JP2004184959A - Diffusion cryptography - Google Patents

Diffusion cryptography Download PDF

Info

Publication number
JP2004184959A
JP2004184959A JP2002382965A JP2002382965A JP2004184959A JP 2004184959 A JP2004184959 A JP 2004184959A JP 2002382965 A JP2002382965 A JP 2002382965A JP 2002382965 A JP2002382965 A JP 2002382965A JP 2004184959 A JP2004184959 A JP 2004184959A
Authority
JP
Japan
Prior art keywords
encryption key
cryptographic key
dictionary
cryptography
same
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2002382965A
Other languages
Japanese (ja)
Inventor
Kazu Taniguchi
和 谷口
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to JP2002382965A priority Critical patent/JP2004184959A/en
Publication of JP2004184959A publication Critical patent/JP2004184959A/en
Pending legal-status Critical Current

Links

Abstract

<P>PROBLEM TO BE SOLVED: To provide a cryptography for generating multiple kinds of cryptograms even when the same plaintext is encrypted by the same cryptographic key. <P>SOLUTION: By using the cryptographic key as a dictionary, generation of multiple kinds of cryptograms using one cryptographic key is made possible. This technology makes deciphering by brute force attack to the cryptographic key meaningless, and can make it difficult to grasp the whole of the cryptographic key. Thus, the technology can make deciphering and wiretapping or the like more difficult, assure the safety of communication, and contribute to the society. <P>COPYRIGHT: (C)2004,JPO&NCIPI

Description

【0001】本発明は、同一の平文に同一の暗号鍵を用いても、複数種類の暗号文を生成することができる。
【0002】暗号鍵を辞書として用いることで、暗号化を施す対象に発現する文字列、もしくは電気信号等の並びの要素それぞれについて、複数種類の要素へと写像を行う。
【0003】暗号鍵を辞書として用いることで、暗号化を施す対象に発現する文字列、もしくは電気信号等の並びの要素とは無関係な要素を付加することにより、暗号文の一要素あたりの平文の要素数を変化させることができる。
【発明の属する技術分野】
【0004】情報セキュリティーの分野における、基礎的アルゴリズムに関する発明である。
【従来の技術】
【0005】同一の平文に同一の暗号鍵を用いても暗号文は一種類しか生成できない。
【0006】昨今の計算機技術の進歩はめざましく、一種類の暗号鍵で一種類の暗号文しか生成しないような暗号技術では、暗号鍵を総当りさせることで暗号を破ることが容易に行われる。
【発明が解決しようとする課題】
【0007】本発明が解決しようとする課頭は、同一の平文に同一の暗号鍵を用いると、一種類の暗号文しか生成しないことである。
【0008】、一種類の暗号文しか生成しない暗号技術では、暗号鍵を総当りで組み合わせることで解読されてしまう。
【0009】計算機技術の進歩による暗号解読に必要な時間が短縮されてきている。
【課題を解決するための手段】
【0010】コンピュータを操作し、暗号鍵を辞書として用いることで解決する。
【発明の実施の形態】
【0011】コンピュータを操作し、暗号鍵を辞書として用いることで解決する。
【実施例】以下において本発明の実施例を示すが、本発明は以下の実施例にのみ限られるものではない。
【実施例1】平文「049」(文字列)について暗号化を行う。
以下の内容をもつ暗号鍵を用意し辞書として用いる。
暗号鍵のはじめ>
「0」を「A」「B」「C」のいずれか一つに写像する。
「4」を「D」「E」「F」のいずれか一つに写像する。
「9」を「G」「H」「I」のいずれか一つに写像する。
<暗号鍵のおわり
この暗号鍵を用いて「049」(文字列)に暗号化を施すと、
3×3×3=27 となり、
27種類の暗号文を生成することができる。列挙すると次のようになる。
「ADG」「ADH」「ADI」「AEG」「AEH」「AEI」
「AFG」「AFH」「AFI」「BDG」「BDH」「BDI」
「BEG」「BEH」「BEI」「BFG」「BFH」「BFI」
「CDG」「CDH」「CDI」「CEG」「CEH」「CEI」
「CFG」「CFH」「CFI」
【実施例2】平文「049」(文字列)について暗号化を行う。
以下の内容をもつ暗号鍵を用意し辞書として用いる。
暗号鍵のはじめ>
乱数を用いて文字の間に「5」「6」「8」を付加する。
<暗号鍵のおわり
この暗号鍵を用いて「049」(文字列)に暗号化を施すと、
(4×4×4×4)−1=255となり、
255種類の暗号文を生成することができる。
【実施例3】平文「049」(文字列)について「実施例1」「実施例2」を組み合わせて暗号化を行う。
以下の内容をもつ暗号鍵を用意し辞書として用いる。
暗号鍵のはじめ>
「0」を「A」「B」「C」のいずれか一つに写像する。
「4」を「D」「E」「F」のいずれか一つに写像する。
「9」を「G」「H」「I」のいずれか一つに写像する。
乱数を用いて文字の間に「5」「6」「8」を付加する。
<暗号鍵のおわり
この暗号鍵を用いて「049」(文字列)に暗号化を施すと、
6885=(3×3×3)×{(4×4×4×4)−1} となり、
6885種類の暗号文を生成することができる。
【発明の効果】
【0012】本発明により、暗号文を複数の種類生成することができる。盗聴者が盗聴を行っても入手できるのは、複数種類ある暗号文のうちの一種類だけである。よって暗号鍵を暗号文に対して総当りさせることによって解読に成功しても、盗聴者は暗号鍵の一部を知るにすぎない。このようにして、暗号鍵の全体を知ることを困難にすることができ、計算機技術の向上による暗号の脆弱化を防ぐことができる。さらには、情報通信網ネットワークや各種媒体等を通して行われる電子商取引や企業の顧客情報等、重要な情報等の交換について、その安全性を確保することができるのである。
According to the present invention, a plurality of types of ciphertexts can be generated even when the same encryption key is used for the same plaintext.
[0002] By using an encryption key as a dictionary, a character string or an array of elements such as an electric signal, which appears in an object to be encrypted, is mapped to a plurality of types of elements.
[0003] By using an encryption key as a dictionary, a character string that appears in an object to be encrypted or an element irrelevant to an arrangement element such as an electric signal is added, so that a plaintext per element of the ciphertext is added. Can be changed.
TECHNICAL FIELD OF THE INVENTION
[0004] The invention relates to a basic algorithm in the field of information security.
[Prior art]
[0005] Even if the same encryption key is used for the same plaintext, only one type of ciphertext can be generated.
[0006] Recent advances in computer technology have been remarkable. With an encryption technology in which only one type of ciphertext is generated with one type of encryption key, it is easy to break the encryption by making the encryption key brute force.
[Problems to be solved by the invention]
[0007] The problem to be solved by the present invention is that if the same encryption key is used for the same plaintext, only one type of ciphertext is generated.
[0008] In a cryptographic technique that generates only one type of ciphertext, it is deciphered by combining cryptographic keys brute force.
[0009] Advances in computer technology have reduced the time required for decryption.
[Means for Solving the Problems]
The problem is solved by operating the computer and using the encryption key as a dictionary.
BEST MODE FOR CARRYING OUT THE INVENTION
The problem is solved by operating the computer and using the encryption key as a dictionary.
EXAMPLES Examples of the present invention will be described below, but the present invention is not limited to the following examples.
[Embodiment 1] Encryption is performed on plaintext "049" (character string).
An encryption key having the following contents is prepared and used as a dictionary.
Beginning of encryption key>
"0" is mapped to any one of "A", "B", and "C".
"4" is mapped to any one of "D", "E", and "F".
"9" is mapped to any one of "G", "H", and "I".
<End of Encryption Key When this encryption key is used to encrypt “049” (character string),
3 × 3 × 3 = 27, and
27 types of ciphertexts can be generated. The enumeration is as follows.
"ADG""ADH""ADI""AEG""AEH""AEI"
"AFG""AFH""AFI""BDG""BDH""BDI"
"BEG""BEH""BEI""BFG""BFH""BFI"
"CDG""CDH""CDI""CEG""CEH""CEI"
"CFG""CFH""CFI"
[Second Embodiment] Encryption is performed on plaintext "049" (character string).
An encryption key having the following contents is prepared and used as a dictionary.
Beginning of encryption key>
“5”, “6” and “8” are added between characters using random numbers.
<End of Encryption Key When this encryption key is used to encrypt “049” (character string),
(4 × 4 × 4 × 4) −1 = 255, and
255 types of ciphertexts can be generated.
Embodiment 3 Plain text "049" (character string) is encrypted by combining "Example 1" and "Example 2".
An encryption key having the following contents is prepared and used as a dictionary.
Beginning of encryption key>
"0" is mapped to any one of "A", "B", and "C".
"4" is mapped to any one of "D", "E", and "F".
"9" is mapped to any one of "G", "H", and "I".
“5”, “6” and “8” are added between characters using random numbers.
<End of Encryption Key When this encryption key is used to encrypt “049” (character string),
6885 = (3 × 3 × 3) × {(4 × 4 × 4 × 4) −1},
6885 kinds of ciphertexts can be generated.
【The invention's effect】
According to the present invention, a plurality of types of ciphertexts can be generated. Even if an eavesdropper performs eavesdropping, only one of a plurality of types of ciphertexts can be obtained. Thus, even if the encryption key is brute-forced against the ciphertext and succeeds in decryption, the eavesdropper only knows a part of the encryption key. In this manner, it is possible to make it difficult to know the entire encryption key, and it is possible to prevent the encryption from becoming weak due to the improvement in computer technology. Further, it is possible to ensure the security of exchange of important information, such as electronic commerce and corporate customer information, performed through an information communication network or various media.

Claims (1)

本発明は、同一の平文を同一の暗号鍵を用いて暗号化しても複数種類の暗号文を生成する技術である。The present invention is a technique for generating a plurality of types of ciphertext even if the same plaintext is encrypted using the same encryption key.
JP2002382965A 2002-12-04 2002-12-04 Diffusion cryptography Pending JP2004184959A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2002382965A JP2004184959A (en) 2002-12-04 2002-12-04 Diffusion cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2002382965A JP2004184959A (en) 2002-12-04 2002-12-04 Diffusion cryptography

Publications (1)

Publication Number Publication Date
JP2004184959A true JP2004184959A (en) 2004-07-02

Family

ID=32766818

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2002382965A Pending JP2004184959A (en) 2002-12-04 2002-12-04 Diffusion cryptography

Country Status (1)

Country Link
JP (1) JP2004184959A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2984648A1 (en) * 2011-12-20 2013-06-21 Oberthur Technologies Method for providing response to request by individual electronic system for banking transaction, involves analyzing specific signature using cryptographic unit, where part of unit is selected based on result of analysis of signature

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2984648A1 (en) * 2011-12-20 2013-06-21 Oberthur Technologies Method for providing response to request by individual electronic system for banking transaction, involves analyzing specific signature using cryptographic unit, where part of unit is selected based on result of analysis of signature

Similar Documents

Publication Publication Date Title
EP1876748B1 (en) Privacy-preserving concatenation of strings
KR20100069610A (en) Methods and devices for a chained encryption mode
US7110539B1 (en) Method and apparatus for encrypting and decrypting data
US20100174897A1 (en) Encryption method for highest security applications
US20120314857A1 (en) Block encryption device, block decryption device, block encryption method, block decryption method and program
CN102904712A (en) Information encrypting method
US9059838B2 (en) Encryption algorithm with randomized buffer
US20020159588A1 (en) Cryptography with unconditional security for the internet, commercial intranets, and data storage
JP5992651B2 (en) ENCRYPTION METHOD, PROGRAM, AND SYSTEM
KR101148560B1 (en) Apparatus and method for encryption using mixture of bit data
Kadry et al. An improvement of RC4 cipher using vigenère cipher
JP2004184959A (en) Diffusion cryptography
CN114036541A (en) Application method for compositely encrypting and storing user private content
JP2000004223A (en) Encryption/authentication system
JP2002023624A (en) Block cipher communication method and device therefor, and recording medium with block cipher communication program recorded thereon
JP5293612B2 (en) ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM
Pancholi et al. Cryptography: comparative studies of different symmetric algorithms
Jonathan A Open Workbook of Cryptology: A project-based introduction to crypto in Python
Bhowmika et al. A Symmetric Key-Based Cryptographic Transaction on Cryptocurrency Data
Nagde et al. New Approach for Data Encryption using Two Way Crossover
Poritz Open Workbook of Cryptology
TW201919361A (en) Method for block cipher enhanced by nonce text protection and decryption thereof
Olanrewaju et al. AN ENHANCED SYMMETRIC KEY ALGORITHM FOR SECURED NETWORK COMMUNICATION
Abbas et al. Arae Cipher System
Nurwhaju et al. Novel cryptography using Horse Step Algorithm for more flexible key