I, plaintext L is divided into M sections, be respectively L1, L2 ..., LM, Lm is in L
Plaintext character field, 1≤m≤M;Further, Lm is divided into Nm group, Lm1, Lm2 ..., LmNm, Lmnm is the character in Lm
Group, 1≤nm≤Nm;M is 1 --- one and the above natural number are taken between M ', M ', M, m, Nm, nm are greater than oneself equal to 1 respectively
So number;
(3) according to program preset in A I, Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm in Acm, and nm is corresponding
Dcm, wherein Nm corresponds to d ' cm, then LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd '
Cmyhd ' cmzhd ' cm, then Lm is mapped, tail formula is stayed to be encrypted to the Ecmfxhd ' cmyhd ' cmzhd ' cm, this stays tail formula to encrypt phase
When in the fusion of core;When nm corresponds to dcm, nm, dcm difference are from small to large, that is, when Lmnm mapping is corresponding
After Bcmxhdcmyhdcmzhdcm, following the character group Lm (nm+1) after Lmnm closely, to map the Bcmxhdcmyhdcmzhdcm direct
Or Bcmxh (dcm+i) yh (dcm+i) zh (dcm+i) for fissioning out indirectly;Cm is 1 --- taken between C one or more from
So number, d ' cm is under the jurisdiction of dcm, and dcm, d ' cm are respectively 2 --- and it takes one between Dcm and the above natural number, i is greater than equal to 1
Natural number, (dcm+i) is 3 --- one and the above natural number are taken between Dcm;
(4) further, L is encrypted to ciphertext dd by A I;
(5) L is encrypted to ciphertext dd by A II, which is identical to the encryption principle that A I encrypts the L, alternatively, A II
Ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm in ciphertext dd is decrypted into plaintext character field Lm, that is, ciphertext character group
Ecmfxhd ' cmyhd ' cmzhd ' cm should after mapping the code characters group Ecmfxhdcmyhdcmzhdcm in Acm
Ecmfxhdcmyhdcmzhdcm inverse correspondence node Bcmxhdcmyhdcmzhdcm, the Bcmxhdcmyhdcmzhdcm and LmNm phase
Mapping, also, since the Bcmxhdcmyhdcmzhdcm, to (dcm-i) grade node-home, obtain node Bcmxh (dcm-
I) yh (dcm-i) zh (dcm-i), Bcmxh (dcm-i) yh (dcm-i) zh (dcm-i) and Lm (Nm-1) phase mapping ..., with
This analogizes, and belongs to node Bcmxhd " cmyhdc " mzhd " cm always, and " cm's Bcmxhd " cmyhdc " mzhd sets each other off with Lm1
Penetrate, be finally sequentially connected in series Bcmxhdcmyhdcmzhdcm, Bcmxh (dcm-i) yh (dcm-i) zh (dcm-i) ...,
Cm, then Lm is resumed Bcmxhd " cmyhdc " mzhd ", and then L is resumed;M is under the jurisdiction of dcm to dc ", and " m exists respectively by (dcm-i), dc
2 --- one and the above natural number are taken between Dcm;
(6) after code characters group Ecmfxhd ' cmyhd ' cmzhd ' cm is used, originally the relative position at place occurs
Change, alternatively, it is abandoned by A I, A II, that is, when G is greater than the natural number equal to 1, Kgjg become participate in or become and
Participate in Ecfxhdcyhdczhdc in A;That is, A I, A II are synchronous dynamics.
Bcxhdcyhdczhdc in the component part (1) is one and the above Arabic numerals, one and the above word
Female, one and the above Chinese character, one or more in the general additional character in concerned countries or area or group, one and the above court
One of fresh word, one and the above Japanese word or more.
Hdc in the component part (1) dc grade nodes are that spherical and/or hemispherical is distributed, the node, close
Code character group is three-dimensional, so, which is indicated with Bcxhdcyhdczhdc, i.e., there is the node X-coordinate, Y-coordinate, Z to sit
Mark, the code characters group indicate that x ' hdc belongs to X-coordinate, y ' hdc belongs to Y-coordinate, z ' hdc belongs to Ecfx ' hdcy ' hdcz ' hdc
In Z coordinate.
Hdc dc grades of nodes in the component part (1), tree form distribution is on x/y plane, i.e., the x/y plane is related to x
Axis, y-axis, the node be it is two-dimensional, code characters group is three-dimensional, so, which is indicated with Bcxhdcyhdc, i.e. the section
Point has X-coordinate, Y-coordinate, which is indicated with Ecfxhdcyhdczhdc, i.e. the Ecfxhdcyhdczhdc have with
The no Z coordinate of the identical X-coordinate of the node, Y-coordinate identical with the node, the node.
Preset program in the component part (3), including calculate position, contraposition;Position Wm=m+M+y in the calculation position, Wm
--- one and the above natural number being taken between C, y=0 or y are 1 --- 2, one and the above natural number are taken between (C-2M), or
Person, Wm=(C+z)-m-M, Wm is 1, and --- one and the above natural number being taken between C, z=0 or z are 1 --- takes between (M+1)
One and the above natural number;Mmax be can by the maximum quantity of the plaintext character field of A primary encryption, 2Mmax=C, or
(2Mmax+1)=C, M is 1 --- one and the above natural number are taken between Mmax;The contraposition refers to that Wm and cm is corresponded, then
Lm and Acm is corresponded, and further, Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm in Acm.
Preset program in the component part (3), comprising: as the M >=2, LmNm Mapping B cmxhd ' cmyhd '
Cmzhd ' cm, and then after LmNm corresponds to Ecmfxhd ' cmyhd ' cmzhd ' cm, the section where the Bcmxhd ' cmyhd ' cmzhd ' cm
Unique volume that uniquely number, the Bcmxhd ' cmyhd ' cmzhd ' cm have in Acm that point set zoarium has in Acm
Number, one of the Ecmfxhd ' cmyhd ' cmzhd ' cm or more, determine or participate in determine c (m+1), and then L (m+1) n (m+
1) corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) in Ac (m+1) is mapped;C (m+1) is 1 --- it is taken between C
One and the above natural number, 2≤dc (m+1)≤Dc (m+1).
In the component part (4), comprising: between ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm and/or close
Between Chinese character group Ecmfxhd ' cmyhd ' cmzhd ' cm and preset dynamic password, mathematical computations are carried out, combination is split, moves
It is obtaining the result is that a part in ciphertext dd or ciphertext dd behind one of position, pairing, replacement or more.
The one and above letter, is ee different letters in the original writing system of one kind, and ee is greater than
In 2 natural number;The original writing system corresponds to a kind of or more existing writing system in the world, that is, every ff letter
An alphabetical section is constituted, ff is 1 --- one and the above natural number, not identical, each word between each letter section are taken between ee
Parent segment fixedly or dynamically corresponding existing in the world one and the above Chinese character, one or more letter, one and the above Ah
Arabic numbers, one or more in the general additional character in concerned countries or area or group, one and above Korea's word, one
And one of above Japanese word or more.
Second of technical solution that the present invention uses are as follows: a kind of direct communication method includes the following steps:
(1) make atom caryogram cryptographic system A I 1 as claimed in any one of claims 1 to 8, A II 2, A I 1 with
A II 2 is identical;One side AAA of communication possesses A I 1, and another party BBB of communication possesses A II 2;
(2) after plaintext L is encrypted to ciphertext gg using A I 1 by AAA, half ciphertext hh or gg, hh=L+gg are sent to BBB;
It after BBB collects mail, uses A II 2 " L in confirmation hh, or decryption gg and then L are restored ", wherein should " confirmation L in hh "
Refer to, the L in hh is encrypted to ciphertext ii by A II 2, whether the gg that compares in ii and hh is identical, and if they are the same, then BBB confirms hh
In L or A II 2 gg in hh is decrypted into jj, the L that compares in jj and hh it is whether identical, if they are the same, then BBB confirms in hh
L.
The third technical solution that the present invention uses are as follows: a kind of indirect communication method includes the following steps:
(1) production atom caryogram cryptographic system A I 3 as claimed in any one of claims 1 to 8, A II 4, A I 5, A
II 6, A I 3 is identical as A II 4, and A I 5 is identical as A II 6;One side CCC of communication possesses A I 3, the party intermediary of communication
VVV possesses A II 4, A I 5, and another party DDD of communication possesses A II 6;
(2) after plaintext L ' is encrypted to ciphertext kk using A I 3 by CCC, to VVV send half ciphertext pp or kk, pp=L '+
kk;VVV collect mail after, using A II 4 " confirmation pp in L ', or decryption kk, and then L ' be restored ", wherein should " confirmation pp
In L ' " refer to, the L ' in pp is encrypted to ciphertext qq by A II 4, and whether the kk compared in qq and pp identical, if they are the same, then
Whether the L ' that the kk in pp is decrypted into rr by L ' or A II 4 in VVV confirmation pp, compares in rr and pp is identical, if they are the same, then
VVV confirms the L ' in pp;
After plaintext L ' is encrypted to ciphertext ss using A I 5 by VVV, half ciphertext tt or ss, tt=L '+ss are sent to DDD;
DDD collect mail after, using A II 6 " confirmation tt in L ', or decryption ss, and then L ' be restored ", wherein should " confirmation tt in
L ' " refers to that the L ' in tt is encrypted to ciphertext uu by A II 6, and whether the ss compared in uu and tt is identical, and if they are the same, then VVV is true
Recognize the L ' in tt or A II 6 ss in tt is decrypted into ww, the L ' that compares in ww and tt it is whether identical, if they are the same, then VVV is true
Recognize the L ' in tt.
The utility model has the advantages that
Core of the invention content first is that: since the first order node in each cipher table up, until the
(Dc-1) grade node terminates, and each node is incomplete fission node, several next stage nodes of directly fissioning out;Cause
This, since third level node up, each node directly belongs to some node in even higher level of node.
So after Lmnm Mapping B cmxhdcmyhdcmzhdcm, following the character group Lm (nm+ after Lmnm closely in encryption
1) when Mapping B cmxh (dcm+i) yh (dcm+i) zh (dcm+i), key point is, Bcmxh (dcm+i) yh (dcm+i) zh
(dcm+i), it is necessary to be that the Bcmxhdcmyhdcmzhdcm directly or indirectly fissions out;In decryption, from
Bcmxhdcmyhdcmzhdcm (with Lmnm phase mapping) obtains node Bcmxh (dcm-i) yh to (dcm-i) grade node-home
(dcm-i) zh (dcm-i) [with Lm (nm-1) phase mapping], key point is, the Bcmxhdcmyhdcmzhdcm, it is necessary to be direct
Or Bcmxh (dcm-i) yh (dcm-i) zh (dcm-i) is belonged to indirectly.
Core content second is that: each node have plane coordinates or spatial coordinate, wherein when each node has
When spatial coordinate, then node is more difficult to be cracked;Each node corresponds to one and the above code characters group, because of code characters
Group has spatial coordinate, and code characters group is made to be more difficult to be cracked;That is, cipher table has stereochemical structure, cipher table is
Three-dimensional, it is difficult to it is cracked.
Core content third is that: the calculation position, contraposition, on the basis of resistance is deleted, also resist reset.
Core content fourth is that: be related to multiple cipher tables encryption when, dynamically select multiple cipher tables, make the selection of cipher table
It is relevant with more randomness, also, between the multiple cipher tables dynamically selected;More innovatively, it is selected in dynamic more
On the basis of a cipher table, plaintext L can be encrypted to the very short ciphertext of length, benefit is: (1) for example, such as following 7 institutes of example
It states, plaintext L is encrypted to 555525555255552 (EcMfxhd ' cMyhd ' cMzhd ' cM, i.e. ciphertext dd), that is, plaintext L is added
A code characters group in close the last one cipher table in several relevant cipher tables, then the ciphertext can not exist
It is rearranged, deletes problem;(2) if code characters group is all disposable (after being used, being abandoned), if with having
The ciphertext of dry ciphertext character group is compared, then has saved a code characters group (cipher word in the last one described cipher table
Symbol group EcMfxhd ' cMyhd ' cMzhd ' cM after being used, is abandoned, and in other cipher tables in several described cipher tables
The code characters group Ecmfxhd ' cmyhd ' cmzhd ' cm being involved, can not be abandoned by A, but change its it is original where
Relative position);(3) plaintext L can be the audio and/or video of big data quantity, that is, can by the audio of big data quantity and/
Or video, it is encrypted to the ciphertext being only made of a ciphertext character group, and form half ciphertext, send, is then convenient for destination
Confirm the audio and/or video either with or without being replaced, reset, delete.
Core content fifth is that: it is described between ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm, and/or ... it
Between, carry out mathematical computations, split combination ..., help to resist ciphertext only attack (because ciphertext character group is stashed), into
And defend replacement;Meanwhile if as soon as ciphertext dd is a ciphertext character group, there is no reset, delete problem.
Core content sixth is that: the original writing system expands the scope of application of atom caryogram cryptographic system.
In addition, being not necessarily one-to-one correspondence when nm corresponds to dcm;For example, the m in Nm takes a sub-value when Nm corresponds to d ' cm,
Cm in d ' cm takes secondary and values above, that is, a LmNm can map multiple Bcmxhd ' cmyhd ' cmzhd ' cm, obtain multiple
Ecmfxhd ' cmyhd ' cmzhd ' cm, so that ciphertext be made to be more difficult to be replaced.
In addition, Bcmxhd ' cmyhd ' cmzhd ' cm corresponds to Ecmfxhd ' cmyhd ' cmzhd ' cm, it is not necessarily an a pair
It answers;For example, according to preset program, fxhdcyhdczhdc is desirable when Fxhdcyhdczhdc is greater than 1 natural number
1 --- two between Fxhdcyhdczhdc and numbers above, that is, a node Bcmxhd ' cmyhd ' cmzhd ' being mapped
Cm can correspond to multiple Ecmfxhd ' cmyhd ' cmzhd ' cm, so that ciphertext character group be made to be more difficult to be replaced.
The defensive replacement (distorting) of the present invention.For example, (password is pair under the premise of the password of addresser has been cracked
Position password, but be not this patent atom caryogram password), it will be substituted in plain text " day after tomorrow goes " in plain text " today goes ";But it uses
After atom caryogram cryptographic system, if fake producer attempts to replace, it is necessary to close to replace with a code characters group (corresponding " rear ")
Original ciphertext character group (corresponding " the present ") in text, due to the code characters group in atom caryogram cryptographic system, it is difficult to it is cracked,
To be difficult to be replaced.
For example, each code characters group is 15 bit digitals, 15 bit digitals are exactly 100,000,000,000,000, that is to say, that are being slightly less than hundred
In trillion different code characters groups, more than 100 ten thousand or more different passwords are randomly choosed for each cipher table (Dc=7)
Character group, so, it is the equal of 1/100000000th that (1), which selects more than 100 ten thousand in being slightly less than 100,000,000,000,000, for each cipher table,
Ratio;(2) fake producer is in order to replace some code characters group, in more than 100 ten thousand or more, guesses on one probability is
Hundred a ten thousandths;(3) even if fake producer has guessed some code characters group in some cipher table, due in some cipher table
Dc=7, it is therefore difficult to know the node in some code characters group and some cipher table on which rank of node set body
It is corresponding;(4) due to node set body more than one (dc is bigger, and the quantity of node set body at the same level is more) at the same level, so,
It is difficult to know some code characters group, it is corresponding with the node on which node set body in node set body at the same level;(5)
Since on different node set bodies, putting in order for node be not all identical, it is therefore difficult to know some code characters
Group is corresponding with which node on some node set body;(6) when should which node correspond to several code characters groups
Ecfxhdcyhdczhdc, that is, when on Fxhdcyhdczhdc >=2, be then difficult to know some code characters group where it
In code characters group aggregate tagmeme (1,2 ..., Fxhdcyhdczhdc, be exactly the sequence on a code characters group aggregate
Position arrangement).
Because code characters group has spatial coordinate, that is, indicate that the spatial position of code characters group is (empty with spatial coordinate
Between dimension), so, unless fake producer is aware of the spatial coordinate of some code characters group, that corresponding node
Plane coordinates or spatial coordinate, otherwise, even if fake producer has guessed some code characters group, fake producer is also difficult to know this certain
Which node is a code characters group correspond to, or is difficult to know code characters group set of some the code characters group where it
Tagmeme (because having guessed wrong tagmeme, also will appear weak point) in body.
(pretending to be) is forged in defence.For example, cheat pretends to be the QQ number code of addresser, transmitted to the relative of addresser, says that " I am anxious
Need to spend money ", allow receiver to hasten to some account remittance;And use atom caryogram cryptosystem encryption QQ information, then the cheat
It can not succeed, because, after which must successfully usurp the atom caryogram password password device that addresser possesses, encryption QQ letter
It ceases, transmit, VVV just can carry out intermediary (transmitting to the relative of addresser) for cheat;For example, cheat to pretend to be government offices, to
Some citizen transmits (swindle), and cheat must successfully usurp the atom caryogram password password device that government offices possess and otherwise deceive
Son has no idea to pretend to be government offices, because VVV can not carry out intermediary (transmitting to some citizen) for you.
Defending against network starts a rumour (because of online often anonymity, belong to a kind of special forgery).For example, signing in advance
It concludes an agreement, agreement regulation: when online dispatch, follow-up, it is necessary to (pass through VVV using personal atom caryogram password password device encryption
Intermediary);This measure is convenient for tracing the source started a rumour, containment the starting a rumour, mislead the people, destroying of " network navy ", random state.
Defend general playback.For example, in real life, for convenient for memory, vast majority of people is provided with static state, digit
Limited identification cipher (bank card password, password lock cipher etc.), if criminal to carry out Replay Attack, for example, silver-colored
Capable regulation is that daily trial and error number is no more than 2 times, then for criminal in 2 trial and errors allowed daily, input is different
Numeric string or digital string, until having one day, hit it finally, then the password is cracked by criminal;But if using former
Daughter nucleus type cryptosystem encryption, due to its be it is dynamic, one-time pad (indicates that the ciphertext character group of identification cipher is used
Afterwards, abandon or change relative position by A), it is synchronous that (A I is synchronous with A II, that is, the continuous more days trial and errors of A I can be led
A II synchronous operation is caused, and then A II can issue alert news), make criminal that can not crack identification cipher by Replay Attack.
Also a kind of " abnormal type is reset " (a kind of behavior sabotaged) can be defendd by the calculation position, contraposition;For example, broken
Bad person is directed to the atom caryogram password password device (A I) of some number, has arbitrarily compiled 15 bit digitals as ciphertext (assuming that should
15 bit digitals are a code characters group in some cipher table in the atom caryogram password password device by chance), and send
The number of the ciphertext, the atom caryogram password password device, so that atom caryogram cryptographic system is gone wrong, (A I is not transmitted, and A
II but receives transmitting for A I, also the operation of progress next step and cause that A I and A II's is asynchronous);But because the calculation position,
Contraposition is checked on, (this 15 when direct destination (A II) calculates position (M=1, m=1, y=0, m+M+y=1+1+0=2), contraposition
Number should correspond to cipher table A2), unless 15 bit digital also happens to be a code characters group in A2, otherwise occur different
Often.
Defence is reset.For example, fake producer has reset plaintext character field in half ciphertext, ciphertext character group, direct destination
When encrypting, confirming the plaintext in half ciphertext, since identical plaintext character field maps in different cipher tables, obtain
Ecmfxhd ' cmyhd ' cmzhd ' cm is different (because all code characters groups are unique, some cipher word in A
Symbol group is only uniquely present in some cipher table), so, some plaintext character field is rearranged, aligns, reflects with new cipher table
After penetrating, new ciphertext is obtained, original ciphertext in the new ciphertext and half ciphertext is inevitable not to be consistent.For example, when ciphertext is independent
In use, fake producer has reset the ciphertext character group in ciphertext, but because some ciphertext character group in ciphertext is rearranged after, sequence
Position is changed, so, when direct destination decrypts, which should align with new cipher table, similarly,
Necessarily occur abnormal.
The present invention is highly-safe.Cipher system requirement: 1, key is real random sequence;2, key length is more than or equal to
Length of the plaintext;3, each key only uses primary (one-time pad).The key of this patent atom caryogram cryptographic system, mainly password
Table;In cipher table, between node and node relevant, not at the same level, there is the relationship of three-dimensional, complicated fission or ownership;
Code characters group in cipher table is real random sequence, and is three-dimensional random sequence (because code characters group has
Spatial coordinate).The content (length) of cipher table is more than or equal to length of the plaintext.Due to the presence of the subordinate list of cipher table, can allow is made
Used code characters group is abandoned, and each key (cipher table) is made to be dynamic, one-time pad.
The present invention is general, conveniently: (1) not only for encrypting short essay (such as identification cipher, unlocking cipher), but also for encrypting length
Whole finance account in text, such as e-payment, text whole in transaction amount, such as Content of Communication, such as to call
The encrypted acknowledgment of (audio), picture (video).(2) both for stationary electronic device (such as fixed desktop computer, have it is close
The safety box of code lock), and it is used for mobile device;Such as the engineering machinery moved, such as mobile phone, that is, guaranteeing to completely cut off handset sickness
Under the premise of poison, atom caryogram cryptographic system is built-in in mobile phone;Such as object wearing device, that is, atom caryogram cryptographic system can
It is built in object wearing device, such as wrist scrambler, the wrist scrambler and internet are not connected to, are sick with the wooden horse from internet
Poison has physical isolation;The defect (such as U-shield) being related to there is no USBKey, that is, USBKey needs first to download a client software,
And it is not easy to mobile use.(3) (such as described original writing system) applied widely.
To sum up, the present invention is defensive replaces, forges, resetting, resetting, deleting, highly-safe, general, conveniently.
Detailed description of the invention:
Fig. 1 is tree-like cipher table A6 (cm=c1=6 in Acm);Hdcm dcm grades of nodes, tree form distribution are flat in xy
On face, then in Fig. 1: Hd6 d6 grades of nodes, for tree form distribution on x/y plane, node Bcmxhdcmyhdcm is node
B6xhd6yhd6, code characters group Ecmfxhdcmyhdcmzhdcm are code characters group E6fxhd6yhd6zhd6.
In Fig. 1, " core of A6 " is equivalent to the tree root of tree-like A6, and " core of A6 " is equivalent to the first order node of A6.
In Fig. 1,10 the 2nd grade of node B6xh2yh2 (d6=2, hd6=h2 in Hd6=H2=10, B6xhd6yhd6,
Successively 9,2,1,6,4,7,0,5,3,8), be distributed on the trunk of tree-like A6 (trunk is second level node set body), come
Derived from the fission of " core of A6 ";The E6fxhd6yhd6zhd6 is E6fxh2yh2zh2, and B6xh2yh2 is corresponding
E6fxh2yh2zh2。
B6x9y9=3 (h2=9) in 10 the 2nd grade of node B6xh2yh2, the 2nd grade of node B6x9y9 are corresponding
E6fx9y9z9 (h2=9 in E6fxh2yh2zh2);As fx9y9z9=1, E6fx9y9z9 is E61, which is
123456789044444。
In Fig. 1,10 3rd level node B6xh3yh3 (d6=3, hd6=h3 in Hd6=H3=10, B6xhd6yhd6,
Successively 5,2,6,8,0,3,4,1,9,7), be distributed on a branch of tree-like A6 that (branch is third level node set
Body), from above-mentioned 2nd grade of node B6x9y9 fission (that is, any one node in 10 3rd level node B6xh3yh3,
Belong to the B6x9y9);E6fxhd6yhd6zhd6 is E6fxh3yh3zh3, and B6xh3yh3 corresponds to E6fxh3yh3zh3.
B6x5y5=0 (h3=5) in 10 3rd level node B6xh3yh3, the 3rd level node B6x5y5 are corresponding
E6fx5y5z5 (h3=5 in E6fxh3yh3zh3);As fx5y5z5=1, E6fx5y5z5 is E61, which is
678901234588888。
In Fig. 1,10 the 4th grade of node B6xh4yh4 (d6=4, hd6=h4 in Hd6=H4=10, B6xhd6yhd6,
Successively 6,5,1,0,9,2,4,3,7,8), be distributed on a branch of tree-like A6 that (branch is fourth stage node set
Body), from above-mentioned 3rd level node B6x5y5 fission (that is, any one node in 10 the 4th grade of node B6xh4yh4,
Belong to the B6x5y5);E6fxhd6yhd6zhd6 is E6fxh4yh4zh4, and B6xh4yh4 corresponds to E6fxh4yh4zh4.
B6x7y7=4 (h4=7) in 10 the 4th grade of node B6xh4yh4, the 4th grade of node B6x7y7 are corresponding
E6fx7y7z7 (h4=7 in E6fxh4yh4zh4);As fx7y7z7=1, E6fx7y7z7 is E61, which is
222232222322223。
Condition by drawing attached drawing is limited, so, there is the omission point in Fig. 1;In Fig. 1, the vertical point that omits is indicated
The fission of node B6xh3yh3, level, which omits point, indicates the fission of node B6xh2yh2, and inclined omission point indicates and node
The corresponding E6fxh2yh2zh2 of B6xh2yh2, E6fxh3yh3zh3 corresponding with node B6xh3yh3 and B6xh4yh4 phase
Corresponding E6fxh4yh4zh4;Inclined omission point is also shown that code characters group perpendicular to the X/Y plane where node, that is, A6
It is three-dimensional.
Specific embodiment
In the following with reference to the drawings and specific embodiments, the present invention is furture elucidated, it should be understood that these embodiments are merely to illustrate
The present invention rather than limit the scope of the invention, after the present invention has been read, this field related personnel, producer, mechanism pair
The modification and/or utilization of various equivalent forms of the invention fall within herein described technical solution limited range.
Example 1, the first step are that plaintext L is divided (quartile) at M sections of plaintext character fields (L1, L2 ..., LM) (1≤m≤M).
Second step is the calculating (i.e. calculation position) of position;In the calculation position position 5Wm=m+M+y [Wm is 2 --- one is taken between C
And the above natural number, y=0 or y are 1 --- and one and the above natural number are taken between (C-2M)] or Wm=(C+z)-m-M [Wm
1 --- one and the above natural number are taken between C, z=0 or z are 1 --- one and the above natural number are taken between (M+1)];
Mmax is can be by the maximum quantity of the plaintext character field of A primary encryption, 2Mmax=C, or (2Mmax+1)=C, and M is 1 ---
One and the above natural number are taken between Mmax.
In this example, y=0 or z=1, total quantity C=2000, the 2Mmax=C=2000 of cipher table, then Mmax=1000;
So Wm=m+M, Wm are 2 --- one and the above natural number are taken between 2000;Or Wm=(C+z)-m-M, Wm is 1 ---
One and the above natural number are taken between 2000.
Third step is contraposition;Wm and cm is corresponded, then Lm and Acm is corresponded;That is, the cm in Wm and Acm, respectively from
It is small to arrange to longer spread or from big to small, and corresponded (contraposition), then Lm and Acm are corresponded (contraposition).
For example, the first step, L is divided into 1 section (L1), then L1 is exactly L (M=1, m=1).Second step calculates position;W1=m+M
=1+1=2 or W1=(C+z)-m-M=(2000+1) -1-1=1999.Third step, contraposition;C1 in W1 (=2) and Ac1
(=2) are aligned, then L1 and A2 is aligned, that is, L1 is encrypted with cipher table A2;Or in W1 (=1999) and Ac1
C1 (=1999) is aligned, then L1 and A1999 is aligned, that is, L1 is encrypted with cipher table A1999.
For example, the first step, L is divided into 3 sections (L1, L2, L3) (M=3,1≤m≤M), then L1, L2, L3 are in L respectively
Plaintext character field.Second step calculates position;Because M=3, m are 1,2,3, so W1=1+3=4, W2=2+3=5, W3=3+3
=6 or W1=2000+1-1-3=1997, W2=2000+1-2-3=1996, W3=2000+1-3-3=1995.Third step,
Contraposition;Wm (being equal to 4,5,6) is arranged from small to large respectively with the cm (being equal to 4,5,6) in Acm, and is corresponded, then L1
It is aligned with A4, L2 is aligned with A5, and L3 is aligned with A6, that is, L1 is encrypted with cipher table A4, L2 cipher table
A5 is encrypted, and L3 is encrypted with cipher table A6;Or in Wm (be equal to 1997,1996,1995) and Acm cm (be equal to 1997,
1996,1995) it respectively from big to small arranges, and is corresponded, then L1 and A1997 is aligned, and L2 and A1996 are carried out pair
Position, L3 are aligned with A1995, that is, L1 is encrypted with cipher table A1997, and L2 is encrypted with cipher table A1996, and L3 is used
Cipher table A1995 is encrypted.
For example, the first step, L is divided into 1000 sections (L1, L2 ..., L1000) (M=Mmax=1000,1≤m≤M),
Then L1, L2 ..., L1000 be plaintext character field in L respectively.Second step calculates position;Because M=1000, m are 1,2 ...,
1000, thus Wm be equal to 1+1000 (=1001), 2+1000 (=1002) ..., 1000+1000 (=2000) or Wm be equal to
2000+1-1-1000 (=1000), 2000+1-2-1000 (=999) ..., 2000+1-1000-1000 (=1).Third step,
Contraposition;Wm (be equal to 1001,1002 ..., 2000) with Acm in cm (be equal to 1001,1002 ..., 2000), respectively from it is small to
Longer spread, and being corresponded, then L1 and A1001 is aligned, and L2 is aligned with A1002 ..., L1000 and A2000
Aligned, that is, L1 is encrypted with cipher table A1001, and L2 is encrypted with cipher table A1002 ..., L1000 cipher table
A2000 is encrypted;Or Wm (be equal to 1000,999 ..., 1) with Acm in cm (be equal to 1000,999 ..., 1) respectively from big
To minispread, and corresponded, then L1 and A1000 is aligned, and L2 is aligned with A999 ..., L1000 and A1 into
Row contraposition, that is, L1 is encrypted with cipher table A1000, and L2 is encrypted with cipher table A999 ..., L1000 cipher table A1
It is encrypted.
In addition, plaintext L is encrypted to ciphertext dd, is sent to A II by A I, and under the premise of ciphertext dd can be decrypted, A
The dd can be divided (quartile) into same amount of ciphertext character group, calculation position, contraposition, mapping, decryption by II.For example, when encryption, A
Plaintext L is divided into 3 plaintext character field L1, L2, L3 (M=3) by I;After A II receives ciphertext dd, dd is divided into 3 by A II
A ciphertext character group (dd1, dd2, dd3), m=1,2,3, M=3, ddm are ciphertext character groups in ciphertext dd.Carry out again calculation position,
Contraposition (identical as the calculation position in encryption, contraposition principle);For example, calculating position with the addition, that is, dd1 and A4 contraposition (is solved with A4
It is close) so L1 be resumed, dd2 and A5 contraposition (being decrypted with A5) and then L2 is resumed, dd3 and A6 align (being decrypted with A6), into
And L3 is resumed;And then L is resumed.
It is described calculate position, contraposition main purpose (or great advantage) be: atom caryogram cryptographic system be used for encrypt or
When decryption, by the calculation position, contraposition, half ciphertext or ciphertext for issuing fake producer (or saboteur) to originator, Wu Fajin
What row left no trace deletes, and can't reset.
Example 2, for example, step 1, certain consumer CCC (originator possesses A I 3) (collects mail on the net to on-line shop DDD indirectly
Side, possesses A II 6, A 6 ≠ A of II I 3) shopping, and paid in advance by Internetbank to DDD, Payment Amount is 34 yuan of people
Coin;The bank account of DDD is 304565 (assuming that the digit of bank account is 6), and the bank account of CCC is 456078, then originally
Plaintext L in example is 30456534456078 (first 6 are collecting account, and centre is transaction amount, and latter 6 are Send only Account),
That is, the L is the full content of this e-payment (e-Bank payment).
Position, contraposition are calculated in step 2, segmentation (quartile).According to program preset in A I 3, L be divided into M sections [L1,
L2 ..., LM], Lm is the plaintext character field (1≤m≤M) in L;In this example, collecting account 304565 is divided into 2 sections, hands over
The easy amount of money (money transfer amount) 34 is divided into 1 section, and Send only Account 456078 is divided into 2 sections, so, which is divided into 5 sections of (M
=5, m be 1,2,3,4,5), that is, it be 565, L3 be 34, L4 be 456, L5 is 078 that L1, which is 304, L2,.
Similarly with the calculation position (addition) of example 1, contraposition, because of m=1, M=5, y=0, L1 and A6 (such as Fig. 1) are carried out
Contraposition, that is, L1 is carried out with cipher table A6 to bit encryption;M=2, M=5, y=0, so, L2 carries out contraposition with cipher table A7 and adds
It is close;M=3, M=5, y=0, so L3 is carried out with cipher table A8 to bit encryption;M=4, M=5, y=0, so, L4 cipher table
A9 is carried out to bit encryption;M=5, M=5, y=0, so, L5 is carried out with cipher table A10 to bit encryption.
The attached drawing of cipher table A7, A8, A9, A10 are not shown, the structure type of the attached drawing of A7, A8, A9, A10, identical as A6;
But on the putting in order of the node on each node set body, whole is not identical with A6 respectively by A7, A8, A9, A10, and
It is all not identical between A7, A8, A9, A10;It is not identical between all code characters groups, that is, each code characters group is in A
In be unique.
Step 3, grouping, mapping.Lm is divided into Nm group [Lm1, Lm2 ..., LmNm], and Lmnm is the plaintext character in Lm
Group (1≤nm≤Nm);In this example, specific grouping is:
L1 is divided into 3 groups (m=1, Nm=N1=3, nm=n1), that is, L11 (n1=1)=3, L12 (n1=2)=0, L13
(n1=N1=3)=4.
L2 is divided into 3 groups (m=2, Nm=N2=3, nm=n2), that is, L21 (n2=1)=5, L22 (n2=2)=6, L23
(n2=N2=3)=5.
L3 is divided into 2 groups (m=3, Nm=N3=2, nm=n3), that is, and L31 (n3=1)=3, L32 (n3=N3=2)=
4。
L4 is divided into 3 groups (m=4, Nm=N4=3, nm=n4), that is, L41 (n4=1)=4, L42 (n4=2)=5, L43
(n4=N4=3)=6.
L5 is divided into 3 groups (m=5, Nm=N5=3, nm=n5), that is, L51 (n5=1)=0, L52 (n5=2)=7, L53
(n5=N5=3)=8.
According to program preset in A I, Lmnm map corresponding Bcmxhdcmyhdcmzhdcm in Acm (nm corresponds to dcm,
Wherein, Nm corresponds to d ' cm, then LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd ' cmyhd '
Cmzhd ' cm), then Lm is mapped, stays tail formula encryption (fusion) at the Ecmfxhd ' cmyhd ' cmzhd ' cm;When nm corresponds to dcm,
Nm, dcm difference are from small to large, that is, after Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm, follow the character after Lmnm closely
Group Lm (nm+1) maps Bcmxh (dcm+i) yh (dcm+i) that the Bcmxhdcmyhdcmzhdcm directly or indirectly fissions out
zh(dcm+i).I=1 in this example.
As Fig. 1, L1n1 map corresponding B6xhd6yhd6 in A6;M=1, Lm=L1, nm=n1, cm=c1=6, Acm=
Ac1=A6, Bcm=Bc1=B6, dcm=dc1=d6, d ' cm=d ' c1=d ' 6, Nm=N1, n1 corresponds to d6, wherein N1 is corresponding
D ' 6, then L1N1 Mapping B 6xhd ' 6yhd ' 6, and then L1N1 corresponds to E6fxhd ' 6yhd ' 6zhd ' 6.Specifically, as follows:
Such as Fig. 1, because the n1 (=1) in L1n1 is corresponding d6 (=2), the B6xhd6yhd6 with L11 phase mapping is
(10 second level node B6xh2yh2 are shown in Fig. 1 for some node in 10 second level node B6xh2yh2 shown in FIG. 1
Second level node set body on, be successively 9,2,1,6,4,7,0,5,3,8);Again because of 10 second level nodes
Node B6x9y9=3 (h2=9) in B6xh2yh2, so L11 (=3) maps second level node B6x9y9 (number 3).
Such as Fig. 1, because the n1 (=2) in L1n1 is corresponding d6 (=3), the B6xhd6yhd6 with L12 phase mapping is
(10 third level node B6xh3yh3 are shown in Fig. 1 for some node in 10 third level nodes B6xh3yh3 shown in FIG. 1
Third level node set body on, be successively 5,2,6,8,0,3,4,1,9,7, the third level node set body and the above-mentioned second level
Node B6x9y9 is connected directly, that is, 10 third level node B6xh3yh3 are that second level node B6x9y9 directly fissions
Out);It is reflected again because of the node B6x5y5=0 (h3=5) in 10 third level node B6xh3yh3, L12 (=0)
Penetrate third level node B6x5y5 (B6x5y5, i.e. number 0 are that second level node B6x9y9 directly fissions out).
Such as Fig. 1, because the n1 (=N1=3) in L1n1 is corresponding d ' 6 (=D6=4), with L13 phase mapping
B6xhd ' 6yhd ' 6 is some node (10 fourth stage node in 10 fourth stage nodes B6xh4yh4 shown in FIG. 1
It is successively 6,5,1,0,9,2,4,3,7,8 on fourth stage node set body B6xh4yh4 shown in Fig. 1, the fourth stage node
Aggregate is connected directly with above-mentioned third level node B6x5y5, that is, 10 fourth stage node B6xh4yh4 are the third level
Node B6x5y5 directly fissions out);Again because of the node B6x7y7=4 (h4 in 10 fourth stage node B6xh4yh4
=7), so L13 (=4) maps fourth stage node B6x7y7, (B6x7y7, i.e. number 4, belong to the B6xhd ' in this example
6yhd ' 6, meanwhile, which is that third level node B6x5y5 directly fissions out), and then L13 corresponds to E6fx7y7z7,
Corresponding to E61 because of the fx7y7z7=1 in this example, L13 again, (E61 is code characters group 222232222322223, should
222232222322223 belong to E6fxhd ' 6yhd ' 6zhd ' 6) in this example;Then L1 (304) is mapped, stays the encryption of tail formula (poly-
Become) at 222232222322223 (i.e. E61).
Similarly, L2n2 maps corresponding B7xhd7yhd7 in A7;M=2, cm=c2=7, Nm=N2, n2 correspond to d7,
In, N2 corresponds to d ' 7, then L2N2 Mapping B 7xhd ' 7yhd ' 7, and then L2N2 corresponds to E7fxhd ' 7yhd ' 7zhd ' 7;Specifically, such as
Under:
Because the n2 (=1) in L2n2 is corresponding d7 (=2), the B7xhd7yhd7 with L21 phase mapping is 10 second
Some node ... in grade node B7xh2yh2;Again because of the B7x10y10=5 in 10 second level node B6xh2yh2
(h2=10), so L21 (=5) maps second level node B7x10y10 (number 5).
Because n2 (=2) in L2n2 is corresponding d7 (=3), the B7xhd7yhd7 with L22 phase phase mapping is 10 the
Some node ... in three-level node B7xh3yh3;Again because of the B7x4y4=6 in 10 third level node B7xh3yh3
(h3=4), so L22 (=6) maps third level node B7x4y4, (B7x4y4, i.e. number 6, are above-mentioned second level nodes
B7x10y10 directly fissions out).
Because the n2 (=N2=3) in L2n2 is corresponding d ' 7 (=D7=4), the B7xhd ' 7yhd ' with L23 phase mapping
7 be some node ... in 10 fourth stage node B7xh4yh4;Again because in 10 fourth stage node B7xh4yh4
B7x8y8=5 (h4=8), so L23 (=5) maps fourth stage node B7x8y8, (B7x8y8, i.e. number 5, belong to this example
In B7xhd ' 7yhd ' 7, meanwhile, the B7x8y8 be above-mentioned third level node B7x4y4 directly fission come out), and then L23 pairs
E7fx8y8z8 is answered, and because of the fx8y8z8=1 in this example, L23 corresponds to E71, and (E71 is code characters group
333343333433334, this 333343333433334 belongs to E7fxhd ' 7yhd ' 7zhd ' 7) in this example;Then L2 be mapped,
Stay tail formula encryption (fusion) at 333343333433334 (i.e. E71).
Similarly, L3n3 maps corresponding B8xhd8yhd8 in A8;M=3, cm=c3=8, Nm=N3, n3 correspond to d8,
In, N3 corresponds to d ' 8, then L3N3 Mapping B 8xhd ' 8yhd ' 8, and then L3N3 corresponds to E8fxhd ' 8yhd ' 8zhd ' 8;Specifically, such as
Under:
Because n3 (=1) in L3n3 corresponding d8 (=2) ..., L31 (=3) maps second level node B8x4y4
(number 3).
Because the n3 (=N2=2) in L3n3 is corresponding d ' 8 (=3), the B8xhd ' 8yhd ' 8 with L32 phase mapping is
Some node ... in 10 third level node B8xh3yh3;Again because in 10 third level node B8xh3yh3
B8x9y9=4 (h3=9), so L32 (=4) maps third level node B8x9y9, (B8x9y9, i.e. number 4, belong to this example
In B8xhd ' 8yhd ' 8, meanwhile, the B8x9y9 be above-mentioned second level node B8x4y4 directly fission come out), and then L32 pairs
E8fx9y9z9 is answered, and because of the fx9y9z9=1 in this example, L32 corresponds to E81, and (E81 is code characters group
444454444544445, this 444454444544445 belongs to E8fxhd ' 8yhd ' 8zhd ' 8) in this example;Then L3 be mapped,
Stay tail formula encryption (fusion) at 444454444544445 (i.e. E81).It should be noted that D8=4.
Similarly, L4n4 maps corresponding B9xhd9yhd9 in A9;M=4, cm=c4=9, Nm=N4, n4 correspond to d9,
In, N4 corresponds to d ' 9, then L4N4 Mapping B 9xhd ' 9yhd ' 9, and then L4N4 corresponds to E9fxhd ' 9yhd ' 9zhd ' 9;Specifically, such as
Under:
Because the n4 (=1) in L4n4 is corresponding d9 (=2) ...;So L41 (=4) maps second level node B9x6y6
(number 4).
Because the n4 (=2) in L4n4 is corresponding d9 (=3) ...;So L42 (=5) maps third level node B9x1y1
(number 5) (B9x1y1 is that above-mentioned second level node B9x6y6 directly fissions out).
Because the n4 (=N4=3) in L4n4 is corresponding d ' 9 (=D9=4), the B9xhd ' 9yhd ' with L43 phase mapping
9 be some node ... in 10 fourth stage node B9xh4yh4;Again because in 10 fourth stage node B9xh4yh4
B9x2y2=6 (h4=2) ..., so, L43 (=6) maps fourth stage node B9x2y2, and (B9x2y2, i.e. number 6, are these
B9xhd ' 9yhd ' 9 in example, meanwhile, which is that above-mentioned third level node B9x1y1 directly fissions out), and then L43
Corresponding E9fx2y2z2, and because of the fx2y2z2=1 in this example, L43 corresponds to E91, and (E91 is code characters group
555565555655556, this 555565555655556 be E9fxhd ' 9yhd ' 9zhd ' 9) in this example;Then L4 is mapped, stays
Tail formula encrypts (fusion) into 555565555655556 (i.e. E91).
Similarly, L5n5 maps corresponding B10xhd10yhd10 in A10;M=5, cm=c5=10, Nm=N5, n5 are corresponding
D10, wherein N5 corresponds to d ' 10, then L5N5 Mapping B 10xhd ' 10yhd ' 10, and then L5N5 corresponds to E10fxhd ' 10yhd '
10zhd′10;Specifically, as follows:
Because the n5 (=1) in L5n5 is corresponding d10 (=2) ...;So L51 (=0) maps second level node B10x8y8
(number 0).
Because the n5 (=2) in L5n5 is corresponding d10 (=3) ...;So L52 (=7) maps third level node B10x7y7
(number 7) (B10x7y7 is that above-mentioned second level node B10x8y8 directly fissions out).
Because the n5 (=N5=3) in L5n5 is corresponding d ' 10 (=D10=4), the B10xhd ' with L53 phase mapping
10yhd ' 10 is some node ... in 10 fourth stage node B10xh4yh4;Again because of 10 fourth stage nodes
B10x5y5=8 (h4=5) in B10xh4yh4, thus L53 (=8) map fourth stage node B10x5y5 (B10x5y5,
That is number 8, is the B10xhd ' 10yhd ' 10 in this example, meanwhile, which is that above-mentioned third level node B10x7y7 is directly split
Become out), and then L53 corresponds to E10fx5y5z5, and corresponding to E101 because of the fx5y5z5=1 in this example, L53 (should
E101 is code characters group 666676666766667, this 666676666766667 is E10fxhd ' 10yhd ' in this example
10zhd′10);Then L5 is mapped, stays tail formula encryption (fusion) at 666676666766667 (i.e. E101).
Step 4, further, L (30456534456078) are encrypted to ciphertext dd by A I 3, which is
222232222322223/333343333433334/444454444544445/555565555655556/
666676666766667。
Still further, forming half ciphertext on the basis of the ciphertext dd;Half ciphertext is:
(30456534456078)+(222232222322223/333343333433334/444454444544445/
555565555655556/666676666766667), that is, half ciphertext is (L+dd).
To the communications intermediary side VVV of authority, (VVV possesses A II 4, A I 5, A II 4=A I 3, A I to consumer CCC
5=A II 6) send half ciphertext (L+dd), the number 4545 of scrambler A I 3.
Step 5, if consumer CCC registered the bank account of oneself at VVV, VVV will also first check CCC and send
Half ciphertext in Send only Account, whether be consistent with the bank account that it is registered at VVV (with anti-counterfeiting);After confirmation,
4545 (numbers of scrambler A I 3) that VVV is sent according to CCC, recall A II 4.
VVV encrypts with A II 4, confirms and plaintext L:A II 4 L is encrypted to ciphertext dd ' (encryption principle is identical to A I
The principle of 3 encryption L), and whether compare the ciphertext dd that the ciphertext dd ' and A I 3 that A II 4 is encrypted to is encrypted to identical;In this example
Identical, then L obtains the confirmation of VVV.
Or VVV is decrypted with A II 4, is confirmed that the ciphertext in half ciphertext is grouped (quartile) by plaintext L:A II 4
(from left to right, 15 Arabic numerals are a ciphertext character group), the 5 ciphertext character groups that will be obtained after grouping, with A II
A6, A7, A8, A9, A10 in 4 are corresponded, are aligned and (calculate the principle of position, contraposition, be identical to the principle of example 1), map
(the 1st ciphertext character group 222232222322223 map code characters group in A6 ..., the 5th ciphertext character group
666676666766667 mapping A10 in code characters group), decryption, obtain plaintext character field, further, obtain in plain text,
Compare plaintext that A II 4 is decrypted again and whether L is identical;Identical in this example, then L obtains the confirmation of VVV.
It is [close that ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm in ciphertext dd is decrypted into plaintext character field Lm by A II
Chinese character group Ecmfxhd ' cmyhd ' cmzhd ' cm should after mapping the code characters group Ecmfxhdcmyhdcmzhdcm in Acm
Ecmfxhdcmyhdcmzhdcm inverse correspondence node Bcmxhdcmyhdcmzhdcm (with LmNm phase mapping), from this
Bcmxhdcmyhdcmzhdcm starts, and to (dcm-i) grade node-home, obtains node Bcmxh (dcm-i) yh (dcm-i) zn
(dcm-i) [with Lm (Nm-1) phase mapping] ..., and so on, belong to always node Bcmxhd " cmyhdc " mzhd " cm (with
Lm1 phase mapping), finally it is sequentially connected in series Bcmxhdcmyhdcmzhdcm, Bcmxh (dcm-i) yh (dcm-i) zh (dcm-
I) ..., cm, then Lm is resumed Bcmxhd " cmyhdc " mzhd "], and then L be resumed.In this example, i=1;It is specific decrypted
Journey is as follows:
As plaintext character field L1 (304) is encrypted to ciphertext character group 222232222322223 by Fig. 1, A I 3;A II 4
With the ciphertext character group 222232222322223, (search) code characters group is mapped in the A6 in A II 4
222232222322223 (=E6fx7y7z7=E61), 222232222322223 inverse correspondence fourth stage node B6x7y7 (=
4) (with L13 phase mapping), since fourth stage node B6x7y7, to third level node-home, not exclusively fissioned
Three-level node B6x5y5 (=0) (with L12 phase mapping);Again since third level node B6x5y5, to second level node-home,
(with L11 phase mapping, which is exactly the Bcmxhd " to the second level node B6x9y9 (=3) not exclusively to be fissioned
cmyhdc″m zhd″cm);Finally be sequentially connected in series this 4,0,3, then L1 (304) is resumed.
Similarly, A II 4 decrypts ciphertext character group 333343333433334 ..., L2 (565) by the A7 in A II 4
It is resumed.
Similarly, A II 4 decrypts ciphertext character group 444454444544445 ..., L3 (34) quilt by the A8 in A II 4
Restore.
Similarly, A II 4 decrypts ciphertext character group 555565555655556 ..., L4 (456) by the A9 in A II 4
It is resumed.
Similarly, A II 4 decrypts ciphertext character group 666676666766667 ..., L5 (078) by the A10 in A II 4
It is resumed.
Step 6, in A I 3, A II 4, code characters group 222232222322223,333343333433334,
444454444544445, it 555565555655556,666676666766667 is abandoned by A.222202222022220 (K11, it is false
If the g=1 in Kgjg, then Kg is K1, and jg is j1, j1=1) it replaces 222232222322223, become the E61,
333303333033330 (K12, j1=2) replace 333343333433334, become the E71, and 444404444044440
(K13, j1=3) replaces 444454444544445, becomes the E81, and 555505555055550 (K14, j1=4) are replaced
555565555655556, become the E91,666606666066660 (K15, j1=5) replace 666676666766667, at
For the E101;That is, A I 3, A II 4 are dynamic.
Step 7, VVV and JRJG (" China Unionpay " or relevant bank or relevant payment mechanism or relevant financial machine
Structure) connection, (if consumer did not register the bank account of oneself at VVV, the JRJG handle is needed in JRJG agreement
Close or cooperate with VVV, to check the Send only Account in half ciphertext that CCC is sent, whether oneself), and operated
Complete after this e-Bank payment that (" 34 yuans " in the bank account of consumer CCC are transferred on-line shop DDD's by the JRJG
In bank account), after L is encrypted to ciphertext dd " using A I 5 by VVV, the dd " is sent to DDD;After DDD receives the dd ", use
A II 6 decrypts the dd " (L is restored), then DDD firmly believes that the fund of this online shopping is transferred bank self by the JRJG
In account, DDD starts to deliver to CCC.Also, A I 5, A II 6 are dynamic, that is, used code characters group is put
It abandons.Here, there is a premise, DDD registered the bank account (6 associated of A II with DDD) of oneself at VVV, so as to
Collecting account (bank account of DDD) in half ciphertext that VVV is sent according to CCC, which is recalled.
In addition, the consumer CCC can also be by the order number of this online shopping, the name of oneself, telephone number, place of acceptance
The bank account of location and the DDD, payment amount, the bank account of CCC together, are encrypted to ciphertext using A I 3, and should
Ciphertext or half ciphertext by the ciphertext as component part, are sent to VVV, VVV decrypts the ciphertext, or confirms in half ciphertext
It after plaintext, re-encrypts, be sent to DDD.
If trojan horse deletes half ciphertext (L+dd);For example, by 5 plaintext character fields Lm, 5 ciphertext words
Symbol group ddm is deleted to 1 plaintext character field L1,1 ciphertext character group dd1 (L1 corresponds to dd1), but when due to encrypting, confirming, A
The L1 is calculated position (M=1, m=1, y=0, W1=m+M+y=1+1+0=2) by II, (ciphertext comes from for the ciphertext that maps, be encrypted to
In A2), not equal to dd1 (dd1 from A6, because of M=5, m=1, y=0, W1=m+M+y=1+5+0=6), and produce
Contradictory (because code characters group all in A is unique);Alternatively, calculating position method according to example 1 when decryption, confirmation
(addition), dd1 should corresponding A 2, however, a code characters group Ecmfxhd ' cmyhd ' cmzhd ' with the dd1 phase mapping
Cm is appeared in A6, and produces the contradiction of A2 and A6.
It is assumed that trojan horse remains the plaintext character field (L1, L2, L3) of front three, the ciphertext character group of front three
(dd1, dd2, dd3), two plaintext character fields below, two ciphertext character groups delete below, also, L1 and L3 is adjusted mutually
(dd1 becomes new for change place (L1 becomes the third plaintext character group L " ' 3 in new plaintext), dd1 and the mutual reversing of position of dd3
Ciphertext in third ciphertext character group dd " ' 3), and then L " ' 3, dd " ' 3 corresponding cipher table A6 (M=3, m=3, y=0, m+
It M+y=3+3+0=6), then is not in weak point, because L " ' 3, dd " ' 3 is natively corresponded to when encrypted acknowledgment or decryption confirm
A6, that is, original M=5, g=1, y=0, m+M+y=5+1+0=6;But second former, former third plaintext character group
(L2, L3), and second former, former third ciphertext character group (dd2, dd3) will be inevitable in encrypted acknowledgment or decryption confirmation
It will appear weak point.
It should be noted that faking since the digit of bank account is usually specific, (such as 22) that each side is generally acknowledged
A possibility that person deletes the e-Bank payment (belonging to e-payment) is little, this example only with the e-Bank payment come into
Row explanation;In practice, completely can by the e-payment, change into it is unrelated with e-payment, limited without digit or number of words
Word content or identification cipher of system etc., to securely communicate.
If fake producer resets five plaintext character fields in half ciphertext, five ciphertext character groups put in order
(such as original L1 and original L2 are exchanged and so that former L2 is become new L1, original L1 and become new L2, and 222232222322223 Hes
333343333433334 exchange), then the A II 4 of VVV is according to the principle of example 1, and normally the plaintext in double of ciphertext carries out institute
It states segmentation, calculate position, contraposition, and map, encrypt, then the ciphertext that A II 4 is encrypted to affirms not phase with the ciphertext that A I 3 is encrypted to
With (such as after original L2 becomes new L1, the ciphertext character group that new L1 is encrypted to, certainly not 333343333433334, because
It is unique for code characters group all in A);Or A II 4 decrypts ciphertext (grouping, calculation in half ciphertext in which can not be successfully
It after position, contraposition, maps, searched for less than code characters group 333343333433334 in A6, map, searched for less than close in A7
Code character group 222232222322223).
In addition, if A II 4 to the ciphertext block after, without the calculation position, contraposition (in A search with ciphertext word
The code characters group of symbol group phase mapping, rather than contraposition search is carried out in A6, A7, A8, A9, A10), can also be decrypted,
Confirmation, that is, after grouping, mapping, decryption, whether verifying and one-to-one five cipher tables of ciphertext character group are also pressed
According to tactic (because ciphertext character group arranges from small to large) from small to large, and verifying five cipher tables is not
It is A6, A7, A8, A9, A10.In fact, decryption when, when code characters group all in A is unique, either first contraposition, after
Mapping still first maps, carries out the verifying afterwards, is the one thing in fact;Because verify five cipher tables be A6, A7,
A8, A9, A10 are equivalent to the calculation position, verify what whether five cipher tables arranged from small to large, are equivalent to the contraposition.
In addition, in the component part (4), comprising: between Ecmfxhd ' cmyhd ' cmzhd ' cm, carry out mathematics meter
It is obtaining the result is that ciphertext dd after calculation;That is, between Ecmfxhd ' cmyhd ' cmzhd ' cm, progress mathematical computations (such as be added
Or subtract each other), a sum is obtained, using the sum as ciphertext dd;For example, in this example, by 222232222322223+
333343333433334+444454444544445+555565555655556+66667666 6766667, obtained sum are
2222272222722225, then it regard the sum 2222272222722225 as ciphertext dd;Further, by plaintext L
(30456534456078)+the dd (2222272222722225), obtains half ciphertext (30456534456078/
2222272222722225), which is sent to VVV (in this example, plaintext L in half ciphertext can only carries out encrypting really
Recognize).Also, 5 code characters groups (222232222322223,333343333433334,444454444544445,
555565555655556,666676666766667), because being hidden, being not exposed to except A, this 5
Code characters group can not be abandoned by A, but change its originally in A where relative position.
Example 3, because the memory space of hardware is limited, for example, when having 26 English words on every level-one node set body
When female (Dc >=7) or a Chinese character up to ten thousand (Dc >=3), then require hardware that there is the memory space of flood tide;So in order to expand atom
The scope of application of caryogram cryptographic system, the special original a kind of writing system yuan of the present invention, in order to will be existing in the world
Writing system, such as one of Chinese character, Chinese words, additional character, letter, alphabetical group (such as English word) or more, turn
The alphabetical section being changed in yuan.
For example, yuan has 6 different letters (ee=6), they are Q, R, S, T, U, V;Every 6 letters constitute a word
Parent segment ZZZ (ff=6, that is, ff is 1 --- it is taken between ee 6), then it is a different to share 46656 (=6 × 6 × 6 × 6 × 6 × 6)
ZZZ。
For another example yuan corresponds to GB2312-80 character set (chinese national standard character set), that is, ZZZ it is corresponding one and with
One in upper Chinese character, one or more letter, one and the above Arabic numerals, one and the above additional character (China is general)
Kind or more.Such as, in 46656 different ZZZ, 40,000 ZZZ can at least be selected at random, the Chinese character different from 40,000,
Chinese words are corresponded;Such as, QQQQQQ (one of ZZZ) is corresponding with Chinese character " people ", and QQQQQR and Chinese words are " public
The people " are corresponding.Such as, in 46656 different ZZZ, 6656 ZZZ can be selected at random, with 6656 letters and alphabetical group, number
Word and digital group, additional character etc., are corresponded;Such as, QQQQRR is corresponding with English alphabet " m ", QQQRRR and Arab
Digital " 5 " or digital group " 333 " are corresponding, and QQRRRR and additional character ", " (comma) are corresponding.
For another example yuan corresponds to English-speaking country's standard character collection, that is, ZZZ corresponding one or more letter, one or more
One of Arabic numerals, one and the above additional character (English area is general) or more;Such as, not at described 46656
In same ZZZ, 40,000 ZZZ can be at least selected at random, and the English word different from 40,000, English phrase are corresponded;
Such as, QRRRRR is corresponding with English word " sea " (ocean);Such as, in 46656 different ZZZ, 6656 can be selected at random
ZZZ is corresponded with 6656 numbers, digital group, additional character.
Example 4, for example, the information that addresser will issue receiver is in plain text " today ";Pass through the conversion table (example in A I 3
Such as, in the conversion table, the alphabetical section ZZZ in yuan described in a Chinese characters up to ten thousand and example 3 is corresponded), A I 3 is by plaintext character
Section " the present " is converted to the alphabetical section QRSTUV in yuan, and plaintext character field " day " is converted to the alphabetical section RSTUVQ in yuan,
Then " today " is converted into QRSTUVRSTUVQ (plaintext L).
According to program preset in A I 3, it is that (first bright by QRSTUV which, which is divided (quartile) into 2 sections (L1, L2), L1,
Text parent segment), L2 is RSTUVQ (the alphabetical section of second plaintext).L1 is divided into 6 groups alphabetical (Q, R, S, T, U, V), that is, L11=
Q, L12=R, L13=S, L14=T, L15=U, L16=V;L2 is divided into 6 groups alphabetical (R, S, T, U, V, Q), that is, L21=R,
L22=S, L23=T, L24=U, L25=V, L26=Q.
With in example 1 calculation position, contraposition similarly, L1 is with cipher table A3 to bit encryption, and L2 is with cipher table A4 to bit encryption.
Similarly with the encryption in example 2, L1 mapped with A3, be encrypted to ciphertext character group 777787777877778, it will with A4
L2 mapping is encrypted to ciphertext character group 888898888988889, further, forms ciphertext 777787777877778/
888898888988889。
The ciphertext 777787777877778/888898888988889 is issued VVV (party intermediary of communication) by addresser;
It is same with the calculation position in example 1, contraposition after the ciphertext is divided into 2 sections (15 bit digitals are a ciphertext character group) with A II 4 by VVV
Decryption in reason and example 2 similarly, is mapped, first ciphertext character group 777787777877778 of decryption with the A3 in A II 4,
QRSTUV is resumed, with second the A4 mapping in A II 4, decryption ciphertext character group 888898888988889, RSTUVQ quilt
Restore;VVV passes through the conversion of the conversion table in A II 4 again, and QRSTUV is converted into " the present ", and RSTUVQ is converted into " day ", into
One step, " today " is resumed in plain text, and VVV learns " today ";..., similarly, the another set of atom caryogram cryptographic system of VVV
(being decrypted by the conversion of the alphabetical section in the plaintext character field and the yuan and VVV encryption, receiver), with the collection of letters
People is contacted, and is informed " today ".
It should be noted that the Dc=4 in example 2, Dc=7 in this example, but the principle of cipher table is identical, mapping, encryption
It is identical with the principle of mapping, decryption.
Example 5, certain consumer possess atom caryogram cryptographic system A I 1, atom caryogram cryptographic system A built in certain electronic lock
II 2 (A II 2=A I 1), 987065 be the random code of real-time display on the display screen of the electronic lock, which is the electricity
Son lock this unlock unlocking cipher (random code that the electronic lock is unlocked next time, majority be not this 987065), and A I
1, Dc >=7 in the cipher table in A II 2.
The first step, the consumer input the random code 987065 into A I 1 by the camera to match with A I 1
(plaintext L), the L are divided into 1 section (L1) by A I 1, that is, L1 is exactly L (M=1, m=1);Second step calculates position, contraposition, with example 1
Calculation position, contraposition similarly, encrypt the L1 with the A2 in A I 1;Third step, the L1 are divided into 6 groups, that is, L11=9, L12=8,
L13=7, L14=0, L15=6, L16=5;Similarly, L1 is mapped, is encrypted by the A2 in A I 1 for encryption in 4th step, with example 2
At ciphertext character group E2fxhd ' 2yhd ' 2zhd ' 2 (i.e. ciphertext dd);5th step, ciphertext dd input the electricity by infrared or radio frequency
Son lock A II 2 in, in example 1 calculation position, contraposition similarly, similarly with the decryption in example 2, the dd by A II 2 A2 solve
Close to be consistent at 987065 with the random code of real-time display, which is opened.
The unlocking of the electronic lock belongs to the direct communication;It is related to single table, that is, pertain only to a cipher table.
Similarly, other identification ciphers (such as bankbook password, bank card password, e-Bank payment password, modification logging)
The form of random code can be used, that is, holder can not need preset geostationary (static) in relevant terminal
Identification cipher (obviously, remembers bad holder and also just eliminates the worry for remembering various identification ciphers), but logical
Portable atom caryogram password password device is crossed, by the indirect communication, to carry out relevant operation (ATM withdrawal, brush
Card, online shopping log in website etc.).
Example 6, some common symmetric cryptography of originator, will be encrypted to ciphertext 1 in plain text;Atom caryogram cryptographic system is used again
The key JK of the common symmetric cryptography is encrypted to ciphertext 2 by A I;Ciphertext 1, ciphertext 2 are sent to destination by originator, should
It is JK that destination, which is decrypted to ciphertext 2, learns the key of the symmetric cryptography with atom caryogram cryptographic system A II, further according to this
Key JK is decrypted ciphertext 1, learns the plaintext.
Example 7, as the M >=2, LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd '
After cmyhd ' cmzhd ' cm, which participates in determining c (m+1), and then L (m+1) n (m+1) maps
Corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) in Ac (m+1).
For example, plaintext L be divided into M sections [L1, L2, L3 ..., L (M-1), LM], m is 1,2,3 ..., (M-1), M.
When m=1, L1 is divided into 6 groups (L11, L12, L13, L14, L15, L16), that is, the n1 in L1n1 is 1,2,3,4,5,
6, L1N1 be exactly L16 (n1=N1=6);Assuming that program preset in A is: L1n1 maps corresponding in A55
B55xhd55yhd55zhd55 (cm=c1=55 in the m=1 in Lmnm, Acm, Bcmxhdcmyhdcmzhdcm), wherein
L1N1 Mapping B 55xhd ' 55yhd ' 55zhd ' 55, L1N1 corresponds to E55fxhd ' 55yhd ' 55zhd ' 55
(777777777777777);
It is calculated by the E55fxhd ' 55yhd ' 55zhd ' 55 (777777777777777) and dynamic password to determine
C2 [m=1 in c (m+1)].According to program preset in A, the P dynamic password in A is " E55fxhd ' 55yhd ' at this time
55zhd ' 55 is divided by 111111111111111 ", that is, 777777777777777 ÷ 111111111111111=7, that is to say, that
The c2=7;In turn, L2n2 maps corresponding B7xhd7yhd7zhd7 in A7, i.e., in described L (m+1) n (m+1) mapping Ac (m+1)
[m=1, m+1=2, c (m+1)=c2=7, the m (=1) are corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1)
Refer to the tagmeme of upper plaintext character field L1], wherein L2N2 Mapping B 7xhd ' 7yhd ' 7zhd ' 7, L2N2 corresponds to E7fxhd '
7yhd′7zhd′7(888838888388883);
It is calculated by the E7fxhd ' 7yhd ' 7zhd ' 7 (888838888388883) and (P+1) a dynamic password
To determine c3 [m=2 in c (m+1)];According to program preset in A, which is " E7fxhd ' 7yhd '
7zhd ' 7 is divided by 77774777747777 ", that is, 888838888388883 ÷ 77774777747777=11.43 (it rounds up,
No more than 4 digits), further, the decimal point in 11.43 is taken away, makes 11.43 to become 1143 (because of the cipher table in A
Quantity C=10000), and then corresponding B1143xhd1143yhd1143zhd1143, i.e., the described L (m+ in L3n3 mapping A1143
1) n (m+1) maps corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) [m=2, m+1=3, c (m in Ac (m+1)
+ 1)=c3=1143, the m (=2) refer to the tagmeme of a plaintext character field L2], wherein L3N3 Mapping B 1143xhd '
1143yhd ' 1143zhd ' 1143, L3N3 correspond to E1145fxhd ' 1143yhd ' 1143zhd ' 1143
(999949999499994);..., and so on, until corresponding BcMxhdcMyhdcMzhdcM in LMnM mapping AcM, i.e.,
Corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) in L (m+1) n (m+1) mapping Ac (m+1) [m=M-1,
M+1=M, c (m+1)=cM, the m (=M-1) refer to the tagmeme of a plaintext character field L (M-1)], wherein LMNM mapping
BcMxhd ' cMyhd ' cMzhd ' cM, LMNM correspond to EcMfxhd ' cMyhd ' cMzhd ' cM (555525555255552);So should
L is encrypted to 555525555255552 (EcMfxhd ' cMyhd ' cMzhd ' cM, i.e. ciphertext dd).
When being related to two or more cipher table, compared with example 2, the advantages of this example is very short (such as the above-mentioned ciphertext of ciphertext
555525555255552, which is a ciphertext character group), that is, example 2 is that Lm is encrypted to Ecmfxhd ' cmyhd '
Cmzhd ' cm (further, by 5 Ecmfxhd ' cmyhd ' cmzhd ' cm arranged in sequence, formation ciphertext), this example is that L is direct
It is encrypted to EcMfxhd ' cMyhd ' cMzhd ' cM (ciphertext dd);The shortcomings that this example, is not illustrated how to ciphertext EcMfxhd '
(so ciphertext dd described in this example can be used as the ciphertext in half ciphertext) is decrypted in cMyhd ' cMzhd ' cM, and example 2 further relates to
Ciphertext is decrypted and (so the ciphertext of example 2 can be used as the ciphertext in half ciphertext, also be can be used alone).
This example is not related to the calculation position.But this example safety with higher, it is more difficult to it replaces, reset, delete, reset,
Cause are as follows: (1) plaintext character group Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm, generates Ecmfxhd ' cmyhd ' cmzhd '
Cm, then determined Ac (m+1) by Ecmfxhd ' cmyhd ' cmzhd ' cm participation, and then generate Ec (m+1) fxhd ' c (m+1) yhd ' c
(m+1) zhd ' c (m+1) ..., that is, because Ecmfxhd ' cmyhd ' cmzhd ' cm be random (for the people except A), institute
It is also random with the cipher table Ac (m+1) being selected;(2) because the same plaintext character field corresponds to different cipher tables, meeting
Different Ecmfxhd ' cmyhd ' cmzhd ' cm is generated, so, cipher table is selected at random, and safety is higher.
When atom caryogram cryptographic system is used to encrypt plaintext L (audio and/or the video) of big data quantity, this example can be used
Principle, which is encrypted to very short ciphertext (such as only one ciphertext character group), further, the L and the ciphertext are constituted
Half ciphertext, in order to which destination encrypts the plaintext L in half ciphertext, confirms.
Example 8, as the M >=2, LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd '
After cmyhd ' cmzhd ' cm, which determines c (m+1), and then L (m+1) n (m+1) maps Ac (m+
1) corresponding Bc (m+1) xhdc (m+1) yhdc (m+1) zhdc (m+1) in.For example, cm=15, E15fxhd ' 15yhd ' 15zhd '
15 be 456056706780789;This 456056706780789 is split, four figures 0789 will be split out thereafter, determines c
(m+1), that is, 0789=c (m+1);So corresponding in L (m+1) n (m+1) mapping A0789
B0789xhd0789yhd0789zhd0789。
It is the explanation about technical solution and embodiment below.
Memory capacity about hardware.For example, each cipher table has 7 grades of nodes (Dc=7), since the second level, every grade
There is 10 different numbers (0 --- 9 random alignment) on node set body, then each cipher table there are more than 100 ten thousand nodes, false
If the corresponding 1 code characters group of each node, then have more than 100 ten thousand code characters groups;If each code characters group has 15
Number, then each cipher table occupies more than 1,500 ten thousand bytes;If there is 1,000 different cipher tables, then the storage of hardware is needed
Capacity is not less than 1.5 G;If there is 10,000 different cipher tables, then need the memory capacity of hardware not less than 15 G;If
There are 1,000 different cipher tables, the corresponding 10 code characters groups of each node then need the memory capacity of hardware not less than 15
G;If there is 10,000 different cipher tables, the corresponding 10 code characters groups of each node, then the memory capacity of hardware should not be low
In 150 G.
About atom caryogram cipher table.The cipher table is similar to the family tree of our mankind;For example, the first generation is first ancestor's c (phase
When " core ", the first order node in Ac);First ancestor has given birth to 10 sons, and (every son is the equal of a second level node
Bcxh2yh2zh2, dc=2), after growing to manhood, every son all gets married, breaks up the family, individually living or going abroad to seek one's livelihood (to be occupied in other places
Firmly), that is, every son has an address (being equivalent to x coordinate, y-coordinate, z coordinate), and every son has one and with subscript
Know object (such as silver bracelet, a silver bracelet are equivalent to a code characters group Ecfxh2yh2zh2), all silver bracelets (10
Or more) between, it is different;Every son has given birth to 10 sons again, then first ancestor c has 100 grandsons, and each grandson is
The third generation (each grandson is the equal of the third level node Bcxh3yh3zh3, dc=3) of first ancestor family, each grandson ties
It weds, break up the family, individually living or living in other places, that is, each grandson has an address (to be equivalent to x coordinate, y-coordinate, z to sit
Mark), each grandson has one and the above silver bracelet (silver bracelet is equivalent to a code characters group Ecfxh3yh3zh3),
It is different between all silver bracelets (100 or more);..., and so on, until the 7th generation of first ancestor c family
(dc=Dc=7, the Dc are the total quantitys of the grade of node, at this point, the Dc shows that six generations were multiplied for by first ancestor c family, that is, first ancestor c
In family's a total of seven generation, which is the total quantity in " generation ").
In a total of 1,000,000 the 7th generations, (in 10 × 10 × 10 × 10 × 10 × 10=1 × 10^6, each the 7th generation, were suitable
Then the 7th grade of node Bcxh7yh7zh7);In 1000000 the 7th generations, in each the 7th generation, gets married, breaks up the family, individually
It lives or lives in other places, that is, in each the 7th generation, there is an address (being equivalent to x coordinate, y-coordinate, z coordinate), each
, there were one and the above silver bracelet (silver bracelet is equivalent to a code characters group Ecfxh7yh7zh7) in 7th generation, all
It is different between silver bracelet (1,000,000 or more);On each node set body, long children's arrangement between brother is suitable
Sequence is not all identical.
The family tree of the first ancestor c is family tree as a kind of ideal world;From the second generation, every generation of the family tree it is every
One branch all grows to manhood and (does not die young), all gets married and gets married, gives birth to son (all 10 raw), a pickup generation, burning incense is continuous, son
Sun Mantang extremely rarely completes producing a male heir to continue the family line for task.
The first ancestor c has several brothers, each brother also has a family tree (with the structure type in first ancestor's c family tree
It is identical, but particular content is had any different, and for example, silver bracelet, i.e. code characters group is not identical;For example, in each node set body
On, the length children between brother puts in order all not identical);The family tree (being equivalent to a cipher table) of each first ancestor is independent
, have a style of one's own;That is, make between different first ancestor families, have occurred dynamic connection (be equivalent to different cipher tables it
Between, dynamic connection has occurred).
About " atomic nucleus "." fission " in atom caryogram cryptographic system, the nuclear fission being equivalent in atom bomb;
" fusion " in atom caryogram cryptographic system, the nuclear fusion being equivalent in hydrogen bomb;So the present invention is named as atom
Caryogram cryptographic system.
About at least identical double subsystem of A, A I and A II.Identical double subsystem refers to A II and A I
It is identical;Because A II and A I must be identical, so, A II and A I must be synchronized in terms of content in running, are the equal of
Event synchronization.
Stationary problem about A I and A II:
(1) the atom caryogram cryptographic system requires to synchronize, and the cipher table in cipher table and A II in mainly A I is wanted
It is synchronous;If asynchronous, A I and A II are no longer identical, even if not malfunctioned using primary, secondary, are used often, just
It will necessarily malfunction;Most simple, most effective method, be by the constant reply of the content of direct receiver, indirect receiver come
Solve stationary problem.
For example, addresser CCC contraposition cryptographic system A I 3, by " agreement is signed a contract " encryption, is sent to the direct collection of letters
People VVV (party intermediary), VVV immediately with contraposition cryptographic system A II 4, to decryption, learn content " agreement is signed a contract " after,
Immediately with contraposition cryptographic system A I 5, by " agreement is signed a contract " encryption, it is sent to indirect receiver DDD;Meanwhile VVV is immediately
With A II 4, " agreement is signed a contract " is encrypted again, new ciphertext (because A I, A II are dynamic) is formed, replys
To CCC;CCC uses A I 3 immediately, and the new ciphertext that VVV is sent is decrypted, and " agreement is signed a contract " restores, then shows VVV
The information (synchronized) of CCC sending is accurately had received, (this reply is not replaced or distorted to content by trojan horse
Facilitate the content that CCC sends out oneself to check, prevent oneself from sending out wrong because of careless);Meanwhile for VVV
For, also indicate that CCC has had received the reply of VVV, because if CCC does not receive the reply of VVV immediately, being certain to
Immediately with the service platform of VVV, phone contact is carried out, to keep A II 4 synchronous with A I's 3.
Similarly, the letter that DDD can also be sent with contraposition cryptographic system A II 6, decryption VVV, " agreement is signed a contract " restores;
" agreement is signed a contract " is encrypted with A II 6 again again, forms new ciphertext, is replied to VVV;Similarly, VVV can also be used
Cryptographic system A I 5 is aligned, the reply of DDD is decrypted, " agreement is signed a contract " restores, then shows that DDD is accurately received
Information (synchronized) that VVV is issued, content are not replaced or distort (this reply also contributes to VVV and checked);Together
When, for DDD, if VVV does not receive the reply of DDD immediately, it is certain to carry out phone contact with DDD immediately, with
Keep A II 6 synchronous with A I's 5.
Above-mentioned reply can also solve a kind of security risk --- intermittent retention.What is meant by intermittent retention? for example, hair
Believe that people sends the documents for the first time, is " disagreeing " in plain text, by the contraposition cryptographic system A I 3 of oneself, encrypts, be sent to VVV, but
It is stealthily to be retained by trojan horse, VVV is not received, which, which does not also know, is trapped;It is assumed that the addresser is quickly
It changes mind again, second of dispatch, is " agreement " in plain text, by the encryption of contraposition cryptographic system A I 3 of oneself, is sent to
VVV still, and is stealthily retained (addresser does not also know) by the trojan horse;Then, which will be retained
For the first time dispatch (" disagreeing "), issue VVV, caused by consequence be that indirect receiver is apprised of, addresser " disagrees ";Such as
Fruit uses the above-mentioned method responded immediately to, then can prevent the intermittent retention.
Above-mentioned reply, the hidden danger that retention can also be solved, reset.What is meant by retention, reset? for example, addresser sends out for the first time
Text contains " 567234 " (collecting account) in plaintext, is encrypted to the half close of first time by the contraposition cryptographic system A I 3 of oneself
Text is sent to VVV, still, is stealthily retained by trojan horse;Addresser sends the documents for the second time, (receives in plaintext containing " 900100 "
Money account), secondary half ciphertext is encrypted to by the contraposition cryptographic system A I 3 of oneself, is sent to VVV, and by wooden horse disease
Poison stealthily retains;Trojan horse is by the ciphertext character group of the expression 567 in half ciphertext of first time and secondary half ciphertext
In expression 100 ciphertext character group, reset the ciphertext KKKKK of (combination) Cheng Xin, (this 567100 for the new plaintext 567100 of correspondence
It is the bank account that trojan horse possesses), and form half ciphertext (567100+KKKKK), be sent to VVV;Caused by consequence be,
The money of addresser is transferred in the bank account 567100 possessed to trojan horse;If using the above-mentioned method responded immediately to,
The retention, rearrangement can then be prevented.
(2) e-payment is gone on smoothly, and also can solve the stationary problem of A I and A II.For example, consumer is in supermarket
Swipe the card when doing shopping, it is assumed that consumer with portable contraposition cryptographic system A I 3, by the bank account of supermarket, the shopping amount of money,
This shopping serial number, consumer bank card account, encrypted, formed half ciphertext, be sent to relevant VVV, carry out
The indirect communication (..., VVV cooperates after the operation such as being verified, being transferred accounts to relevant bank, passes through contraposition cryptographic system A I
5, (half ciphertext) is transmitted to supermarket;Supermarket is encrypted, is confirmed by aligning cryptographic system A II 6, the plaintext in double of ciphertext
Or decryption, confirmation, confirmation is errorless, then shows that this shopping money has been transferred accounts to the bank account of supermarket, and then supermarket agrees to disappear
Expense person's picking leaves supermarket.Although not using the method for above-mentioned reply, going on smoothly for e-payment shopping can also
To guarantee the synchronization between A I and A II.
About containment telecommunication fraud.On condition that sign the agreement in advance, agreement regulation: a citizen or mechanism (bank,
The units such as association, company, website, hospital, school, water supply, power supply, gas supply) or a government offices, it is accused to another citizen
When knowing information, atom caryogram password password device will be used, and pass through VVV intermediary.
About one or more.It is exactly more than one (containing one).
About component part (1) xhdcyhdczhdc.The xhdcyhdczhdc is spatial coordinate;It should
Xhdc in xhdcyhdczhdc can be longitude, the how many degree (°) of number in latitude;Yhdc in the xhdcyhdczhdc,
Can be is longitude, how much how many points (') in latitude;Zhdc in the xhdcyhdczhdc, can be is longitude, in latitude
How much how many seconds (").
In specific use, code characters group have to not necessarily use spatial coordinate;For example, in tree-like cipher table,
After carrying out Unified number to node, code characters group respectively, code characters group is arranged on X/Y plane, then the cipher word
Symbol group does not have spatial coordinate, only has plane coordinates (x, y) can also be with.
About incomplete fission.This not exclusively refers to without all fissions.
About putting in order for node.Between node set body not at the same level and/or between node set body at the same level, section
The whole that puts in order of node on point set zoarium is identical.
About becoming or participate in or become and participate in.For example, having two or more independent small in a code characters group
Group, wherein after having a group to be used, being abandoned, a Kgjg is given in original position, then a Kgjg is exactly institute
State participation;For example, in a code characters group, without independent group, a code characters group used after, be abandoned,
A Kgjg is given in its original position, then a Kgjg is exactly described becomes;For example, the jg in the Kgjg, 1 ---
Between Jg, two natural numbers are taken, one of them is to become, the other is participating in, then becomes and participates in described in generation.
About component part (2) the plaintext L.Plaintext L, refers to: for A I, A II, which is in plain text;Relatively
For people or encryption apparatus except A I, A II, which is not necessarily in plain text, for example, Lm is the original text system
Alphabetical section in system.
About character group.Character group has a word or symbol, or has two or more word and/or symbol;Word refers to word
One of female, number, text or more, symbol refers to one of additional character (country or group are general), picture
Or more.
About staying tail formula described in component part (3).The tail in tail is stayed, refers to LmNm;Stay tail formula encryption=fusion.
About mapping.Mapping is exactly identical or corresponding.
About the i.It is directly to fission as the i=1 in (dcm+i);It is to fission indirectly when i >=2;For example, i=2
When, it indicates: the node jjjjj in dcm grades, several (dcm+1) grade nodes of directly fissioning out, from several (dcm
+ 1) the node jjjjj in grade node, several (dcm+2) grade nodes of directly fissioning out.
About cm.Why the Ac in component part (1) being become into Acm, does Dc become Dcm? the reason is that: convenient for citing.Example
Such as, in example 2, L1n1 maps corresponding B6xhd6yhd6zhd6 in A6, that is, m=1, nm=n1 in Lmnm, m=1 in Acm,
Cm=c1=6 in cm=c1=6, Bcmxhdcmyhdcmzhdcm, dcm=dc1=d6;L2n2 maps corresponding in A7
B7xhd7yhd7zhd7.......It does so, just highlights: different Lmnm, corresponding different Acm.
About d ' cm.The Bcmxhdcmyhdcmzhdcm mapped by LmNm, is exactly Bcmxhd ' cmyhd ' cmzhd ' cm, institute
With d ' cm is under the jurisdiction of dcm;Meanwhile Bcmxhd ' cmyhd ' cmzhd ' cm corresponds to Ecmfxhd ' cmyhd ' cmzhd ' cm.
About (dcm-i) described in component part (5).It is directly to belong to as the i=1 in (dcm-i);When i >=2, between being
Connect ownership.
It changes about the relative position where it is original described in component part (6).The relative position, for example, certain
It after a code characters group is used, is not abandoned by A, according to program preset in A, which has been moved over to separately
At one position, or node corresponding with some code characters group has been moved over at another position and (has carried out a new section
Point, corresponding), that is, the relative position between some code characters group and original corresponding node is changed.
After being used about code characters group Ecmfxhd ' cmyhd ' cmzhd ' cm, is abandoned by A I, A II or it is original
The relative position at place changes.Ecmfxhd ' cmyhd ' cmzhd ' the cm, refers to all Ecmfxhd ' being previously used
Cmyhd ' cmzhd ' cm can also refer to a part in the Ecmfxhd ' cmyhd ' cmzhd ' cm being previously used, or even refer to one
It is a, such as EcMfxhd ' cMyhd ' cMzhd ' cM.
About the one and above Arabic numerals, one or more letter, one and the above Chinese character, one or more
Additional character (country or group are general), one and above Korea's word, one and the above Japanese word.The additional character,
It does not include this and the above Arabic numerals, one or more letter, one and above Korea's word, one and the above Japanese
Word.
About the primary encryption.For example, certain article is divided into 1500 plaintext character fields, but only 2000 close
When code table (C=2Mmax, Mmax=1000), that is, what if once can only at most encrypt 1000 plaintext character fields? method
It is, such as by 1000 before in 1500 plaintext character fields, as plaintext L, to carry out the calculations position, contraposition, mapping, add
Close, which is to encrypt for the first time;By 500 behind in 1500 plaintext character fields, as second plaintext L, then carry out
The calculation position, contraposition, mapping, encryption, the encryption are second of encryptions;So when divided number of segment is greater than Mmax in plain text,
The primary encryption is primary in encryption by several times.
About y 1 --- one and the above natural number are taken between (C-2M).For example, y=C-2M;As m=1, w1=m+
M+y=1+M+ (C-2M)=C-M+1;As m=M, wM=m+M+y=M+M+ (C-2M)=C.
About z 1 --- one and the above natural number are taken between (M+1).For example, z=M+1, and M=Mmax;Work as m=
When 1, w1=(C+z)-m-M=(C+M+1) -1-M=C;As m=M=Mmax, wM=(C+z)-m-M=(C+M+1)-Mmax-
Mmax=(C-2Mmax)+M+1 is (if 2Mmax=C, wM=M+1;If 2Mmax+1=C, wM=1+M+1).
The unique volume having in Acm about the node set body where the described Bcmxhd ' cmyhd ' cmzhd ' cm
Number, unique number ... for having in Acm of the Bcmxhd ' cmyhd ' cmzhd ' cm, determine or participate in determine c (m+
1) ....For example, unique number that the node set body where the Bcmxhd ' cmyhd ' cmzhd ' cm has in Acm, or
Unique number that the Bcmxhd ' cmyhd ' cmzhd ' cm has in Acm, is 567804567034560, by this
Last 4-digit number 4560 in 567804567034560, splits out, and determines the tagmeme of Next Password table, that is, and c (m+1)=
4560。
About fractionation combination, displacement, pairing, replacement.For example, first split between ciphertext character group, rear combination,
Form ciphertext dd;For example, being shifted between ciphertext character group, ciphertext dd is formed;For example, by a ciphertext character group with
After one preset dynamic password pairing, the ciphertext character group is represented with the dynamic password, forms a part in ciphertext dd;Example
Such as, a ciphertext character group is replaced with a dynamic password, forms a part in ciphertext dd.
The conversion table described in example 4.Assuming that conversion table is dynamic, for example, in yuan described in a Chinese character up to ten thousand and example 3
Alphabetical section ZZZ correspond, which is dynamic, that is, according to preset program, relevant one-to-one correspondence is previously used
Once, change primary (being not necessarily all one-to-one correspondence all to change);Assuming that conversion table be it is static, for example, a Chinese up to ten thousand
Alphabetical section ZZZ in yuan described in word and example 3 is corresponded, which is static, relatively constant.
About contraposition.Because in component part (3), Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm (nm in Acm
Corresponding dcm), which is first contraposition (nm corresponds to dcm), maps afterwards, so, atom caryogram password of the present invention, and it is a kind of right
Position password;Atom caryogram cryptographic system of the present invention and a kind of contraposition cryptographic system.
Claims (10)
1. a kind of atom caryogram cryptographic system, it is characterised in that following component parts:
(1) at least identical double subsystem of atom caryogram cryptographic system A, A I and A II;Have in A C cipher table (A1,
A2 ..., AC), Ac is cipher table, 1≤c≤C;Ac originates from " core " of Ac, and being somebody's turn to do " core " is first order node;First order node
Not exclusively fission and generate H2 second level node, h2 is 1 --- when taking any one natural number between H2, Bcxh2yh2zh2 is
A second level node in the H2 second level node, also, the Bcxh2yh2zh2 corresponds to code characters group
Ecfxh2yh2zh2;The Bcxh2yh2zh2 not exclusively fissions and generates H3 third level node, and h3 is 1 --- and it takes and appoints between H3
When one natural number, Bcxh3yh3zh3 is a third level node in the H3 third level node, also, should
Bcxh3yh3zh3 corresponds to code characters group Ecfxh3yh3zh3, which belongs to what this was not exclusively fissioned
Bcxh2yh2zh2 ..., and so on, Bcxh (dc-1) yh (dc-1) zh (dc-1) not exclusively fission and generate Hdc the
Dc grades of nodes, 2≤dc≤Dc, hdc is 1 --- and when taking any one natural number between Hdc, Bcxhdcyhdczhdc is the Hdc
Dc grades of nodes in dc grades of nodes, also, the Bcxhdcyhdczhdc corresponds to code characters group
Ecfxhdcyhdczhdc, wherein fxhdcyhdczhdc is 1 --- one and the above natural number are taken between Fxhdcyhdczhdc,
The Bcxhdcyhdczhdc belongs to the Bcxh not exclusively to fission (dc-1) yh (dc-1) zh (dc-1);C,c,
Fxhdcyhdczhdc, Fxhdcyhdczhdc are greater than the natural number equal to 1 respectively, and Dc is the total quantity of the grade of node, dc,
Dc, Hdc are greater than the natural number equal to 2 respectively;All code characters groups are unique in A;There is no subordinate list in A, alternatively, A
In have G subordinate list (K1, K2 ..., KG), Kg is subordinate list, have in 1≤g≤G, Kg Jg code characters group (Kg1, Kg2 ...,
KgJg), Kgjg is code characters group, 1≤jg≤Jg, when g is 1 --- between G, jg 1 --- taken respectively between Jg one and
When the above natural number, Kgjg will become or participate in or become and participate in Ecfxhdcyhdczhdc in A, and G, g, jg, Jg are big respectively
In the natural number for being equal to 1;
(2) according to program preset in A I, plaintext L is divided into M sections, L1, L2 ..., LM, Lm is the plaintext character field in L,
1≤m≤M;Further, Lm is divided into Nm group, Lm1, Lm2 ..., LmNm, Lmnm is the character group in Lm, 1≤nm≤
Nm;M is 1 --- one and the above natural number are taken between M ', M ', M, m, Nm, nm are greater than the natural number equal to 1 respectively;
(3) according to program preset in A I, Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm in Acm, and nm corresponds to dcm,
In, Nm corresponds to d ' cm, then LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd ' cmyhd '
Cmzhd ' cm, then Lm is mapped, tail formula is stayed to be encrypted to the Ecmfxhd ' cmyhd ' cmzhd ' cm, this stays the encryption of tail formula to be equivalent to core
Fusion;When nm corresponds to dcm, nm, dcm difference are from small to large, that is, when Lmnm maps corresponding Bcmxhdcmyhdcmzhdcm
Afterwards, it follows the character group Lm (nm+1) after Lmnm closely and maps the Bcmxhdcmyhdcmzhdcm and directly or indirectly fission and come out
Bcmxh(dcm+i)yh(dcm+i)zh(dcm+i);Cm is 1 --- one and the above natural number are taken between C, d ' cm is under the jurisdiction of
Dcm, dcm, d ' cm are respectively 2 --- one and the above natural number are taken between Dcm, i is greater than the natural number equal to 1, (dcm+i)
3 --- one and the above natural number are taken between Dcm;
(4) further, L is encrypted to ciphertext dd by A I;
(5) L is encrypted to ciphertext dd by A II, which is identical to the encryption principle that A I encrypts the L, alternatively, A II will be close
Ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm in literary dd is decrypted into plaintext character field Lm, that is, ciphertext character group
Ecmfxhd ' cmyhd ' cmzhd ' cm should after mapping the code characters group Ecmfxhdcmyhdcmzhdcm in Acm
Ecmfxhdcmyhdcmzhdcm inverse correspondence node Bcmxhdcmyhdcmzhdcm, the Bcmxhdcmyhdcmzhdcm and LmNm phase
Mapping, also, since the Bcmxhdcmyhdcmzhdcm, to (dcm-i) grade node-home, obtain node Bcmxh (dcm-
I) yh (dcm-i) zh (dcm-i), Bcmxh (dcm-i) yh (dcm-i) zh (dcm-i) and Lm (Nm-1) phase mapping ..., with
This analogizes, and belongs to node Bcmxhd " cmyhdc " mzhd " cm always, and " cm's Bcmxhd " cmyhdc " mzhd sets each other off with Lm1
Penetrate, be finally sequentially connected in series Bcmxhdcmyhdcmzhdcm, Bcmxh (dcm-i) yh (dcm-i) zh (dcm-i) ...,
Cm, then Lm is resumed Bcmxhd " cmyhdc " mzhd ", and then L is resumed;M is under the jurisdiction of dcm to dc ", and " m exists respectively by (dcm-i), dc
2 --- one and the above natural number are taken between Dcm;
(6) after code characters group Ecmfxhd ' cmyhd ' cmzhd ' cm is used, originally the relative position at place changes,
Alternatively, it is abandoned by A I, A II, that is, when G is greater than the natural number equal to 1, Kgjg becomes or participates in or become and participate in A
Middle Ecfxhdcyhdczhdc;That is, A I, A II are synchronous dynamics.
2. atom caryogram cryptographic system according to claim 1, it is characterised in that: in the component part (1)
Bcxhdcyhdczhdc, be one and the above Arabic numerals, one or more letter, one and the above Chinese character, one and with
On in the general additional character in concerned countries or area or group, one and above Korea's word, one and the above Japanese word
It is a kind of or more.
3. atom caryogram cryptographic system according to claim 1, it is characterised in that: Hdc in the component part (1) the
Dc grades of nodes are the distributions of spherical and/or hemispherical, and the node, code characters group are three-dimensional, so, which uses
Bcxhdcyhdczhdc indicates that is, the node has X-coordinate, Y-coordinate, Z coordinate, code characters group Ecfx ' hdcy '
Hdcz ' hdc indicates that x ' hdc belongs to X-coordinate, y ' hdc belongs to Y-coordinate, z ' hdc belongs to Z coordinate.
4. atom caryogram cryptographic system according to claim 1, it is characterised in that: Hdc in the component part (1) the
Dc grades of nodes, tree form distribution is on x/y plane, i.e., the x/y plane is related to x-axis, y-axis, and the node is two-dimensional, code characters group
It is three-dimensional, so, which is indicated with Bcxhdcyhdc, i.e., the node has X-coordinate, Y-coordinate, which uses
Ecfxhdcyhdczhdc indicates that the i.e. Ecfxhdcyhdczhdc has X-coordinate identical with the node, identical with the node
The no Z coordinate of Y-coordinate, the node.
5. atom caryogram cryptographic system according to claim 1, it is characterised in that: preset in the component part (3)
Program, including calculate position, contraposition;Position Wm=m+M+y in the calculation position, Wm is 2 --- one and the above natural number, y=are taken between C
0 or y is 1 --- one and the above natural number are taken between (C-2M), alternatively, Wm=(C+z)-m-M, Wm is 1 --- it is taken between C
One and the above natural number, z=0 or z are 1 --- one and the above natural number are taken between (M+1);Mmax is can be primary by A
The maximum quantity of the plaintext character field of encryption, 2Mmax=C, or (2Mmax+1)=C, M is 1 --- taken between Mmax one and with
Upper natural number;The contraposition, refers to Wm and cm --- corresponding, then Lm and Acm is corresponded, and further, Lmnm maps phase in Acm
The Bcmxhdcmyhdcmzhdcm answered.
6. atom caryogram cryptographic system according to claim 1, it is characterised in that: preset in the component part (3)
Program, comprising: as the M >=2, LmNm Mapping B cmxhd ' cmyhd ' cmzhd ' cm, and then LmNm corresponds to Ecmfxhd '
After cmyhd ' cmzhd ' cm, unique volume that the node set body where the Bcmxhd ' cmyhd ' cmzhd ' cm has in Acm
Number, the Bcmxhd ' cmyhd ' cmzhd ' cm have in Acm unique number, in the Ecmfxhd ' cmyhd ' cmzhd ' cm
One kind or more, determine or participate in determine c (m+1), and then corresponding Bc (m+1) in L (m+1) n (m+1) mapping Ac (m+1)
xhdc(m+1)yhdc(m+1)zhdc(m+1);C (m+1) is 1 --- take one and the above natural number between C, 2≤dc (m+1)≤
Dc(m+1)。
7. atom caryogram cryptographic system according to claim 1, it is characterised in that: in the component part (4), comprising:
Between ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm and/or ciphertext character group Ecmfxhd ' cmyhd ' cmzhd ' cm with
Between preset dynamic password, after carrying out one of mathematical computations, fractionation combination, displacement, pairing, replacement or more, obtain
The result is that a part in ciphertext dd or ciphertext dd.
8. atom caryogram cryptographic system according to claim 2, it is characterised in that: the one and above letter is a kind of
Ee different letters in original writing system, ee are greater than the natural number equal to 2;The original writing system, it is corresponding
A kind of or more existing writing system in the world, that is, every ff letter constitutes an alphabetical section, and ff is 1 --- it is taken between ee
One and the above natural number, not identical between each letter section, fixedly or dynamically correspondence is existing in the world for each letter section
One and the above Chinese character, one or more letter, one and the above Arabic numerals, one or more on concerned countries or ground
One of the general additional character in area or group, one and above Korea's word, one and the above Japanese word or more.
9. a kind of direct communication method, includes the following steps:
(1) production atom caryogram cryptographic system A I 1 as claimed in any one of claims 1 to 8, A II 2, A I 1 and A II
2 is identical;One side AAA of communication possesses A I 1, and another party BBB of communication possesses A II 2;
(2) after plaintext L is encrypted to ciphertext gg using A I 1 by AAA, half ciphertext hh or gg, hh=L+gg are sent to BBB;BBB is received
After letter, use A II 2 " L in confirmation hh, or decryption gg and then L are restored ", wherein should " confirmation L in hh " refer to,
Whether the gg that the L in hh is encrypted to ciphertext ii by A II 2, compares in ii and hh is identical, and if they are the same, then BBB confirms the L in hh,
Or the gg in hh is decrypted into jj by A II 2, whether the L that compares in jj and hh is identical, if they are the same, then BBB confirms the L in hh.
10. a kind of indirect communication method, includes the following steps:
(1) production atom caryogram cryptographic system A I 3 as claimed in any one of claims 1 to 8, A II 4, A I 5, A II
6, A I 3 are identical as A II 4, and A I 5 is identical as A II 6;One side CCC of communication possesses A I 3, the party intermediary VVV of communication
Possess A II 4, A I 5, another party DDD of communication possesses A II 6;
(2) after plaintext L ' is encrypted to ciphertext kk using A I 3 by CCC, half ciphertext pp or kk, pp=L '+kk are sent to VVV;VVV
It after the collection of letters, uses A II 4 " L ' in confirmation pp, or decryption kk and then L ' are restored ", wherein should " confirmation L ' in pp "
Refer to, the L ' in pp is encrypted to ciphertext qq by A II 4, and whether the kk compared in qq and pp is identical, and if they are the same, then VVV confirms pp
In L ' or A II 4 kk in pp is decrypted into rr, the L ' that compares in rr and pp it is whether identical, if they are the same, then VVV confirms pp
In L ';
After plaintext L ' is encrypted to ciphertext ss using A I 5 by VVV, half ciphertext tt or ss, tt=L '+ss are sent to DDD;DDD is received
After letter, use A II 6 " L ' in confirmation tt, or decryption ss and then L ' are restored ", wherein should " confirmation L ' in tt " be
Refer to, the L ' in tt is encrypted to ciphertext uu by A II 6, and whether the ss compared in uu and tt is identical, and if they are the same, then VVV confirms in tt
L ' or A II 6 ss in tt is decrypted into ww, the L ' that compares in ww and tt it is whether identical, if they are the same, then VVV confirms in tt
L '.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410685848.2A CN105897420B (en) | 2014-11-21 | A kind of atom caryogram cryptographic system and direct communication method and indirect communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410685848.2A CN105897420B (en) | 2014-11-21 | A kind of atom caryogram cryptographic system and direct communication method and indirect communication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105897420A CN105897420A (en) | 2016-08-24 |
CN105897420B true CN105897420B (en) | 2019-07-16 |
Family
ID=
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101527629A (en) * | 2002-03-21 | 2009-09-09 | 株式会社Ntt都科摩 | Hierarchical identity-based encryption and signature schemes |
CN102611558A (en) * | 2012-04-27 | 2012-07-25 | 西安电子科技大学 | Magic square-based secret key distribution and identity authentication method of electronic account administrated by multi-users commonly |
CN103973435A (en) * | 2014-05-09 | 2014-08-06 | 褚万青 | Alignment password system, direct communication method and indirect communication method |
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101527629A (en) * | 2002-03-21 | 2009-09-09 | 株式会社Ntt都科摩 | Hierarchical identity-based encryption and signature schemes |
CN102611558A (en) * | 2012-04-27 | 2012-07-25 | 西安电子科技大学 | Magic square-based secret key distribution and identity authentication method of electronic account administrated by multi-users commonly |
CN103973435A (en) * | 2014-05-09 | 2014-08-06 | 褚万青 | Alignment password system, direct communication method and indirect communication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Research on a covert communication model realized by using smart contracts in blockchain environment | |
CN107682308A (en) | The electronic evidence preservation system for Channel Technology of being dived based on block chain | |
CN107301521A (en) | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain | |
CN102033901B (en) | Citizen information management system method | |
CN108964905A (en) | A kind of safe and efficient block chain implementation method | |
CN109410076A (en) | Agricultural product based on block chain technology, which are traced to the source, insures public service platform | |
CN110033258A (en) | Business datum encryption method and device based on block chain | |
CN103490889B (en) | A kind of infinite length key internet communication encryption method | |
CN101999132A (en) | A strong authentication token generating one-time passwords and signatures upon server credential verification | |
CN110086626A (en) | Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair | |
CN109815051A (en) | The data processing method and system of block chain | |
CN107333262A (en) | A kind of system and method based on CN39 code authentication phone numbers | |
CN113781073B (en) | Subsidizing method capable of hiding real names based on matrix alliance chain | |
CN111654363A (en) | Alliance chain privacy protection method based on group signature and homomorphic encryption | |
CN110503290A (en) | The twin volume data management method of number towards product lifecycle | |
CN109447807A (en) | The weak center's trust data management system and method for the total score double-strand of digital bank | |
CN109660359A (en) | Generate the method, equipment and the method for generating the credible address of HD wallet of HD wallet business card | |
CN107154850A (en) | A kind of processing method and processing device of block chain data | |
CN110263573A (en) | Representation method based on block chain personal identification | |
CN115242371A (en) | Method, device and system for calculating set intersection and cardinality of differential privacy protection | |
CN108696508A (en) | System and method based on CN39 code authentication resident identification card numbers | |
CN106921677A (en) | A kind of multiple encryption system of block chain houseclearing | |
Buccafurri et al. | Ethereum Transactions and Smart Contracts among Secure Identities. | |
CN102185696A (en) | Mobile phone user authentication method without trusted third party on basis of handwriting characteristics | |
CN107733936A (en) | A kind of encryption method of mobile data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |