CN107968705B - Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system - Google Patents

Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system Download PDF

Info

Publication number
CN107968705B
CN107968705B CN201711213115.9A CN201711213115A CN107968705B CN 107968705 B CN107968705 B CN 107968705B CN 201711213115 A CN201711213115 A CN 201711213115A CN 107968705 B CN107968705 B CN 107968705B
Authority
CN
China
Prior art keywords
ciphertext
value
decryption
encryption
plaintext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711213115.9A
Other languages
Chinese (zh)
Other versions
CN107968705A (en
Inventor
邹文斌
庄兆永
焦述铭
李霞
徐晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201711213115.9A priority Critical patent/CN107968705B/en
Publication of CN107968705A publication Critical patent/CN107968705A/en
Application granted granted Critical
Publication of CN107968705B publication Critical patent/CN107968705B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention is suitable for the technical field of data processing, and provides an encryption method, which comprises the following steps: generating a hidden key according to a preset cyclic shift value and a preset turnover value; encrypting an original plaintext by using a hidden key to obtain an initial ciphertext picture; shifting and overturning the initial ciphertext picture according to the cyclic shift value and the overturning value to obtain a quasi-final ciphertext; and inputting the quasi-final ciphertext into a double random phase encryption system to obtain a final ciphertext. According to the embodiment of the invention, the circular shift value and the turnover value are used for generating the hidden key, and the hidden key is used for constructing the additional encryption layer in the original plaintext and the double random phase encryption system, because the correct circular shift and turnover value cannot be obtained when the final ciphertext is attacked by the ciphertext attack COA, the hidden key cannot be obtained according to the correct circular shift and turnover value, so that the final ciphertext encrypted by the embodiment of the invention cannot be cracked, and the safety of the double random phase encryption system can be enhanced by the embodiment of the invention.

Description

Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system
Technical Field
The invention belongs to the technical field of data processing, and particularly relates to an encryption/decryption method, an encryption/decryption end and a double random phase encryption/decryption system for resisting ciphertext-only attack.
Background
The study of optical information security has become more and more important in the last decade. The optical encryption system is widely applied to the fields of information encryption, information authentication, information hiding and the like. In optical security encryption, information is processed in an optical mode rather than a digital mode, so that the method has the advantages of multiple dimensions, high parallelism, high processing speed and the like.
The Double Random Phase Encryption (DRPE) system was the first attempt to encrypt information using an optical encryption system proposed in 1995. The DRPE can be used in the image domain and Fourier transform domain of a 4f optical lens system, and can also be used in the fractional Fourier domain and Fresnel domain. Despite the many achievements, the DRPE technology still faces some difficulties and challenges, such as the security strength of the DRPE system is not high enough.
In the past, the academics actively research the security loophole of the optical encryption system, and propose an attack algorithm to crack the optical encryption system, and then improve the optical encryption system according to the weakness of the attack scheme. The improved optical encryption system may be further broken by new attack methods. The method is a repeated and circular progress process between a new cracking method and a new anti-cracking encryption security system in the development process of the security encryption system. For the DRPE system, there are many Attack methods to crack the encryption system, and the commonly used Attack methods in the past include known plaintext Attack, chosen Ciphertext Attack, and cipher text Only Attack (COA). Among these attack methods, the cipher text only attack COA is the most fatal cracking method for the DRPE system, because the cipher text only attack COA can illegally recover the plaintext from the cipher text information alone, the DRPE system has a serious security vulnerability problem.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide an encryption/decryption method, an encryption/decryption end and a dual random phase encryption/decryption system for resisting ciphertext-only attack, and aims to solve the problems that in the prior art, the ciphertext-only attack COA can illegally recover a plaintext from ciphertext information alone, and a DRPE system has a severe security hole.
The invention is realized in such a way that an encryption method comprises the following steps:
generating a hidden key according to a preset cyclic shift value and a preset turnover value;
encrypting the original plaintext by using the hidden key to obtain an initial ciphertext picture;
shifting and overturning the initial ciphertext picture according to the cyclic shift value and the overturning value to obtain a quasi-final ciphertext;
and inputting the quasi-final ciphertext into a double-random phase encryption system to obtain a final ciphertext.
Further, the generating the hidden key according to the preset cyclic shift value and the flip value includes:
generating a key seed according to the cyclic shift value and the turnover value;
and inputting the key seed into a random number generator to generate the hidden key.
Further, the shifting and turning of the original plaintext by using the hidden key to obtain the initial ciphertext comprises:
carrying out binary coding on the original plaintext to obtain the original binary plaintext;
encrypting the original binary plaintext by using the hidden key to obtain an initial ciphertext of a binary sequence;
and converting the binary sequence initial ciphertext into the initial ciphertext picture.
Further, the shifting and flipping the initial ciphertext picture according to the cyclic shift value and the flipping value to obtain a quasi-final ciphertext includes:
inserting original position reference information into the initial ciphertext picture to obtain a reference picture;
and shifting the reference picture according to the cyclic shift value, and overturning the shifted reference picture according to the overturning value to obtain the quasi-final ciphertext.
The embodiment of the present invention further provides an encryption end, including:
the key generation unit is used for generating a hidden key according to a preset cyclic shift value and an overturn value;
and the plaintext encryption unit is used for encrypting an original plaintext by using the hidden key to obtain an initial ciphertext picture, shifting and overturning the initial ciphertext picture according to the cyclic shift value and the overturning value to obtain a quasi-final ciphertext, and inputting the quasi-final ciphertext into a double-random phase encryption system to obtain a final ciphertext.
Further, the plaintext encryption unit is specifically configured to:
generating a key seed according to the cyclic shift value and the turnover value;
inputting the key seed into a random number generator to generate the hidden key;
carrying out binary coding on the original plaintext to obtain the original binary plaintext;
encrypting the original binary plaintext by using the hidden key to obtain an initial ciphertext of a binary sequence;
converting the binary sequence initial ciphertext into the initial ciphertext picture;
inserting original position reference information into the initial ciphertext picture to obtain a reference picture;
and shifting the reference picture according to the cyclic shift value, and overturning the shifted reference picture according to the overturning value to obtain the quasi-final ciphertext.
The embodiment of the invention also provides a decryption method, which comprises the following steps:
inputting the decryption key and the final ciphertext into a double random phase decryption system to obtain a quasi-final ciphertext;
shifting and overturning the quasi-final ciphertext according to the decryption shifting and overturning information to obtain an initial ciphertext picture;
and generating a hidden key according to the decryption displacement turnover information, and decrypting the initial ciphertext picture according to the hidden key to obtain an original plaintext.
Further, the performing shift and flip on the quasi-final ciphertext according to the decryption shift and flip information, and the obtaining of the initial ciphertext picture by 4 includes:
calculating to obtain a cyclic shift value (x) according to the original position reference information and the position reference information in the quasi-final ciphertext0,y0) And a roll-over value fpAt said cyclic shift value (x)0,y0) And a roll-over value fpAs decryption shift flip information;
and the quasi-final ciphertext is subjected to cyclic shift value (-x)0,-y0) Flip value-fpShifting and turning over respectively to obtain the initial ciphertext picture;
generating a hidden key according to the decryption shift and flip information, and decrypting the initial ciphertext picture according to the hidden key to obtain an original plaintext, including:
according to the aboveCyclic shift value (x)0,y0) And a roll-over value fpGenerating a key seed, inputting the key seed into a random number generator, and generating the hidden key;
carrying out binary coding on the initial ciphertext picture to obtain a binary sequence initial ciphertext;
decrypting the binary sequence initial ciphertext by using the hidden key to obtain a binary plaintext;
and converting the binary plaintext to obtain the original plaintext.
An embodiment of the present invention further provides a decryption end, including:
the ciphertext decryption unit is used for inputting the decryption key and the final ciphertext into the double-random phase decryption system to obtain a quasi-final ciphertext;
an initial decryption unit for calculating a cyclic shift value (x) according to the original position reference information and the position reference information in the quasi-final ciphertext0,y0) And a roll-over value fpAt said cyclic shift value (x)0,y0) And a roll-over value fpAs decryption shift and flip information, the quasi-final ciphertext is subjected to cyclic shift value (-x)0,-y0) Flip value-fpShifting and turning over respectively to obtain the initial ciphertext picture;
a plaintext decryption unit for decrypting the encrypted data according to the cyclic shift value (x)0,y0) And a roll-over value fpGenerating a key seed, inputting the key seed into a random number generator, generating the hidden key, carrying out binary coding on the initial ciphertext picture to obtain a binary sequence initial ciphertext, decrypting the binary sequence initial ciphertext by using the hidden key to obtain a binary plaintext, and converting the binary plaintext to obtain the original plaintext.
The embodiment of the invention also provides a double random phase encryption and decryption system for resisting ciphertext-only attack, which comprises the encryption end and the decryption end.
Compared with the prior art, the invention has the beneficial effects that: the embodiment of the invention generates a hidden key according to a cyclic shift value and an overturn value preset by a user, encrypts an original plaintext by using the hidden key to obtain an initial ciphertext picture, shifts and overturns the initial ciphertext picture according to the preset cyclic shift value and the overturn value to obtain a quasi-final ciphertext, and finally inputs the quasi-final ciphertext into a DRPE (double random phase encryption System) to obtain a final ciphertext. According to the embodiment of the invention, the circular shift value and the turnover value are used for generating the hidden key, and an additional encryption layer is constructed in the original plaintext and the DRPE, because the COA cannot obtain the correct circular shift and turnover value when attacking the final ciphertext, the hidden key cannot be obtained according to the correct circular shift and turnover value, so that the final ciphertext encrypted by the embodiment of the invention cannot be cracked, and the safety of the DRPE can be enhanced by the embodiment of the invention.
Drawings
Fig. 1 is a flowchart of an encryption method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an encryption side according to an embodiment of the present invention;
fig. 3 is a flowchart of a decryption method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a decryption side according to an embodiment of the present invention;
FIG. 5 is a block diagram of a dual random phase encryption/decryption system for resisting ciphertext-only attack according to an embodiment of the present invention;
fig. 6 is a flowchart illustrating operation of a dual random phase encryption/decryption system for resisting ciphertext-only attacks according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The phase extraction step in the existing COA cracking method has a defect, namely although the COA cracking method can crack the plaintext content, the cyclic shift and the overturn state of the cracked and recovered plaintext content are incorrect.
Based on this, in the proposed dual random phase encryption/decryption system against ciphertext-only attack, the user-entered cyclic shift value and the flip value are used to generate the hidden key information and use the hidden key to construct an additional encryption layer between the original plaintext and the dual random phase encryption system DRPE.
Fig. 1 illustrates an encryption method provided in an embodiment of the present invention, including:
s101, generating a hidden key according to a preset cyclic shift value and a preset turnover value;
s102, encrypting the original plaintext by using the hidden key to obtain an initial ciphertext picture;
s103, shifting and overturning the initial ciphertext picture according to the cyclic shift value and the overturning value to obtain a quasi-final ciphertext;
and S104, inputting the quasi-final ciphertext into a double-random phase encryption system to obtain a final ciphertext.
In the above step S101, the value is expressed by (x)0,y0) Representing the cyclic shift value by fpRepresenting the flip value by a cyclic shift value (x)0,y0) And a roll-over value fpAs the encryption information, generating a hidden key according to the encryption information, the specific steps include: according to cyclic shift value (x)0,y0) And a roll-over value fpAnd generating a key seed, inputting the key seed into a random number generator, and generating the hidden key.
In step S102, the original plaintext is encrypted by using the hidden key generated in step S101, and the specific encryption process includes: carrying out binary coding on the original plaintext to obtain the original binary plaintext; encrypting the original binary plaintext by using the hidden key to obtain an initial ciphertext of a binary sequence; and converting the binary sequence initial ciphertext into the initial ciphertext picture. In the step, aiming at the weakness that the existing COA attack method is used for cracking the DRPE, namely the weakness that the identified cyclic shift value and the identified turnover value are incorrect, the original plaintext is encrypted by using a hidden key generated by the cyclic shift value and the turnover value preset by a user, and the original plaintext is safer through the simple encryption operation. Further, the essence of converting the binary sequence initial ciphertext into the initial ciphertext picture is to convert the binary number in the binary sequence initial ciphertext into a decimal number, and the decimal number is a pixel of the initial ciphertext picture.
In S103, shifting and flipping the initial ciphertext picture obtained by encrypting in step S102 again by using the cyclic shift value and the flipping value preset by the user, where the specific shifting and flipping process includes: inserting original position reference information into the initial ciphertext picture to obtain a reference picture; and shifting the reference picture according to the cyclic shift value, and overturning the shifted reference picture according to the overturning value to obtain the quasi-final ciphertext.
By the encryption method provided by the embodiment, an additional encryption layer is added between the original plaintext and the DRPE system, the encryption layer is realized by a hidden key generated by a circular shift value and a turnover value set by a user, the security of the conventional DRPE system can be enhanced by the encryption method, and the problem of attack on COA by a ciphertext-only message is solved.
Fig. 2 shows an encryption end provided in an embodiment of the present invention, including:
a key generating unit 201, configured to generate a hidden key according to a preset cyclic shift value and a roll-over value;
and the plaintext encryption unit 202 is configured to encrypt an original plaintext by using the hidden key to obtain an initial ciphertext picture, shift and flip the initial ciphertext picture according to the cyclic shift value and the flip value to obtain a quasi-final ciphertext, and input the quasi-final ciphertext into a dual-random-phase encryption system to obtain a final ciphertext.
Further, the plaintext encryption unit 201 is specifically configured to:
generating a key seed according to the cyclic shift value and the turnover value;
inputting the key seed into a random number generator to generate the hidden key;
carrying out binary coding on the original plaintext to obtain the original binary plaintext;
encrypting the original binary plaintext by using the hidden key to obtain an initial ciphertext of a binary sequence;
converting the binary sequence initial ciphertext into the initial ciphertext picture;
inserting original position reference information into the initial ciphertext picture to obtain a reference picture;
and shifting the reference picture according to the cyclic shift value, and overturning the shifted reference picture according to the overturning value to obtain the quasi-final ciphertext.
For the above encryption method, fig. 3 shows a decryption method provided in an embodiment of the present invention, including:
s301, inputting the decryption key and the final ciphertext into a double-random phase decryption system to obtain a quasi-final ciphertext;
s302, shifting and overturning the quasi-final ciphertext according to the decryption shift and overturning information to obtain an initial ciphertext picture;
and S303, generating a hidden key according to the decryption shift overturning information, and decrypting the initial ciphertext picture according to the hidden key to obtain an original plaintext.
In step 301, the user uses the encryption key of the DRPE encryption system as a decryption key, inputs the decryption key and the final ciphertext into the dual random phase decryption system, and decrypts the final ciphertext through the dual random phase decryption system to obtain a quasi-final ciphertext.
In step S302, the quasi-final ciphertext includes position reference information, the original position reference information used in the encryption and the position reference information in the quasi-final ciphertext are calculated to obtain a position distance therebetween, and a cyclic shift value (x) is determined according to the position distance0,y0) And a roll-over value fpThe value of the cyclic shift (x)0,y0) And a roll-over value fpAs decryption shift flip informationDetermining the cyclic shift value (-x) to be shifted for the quasi-final ciphertext according to the decrypted shift and flip information0,-y0) And a roll-over value-fpAccording to the cyclic shift value (-x)0,-y0) And a roll-over value-fpAnd shifting and overturning the quasi-final ciphertext to obtain an initial ciphertext picture.
In step S303, the decryption side performs decryption according to the cyclic shift value (x)0,y0) And a roll-over value fpGenerating a key seed, inputting the key seed into a random number generator, generating the hidden key, carrying out binary coding on the initial ciphertext picture to obtain a binary sequence initial ciphertext, decrypting the binary sequence initial ciphertext by using the hidden key to obtain a binary plaintext, and converting the binary plaintext to obtain the original plaintext.
Fig. 4 shows a decryption side provided in an embodiment of the present invention, including:
a ciphertext decryption unit 401, configured to input the decryption key and the final ciphertext into the dual random phase decryption system, to obtain a quasi-final ciphertext;
and the initial decryption unit 402 is configured to shift and flip the quasi-final ciphertext according to the decryption shift and flip information, so as to obtain an initial ciphertext picture.
A plaintext decryption unit 403, configured to generate a hidden key according to the decryption shift flipping information, and decrypt the initial ciphertext picture according to the hidden key to obtain an original plaintext.
Further, the initial decryption unit 402 is specifically configured to: calculating to obtain a cyclic shift value (x) according to the original position reference information and the position reference information in the quasi-final ciphertext0,y0) And a roll-over value fpAt said cyclic shift value (x)0,y0) And a roll-over value fpAs decryption shift and flip information, the quasi-final ciphertext is subjected to cyclic shift value (-x)0,-y0) Flip value-fpAnd respectively shifting and overturning to obtain the initial ciphertext picture.
The plaintext decryption unit 403 is specifically configured to: according to the circulationShift value (x)0,y0) And a roll-over value fpGenerating a key seed, inputting the key seed into a random number generator, generating the hidden key, carrying out binary coding on the initial ciphertext picture to obtain a binary sequence initial ciphertext, decrypting the binary sequence initial ciphertext by using the hidden key to obtain a binary plaintext, and converting the binary plaintext to obtain the original plaintext.
Fig. 5 shows a dual random phase encryption and decryption system for resisting ciphertext-only attack according to an embodiment of the present invention, which includes the encryption end shown in fig. 2 and the decryption end shown in fig. 4.
In a specific application, one encryption end may correspond to one or more decryption ends, that is, after the encryption end completes encryption of an original plaintext, a final ciphertext obtained by encryption is transmitted to the one or more decryption ends, and the decryption end decrypts a final key according to the final ciphertext transmitted by the encryption end and an encryption key used in encryption. In this embodiment, the encryption end and the decryption end perform encryption and decryption in a symmetric manner, that is, the encryption end uses the random number generator to generate the hidden key, the decryption end uses the same random number generator to generate the hidden key, and the encryption key used when the encryption end inputs the final ciphertext into the DEPR encryption system is used as the decryption key when the decryption end uses the DRPE decryption system to decrypt the final ciphertext.
When the decryption end decrypts the final ciphertext transmitted by the encryption end, the original position reference information, the circular shift value and the turnover value preset by the user and the encryption key of the encryption end which are used in encryption are needed, and the decryption of the final ciphertext can be completed through the encryption key of the encryption end, the original position reference information, the circular shift value and the turnover value.
Fig. 6 shows the encryption and decryption processes performed by the dual random phase encryption and decryption system for resisting ciphertext-only attack provided by the embodiment of the present invention, including:
a. the encryption end carries out binary coding on the original plaintext 2DC1 to obtain the original binary plaintext;
b. the encryption terminal follows the user settingRing shift value (x)0,y0) And a roll-over value fpCombining to generate a key seed;
c. the encryption end inputs the key seed into a random number generator to generate a hidden key;
d. the encryption end encrypts an original binary plaintext by using the hidden key to obtain a binary sequence initial ciphertext;
e. the encryption terminal converts the binary sequence initial ciphertext into an initial ciphertext picture 703D;
f. the encryption terminal inserts original position reference information Y into the initial ciphertext picture 703D to obtain a reference picture, and according to a cyclic shift value (x) set by a user0,y0) And flipping fpShifting and overturning the reference picture to obtain a quasi-final ciphertext Y703D;
g. the encryption end inputs the quasi-final ciphertext Y703D into a DRPE (double random phase encryption System) to obtain a final ciphertext;
h. the encryption terminal transmits the final ciphertext to a specific decryption terminal in an unsafe condition;
i. the decryption end takes the key of the DRPE as a decryption key, and inputs the decryption key and the final ciphertext into the DRPE to obtain a decrypted quasi-final ciphertext Y703D; .
j. The decryption end determines a cyclic shift value (x) according to the original position reference information Y in the decrypted quasi-final ciphertext Y703D and the position distance calculated according to the original position reference information Y inserted during encryption0,y0) And flipping fpValue, the decryption end decrypts the obtained quasi-final ciphertext Y703D according to the circulation position (-x)0,-y0) And flip-fpObtaining an initial ciphertext picture 703D;
k. the decryption end performs binary coding on the initial ciphertext picture 703D to obtain a binary sequence initial ciphertext;
l, the decryption end decrypts the obtained cyclic shift value (x)0,y0) And flipping fpThe values are combined to generate a key seed;
m, the decryption end inputs the key seeds into a random number generator which is the same as the encryption end to generate a hidden key;
n, the decryption end decrypts the binary sequence initial ciphertext according to the hidden key to obtain a decrypted binary plaintext;
and o, the decryption end converts the binary plaintext obtained by decryption into decrypted plaintext 2DC 1.
In the embodiment of the invention, the cyclic shift and the turning state of the plaintext content which is recovered by the COA cracking of the existing ciphertext-only attack and discovered in the DRPE research of the dual-random-phase encryption system are usually incorrect, the cyclic shift and the turning state are used as key seeds to generate a hidden key to encrypt the plaintext, and the enhanced dual-random-phase encryption system resisting the ciphertext-only attack is provided, namely, the enhanced dual-random-phase encryption system firstly performs symmetrical encryption once and then performs DRPE encryption before DRPE encryption. Because the circular shift and the overturn state of the plaintext obtained by the attack of the ciphertext only on the COA are usually incorrect, the circular shift and the overturn value calculated by the attack of the ciphertext only on the plaintext are also incorrect, and therefore a hidden key cannot be obtained, the ciphertext obtained by the encryption of the embodiment of the invention can be prevented from the attack of the ciphertext only on the COA, and the safety of the DRPE encryption system is improved.
The embodiment of the invention combines the symmetric encryption and the DRPE encryption, and can be widely applied to information security protection in the fields of military affairs, government affairs, commerce, finance, personal privacy and the like.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. An encryption method, comprising:
generating a hidden key according to a preset cyclic shift value and a preset turnover value;
encrypting the original plaintext by using the hidden key to obtain an initial ciphertext picture;
shifting and overturning the initial ciphertext picture according to the cyclic shift value and the overturning value to obtain a quasi-final ciphertext;
and inputting the quasi-final ciphertext into a double-random phase encryption system to obtain a final ciphertext.
2. The encryption method of claim 1, wherein the generating of the hidden key according to the preset cyclic shift value and the roll-over value comprises:
generating a key seed according to the cyclic shift value and the turnover value;
and inputting the key seed into a random number generator to generate the hidden key.
3. The encryption method according to claim 1 or 2, wherein said encrypting the original plaintext by using the hidden key to obtain the initial ciphertext picture comprises:
carrying out binary coding on the original plaintext to obtain the original binary plaintext;
encrypting the original binary plaintext by using the hidden key to obtain an initial ciphertext of a binary sequence;
and converting the binary sequence initial ciphertext into the initial ciphertext picture.
4. The encryption method according to claim 1, wherein the performing shift reversal on the initial ciphertext picture according to the cyclic shift value and the reversal value to obtain a quasi-final ciphertext comprises:
inserting original position reference information into the initial ciphertext picture to obtain a reference picture;
and shifting the reference picture according to the cyclic shift value, and overturning the shifted reference picture according to the overturning value to obtain the quasi-final ciphertext.
5. An encryption peer, comprising:
the key generation unit is used for generating a hidden key according to a preset cyclic shift value and an overturn value;
and the plaintext encryption unit is used for encrypting an original plaintext by using the hidden key to obtain an initial ciphertext picture, shifting and overturning the initial ciphertext picture according to the cyclic shift value and the overturning value to obtain a quasi-final ciphertext, and inputting the quasi-final ciphertext into a double-random phase encryption system to obtain a final ciphertext.
6. The encryption terminal of claim 5, wherein the plaintext encryption unit is specifically configured to:
generating a key seed according to the cyclic shift value and the turnover value;
inputting the key seed into a random number generator to generate the hidden key;
carrying out binary coding on the original plaintext to obtain the original binary plaintext;
encrypting the original binary plaintext by using the hidden key to obtain an initial ciphertext of a binary sequence;
converting the binary sequence initial ciphertext into the initial ciphertext picture;
inserting original position reference information into the initial ciphertext picture to obtain a reference picture;
and shifting the reference picture according to the cyclic shift value, and overturning the shifted reference picture according to the overturning value to obtain the quasi-final ciphertext.
7. A decryption method, comprising:
inputting the decryption key and the final ciphertext into a double random phase decryption system to obtain a quasi-final ciphertext;
performing shift, overturn and decryption on the quasi-final ciphertext according to the decryption shift and overturn information to obtain an initial ciphertext picture, and performing cyclic shift on the initial ciphertext picture by using a cyclic shift value (x)0,y0) And a roll-over value fpAs decryption shift flip information;
and generating a hidden key according to the decryption displacement turnover information, and decrypting the initial ciphertext picture according to the hidden key to obtain an original plaintext.
8. The decryption method according to claim 7, wherein the decrypting the quasi-final ciphertext according to the decryption shift reversal information to obtain an initial ciphertext picture comprises:
calculating to obtain a cyclic shift value (x) according to the original position reference information and the position reference information in the quasi-final ciphertext0,y0) And a roll-over value fpAt said cyclic shift value (x)0,y0) And a roll-over value fpAs decryption shift flip information;
and the quasi-final ciphertext is subjected to cyclic shift value (-x)0,-y0) Flip value-fpShifting and turning over respectively to obtain the initial ciphertext picture;
generating a hidden key according to the decryption shift and flip information, and decrypting the initial ciphertext picture according to the hidden key to obtain an original plaintext, including:
according to the cyclic shift value (x)0,y0) And a roll-over value fpGenerating a key seed, inputting the key seed into a random number generator, and generating the hidden key;
carrying out binary coding on the initial ciphertext picture to obtain a binary sequence initial ciphertext;
decrypting the binary sequence initial ciphertext by using the hidden key to obtain a binary plaintext;
and converting the binary plaintext to obtain the original plaintext.
9. A decryption side, comprising:
the ciphertext decryption unit is used for inputting the decryption key and the final ciphertext into the double-random phase decryption system to obtain a quasi-final ciphertext;
an initial decryption unit for calculating a cyclic shift value (x) according to the original position reference information and the position reference information in the quasi-final ciphertext0,y0) And a roll-over value fpAt said cyclic shift value (x)0,y0) And a roll-over value fpAs decryption shift and flip information, the quasi-final ciphertext is subjected to cyclic shift value (-x)0,-y0) Flip value-fpShifting and overturning are respectively carried out to obtain an initial ciphertext picture;
a plaintext decryption unit for decrypting the encrypted data according to the cyclic shift value (x)0,y0) And a roll-over value fpGenerating a key seed, inputting the key seed into a random number generator, generating a hidden key, carrying out binary coding on the initial ciphertext picture to obtain a binary sequence initial ciphertext, decrypting the binary sequence initial ciphertext by using the hidden key to obtain a binary plaintext, and converting the binary plaintext to obtain the original plaintext.
10. A dual random phase encryption/decryption system against ciphertext-only attacks, comprising the encryption terminal of claim 5 or 6 and the decryption terminal of claim 9.
CN201711213115.9A 2017-11-28 2017-11-28 Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system Active CN107968705B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711213115.9A CN107968705B (en) 2017-11-28 2017-11-28 Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711213115.9A CN107968705B (en) 2017-11-28 2017-11-28 Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system

Publications (2)

Publication Number Publication Date
CN107968705A CN107968705A (en) 2018-04-27
CN107968705B true CN107968705B (en) 2021-02-02

Family

ID=61998838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711213115.9A Active CN107968705B (en) 2017-11-28 2017-11-28 Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system

Country Status (1)

Country Link
CN (1) CN107968705B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067517B (en) * 2018-06-22 2021-07-09 成都卫士通信息产业股份有限公司 Encryption and decryption device, encryption and decryption method and communication method of hidden key
CN110855437B (en) * 2019-11-18 2023-04-25 南京工程学院 Secret communication method and system based on liquid crystal light valve
CN112953706B (en) * 2019-12-11 2022-09-06 天翼云科技有限公司 Information processing method and device
CN111582284B (en) * 2020-04-27 2023-04-07 中国科学院信息工程研究所 Privacy protection method and device for image recognition and electronic equipment
CN111740830B (en) * 2020-08-12 2020-12-11 科大讯飞(苏州)科技有限公司 Information encryption and decryption method and device, information processing equipment and storage medium
CN112202757B (en) * 2020-09-27 2023-02-14 贵州航天计量测试技术研究所 Geographic coordinate shape-preserving encryption method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101086811A (en) * 2007-05-18 2007-12-12 中国科学院上海光学精密机械研究所 Method and apparatus for multiple image encryption using optical polarization state
CN105243635A (en) * 2015-08-21 2016-01-13 南昌大学 Image encryption method based on two-dimensional compression perception and chaotic system
CN105931175A (en) * 2016-04-28 2016-09-07 广西师范大学 Novel image scrambling method based on chaotic technology

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5903648A (en) * 1996-02-06 1999-05-11 The University Of Connecticut Method and apparatus for encryption
CN100589380C (en) * 2008-02-03 2010-02-10 西北农林科技大学 Encryption method based on double-circular queue shift and transposition rule
WO2017004790A1 (en) * 2015-07-07 2017-01-12 深圳大学 Cryptographic decoding method of image coding system based on double random phase and device utilizing same
CN107392834B (en) * 2017-07-28 2021-02-26 江西农业大学 Random cyclic shift image encryption method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101086811A (en) * 2007-05-18 2007-12-12 中国科学院上海光学精密机械研究所 Method and apparatus for multiple image encryption using optical polarization state
CN105243635A (en) * 2015-08-21 2016-01-13 南昌大学 Image encryption method based on two-dimensional compression perception and chaotic system
CN105931175A (en) * 2016-04-28 2016-09-07 广西师范大学 Novel image scrambling method based on chaotic technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Vulnerability to ciphertext-only attack of optical;Xiaoli Liu 等;《OPTICS EXPRESS》;20150727;第23卷(第15期);第18955-18968页 *

Also Published As

Publication number Publication date
CN107968705A (en) 2018-04-27

Similar Documents

Publication Publication Date Title
CN107968705B (en) Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system
Wu et al. Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation
D'souza et al. Advanced encryption standard (AES) security enhancement using hybrid approach
Li et al. Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure
CN107086915B (en) Data transmission method, data sending end and data receiving end
US8767959B2 (en) Block encryption
CN102567943B (en) Asymmetric double image encryption method based on joint of fourier transformation and phase cutting
US20210097187A1 (en) Protecting data from brute force attack
CN104468090A (en) Chinese character password encoding method based on image pixel coordinates
US20100058067A1 (en) Securing a password database
Norouzi et al. Breaking an image encryption algorithm based on the new substitution stage with chaotic functions
CN111314050B (en) Encryption and decryption method and device
CN104881838B (en) One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method
CN112865955B (en) Multi-receiver proxy re-encryption method, system, electronic device and storage medium
CA2639649A1 (en) Cryptography method and system
CN107392970A (en) A kind of digital image encryption algorithm based on bit plane and high-dimension chaotic system
CN115499126A (en) SM2 key distributed storage-based key pair generation method, collaborative signature method, decryption method, device and medium
US8804953B2 (en) Extensive ciphertext feedback
Chen et al. Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain
Mohammed et al. Advancing cloud image security via AES algorithm enhancement techniques
CN104680475A (en) Image hybrid encrypting method based on hyperchaotic system
CN113312654B (en) Homomorphic ciphertext coding and calculating method based on CSP problem
Gong [Retracted] Application Research of Data Encryption Algorithm in Computer Security Management
CN115809459A (en) Data protection and decryption method, system, device and medium for software cryptographic module
CN106161000A (en) The method and system that data file is encrypted and decrypted

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant