CN107733642A - Embedded encryption method based on high order second order logistic mappings - Google Patents
Embedded encryption method based on high order second order logistic mappings Download PDFInfo
- Publication number
- CN107733642A CN107733642A CN201710919542.2A CN201710919542A CN107733642A CN 107733642 A CN107733642 A CN 107733642A CN 201710919542 A CN201710919542 A CN 201710919542A CN 107733642 A CN107733642 A CN 107733642A
- Authority
- CN
- China
- Prior art keywords
- mrow
- plaintext
- logistic
- block
- mapping
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention discloses a kind of embedded encryption method based on logistic mappings, based on the embedded encryption method of logistic mappings, comprises the following steps:Step 1, producing method of the logistic mapping as sub-key system is selected, and the certain number of iteration is distinguished into each mapping in logistic mappings, step 2, plaintext is then divided into some pieces with binary system;Step 3, on the basis of the iteration obtained by step 1, then A and D two parts are obtained to the iteration of the certain number of each mapping progress in logistic mappings;Step 4, after entering shiftrows respectively to each Plaintext block obtained by step 2, corresponding intermediate ciphertext is obtained.The present invention maps core with logistic, carries out high order second order encryption embedded mode, realizes that the high order processing of encryption successive ignition produces complicated changeable key, the device can be embedded into various electronic products, improve the safety of electronic product.
Description
It is on 02 09th, 2015, the entitled " insertion based on high order second order logistic mappings the applying date that the application, which is,
Formula encryption method and device ", Application No. 201510066179.5 application for a patent for invention divisional application.
Technical field
The present invention relates to field of encryption, more particularly to the embedded encryption side mapped based on high order second order logistic
Method.
Background technology
In general logistic mapping encryptings method is mainly to be produced by the initial value x0 and u (algorithm secret key) of mapping
Raw two binary system series AsjAnd Dj, and by the two binary system series AsjAnd DjRegard the sub-key of this cryptographic system as to realize
Encryption.However, the analysis of logistic mapping encryptings method and discovery series AjAnd DjIt is completely true by logistic mappings
It is fixed, and in plain text and the factor such as ciphertext is unrelated.So, when attacker obtains the A of any plaintextjAnd DjAfterwards, it is possible to use this
AjAnd DjDirectly attack has used the ciphertext that same key is encrypted, and this not only can make information security hidden danger be present, will also turn into
Security breaches.It can be seen that only it is it cannot be guaranteed that information security by the simple logistic encryption methods mapped.
In order to improve information security, currently used increasingly complex logistic mapping encryptings method includes free
Between the stream encryption, the stream encryption and second order logistic mapping encryptings etc. of multiple logistic mappings that divide.However, these are multiple
Miscellaneous logistic mapping encrypting methods, although more iterations can ensure information security to a certain extent,
When realizing information transfer, key more preferably can not change at any time, and reliability reduces, and not reach the effect of safe information transmission still
Fruit.
The content of the invention
The technical problems to be solved by the invention are that the key in the presence of existing logistic mapping encryptings method is simple
With key it is immutable the deficiencies of, there is provided it is a kind of based on high order second order logistic mapping embedded encryption method method and dress
Put.
The present invention solves the above problems by the following technical programs:
Based on the embedded encryption method of high order second order logistic mappings, comprise the following steps:
Step 1, producing method of the logistic mapping as sub-key system is selected, and the logistic is reflected
The certain number of iteration is distinguished in each mapping hit,
Selected logistic is mapped as
In formula,Ith mapping n follow-up value of iteration is represented, i=1,2,3....b-1, a-1, b, a, u is setting
Value, and u ∈ (1.64,2),It is the numerical value of type double precision with u, a=1,2,3......, b=1,2,3......, and
A, the complexity and processor computing capability that b value uses according to user are chosen;
Step 2, plaintext is then divided into some pieces with binary system;
Step 3, on the basis of the iteration obtained by step 1, then certain number is carried out to each mapping in logistic mappings
Iteration obtain A and D two parts;
Step 4, after entering shiftrows respectively to each Plaintext block obtained by step 2, corresponding intermediate ciphertext is obtained;
Step 4.1, Plaintext block is divided into m plaintext sub-block;Wherein m is the positive integer more than 1;
Step 4.2, each plaintext sub-block ring shift left or after moving to right S positions simultaneously is obtained into each plaintext sub-block respectively
Displacement plaintext sub-block;
Step 4.3, the order of the plaintext sub-block by each displacement plaintext sub-block as corresponding to it merges to obtain displacement in plain text
Block;
Step 4.4, after Plaintext block ring shift left will be shifted or move to right m × S positions, intermediate ciphertext is obtained;
In above-mentioned steps 4.2 and step 4.4, the direction of displacement of each plaintext sub-block is consistent, and plaintext sub-block and Plaintext block
Direction of displacement it is also consistent;
Step 5, the intermediate ciphertext obtained by step 3 gained A and step 4 is subjected to XOR;
Step 6, judge whether that all Plaintext blocks have been encrypted to finish;If finishing, terminate;Otherwise, return to step 3
Continue to encrypt.
In such scheme, each mapping in being mapped preferably in step 1 logistic carries out the number of iteration first
More than the number that each mapping in being mapped in step 3 logistic carries out iteration again.
Advantages of the present invention is with effect:
Instant invention overcomes key in traditional logistic mapping encryptings method is simple and the shortcomings of key is immutable, with
Logistic maps core, carries out high order second order encryption embedded mode using stm32F407, realizes encryption successive ignition high order
Processing produces complicated changeable key, and the device can be embedded into various electronic products, improve the safety of electronic product.
Brief description of the drawings
Fig. 1 is the encryption flow figure of the present invention;
Fig. 2 is the logistic mapping bifurcation graphs of the present invention;
Fig. 3 is the second order High Degree Logistic-Like Map figure of the present invention.
Embodiment
The invention will be further described with reference to embodiments.
A kind of embedded encryption method method based on high order second order logistic mappings, as shown in figure 1, including as follows
Step:
Step 1, producing method of the logistic mapping as sub-key series is selected:
In formula:Represent ith mapping n follow-up value of iteration.U is setting value, and u ∈ (1.64,2).It is equal with u
For the numerical value of type double precision, a=1,2,3......, b=1,2, the 3...... (complexity that a, b value use according to user
Degree and processor computing capability are chosen).In order to eliminate the influence of instantaneous value, in a preferred embodiment of the invention, by formula (1)
Mapping difference iteration 200 times, it is the starting point for producing key to obtain x200.
Step 2, a series of packet that length are 256 bits will be divided into plain text, last packet is if curtailment
Zero padding.
Step 3, each mapping in formula (1) is distinguished into iteration 40 times again.If the iteration j value of ith mapping is(two enter
Form processed is:WhereinN-th binary system represented).From
The middle numerical value extracted in the 2nd, 3 binary digit, obtains the series of 18 bitBy
The serial D of series A and 32 bits that 20 iteration and extraction obtain 256 bits distinguishes as follows:
A=H1,2H1,3H2,2H2,3H3,2H3,3......H16,2H16,3
D=H17,2H17,3H18,2H18,3H19,2H19,3H20,2H20,3
Wherein, in formula
Step 4, shiftrows are entered to Plaintext block.
First, by Plaintext block pk(k=1,2 ...) is divided into four pieces of 64 bits:Pk1、Pk2、 Pk3And Pk4Circulate respectively
Move to left S1、S2、S3And S4Position, wherein S1=(H17,2H17,3)mod64,S2=(H18,2H18,3)mod64,S3=(H19,2H19,3)
Mod64 and S4=(H20,2H20,3)mod64。
Then, by Pk1、Pk2、Pk3And Pk4Merging obtains Pk, then by Pk, ring shift left S positions, obtain intermediate ciphertext C, k.
Wherein,
S=(H17,2H17,3+H18,2H18,3+H19,2H19,3+H20,2H20,3) mod64.
Step 5, A and C, k are carried out xor operation, obtains encrypted cipher text:
Step 6, if Ck (i) is the value of i-th of byte in ciphertext Ck, it is as follows to calculate E1~E4:
Step 7, if all encryption finishes Plaintext block, terminate;Otherwise iteration E1~E4 is distinguished to various in formula (1), so
After go to step 3 iteration 40 times.
This encryption method reaches the complexity of key first by initial key high order iteration 200 times;Then will be in plain text with two
System is divided into some pieces, is prepared for encryption below;By the key of iteration before, further iteration obtains A and D two again
Point, then carry out XOR by a portion and the plaintext Jing Guo shift operation.Such as Fig. 1, E1~E4 encryptions are basically completed
Module, then further judge whether that all plaintexts are encrypted complete, continue to encrypt if do not returned again to.Each
The key of secondary iteration be all it is different reach time variation, reach encryption information security purpose.
As shown in figure 3, it is the logistic mapping bifurcation graphs of the present invention, when taking parameter a=2, b=3, this figure is
The bifurcation graphs that parameter u changes from 0 to 2.0, it is as seen from the figure, in the range of 1.64-2.0 chaotic motion, can be used for encrypting.When
Determine u value and change a, b value, can all produce different value, so that encryption is better.
It is the second order High Degree Logistic-Like Map figure of the present invention, is the iteration evolution diagram that u takes 1.649 in figure.Can from figure
To find out that the data that interative computation comes out are chaos, when we can change u value in the full mapping ranges of Fig. 3, to adding
It is close to have more selectivity, preferably improve security.
The preferred embodiment to the invention is illustrated above, but the present invention is not limited to embodiment,
Those skilled in the art can also be made on the premise of without prejudice to the invention spirit a variety of equivalent modifications or
Replace, these equivalent modifications or replacement are all contained in scope of the present application.
Claims (2)
1. the embedded encryption method based on high order second order logistic mappings, it is characterised in that comprise the following steps:
Step 1, producing method of the logistic mapping as sub-key system is selected, and by logistic mappings
The certain number of each mapping difference iteration,
Selected logistic is mapped as
<mrow>
<msub>
<mi>x</mi>
<mrow>
<mi>n</mi>
<mo>+</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>=</mo>
<mo>&lsqb;</mo>
<mn>1</mn>
<mo>-</mo>
<mn>4</mn>
<mi>u</mi>
<mrow>
<mo>(</mo>
<msubsup>
<mi>x</mi>
<mi>n</mi>
<mi>a</mi>
</msubsup>
<mo>-</mo>
<msubsup>
<mi>x</mi>
<mi>n</mi>
<mi>b</mi>
</msubsup>
<mo>)</mo>
</mrow>
<mo>&rsqb;</mo>
<mo>&lsqb;</mo>
<mn>1</mn>
<mo>-</mo>
<mn>4</mn>
<mi>u</mi>
<mrow>
<mo>(</mo>
<msubsup>
<mi>x</mi>
<mrow>
<mi>n</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
<mrow>
<mi>a</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
</msubsup>
<mo>-</mo>
<msubsup>
<mi>x</mi>
<mrow>
<mi>n</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
<mrow>
<mi>b</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
</msubsup>
<mo>)</mo>
</mrow>
<mo>&rsqb;</mo>
</mrow>
In formula,Ith mapping n follow-up value of iteration is represented, i=1,2,3....b-1, a-1, b, a, u is setting value, and u
∈ (1.64,2),With u it is the numerical value of type double precision, a=1,2,3......, b=1,2,3......, and a, b take
The complexity and processor computing capability that value uses according to user are chosen;
Step 2, plaintext is then divided into some pieces with binary system;
Step 3, on the basis of the iteration obtained by step 1, then changing for certain number is carried out to each mapping in logistic mappings
In generation, obtains A and D two parts;
Step 4, after entering shiftrows respectively to each Plaintext block obtained by step 2, corresponding intermediate ciphertext is obtained;
Step 4.1, Plaintext block is divided into m plaintext sub-block;Wherein m is the positive integer more than 1;
Step 4.2, each plaintext sub-block ring shift left or after moving to right S positions simultaneously is obtained into the shifting of each plaintext sub-block respectively
Position plaintext sub-block;
Step 4.3, the order of the plaintext sub-block by each displacement plaintext sub-block as corresponding to it merges to obtain displacement Plaintext block;
Step 4.4, after Plaintext block ring shift left will be shifted or move to right m × S positions, intermediate ciphertext is obtained;
In above-mentioned steps 4.2 and step 4.4, the direction of displacement of each plaintext sub-block is consistent, and the shifting of plaintext sub-block and Plaintext block
Position direction is also consistent;
Step 5, the intermediate ciphertext obtained by step 3 gained A and step 4 is subjected to XOR;
Step 6, judge whether that all Plaintext blocks have been encrypted to finish;If finishing, terminate;Otherwise, return to step 3 continues to add
It is close.
2. the embedded encryption method according to claim 1 based on high order second order logistic mappings, it is characterised in that:
The number that each mapping in being mapped in step 1 logistic carries out iteration first is more than in step 3 in logistic mappings
Each mapping carry out the number of iteration again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710919542.2A CN107733642A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on high order second order logistic mappings |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510066179.5A CN104579693B (en) | 2015-02-09 | 2015-02-09 | Based on the high order second order logistic embedded encryption methods mapped and device |
CN201710919542.2A CN107733642A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on high order second order logistic mappings |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510066179.5A Division CN104579693B (en) | 2015-02-09 | 2015-02-09 | Based on the high order second order logistic embedded encryption methods mapped and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107733642A true CN107733642A (en) | 2018-02-23 |
Family
ID=53094972
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710919612.4A Active CN107707352B (en) | 2015-02-09 | 2015-02-09 | A kind of embedded encryption method |
CN201710919545.6A Pending CN107707351A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on logistic mappings |
CN201510066179.5A Expired - Fee Related CN104579693B (en) | 2015-02-09 | 2015-02-09 | Based on the high order second order logistic embedded encryption methods mapped and device |
CN201710919542.2A Pending CN107733642A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on high order second order logistic mappings |
CN201710917058.6A Active CN107835070B (en) | 2015-02-09 | 2015-02-09 | Simple embedded encryption method |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710919612.4A Active CN107707352B (en) | 2015-02-09 | 2015-02-09 | A kind of embedded encryption method |
CN201710919545.6A Pending CN107707351A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on logistic mappings |
CN201510066179.5A Expired - Fee Related CN104579693B (en) | 2015-02-09 | 2015-02-09 | Based on the high order second order logistic embedded encryption methods mapped and device |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710917058.6A Active CN107835070B (en) | 2015-02-09 | 2015-02-09 | Simple embedded encryption method |
Country Status (1)
Country | Link |
---|---|
CN (5) | CN107707352B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110415075A (en) * | 2019-07-11 | 2019-11-05 | 梧州市众恒商贸有限公司 | One kind, which has, exempts from unifunctional merchandise system |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110889477A (en) * | 2018-08-15 | 2020-03-17 | 齐爱民 | Commodity anti-counterfeiting code generation method based on block chain |
CN110650006B (en) * | 2019-09-17 | 2021-11-12 | 南通大学 | Encryption and decryption method for Chinese and English character strings |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6442445B1 (en) * | 1999-03-19 | 2002-08-27 | International Business Machines Corporation, | User configurable multivariate time series reduction tool control method |
CN100369404C (en) * | 2002-01-10 | 2008-02-13 | 张红雨 | Chaotic encipher series generator |
US7848516B2 (en) * | 2006-01-20 | 2010-12-07 | Chiou-Haun Lee | Diffused symmetric encryption/decryption method with asymmetric keys |
CN101217360A (en) * | 2007-12-28 | 2008-07-09 | 中南大学 | A method to obtain uniform distributed pseudo random sequence in random chaos system |
CN101222318B (en) * | 2008-01-23 | 2010-08-18 | 黑龙江大学 | Chaotic sequence generation method and sequence generator of high speed high-precision chaotic function |
CN101232367B (en) * | 2008-01-23 | 2010-06-30 | 黑龙江大学 | Chaos encrypting and decrypting method without multiply and divide of chaos function and circuit thereof |
CN101714917A (en) * | 2009-08-24 | 2010-05-26 | 黑龙江大学 | Chaotic key-based data encryption transmission card |
KR20130064989A (en) * | 2011-12-09 | 2013-06-19 | 연세대학교 산학협력단 | Image transmission method and apparatus, and image reception method and apparatus for image tamper detection |
CN102571330B (en) * | 2012-02-01 | 2014-07-30 | 桂林电子科技大学 | Method for constructing block encryption algorithm based on random function |
CN102708534B (en) * | 2012-04-12 | 2014-10-15 | 江苏理工学院 | Generating method of variable-parameter multistage chaotic pseudorandom sequence |
CN103560876B (en) * | 2013-11-22 | 2016-06-22 | 北京航空航天大学 | A kind of encryption method using the random clock based on chaos and device |
CN103716502B (en) * | 2013-12-25 | 2017-02-01 | 西安理工大学 | Encryption method based on iteration FrFT and chaotic single-channel color images |
CN104065422B (en) * | 2014-07-01 | 2016-06-22 | 电子科技大学 | The noise secondary encryption of a kind of broadband access network and signal recovery method |
CN104144343B (en) * | 2014-07-11 | 2017-06-30 | 东北大学 | A kind of digital image compression encrypts joint coding method |
-
2015
- 2015-02-09 CN CN201710919612.4A patent/CN107707352B/en active Active
- 2015-02-09 CN CN201710919545.6A patent/CN107707351A/en active Pending
- 2015-02-09 CN CN201510066179.5A patent/CN104579693B/en not_active Expired - Fee Related
- 2015-02-09 CN CN201710919542.2A patent/CN107733642A/en active Pending
- 2015-02-09 CN CN201710917058.6A patent/CN107835070B/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110415075A (en) * | 2019-07-11 | 2019-11-05 | 梧州市众恒商贸有限公司 | One kind, which has, exempts from unifunctional merchandise system |
Also Published As
Publication number | Publication date |
---|---|
CN107707351A (en) | 2018-02-16 |
CN107707352B (en) | 2019-07-02 |
CN104579693B (en) | 2017-11-03 |
CN104579693A (en) | 2015-04-29 |
CN107835070B (en) | 2020-09-04 |
CN107707352A (en) | 2018-02-16 |
CN107835070A (en) | 2018-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105530263B (en) | A kind of extra lightweight RFID mutual authentication methods based on tag ID | |
CN107147484A (en) | A kind of full homomorphic cryptography method of floating number towards secret protection | |
CN106301759B (en) | A kind of method of data encryption, the method and device of decryption | |
CN105656619B (en) | A kind of AES encryption method and the anti-power consumption attack method based on it | |
CN104333446B (en) | A kind of novel ultra-light magnitude QTL block cipher implementation method | |
CN108809626A (en) | A kind of whitepack SM4 cryptographic algorithms scheme and system | |
CN101814985B (en) | Block cipher system using multi-chaotic mapping multi-dynamic S-box | |
CN110474761A (en) | One kind 16 takes turns SM4-256 whitepack password implementation method | |
CN104751065A (en) | Encryption method for geographic information product file | |
CN103634102A (en) | Protection method for side channel attack and fault attack | |
CN107733642A (en) | Embedded encryption method based on high order second order logistic mappings | |
CN104917608A (en) | Key anti-power attack method | |
CN103746805B (en) | The generation method and system of external authentication key | |
CN104092535B (en) | A kind of method for realizing DES password encryptions | |
CN104219045B (en) | RC4 stream cipher generators | |
CN103812658B (en) | A kind of secure communication protocols based on stream cipher | |
CN109218008A (en) | A kind of template attack method for SM4 key schedule | |
CN104618092A (en) | Information encryption method and system | |
CN101582170A (en) | Remote sensing image encryption method based on elliptic curve cryptosystem | |
CN103684748B (en) | Symmetric encryption and decryption method, and symmetric encryption and decryption system | |
CN103546277B (en) | The DPA of a kind of smart card SM4 algorithm attacks and key recovery method and system | |
CN105187198B (en) | A kind of aes algorithm hardware realization apparatus under ipsec protocol | |
CN101938739B (en) | Encryption method for wireless local area network | |
CN103051443B (en) | AES (Advanced Encryption Standard) key expansion method | |
CN106788971A (en) | A kind of sub-key generation method based on stream cipher arithmetic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180223 |
|
WD01 | Invention patent application deemed withdrawn after publication |