CN1264865A - Operation method for document exchanger in unknown behavior mode and its architecture - Google Patents

Operation method for document exchanger in unknown behavior mode and its architecture Download PDF

Info

Publication number
CN1264865A
CN1264865A CN 00105464 CN00105464A CN1264865A CN 1264865 A CN1264865 A CN 1264865A CN 00105464 CN00105464 CN 00105464 CN 00105464 A CN00105464 A CN 00105464A CN 1264865 A CN1264865 A CN 1264865A
Authority
CN
China
Prior art keywords
document
exchanger
data
behavior pattern
operation method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 00105464
Other languages
Chinese (zh)
Inventor
后健慈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 00105464 priority Critical patent/CN1264865A/en
Publication of CN1264865A publication Critical patent/CN1264865A/en
Pending legal-status Critical Current

Links

Images

Abstract

An operation method for the document exchanger in unknown behavior mode and its architecture are disclosed. A long string of documents is divided by 4 bits to become document group. The exchanger or buffer can load the 4-bit document in the storage space divided into 4 blocks in disorder mode. The positions of each bits are arranged and combined to generate different variations. Each variation is encoded and the encoded value is chosen by a multitask device to disorder the data in different layers, so the raw document is fully disordered and in different variations. Thus the behavior of encryption system is varied for higher security.

Description

The operation method for document exchanger and the framework thereof of unknown behavior pattern
The present invention relates to a kind of operation method for document exchanger and framework thereof of unknown behavior pattern, particularly a kind of putting in order of source book carried out multi-level disturbing, make the design of the unfixed document exchanger of encryption behavior of encryption safe system.
At present, set up safety, reliable network environment, guarantee that it is the important topic of each Internet Service Provider and ecommerce now that information does not subject in network transmission process that " hacker " illegal invasion forges, distorts or steal.For reaching the purpose of security information, security system is one defence line of present dealer.
The security system operation of existing computer system as shown in Figure 1.(dataexchanger) (or impact damper) transmission is when writing integrated circuit 20 by document exchanger (10) when data, and tandom number generator 11 (random numbergenerator) produces random digit, as the key Key of document exchanger encrypted data.Document exchanger 10 uses random digit (encryption key pair KEY) enciphered message.Encrypted process is except that random digit (encryption key pair KEY) is variant, and the encryption operating type of each data is identical, promptly has identical behavior pattern.
The cipher mode of these data looks like safe, though cracking (break), random digit (encryption key pair) is difficult for, especially 256,512,1024 random digit (encryption key pair) has increased considerably the required time of random digit (encryption key pair) of cracking really.But but ignored another important leak and caused fatal consequence, just aforementioned all encryption operations all are that the behavior pattern of encrypting with random digit is unalterable.Illegal invasion person in fact can deduce out the behavior pattern (as shown in Figure 2) of document exchanger 10 by the integrated circuit change in voltage of observing each various random digit that may exist of input.In fact see through the existing a lot of encipherors of this mode, successfully be cracked as elliptic curve cryptography ECC (Ellipse Curve Code), RSA (Rivest, Shamir and Adleman), Block Cipher.Obviously, the encryption that behavior pattern is fixed is as method, and its security is very troubling.
Fundamental purpose of the present invention, provide a kind of operation method for document exchanger and framework thereof of unknown behavior pattern, mainly be that data with a lot of position is divided into one group of data with 4, interchanger or impact damper are configured in to divide with these 4 has four storage areas that constitute the square form to disturb (scrambling), each positional alignment combination thereby generation have multiple variation, and each variation encoded, the encoded radio of reflection (map) combination is selected through a multiplexer (4-to-1mux), data are carried out multi-level disturbing, by the entanglement that puts in order with source book, and the multiple variation of multiplexer is selected, make the encryption behavior of encryption safe system unfixing, to increase the degree of difficulty that illegal invasion person cracks, prevent intrusion system.
Foundation is aforementioned, and the data of document exchanger of the present invention, is selected via multiplexer during as if multiplexer of use through after disturbing reorganization, and each data will have four kinds of variations.If when using four multiplexers, each data will have 44 kinds of variations, the visual required security classification of the quantity of multiplexer is designed.Because putting in order of data thoroughly and equably disturbed, and be a kind of in the preceding various variation, even illegal invasion person observes with aforementioned change in voltage, also can't determine the order of data address, its data of deducing out certainly will become a useless data, therefore can solve the leak of existing security system.
For achieving the above object, the invention provides a kind of operation method for document exchanger of unknown behavior pattern, it is the square form storage area that the data of a lot of position is configured in the corresponding figure place of division formation, and to each square work reflection assembly coding, figure place according to 4 power values (0,1,2...) is carried out multi-level disturbing, make each bit position produce multiple variation, and therefrom select a kind of permutation and combination order entanglement with source book, make the encryption behavior of encryption safe system unfixing.
The present invention also provides a kind of document exchanger framework of unknown behavior pattern, it is characterized in that it includes: one group of operation method for document exchanger according to described unknown behavior pattern constitutes the multilayer data of having encoded; At least one multiplexer, it is to disturb selecting suitable hierarchical data to change by the controller IC control of correspondence; One tandom number generator, it carries out accidental enciphering to the data after disturbing.
Now the embodiment shown in conjunction with the accompanying drawings describes structure of the present invention and function in detail.Wherein:
Fig. 1 is the security system operation block schematic diagram of existing computer system;
Fig. 2 is the mode that a cracks synoptic diagram of observing the integrated circuit change in voltage of random digit;
Fig. 3-1 is the block schematic diagram of Fractal notion to 3-3;
Fig. 4-1 to 4-4 be the data formats synoptic diagram of the present invention according to the Fractal notion;
Fig. 5 is the data formats synoptic diagram of 256 data of the present invention after disturbing;
Fig. 6 is the first embodiment of the present invention, and it shows the document exchanger Organization Chart that uses single multiplexer;
Fig. 7 is the second embodiment of the present invention, and it shows the document exchanger Organization Chart that uses four groups of multiplexers.
Symbol description:
10 document exchangers, 11 tandom number generators
4 pairs 1 multiplexers of 20 integrated circuit 30-33
The 40-43 controller IC
Basic theories of the present invention is derived from the Fractal notion.Shown in Fig. 3-1, basic framework is made up of four little triangles, and any bigger block (as Fig. 3-2,3-3) is to include following several features:
1. form by basic framework piece;
2. bigger block looks like the basic framework piece forever;
3. from any scenography, all block shape patibhaga-nimittas together.
The present invention with above-mentioned feature application in order to control and handle in the integrated circuit (IC) design of unpredictable and prediction document exchanger 10 of behavior pattern or impact damper.
At first inquire into 4 interchangers or impact damper 10 (shown in Fig. 4-1).Each form with a positive square after disturbing is arranged, and so each position (bit 0-3) will have 4 kinds of combination and variation, be arranged at foursquare four corners (which units 0 shown in the figure, 1,2,3 means).
In the present embodiment, the multiplexer 30 (4-to-1mux) (as shown in Figure 6) that has used 4 pairs 1 goes to control each combination, and for describing in detail, we can temporarily use: " 00 " representative " 01 " representative
Figure A0010546400042
" 10 " representative
Figure A0010546400043
" 11 " representative
Figure A0010546400044
That is to say that when 4 pairs 1 multiplexers 30 were selected " 00 ", these 4 document exchangers will be disturbed by multiplexer To be redefined in these combinations of disturbing back reflection (map) and work as " 00 ", " 01 ", " 10 ", " 11 ", and have only the developer just can know.
These 4 frameworks are upwards expanded again, shown in Fig. 4-2,, constitute 16 blocks by four 4 squares based on these 4 square frameworks that constituted, and will be original each form 4 square and be considered as 1 position, therefore can with its troublesome and with
Figure A0010546400051
Represent it (the Dark grey word shown in Fig. 4-2), so promptly form 16 data after disturbing.
Based on these 16 blocks, constitute one 64 block again by four 16 squares, and will be original each form 16 square and be considered as 1 position, therefore it can be disturbed and with
Figure A0010546400052
Represent it (the light grey word shown in Fig. 4-3), so promptly form 64 data after disturbing.
In like manner,, constitute one 256 block by four 64 squares based on these 64 blocks, and will be original each form 64 square and be considered as 1 position, therefore it can be disturbed and with
Figure A0010546400053
Represent it (outline letters shown in Fig. 4-4), so promptly form 256 data after disturbing.
Can learn that thus Fig. 4-1 all is that 4 framework pieces by Fig. 4-1 constitute (promptly having the feature identical with the Fractal notion) to 4-4 figure, we can define the data impact damper of level, and 16 is 4 2, 64 is 4 3, 256 is 4 4, these numerals 2,3,4 are the number of plies of representative data impact damper, for instance, 4 data impact dampers have only the individual layer combination to each position; 64 data impact dampers (4 3) promptly include 3 layer architectures.
As previously mentioned, each layer all can be divided into 4 equal equal portions, therefore each layer data specified in each equal equal portions available combination number " 00 ", " 01 ", " 10 ", " 11 ", can do to specify the control of the number of plies and block with one 4 pairs 1 multiplexers 30, with these 4 kinds possible variation combinations, source book is disturbed or reorganization.These change combination can be selected default each layer in advance arbitrarily by the developer relevance, and it can define the combination of each layer according to following principle:
" if one deck is selected a combination, and then descending one deck selected will be distance combination combination farthest now "
According to this principle, just 256 digit buffers also will be limited in 4 variations at last, and can be controlled by 4 pairs 1 multiplexers 30.
The contingency table that following table is shown provides logic control one 256 digit buffers, and provides 4 layers combination to go to represent each position thus:
Change The superiors At the middle and upper levels Middle lower floor Orlop
??1 ????00 ????10 ????11 ????01
??2 ????01 ????11 ????00 ????10
??3 ????10 ????00 ????01 ????11
??4 ????11 ????01 ????10 ????00
Data with a 256bits is an example, serves as the square that the basis constitutes according to aforesaid mode with 4, and we suppose that it is encoded to
Figure A0010546400054
(as the black word); Constitute 44 squares of 16 squares, we suppose that it is encoded to
Figure A0010546400055
(as the Dark grey word); Constitute 4 16 squares of 64 squares, we suppose that it is encoded to (as light grey word); Constitute 4 64 squares of 256 squares, we suppose that it is encoded to (as outline letters); Data through recombination as shown in Figure 5, so putting in order of data promptly disturbed, program development personnel only, otherwise can't know troublesome rule, the troublesome data that the illegal invasion personage is grasped also becomes a useless data.
As shown in Figure 6, the Organization Chart of document exchanger of the present invention, the data of N position * N position is example in this with 256 (16 * 16), with regard to aforementioned theory, 256 data can be divided into (4 on 4 layers of structure, 16,4 layers of 64 and 256 etc.), utilize one 4 pairs 1 multiplexers 30 to go to select to change, the activation of 4 pairs 1 multiplexers 30 (enable) then is by a controller IC (controller IC) 40 controls (this can be controlled by software), controller IC 40 is according to changing one, an arbitrarily optional wherein variation is disturbed data, for example choose undermost " 01 ", data in the block (as the black word) that system just becomes 4 bytes is disturbed, and each bit position of source book is upset in proper order.Or controller IC 40 foundation variations one, choose middle lower floor " 11 ", just system is that a unit (as the Dark grey word) disturbs with the block that 16 bytes become.By that analogy, in the present embodiment, this data just has the troublesome pattern of four kinds of variations.
As shown in Figure 7, in the present embodiment, 4 groups 4 couples 1 multiplexer 30-33 have been used, and be a base unit of disturbing with 4 (promptly going up the orlops of each variation in the table), and each 4 pairs 1 multiplexer 30,31,32,33 o'clock, controller 40,41,42,43 can be selected arbitrarily to change.For instance, when first 4 couple 1 multiplexer 30, controller IC 40 is chosen and is changed one, and orlop is chosen " 01 ", data in the block (as the black word) that system just becomes 4 bytes is disturbed, and each bit position of source book is upset in proper order.Data after this disturbs is again when second 4 pairs of 1 multiplexer 31, controller IC 41 can be selected a kind of the disturbing in 4 kinds of variations arbitrarily, for example choose variation one again this moment, just then system disturbs the interior data of block (as the black word) that 4 bytes become.When the 3rd 4 pairs of 1 multiplexer 32, the controller IC 42 of supposing this moment is chosen and is changed two orlop " 10 ", just system is that a unit (as the Dark grey word) disturbs with the block that 64 bytes become with 16.When the 4th 4 pairs of 1 multiplexer 33, suppose that controller IC 43 is chosen arbitrarily again and change three orlop " 11 ", just system is that a unit (as light grey word) disturbs with the block that 16 bytes become with 4.Therefore in the present embodiment, controller IC 40,41,42,43 can be selected a kind of in 4 kinds of variations arbitrarily, disturb for disturbing the basis with orlop, data is disturbed and is promptly had optional 4 kinds of variations each time, present embodiment includes 4 groups 4 couples 1 multiplexer 30-33, promptly have 44 kinds of variations, the troublesome degree of data is complicated more.
Aforesaid disturbing can see through software control rotation (to the left or to the right), or do the change of regularity, and disturb through four layers variations, the behavior pattern that constitutes the data of disturbing is unfixing, unless putting in order of data pushes away reduction through identical variation is counter, otherwise will be the fathomless random number data of stranger.
Comprehensive above-mentioned explanation, can summarize the following step:
Step a, will grow displacement and be configured in the corresponding storage area of division with the square form;
Step b, to 4 nFigure place (n=0,1,2...) the assembly coding value of videoing;
Step c, utilize a multiplexer (30,31,32,33) to select, disturb putting in order of data according to encoded radio;
The maximum times of steps d, repeating step b-cn.
As described above, document exchanger 10 of the present invention puts in order original data troublesome, data after this disturbs is made accidental enciphering via tandom number generator 11 again, although the behavior pattern of this cipher mode is fixed, but sequence of addresses is upset, even illegal invasion person sees through the observation of change in voltage and successfully cracks, but the unfixed variation that puts in order of behavior pattern will make illegal invasion person crack.
Another advantage of the present invention promptly be with the Fractal notion on the integrated circuit (IC) design of reality, only need design one elementary cell, can reach the purpose of evenly disturbing data (scramble data), its framework is more conducive to zone (area) and the sequential demand (timing requirement) of actual integrated circuit layout (layout).
In sum, the data exchange operation method and the framework thereof of unknown behavior pattern provided by the present invention, the data of the unknown behavior pattern of troublesome formation of the data of seeing through is arranged, the difficulty that energy increase data is cracked has proposed effective solution and countermeasure for the problem that exists in the existing security system operation.

Claims (7)

1, a kind of operation method for document exchanger of unknown behavior pattern, it is characterized in that it is the square form storage area that the data of a lot of position is configured in the corresponding figure place of division formation, and to each square work reflection assembly coding, figure place according to 4 power values (0,1,2...) is carried out multi-level disturbing, make each bit position produce multiple variation, and therefrom select a kind of permutation and combination order entanglement with source book, make the encryption behavior of encryption safe system unfixing.
2, the operation method for document exchanger of unknown behavior pattern as claimed in claim 1 is characterized in that this troublesome step can see through the change that systematicness is rotated or done in software control to the left or to the right.
3, the operation method for document exchanger of unknown behavior pattern as claimed in claim 1, the selection that it is characterized in that this variation lies in one deck and selects a kind of combination, the combination combination farthest that following one deck is present with chosen distance.
4, the operation method for document exchanger of unknown behavior pattern as claimed in claim 1 is characterized in that level that this is disturbed and changes deciding on the figure place of data.
5, the operation method for document exchanger of unknown behavior pattern as claimed in claim 1 is characterized in that this method comprises the following steps:
Step a, will grow displacement and be configured in the corresponding storage area of division with the square form;
Step b, to 4 nFigure place (n=0,1,2...) the assembly coding value of videoing;
Step c, utilize a multiplexer (30,31,32,33) to select, disturb putting in order of data according to encoded radio;
The maximum times of steps d, repeating step b-cn.
6, a kind of document exchanger framework of unknown behavior pattern is characterized in that it includes:
One group of operation method for document exchanger according to the described unknown behavior pattern of claim 1 constitutes the multilayer data of having encoded;
At least one multiplexer, it is to disturb selecting suitable hierarchical data to change by the controller IC control of correspondence;
One tandom number generator, it carries out accidental enciphering to the data after disturbing.
7, the document exchanger framework of unknown behavior pattern as claimed in claim 6 is characterized in that described multiplexer is 4 pairs 1 multiplexers.
CN 00105464 2000-03-30 2000-03-30 Operation method for document exchanger in unknown behavior mode and its architecture Pending CN1264865A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 00105464 CN1264865A (en) 2000-03-30 2000-03-30 Operation method for document exchanger in unknown behavior mode and its architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 00105464 CN1264865A (en) 2000-03-30 2000-03-30 Operation method for document exchanger in unknown behavior mode and its architecture

Publications (1)

Publication Number Publication Date
CN1264865A true CN1264865A (en) 2000-08-30

Family

ID=4577719

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 00105464 Pending CN1264865A (en) 2000-03-30 2000-03-30 Operation method for document exchanger in unknown behavior mode and its architecture

Country Status (1)

Country Link
CN (1) CN1264865A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656947A (en) * 2015-11-03 2017-05-10 澧达科技股份有限公司 Data encryption system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656947A (en) * 2015-11-03 2017-05-10 澧达科技股份有限公司 Data encryption system
US10484340B2 (en) 2015-11-03 2019-11-19 Leadot Innovation, Inc. Data encryption system by using a security key
CN106656947B (en) * 2015-11-03 2020-09-25 澧达科技股份有限公司 Data encryption system

Similar Documents

Publication Publication Date Title
Pinkas et al. Oblivious RAM revisited
CN1122951C (en) Method for storing and operating sensitive information in security module, and associated security module
CN106952213B (en) New chaotic image encryption method based on bit permutation Yu dynamic DNA encoding
Xiao et al. A chaos-based hash function with both modification detection and localization capabilities
CN1221900C (en) User's identity authentication method of dynamic electron cipher equipment and its resources sharing system
CN1531820A (en) Multi-level, multi-dimensional content protection
CN1648967A (en) Cryptographic apparatus, cryptographic method, and storage medium thereof
CN101808095A (en) Encryption copy organization method under distributed storage environment
CN111695097A (en) Login checking method and device and computer readable storage medium
CN109765856A (en) The method of security logic system and safe operation flogic system
CN111355589A (en) Reconfigurable ring oscillator physical unclonable function circuit and excitation generation method thereof
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
Turn Privacy transformations for databank systems
CN115048664A (en) Data security storage method, device, equipment and medium based on solid state disk
US8130956B2 (en) Efficient and low power encrypting and decrypting of data
CN1264865A (en) Operation method for document exchanger in unknown behavior mode and its architecture
Vershinin et al. Associative steganography of text messages
CN115643090A (en) Longitudinal federal analysis method, device, equipment and medium based on privacy retrieval
CN112417509B (en) Data security de-duplication method based on self-encoder
CN1514403A (en) Intelligent card-card-secret method and system
CN1625099A (en) Intelligent card for multiple cipher standard and its authorization method
CN112486500B (en) System authorization deployment method
CN112671714B (en) Access control method and system applied to tax control billing
KR101924296B1 (en) Apparatus for security method
CN1142654C (en) Method for realizing network accreditation by encipher clobber generating

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication