CN1474310A - Message characteristic extracting method for information completeness correction - Google Patents
Message characteristic extracting method for information completeness correction Download PDFInfo
- Publication number
- CN1474310A CN1474310A CNA02125401XA CN02125401A CN1474310A CN 1474310 A CN1474310 A CN 1474310A CN A02125401X A CNA02125401X A CN A02125401XA CN 02125401 A CN02125401 A CN 02125401A CN 1474310 A CN1474310 A CN 1474310A
- Authority
- CN
- China
- Prior art keywords
- message
- value
- random number
- section
- message characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The present invention relates to message characteristic extracting method for information completeness verification. One initial random number and plain text are merged randomly, and the merged text is cut into sections with the length of the random number. The random number and the first section of data are xored to produce an intermediate number, the intermediate number is xored with the next section of data, and the number from the final section operation is used as the initial number for the operation of next turn. After several turns of operation, RSA enciphered message characteristic is obtained. The present invention has the advantages of several turns of characteristic extraction, random amendment of plain text, security of the target likely to be distorted and attacked, etc. and can strengthen the capacity of preventing distorted attack.
Description
The present invention relates to a kind of message characteristic that is used for the information integrity verification and pluck extracting method.LZW is the abbreviation of patent applicant's name phonetic (LIANG ZHIWEI).
A few the safest encryption method of generally acknowledging in the world has RSA, DES, IDEA, MD4, MD5, PGP, One-time pad etc. at present.They mostly obtained patent protection power.Technical each tool relative merits: DES, IDEA be to the high efficiency and the high level security of information encryption in enormous quantities, but have the hidden danger of " distorting sexual assault "; MD4, MD5 are used to ensure and the integrality of authentication information transmission, do not serve as information encryption and reduction, initial value with computing machine generation and participation Hash computing is a pseudo random number, is not bestowed encryption as the message digest value of computing target, and every computing of taking turns all relates to expressly whole part full text; RSA is fit to be applied to digital signature and but can not be fit to encrypt information in enormous quantities, and the algorithm of RSA is generally acknowledged that being not suitable for that the high flux information flow is carried out completeness encrypts; PGP is integrated above-mentioned IDEA, MD5, several encryption technologies of RSA and ZIP data compression technique, combination results goes out to optimize cryptographic protocol, but relates to the product of the intellecture property of a plurality of genus third party terms of validity; The confidentiality of traditional One-time pad encryption method is best, and is applicable to not too big text encryption.Aspect patent protection, traditional One-time pad encryption method does not have patent, and the United States Patent (USP) of RSA was shortly past 1 year effective protection period, and all the other all still are in effective protection period of patent.Belong at present China have independent intellectual property right, can by internationally recognized for modern encryption algorithm as safe as a house very few.
The object of the present invention is to provide a kind of message characteristic of information integrity verification to pluck extracting method.
The present invention is by the random number of an about measured length takes place, and is appended to afterbody expressly.To synthesize later plaintext again and be divided into the message information section of a plurality of length for about measured length.Random number and first section message information with gained carries out XOR then, and gained result and second section message information carry out XOR.In turn by that analogy, all participated in a this computing of taking turns up to all message information sections.Take turns XOR from second, the mode expressly that merges changes within random number with gained is inserted into expressly by randomly assigne, and each message information section of cutting apart is calculated by identical XOR mode.Through the processing of number wheel, draw feature short message expressly at last.
The present invention is characterised in that: pluck in the process of carrying at message characteristic (1), and every message of taking turns generation is plucked the value of carrying Rm
n K-1All, be used for just producing the next round message after plug-in type is repaired expressly at random and pluck the value of carrying Rm as the basic value that produces the random position value
n k(2) utilized rsa encryption technique to the random number R of playing the part of initial value in the method with play the part of message and pluck the art wheel message of putting forward desired value and pluck the value of carrying Rm
n kMaintain secrecy.
The present invention's advantage compared with the prior art is: the message characteristic value of (1) many wheel modes is plucked and is carried; (2) each is taken turns the message that obtains and plucks the value of putting forward and be a stray parameter, with the XOR parameter that both is used as pilot process, again as plug-in type finishing random position value expressly, and then produce the next round message and pluck the value of putting forward; (3) can make object (random number R of initial value and the desired value Rm that distorts sexual assault and will be concerned about
n k) disappearance, thereby can take precautions against better and distort sexual assault.
With specific embodiment the present invention is elaborated below:
LZW message characteristic algorithm protocol:
1, the random number R (for example 512bit) that length is Lbit takes place.(table)
2, the 1st plaintext of taking turns is repaired and it is carried out the message grouping.Produce the 1st message of taking turns then and pluck the value of putting forward.
(1) will expressly merge with random number R.Promptly append random number R at the plaintext end.
(2) be one section with length L (for example 512bit), the message that merged is divided into the n+1 section from the beginning to the end.The message that promptly merged is divided into message m
1 1Section is to message m
N+1 1Section (on behalf of which, subscript take turns, and which section is subscript represent).Then with message m
N+1 1Section is given up.(table two A)
(3) R and m
1 1Carry out XOR, get Rm
1 1And then continue Rm
1 1With m
2 1Carry out XOR and get Rm
2 1So analogize and proceed similar XOR, until obtaining Rm
n 1Its length is Lbit (for example 512bit).(table two B)
3, the plaintext of k (k>1, k ∈ N) wheel is done plug-in type finishing at random, and it is carried out the message grouping.The message that produces the k wheel is then plucked the value of putting forward.
(1) will expressly pluck the value of carrying Rm with the message of last round of computing gained
n K-1Merge: with plaintext bit (bit) length is that mould is to Rm
n K-1Delivery, value Pos inserts Rm in plaintext Pos position
n K-1Thereby, finish expressly and Rm
n K-1Merging.
(2) be one section with length L (for example 512bit), the message that merged is divided into the n+1 section from the beginning to the end.Promptly expressly be divided into message m
1 kSection is to message m
N+1 kSection.Then with segmented messages m
N+1 kGive up.(table two C)
(3) R and m
1 kCarry out XOR, get Rm
1 kAnd then continue Rm
1 kWith m
1 kCarry out XOR and get Rm
1 kSo analogize and proceed similar XOR, until obtaining Rm
n kIts length is Lbit (for example 512bit).(table two B)
The size of k value depends on the needs particularly, takes turns computing and just can satisfy general requirement through several usually.The k value is big more, and the successful possibility of distorting sexual assault of cryptography meaning is more little, but can increase operation time.
4, to distort sexual assault in order taking precautions against better, preferably to make the object (random number R of initial value and the desired value Rm that distort sexual assault and will be concerned about
n k) disappearance.Specific practice is: R is appended to Rm
n kConstitute S afterwards.Its length is 2*Lbit (for example 2*512bit).Further adopt the rsa encryption method that S ' is done independent encryption.Form message digest ciphertext S at last.(table three)
Directly to provide other encryption methods to carry out integrated if 5 prepare that message characteristic is plucked the value of putting forward, and can guarantee that S ' section has under the protection (as having adopted the rsa encryption method) of safe enough, considers to remove from above-mentioned the 4th, described rsa encryption.Form message digest ciphertext S (table three) at last.Its length is 2*L bit (for example 2*512bit).
Table two A: the 1st plaintext finishing of taking turns is also carried out message to it and is divided into groups
(... ((R m
1 1) m
2 1) ... m
n 1) → Rm
n 1(Lbit) table two B: produce the 1st message digest value of taking turns
Table two C: the plaintext to the k wheel carries out plug-in type finishing at random and it is carried out the message grouping
(...((Rm
n k-1m
1 k)m
2 k)...m
n k)→Rm
n k(Lbit)
Table two D: the message that produces k (k>1, k ∈ N) wheel is plucked the value of putting forward
Table three: Rm
nMerge formation message characteristic ciphertext S with random number R; Or after merging formation S ',, form message characteristic ciphertext S at last again through rsa encryption
Claims (1)
- A kind of message characteristic that is used for the information integrity verification is plucked and put forward the LZW method, it is characterized in that: pluck in the process of carrying at message characteristic (1), and every message of taking turns generation is plucked the value of carrying Rm n K-1All, be used for just producing the next round message after plug-in type is repaired expressly at random and pluck the value of carrying Rm as the basic value that produces the random position value n k(2) utilize rsa encryption technique that the random number R of initial value and message are plucked the end wheel message of putting forward desired value and plucked the value of carrying Rm n kMaintain secrecy.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA02125401XA CN1474310A (en) | 2002-08-05 | 2002-08-05 | Message characteristic extracting method for information completeness correction |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA02125401XA CN1474310A (en) | 2002-08-05 | 2002-08-05 | Message characteristic extracting method for information completeness correction |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1474310A true CN1474310A (en) | 2004-02-11 |
Family
ID=34142876
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA02125401XA Pending CN1474310A (en) | 2002-08-05 | 2002-08-05 | Message characteristic extracting method for information completeness correction |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1474310A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101394284B (en) * | 2008-11-13 | 2011-01-19 | 四川长虹电器股份有限公司 | One-time password authentication method |
CN1863042B (en) * | 2005-12-13 | 2011-05-04 | 华为技术有限公司 | Method for information encryption and decryption |
CN104967518A (en) * | 2015-07-31 | 2015-10-07 | 中国人民解放军71777部队 | Method for improving information transmission security |
CN113254979A (en) * | 2021-06-26 | 2021-08-13 | 环球数科集团有限公司 | Credible examination system for protecting business privacy and computer storage medium |
-
2002
- 2002-08-05 CN CNA02125401XA patent/CN1474310A/en active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1863042B (en) * | 2005-12-13 | 2011-05-04 | 华为技术有限公司 | Method for information encryption and decryption |
CN101394284B (en) * | 2008-11-13 | 2011-01-19 | 四川长虹电器股份有限公司 | One-time password authentication method |
CN104967518A (en) * | 2015-07-31 | 2015-10-07 | 中国人民解放军71777部队 | Method for improving information transmission security |
CN113254979A (en) * | 2021-06-26 | 2021-08-13 | 环球数科集团有限公司 | Credible examination system for protecting business privacy and computer storage medium |
CN113254979B (en) * | 2021-06-26 | 2021-09-24 | 环球数科集团有限公司 | Credible examination system for protecting business privacy and computer storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2001324925A5 (en) | ||
US20150244518A1 (en) | Variable-length block cipher apparatus and method capable of format preserving encryption | |
CN101262341A (en) | A mixed encryption method in session system | |
WO2014136386A1 (en) | Tag generation device, tag generation method, and tag generation program | |
US20040096056A1 (en) | Method of encryption using multi-key process to create a variable-length key | |
CN109861810A (en) | A kind of data ciphering method and decryption method based on chaos Tuber yield | |
CN110661746B (en) | Train CAN bus communication security encryption method and decryption method | |
CN104396182A (en) | Method of encrypting data | |
CN104038339A (en) | Method for encrypting file or communication message by use of multiple password algorithms and multiple keys | |
WO2007044042A2 (en) | Encryption methods and apparatus | |
CN107566360A (en) | A kind of generation method of data authentication code | |
CN103117850A (en) | Cryptosystem based on random sequence database | |
Li et al. | Breaking an image encryption algorithm based on chaos | |
CN1474310A (en) | Message characteristic extracting method for information completeness correction | |
CN104735094A (en) | Information separation based data security transmission system and method | |
CN101645909B (en) | Multi-media information security guarantee method combining encryption and watermark | |
CN102360414B (en) | Misguiding encryption method capable of correcting pseudorandom sequence | |
CN105959106A (en) | Low-complexity digital encryption method | |
CN105429749A (en) | Separated feature data encryption and decryption method and system | |
Shaker et al. | Digital Signature Based on Hash Functions | |
Rahim | SMS encryption using word auto key encryption | |
CN104022865A (en) | Encrypted transmission method of network data | |
Subandi et al. | Analysis of RC6-Lite Implementation for Data Encryption | |
CN111314053B (en) | Data encryption and decryption method | |
CN114785479A (en) | System and method for preventing AES algorithm module from being attacked |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |