CN1474310A - Message characteristic extracting method for information completeness correction - Google Patents

Message characteristic extracting method for information completeness correction Download PDF

Info

Publication number
CN1474310A
CN1474310A CNA02125401XA CN02125401A CN1474310A CN 1474310 A CN1474310 A CN 1474310A CN A02125401X A CNA02125401X A CN A02125401XA CN 02125401 A CN02125401 A CN 02125401A CN 1474310 A CN1474310 A CN 1474310A
Authority
CN
China
Prior art keywords
message
value
random number
section
message characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA02125401XA
Other languages
Chinese (zh)
Inventor
梁志伟
梁瑞琼
刘保延
程翼宇
Original Assignee
梁志伟
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 梁志伟 filed Critical 梁志伟
Priority to CNA02125401XA priority Critical patent/CN1474310A/en
Publication of CN1474310A publication Critical patent/CN1474310A/en
Pending legal-status Critical Current

Links

Abstract

The present invention relates to message characteristic extracting method for information completeness verification. One initial random number and plain text are merged randomly, and the merged text is cut into sections with the length of the random number. The random number and the first section of data are xored to produce an intermediate number, the intermediate number is xored with the next section of data, and the number from the final section operation is used as the initial number for the operation of next turn. After several turns of operation, RSA enciphered message characteristic is obtained. The present invention has the advantages of several turns of characteristic extraction, random amendment of plain text, security of the target likely to be distorted and attacked, etc. and can strengthen the capacity of preventing distorted attack.

Description

A kind of message characteristic that is used for the information integrity verification is plucked extracting method
The present invention relates to a kind of message characteristic that is used for the information integrity verification and pluck extracting method.LZW is the abbreviation of patent applicant's name phonetic (LIANG ZHIWEI).
A few the safest encryption method of generally acknowledging in the world has RSA, DES, IDEA, MD4, MD5, PGP, One-time pad etc. at present.They mostly obtained patent protection power.Technical each tool relative merits: DES, IDEA be to the high efficiency and the high level security of information encryption in enormous quantities, but have the hidden danger of " distorting sexual assault "; MD4, MD5 are used to ensure and the integrality of authentication information transmission, do not serve as information encryption and reduction, initial value with computing machine generation and participation Hash computing is a pseudo random number, is not bestowed encryption as the message digest value of computing target, and every computing of taking turns all relates to expressly whole part full text; RSA is fit to be applied to digital signature and but can not be fit to encrypt information in enormous quantities, and the algorithm of RSA is generally acknowledged that being not suitable for that the high flux information flow is carried out completeness encrypts; PGP is integrated above-mentioned IDEA, MD5, several encryption technologies of RSA and ZIP data compression technique, combination results goes out to optimize cryptographic protocol, but relates to the product of the intellecture property of a plurality of genus third party terms of validity; The confidentiality of traditional One-time pad encryption method is best, and is applicable to not too big text encryption.Aspect patent protection, traditional One-time pad encryption method does not have patent, and the United States Patent (USP) of RSA was shortly past 1 year effective protection period, and all the other all still are in effective protection period of patent.Belong at present China have independent intellectual property right, can by internationally recognized for modern encryption algorithm as safe as a house very few.
The object of the present invention is to provide a kind of message characteristic of information integrity verification to pluck extracting method.
The present invention is by the random number of an about measured length takes place, and is appended to afterbody expressly.To synthesize later plaintext again and be divided into the message information section of a plurality of length for about measured length.Random number and first section message information with gained carries out XOR then, and gained result and second section message information carry out XOR.In turn by that analogy, all participated in a this computing of taking turns up to all message information sections.Take turns XOR from second, the mode expressly that merges changes within random number with gained is inserted into expressly by randomly assigne, and each message information section of cutting apart is calculated by identical XOR mode.Through the processing of number wheel, draw feature short message expressly at last.
The present invention is characterised in that: pluck in the process of carrying at message characteristic (1), and every message of taking turns generation is plucked the value of carrying Rm n K-1All, be used for just producing the next round message after plug-in type is repaired expressly at random and pluck the value of carrying Rm as the basic value that produces the random position value n k(2) utilized rsa encryption technique to the random number R of playing the part of initial value in the method with play the part of message and pluck the art wheel message of putting forward desired value and pluck the value of carrying Rm n kMaintain secrecy.
The present invention's advantage compared with the prior art is: the message characteristic value of (1) many wheel modes is plucked and is carried; (2) each is taken turns the message that obtains and plucks the value of putting forward and be a stray parameter, with the XOR parameter that both is used as pilot process, again as plug-in type finishing random position value expressly, and then produce the next round message and pluck the value of putting forward; (3) can make object (random number R of initial value and the desired value Rm that distorts sexual assault and will be concerned about n k) disappearance, thereby can take precautions against better and distort sexual assault.
With specific embodiment the present invention is elaborated below:
LZW message characteristic algorithm protocol:
1, the random number R (for example 512bit) that length is Lbit takes place.(table)
2, the 1st plaintext of taking turns is repaired and it is carried out the message grouping.Produce the 1st message of taking turns then and pluck the value of putting forward.
(1) will expressly merge with random number R.Promptly append random number R at the plaintext end.
(2) be one section with length L (for example 512bit), the message that merged is divided into the n+1 section from the beginning to the end.The message that promptly merged is divided into message m 1 1Section is to message m N+1 1Section (on behalf of which, subscript take turns, and which section is subscript represent).Then with message m N+1 1Section is given up.(table two A)
(3) R and m 1 1Carry out XOR, get Rm 1 1And then continue Rm 1 1With m 2 1Carry out XOR and get Rm 2 1So analogize and proceed similar XOR, until obtaining Rm n 1Its length is Lbit (for example 512bit).(table two B)
3, the plaintext of k (k>1, k ∈ N) wheel is done plug-in type finishing at random, and it is carried out the message grouping.The message that produces the k wheel is then plucked the value of putting forward.
(1) will expressly pluck the value of carrying Rm with the message of last round of computing gained n K-1Merge: with plaintext bit (bit) length is that mould is to Rm n K-1Delivery, value Pos inserts Rm in plaintext Pos position n K-1Thereby, finish expressly and Rm n K-1Merging.
(2) be one section with length L (for example 512bit), the message that merged is divided into the n+1 section from the beginning to the end.Promptly expressly be divided into message m 1 kSection is to message m N+1 kSection.Then with segmented messages m N+1 kGive up.(table two C)
(3) R and m 1 kCarry out XOR, get Rm 1 kAnd then continue Rm 1 kWith m 1 kCarry out XOR and get Rm 1 kSo analogize and proceed similar XOR, until obtaining Rm n kIts length is Lbit (for example 512bit).(table two B)
The size of k value depends on the needs particularly, takes turns computing and just can satisfy general requirement through several usually.The k value is big more, and the successful possibility of distorting sexual assault of cryptography meaning is more little, but can increase operation time.
4, to distort sexual assault in order taking precautions against better, preferably to make the object (random number R of initial value and the desired value Rm that distort sexual assault and will be concerned about n k) disappearance.Specific practice is: R is appended to Rm n kConstitute S afterwards.Its length is 2*Lbit (for example 2*512bit).Further adopt the rsa encryption method that S ' is done independent encryption.Form message digest ciphertext S at last.(table three)
Directly to provide other encryption methods to carry out integrated if 5 prepare that message characteristic is plucked the value of putting forward, and can guarantee that S ' section has under the protection (as having adopted the rsa encryption method) of safe enough, considers to remove from above-mentioned the 4th, described rsa encryption.Form message digest ciphertext S (table three) at last.Its length is 2*L bit (for example 2*512bit).
Figure A0212540100051
Table two A: the 1st plaintext finishing of taking turns is also carried out message to it and is divided into groups
(... ((R m 1 1) m 2 1) ... m n 1) → Rm n 1(Lbit) table two B: produce the 1st message digest value of taking turns
Figure A0212540100052
Table two C: the plaintext to the k wheel carries out plug-in type finishing at random and it is carried out the message grouping
(...((Rm n k-1m 1 k)m 2 k)...m n k)→Rm n k(Lbit)
Table two D: the message that produces k (k>1, k ∈ N) wheel is plucked the value of putting forward
Annotate: represents the symbol of XOR
Figure A0212540100053
Table three: Rm nMerge formation message characteristic ciphertext S with random number R; Or after merging formation S ',, form message characteristic ciphertext S at last again through rsa encryption

Claims (1)

  1. A kind of message characteristic that is used for the information integrity verification is plucked and put forward the LZW method, it is characterized in that: pluck in the process of carrying at message characteristic (1), and every message of taking turns generation is plucked the value of carrying Rm n K-1All, be used for just producing the next round message after plug-in type is repaired expressly at random and pluck the value of carrying Rm as the basic value that produces the random position value n k(2) utilize rsa encryption technique that the random number R of initial value and message are plucked the end wheel message of putting forward desired value and plucked the value of carrying Rm n kMaintain secrecy.
CNA02125401XA 2002-08-05 2002-08-05 Message characteristic extracting method for information completeness correction Pending CN1474310A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA02125401XA CN1474310A (en) 2002-08-05 2002-08-05 Message characteristic extracting method for information completeness correction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA02125401XA CN1474310A (en) 2002-08-05 2002-08-05 Message characteristic extracting method for information completeness correction

Publications (1)

Publication Number Publication Date
CN1474310A true CN1474310A (en) 2004-02-11

Family

ID=34142876

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA02125401XA Pending CN1474310A (en) 2002-08-05 2002-08-05 Message characteristic extracting method for information completeness correction

Country Status (1)

Country Link
CN (1) CN1474310A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101394284B (en) * 2008-11-13 2011-01-19 四川长虹电器股份有限公司 One-time password authentication method
CN1863042B (en) * 2005-12-13 2011-05-04 华为技术有限公司 Method for information encryption and decryption
CN104967518A (en) * 2015-07-31 2015-10-07 中国人民解放军71777部队 Method for improving information transmission security
CN113254979A (en) * 2021-06-26 2021-08-13 环球数科集团有限公司 Credible examination system for protecting business privacy and computer storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1863042B (en) * 2005-12-13 2011-05-04 华为技术有限公司 Method for information encryption and decryption
CN101394284B (en) * 2008-11-13 2011-01-19 四川长虹电器股份有限公司 One-time password authentication method
CN104967518A (en) * 2015-07-31 2015-10-07 中国人民解放军71777部队 Method for improving information transmission security
CN113254979A (en) * 2021-06-26 2021-08-13 环球数科集团有限公司 Credible examination system for protecting business privacy and computer storage medium
CN113254979B (en) * 2021-06-26 2021-09-24 环球数科集团有限公司 Credible examination system for protecting business privacy and computer storage medium

Similar Documents

Publication Publication Date Title
JP2001324925A5 (en)
US20150244518A1 (en) Variable-length block cipher apparatus and method capable of format preserving encryption
CN101262341A (en) A mixed encryption method in session system
WO2014136386A1 (en) Tag generation device, tag generation method, and tag generation program
US20040096056A1 (en) Method of encryption using multi-key process to create a variable-length key
CN109861810A (en) A kind of data ciphering method and decryption method based on chaos Tuber yield
CN110661746B (en) Train CAN bus communication security encryption method and decryption method
CN104396182A (en) Method of encrypting data
CN104038339A (en) Method for encrypting file or communication message by use of multiple password algorithms and multiple keys
WO2007044042A2 (en) Encryption methods and apparatus
CN107566360A (en) A kind of generation method of data authentication code
CN103117850A (en) Cryptosystem based on random sequence database
Li et al. Breaking an image encryption algorithm based on chaos
CN1474310A (en) Message characteristic extracting method for information completeness correction
CN104735094A (en) Information separation based data security transmission system and method
CN101645909B (en) Multi-media information security guarantee method combining encryption and watermark
CN102360414B (en) Misguiding encryption method capable of correcting pseudorandom sequence
CN105959106A (en) Low-complexity digital encryption method
CN105429749A (en) Separated feature data encryption and decryption method and system
Shaker et al. Digital Signature Based on Hash Functions
Rahim SMS encryption using word auto key encryption
CN104022865A (en) Encrypted transmission method of network data
Subandi et al. Analysis of RC6-Lite Implementation for Data Encryption
CN111314053B (en) Data encryption and decryption method
CN114785479A (en) System and method for preventing AES algorithm module from being attacked

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication