CN1456981A - Method for generating truth random pins - Google Patents
Method for generating truth random pins Download PDFInfo
- Publication number
- CN1456981A CN1456981A CN 03128073 CN03128073A CN1456981A CN 1456981 A CN1456981 A CN 1456981A CN 03128073 CN03128073 CN 03128073 CN 03128073 A CN03128073 A CN 03128073A CN 1456981 A CN1456981 A CN 1456981A
- Authority
- CN
- China
- Prior art keywords
- random
- sensor
- key
- speed
- mouse
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Input From Keyboards Or The Like (AREA)
- Position Input By Displaying (AREA)
Abstract
The method installs transducer on the appointed equipment as the moving situation of the appointed equipment is measured in follow-up and real time mode by the transducer. The random variable data created with utilizing various parameter variation of orientation and speed occured in the appointed equipment random moving is outputted by the transducer so the true random chiper key can be generated. The method can achieve quite high entropy value and very high randomness.
Description
Technical field
The invention belongs to safe key production method in the information security field, is a kind of truly random key generation method specifically.
Background technology
In information safety system, key is unique voucher of Lawful access.Under the Kerckhoff hypothesis, the key itself that this system adopts is depended in the security of an information safety system, rather than the safe coefficient of system or hardware.Cipher system can disclose, and access strategy can announce that encryption device may be lost, but information safety system still can continue use, and is unaffected.But key is in case leak, and then whole security system is with destroyed: not only validated user can not access system, and the information in the system will be stolen by the disabled user.This shows that the key of safety is very crucial and important for information safety system.By the Shanlon theorem, the key of safety requires to have high as far as possible entropy.And to obtain higher entropy, and then require selected key to have the randomness of height and certain length, avoid predictability.The high speed development of modern communication networks, people are more and more higher to the demand of large batch of safe key.At present, many various key generators occur, be used to produce various keys.Principle of work by its key produces can be divided into following three classes:
The key generation method of 1. a certain random algorithm control: this class key generation method is a present modal class key generation method, and its produces key according to a certain pre-determined random algorithm or the table of random numbers.But because the feature of algorithm self, the key that any algorithm produced all can be predicted.For example: the attack of finding in 1999 at electronic payment protocol SSL is exactly to produce algorithm from key, dopes the possible key by its generation, and then the breakthrough electronic fare payment system.Thereby this class key generator can only be used in the very low occasion of security requirement.
2. manual method: these class methods by toss a coin, throw away random fashion such as dice and obtain key, be one of putative safest key generation method at present.The key that is produced by these class methods has higher entropy, the randomness of height, and can avoid predictability.But these class methods use very loaded down with trivial details.For example: in order to utilize the toss a coin key that produces needed 1024 bit lengths of commercial basic security standard, people need throw coin 1024 times, and are very impracticable.Can not adapt to the demand of modern society, therefore,, generally not obtain safe key in this way except in the very important occasion of only a few to the key generation.
3. random noise generation detection method: this class key generation method is by producing, measure natural noise signal with height random, obtaining needed random key, thereby need hardware devices such as extremely expensive random noise oscillator, random signal generator.Therefore, these class methods were both inconvenient, also impracticable.
In sum, existing three class key generation methods all exist various problems: dangerous, the inconvenience that has that have, what also have is impracticable.All these problems all cause the generation efficient of safe key of high randomness extremely low, and the management difficulty of key strengthens, and the replacing frequency of key reduces, for the safety of infosystem has been brought huge hidden danger.
Summary of the invention
The purpose of this invention is to provide a kind of situation of movement by the real-time follow-up pointing device, the random variation situation of various parameters such as the orientation that is produced when utilizing pointing device mobile at random, speed, thus safe and reliable truly random key generation method can be obtained.
To achieve these goals, characteristics of the present invention are: sensor installation on pointing device, the situation of movement of sensor real-time follow-up pointing device, the variation of various parameters such as the orientation that is produced when utilizing pointing device mobile at random, speed, by sensor output delta data at random, thereby generate truly random key;
The sensor is one or more;
The present invention combines the strong point of existing various key generation methods, avoided using complicated random noise signal generation oscillator, and manual complicated processes, can obtain to have the randomness of higher entropy and height, the high strength safe key that is difficult to predict.The present invention is simple to operate, quick, and is economical and practical, can replace existing various key generation method, has good practical value.The present invention is applicable to all types of fixed point input equipments.
Embodiment
The invention will be further described below in conjunction with embodiment, but this embodiment should not be construed as limitation of the present invention.
The simplest, modal pointing device is exactly a mouse, installation position displacement sensor on Genius mouse at first, speed pickup and pressure transducer, by user's rolling mouse at random, displacement transducer, speed pickup and pressure transducer will be exported the displacement of Genius mouse, speed and break frequency, convert the analog quantity of each sensor to digital quantity by mould/number (A/D) converter, by following the tracks of the situation of movement of Genius mouse, digital quantity to each sensor output carries out discrete sampling, obtain the orientation that this mouse is produced when mobile at random, the Discrete Stochastic situation of change of various parameters such as speed and break frequency, produce algorithm according to predetermined in advance random key then, the data that above-mentioned each sensor obtained are carried out combination calculation (conversion), thereby obtain to have the randomness of higher entropy and height, the high strength safe key that is difficult to predict.
The content that this instructions is not described in detail belongs to and well known to a person skilled in the art prior art.
Claims (3)
1, a kind of truly random key generation method, it is characterized in that: sensor installation on pointing device, the situation of movement of sensor real-time follow-up pointing device, the variation of various parameters such as the orientation that is produced when utilizing pointing device mobile at random, speed, by sensor output delta data at random, thereby generate truly random key.
2, a kind of truly random key generation method as claimed in claim 1, it is characterized in that: sensor is one or more.
3, a kind of truly random key generation method as claimed in claim 1 or 2, it is characterized in that: installation position displacement sensor on Genius mouse, speed pickup and pressure transducer, rolling mouse at random, displacement transducer, speed pickup and pressure transducer will be exported the displacement of Genius mouse, speed and break frequency, convert the analog quantity of each sensor to digital quantity by mould/number (A/D) converter, by following the tracks of the situation of movement of Genius mouse, digital quantity to each sensor output carries out discrete sampling, obtain the orientation that this mouse is produced when mobile at random, the Discrete Stochastic situation of change of various parameters such as speed and break frequency, produce algorithm according to predetermined in advance random key then, the data that above-mentioned each sensor obtained are carried out combination calculation (conversion), thereby obtain to have the randomness of higher entropy and height, the high strength safe key that is difficult to predict.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031280730A CN100447762C (en) | 2003-05-30 | 2003-05-30 | Method for generating truth random pins |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031280730A CN100447762C (en) | 2003-05-30 | 2003-05-30 | Method for generating truth random pins |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1456981A true CN1456981A (en) | 2003-11-19 |
CN100447762C CN100447762C (en) | 2008-12-31 |
Family
ID=29411676
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031280730A Expired - Fee Related CN100447762C (en) | 2003-05-30 | 2003-05-30 | Method for generating truth random pins |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100447762C (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8355503B2 (en) * | 2005-05-06 | 2013-01-15 | Research In Motion Limited | Adding randomness internally to a wireless mobile communication device |
CN103312497A (en) * | 2013-05-30 | 2013-09-18 | 刘一 | Method for utilizing network delay to generate true random secret key |
CN106452744A (en) * | 2016-09-27 | 2017-02-22 | 哈尔滨工程大学 | Root key generation device and method for Internet of things |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1226983A (en) * | 1997-08-05 | 1999-08-25 | 耶尼克斩股份有限公司 | Fingerprint collation |
CN1141818C (en) * | 2000-07-03 | 2004-03-10 | 孟武 | Solid trace cipher communication method |
CN1332548A (en) * | 2000-07-07 | 2002-01-23 | 王正峰 | Secret communicator with dynamic cipher |
-
2003
- 2003-05-30 CN CNB031280730A patent/CN100447762C/en not_active Expired - Fee Related
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8355503B2 (en) * | 2005-05-06 | 2013-01-15 | Research In Motion Limited | Adding randomness internally to a wireless mobile communication device |
US8903085B2 (en) | 2005-05-06 | 2014-12-02 | Blackberry Limited | Adding randomness internally to a wireless mobile communication device |
US9258701B2 (en) | 2005-05-06 | 2016-02-09 | Blackberry Limited | Adding randomness internally to a wireless mobile communication device |
CN103312497A (en) * | 2013-05-30 | 2013-09-18 | 刘一 | Method for utilizing network delay to generate true random secret key |
CN106452744A (en) * | 2016-09-27 | 2017-02-22 | 哈尔滨工程大学 | Root key generation device and method for Internet of things |
CN106452744B (en) * | 2016-09-27 | 2019-10-18 | 哈尔滨工程大学 | A kind of Internet of Things root key generation device and method |
Also Published As
Publication number | Publication date |
---|---|
CN100447762C (en) | 2008-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102541509B (en) | A kind of true random number generation method based on chaos encryption | |
CN101196807B (en) | Random number generator and random number generation method | |
EP2512061A1 (en) | System for conducting remote biometric operations | |
AU2005202296B2 (en) | Method and system for verifying authenticity of an object | |
CN103577150B (en) | Random number generation circuit and method | |
CN100447762C (en) | Method for generating truth random pins | |
CN205068524U (en) | Intelligent gate inhibition system | |
CN206058345U (en) | A kind of municipal works Internet of Things distribution box | |
CN110490215A (en) | A kind of modal identification method and system of wind power plant-power grid interaction | |
JP2003150373A5 (en) | ||
CN1877060A (en) | Digital cipher lock with secure secondary authorization unlocking function | |
CN205320105U (en) | Dynamic password lock | |
CN102662626B (en) | A kind of chaotic double-helix randomizer with disturbance | |
CN1710616A (en) | Simple and efficient true random-number generating method and apparatus | |
CN110278068A (en) | LoRa communication encryption system and its implementation based on chaos sequence | |
Nikolic et al. | Advancement of true random number generators based on sound cards through utilization of a new post-processing method | |
CN106230579B (en) | A kind of pseudo-random signal method for generation and generator based on chaos | |
Ivan et al. | Information and communication systems based on signal systems with improved properties building concept | |
CN115208550A (en) | Dynamic cross chaotic encryption method and system applied to smart power grid | |
Ogorzatek et al. | Some tools for attacking secure communication systems employing chaotic carriers | |
JP2002521740A (en) | An encryption algorithm analysis method using chaos analysis | |
Abdullah et al. | FPAA implementation of chaotic modulation based on Nahrain map | |
CN103220128B (en) | A kind of chaos cipher production method based on taking out position quantification at random | |
JP2004040803A (en) | Method for controlling access to prescribed space via personal hand baggage, and hand baggage for carrying out the same method | |
US20190165933A1 (en) | Communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20081231 Termination date: 20110530 |