WO2015166701A1 - 暗号化方法、プログラム、および、システム - Google Patents
暗号化方法、プログラム、および、システム Download PDFInfo
- Publication number
- WO2015166701A1 WO2015166701A1 PCT/JP2015/055603 JP2015055603W WO2015166701A1 WO 2015166701 A1 WO2015166701 A1 WO 2015166701A1 JP 2015055603 W JP2015055603 W JP 2015055603W WO 2015166701 A1 WO2015166701 A1 WO 2015166701A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- random number
- plaintext
- number sequence
- encryption
- conversion method
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
Definitions
- the present invention relates to an encryption method by a computer, and more particularly to an encryption method that is highly secure against a known plaintext attack.
- Encryption technology is extremely important in today's information communication technology. Encryption technology is required to be safe against various cryptanalysis methods, that is, to be able to obtain plaintext from ciphertext in a realistic calculation time without obtaining an encryption key.
- One of the cryptanalysis methods is a known plaintext attack. This is an attack in which when a ciphertext corresponding to a known specific plaintext can be obtained, the corresponding plaintext is obtained from other ciphertext. If the first part of the plaintext data is fixed, serial number, or timestamp based on the communication protocol standard, etc., the plaintext corresponding to the ciphertext is easy to guess. It is an important requirement in the conversion method.
- the coding rate is not extremely deteriorated, that is, the information amount of the ciphertext compared to the plaintext does not become extremely large.
- indefinite length data for example, digitized telephone voice
- Patent Document 1 discloses a method of concealing plaintext with secret information based on all bits of plaintext.
- an encryption method a system, and a program that have a good coding rate and are suitable for stream ciphers and highly secure against known plaintext attacks.
- the present invention includes a step of generating a random number, a step of selecting one random number sequence based on the random number from a set of random numbers having different lengths that are not correlated with each other, and the one selected random number sequence. Converting the first plaintext based on the first conversion method, connecting the random number and the converted first plaintext to create a second plaintext, and converting the second plaintext to the first.
- a ciphertext creating method including a step of converting by a second conversion method.
- the first aspect of the present invention provides a ciphertext in which the first conversion method is an exclusive OR operation of a random number sequence obtained by repeatedly connecting the selected one random number sequence and the first plaintext.
- the above problem is solved by providing a creation method.
- the present invention also provides a procedure for generating a random number, a procedure for selecting one random number sequence based on the random number from a set of random numbers having different lengths that are not correlated with each other, and the one selected random number
- a procedure for converting a first plaintext based on a sequence by a first conversion method a procedure for concatenating the random number and the converted first plaintext to create a second plaintext; and the second plaintext.
- the first aspect of the present invention provides a ciphertext in which the first conversion method is an exclusive OR operation of a random number sequence obtained by repeatedly connecting the selected one random number sequence and the first plaintext.
- the above problem is solved by providing a creation program.
- the present invention also provides means for generating a random number, means for selecting one random number sequence based on the random number from a set of random numbers having different lengths that are not correlated with each other, and the one selected random number Means for converting the first plaintext based on the sequence by a first conversion method, means for connecting the random number and the converted first plaintext to create a second plaintext, and the second plaintext.
- the first aspect of the present invention provides a ciphertext in which the first conversion method is an exclusive OR operation of a random number sequence obtained by repeatedly connecting the selected one random number sequence and the first plaintext.
- FIG. 1 is a functional configuration diagram of an information system (101) according to an embodiment of the present invention.
- the information system (101) and each function thereof can be realized using a general computer device.
- the computer device may be a virtual computing resource provided by a cloud service or the like.
- the pre-encryption processing function (102) is a function for performing conversion processing prior to the conventional encryption processing function (103). The contents of the processing are shown in FIG. 4 and will be described later.
- the conventional encryption processing function (103) is a function that performs encryption (conversion from plain text to cipher text) by a general encryption method (for example, DES). Since this function is a well-known technique, no further explanation will be given.
- the conventional decryption processing function (104) is a function for performing decryption (conversion from ciphertext to plaintext) by a general encryption method (for example, DES). Since this function is a well-known technique, no further explanation will be given.
- the post-decoding processing function (105) is a function for performing processing subsequent to the conventional decoding processing function (104). The contents of the processing are shown in FIG. 5 and will be described later.
- Plain text (106) is data that becomes an input of an encryption process or an output of a decryption process according to the present invention. It may be stored in a non-volatile storage area such as a hard disk or may be temporary data on the main memory. Moreover, the form directly supplied from the information system outside the information system (101) according to the present invention may also be used.
- the ciphertext (107) is data serving as an output of an encryption process or an input of a decryption process according to the present invention. It may be stored in a non-volatile storage area such as a hard disk or may be temporary data on the main memory.
- the information system (101) according to the present invention may be directly supplied to an external information system.
- the random number matrix (108) is means for storing a random number sequence that is a parameter used in the pre-encryption processing function (102) and the post-decryption processing function (105). It may be stored in a non-volatile storage area or temporary data on the main memory. Moreover, you may supply directly from the system outside the information system (101) which concerns on this invention.
- the contents of the random number sequence matrix (108) are shown in FIG. 2 and will be described later.
- FIG. 2 is an example of a random number matrix (108) according to an embodiment of the present invention.
- a set of 2 ⁇ n (where n is a natural number) kinds of independent random number sequences is specified as a specification.
- the specification may be defined as a public specification that can be obtained by anyone, and may be exchanged in advance between parties that perform communication. By specifying the random number sequence index, a specific random number sequence in the random number sequence matrix can be specified.
- the randomness may be eliminated by paying attention to the period corresponding to the fixed length, so the length of each random number sequence is different, and Desirably disjoint.
- FIG. 3 is a flowchart showing an overall image of the encryption process and the decryption process according to an embodiment of the present invention.
- the data item located on the left side of the rectangle representing each processing step represents the input of that processing step, and the data item located on the right side represents the output of that processing step (the same applies hereinafter).
- the encryption processing according to the present invention is performed as a combination of pre-encryption processing (S301) and generally used encryption processing (S302) (for example, DES).
- S302 generally used encryption processing
- the decoding process according to the present invention is performed as a combination of a commonly used decoding process (S303) (for example, DES) and post-decoding process (S304).
- FIG. 4 is a flowchart showing details of the pre-encryption process (S301) according to the embodiment of the present invention. Hereinafter, each processing step will be described.
- S402 A random number sequence corresponding to the random number sequence index obtained in S401 is obtained from the random number sequence matrix (108) and temporarily stored.
- the camouflage sentence obtained in S403 and the random number sequence index are concatenated to obtain a plaintext (preprocessed plaintext) to be subjected to the conventional encryption process (S302).
- the connection includes a process of connecting a random number index to the head of the camouflage sentence, a process of connecting the random number index to the end of the camouflage sentence, or a process of embedding the random number index at a predetermined position of the camouflage sentence.
- the amount of data in the preprocessed plaintext increases compared to the original plaintext, but the increment is limited only to the bit width of the random number sequence index regardless of the size of the plaintext, and the coding rate is not greatly deteriorated. .
- FIG. 5 is a flowchart showing details of post-decoding processing (S304) according to an embodiment of the present invention. Hereinafter, each processing step will be described.
- the random number sequence index is generated from a unique random number source in the process, and is finally encrypted to ensure confidentiality. It is impossible to guess or enforce which random number sequence index is used.
- the bit width of the random number sequence index is n
- the number of plaintext ciphertext pairs necessary for known plaintext attacks is m
- the bit width of the key used for encryption is L.
- the processing content of one check execution in the exhaustive search is only to decrypt and confirm.
- a successful known plaintext attack means that the key can be identified faster than an exhaustive search. Since the total amount of computation is the amount of computation per execution multiplied by the number of computations, the condition that a known plaintext attack succeeds is the inequality T1 * 2 ⁇ L> T2 * 2 ⁇ (n * m) Represented.
- T1 * 2 ⁇ L> T2 * 2 ⁇ (n * m) is transformed into 2 ⁇ L> 2 ⁇ (n * m) as follows.
- T1 * 2 ⁇ L> T2 * 2 ⁇ (n * m) ⁇ T1 / T2 * 2 ⁇ L> 2 ⁇ (n * m) ⁇ (because 1> T1 / T2)
- 1 * 2 ⁇ L> T1 / T2 * 2 ⁇ L> 2 ⁇ (n * m) ⁇ 2 ⁇ L> 2 ⁇ (n * m)
- L / n> m is transformed into 2 ⁇ L> 2 ⁇ (n * m) as follows.
- the condition that the known plaintext attack is considered to be successful is that the encryption with a key length of 256 bits is less than 32 plaintext encryption This is the case when it can be decrypted with a pair of sentences, when it is possible to perform a known plaintext attack with a cipher with a key length of 56 bits, or when it can be decrypted with less than 7 plaintext ciphertext pairs.
- the number of plaintext ciphertext pairs is considered not to correlate with the amount of processing, so there is no theoretical upper limit, but the present invention places a clear limit on the number of plaintext ciphertext pairs. This is advantageous in that it can be imposed.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
nビットの乱数を平文・初期化ベクトル・暗号鍵・時刻とは無関係に自動的に決定する。これにより、同じ条件下でも乱数は独立して決定され、2^-nの確率でしか偶然の一致はあり得なくなる。このような乱数は、たとえば、物理乱数により実現可能である。決定した乱数を乱数インデックスとして一時的に保存する。
乱数列マトリックス(108)から、S401で求めた乱数列インデックスに対応する乱数列を求め、一時的に保存する。
S402で求めた乱数列を使用して平文を変換し迷彩文を求める。この変換(難読化)アルゴリズムは、その逆変換が容易であること、および、データサイズを増加させないことが望ましい。たとえば、これらの条件を満足する方法として、乱数列を平文のデータ長に合うよう反復した上で、平文との排他的論理和演算を行なうことが望ましい。
S403で得られた迷彩文と乱数列インデックスを連結して、従来型の暗号処理(S302)の対象となる平文(前処理済平文)とする。ここで、連結には、迷彩文の先頭に乱数インデックスを連結する処理、迷彩文の末尾に乱数インデックスを連結する処理、あるいは、迷彩文の所定の位置に乱数インデックスを埋め込む処理を含むものとする。前処理済平文は元々の平文と比較してデータ量が増すが、その増分は平文サイズの大小にかかわらず、乱数列インデックスのビット幅のみに限定され、符号化率を大きく悪化させることはない。
従来型復号処理方法(たとえば、DES)により復号された後処理対象平文を分離し、乱数列インデックスと迷彩文を得る。乱数列インデックスの長さ、および、挿入位置は仕様として定まっているため、この処理の内容は自明である。
乱数列マトリックス(108)において、S501で求めた乱数列インデックスに対応する乱数列を求め一時的に保存する。
S502で求めた乱数列を使用して迷彩文を変換し平文を求める。この変換処理は、S403で行なわれた処理の逆変換である。たとえば、S403で乱数列を必要な回数繰り返して、排他的論理和演算を行なったのであれば、同じ演算を再度行なえばよい。
以下に、本願発明に係る暗号化方式の既知平文攻撃に対する安全性の高さについて説明する。
T1 * 2^L > T2 * 2^(n*m)
→ T1/T2 * 2^L > 2^(n*m)
→ (1 >= T1/T2 なので) 1 * 2^L >= T1/T2 * 2^L > 2^(n*m)
→ 2^L > 2^(n*m)
そしてmの条件を掃き出すと、以下の通り、L/n > m となる。
2^L > 2^(n*m)
→ (L>0, n>0, m>0 なので) Log(2^L) > Log(2^(n*m))
→ L * Log(2) > n * m * Log(2)
→ L > n * m
→ L/n > m
本発明は、従来型の一般的暗号化方式との組み合わせにより容易に実現できる一方で、符号化率が良好であり、平文を複数回走査する必要がないためストリーム暗号においても利用しやすく、加えて、従来型暗号化方式の暗号鍵の長さが仕様により固定されている場合でも本発明に係る方式を追加することで、暗号化方式全体としての強度、とりわけ、既知平文攻撃に対する安全性を強化できる。
Claims (6)
- 乱数を生成するステップと、
互いに相関関係にない長さの異なる乱数列の集合から、前記乱数に基づいてひとつの乱数列を選択するステップと、
前記選択されたひとつの乱数列に基づいて第一の平文を第一の変換方法により変換するステップと、
前記乱数と前記変換後の第一の平文を連結して第二の平文を作成するステップと、
前記第二の平文を第二の変換方法により変換するステップとを
含む暗号文作成方法。 - 前記第一の変換方法は、前記選択されたひとつの乱数列をくり返し連結した乱数列と前記第一の平文との排他的論理和演算である請求項1に記載の暗号文作成方法。
- 乱数を生成する手順と、
互いに相関関係にない長さの異なる乱数列の集合から、前記乱数に基づいてひとつの乱数列を選択する手順と、
前記選択されたひとつの乱数列に基づいて第一の平文を第一の変換方法により変換する手順と、
前記乱数と前記変換後の第一の平文を連結して第二の平文を作成する手順と、
前記第二の平文を第二の変換方法により変換する手順とを
コンピューターに実行させる含む暗号文作成プログラム。 - 前記第一の変換方法は、前記選択されたひとつの乱数列をくり返し連結した乱数列と前記第一の平文との排他的論理和演算である請求項3に記載の暗号文作成プログラム。
- 乱数を生成する手段と、
互いに相関関係にない長さの異なる乱数列の集合から、前記乱数に基づいてひとつの乱数列を選択する手段と、
前記選択されたひとつの乱数列に基づいて第一の平文を第一の変換方法により変換する手段と、
前記乱数と前記変換後の第一の平文を連結して第二の平文を作成する手段と、
前記第二の平文を第二の変換方法により変換する手段とを
含む暗号文作成システム。 - 前記第一の変換方法は、前記選択されたひとつの乱数列をくり返し連結した乱数列と前記第一の平文との排他的論理和演算である請求項5に記載の暗号文作成システム。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2016509164A JP5992651B2 (ja) | 2014-04-28 | 2015-02-26 | 暗号化方法、プログラム、および、システム |
CN201580019435.3A CN106165340B (zh) | 2014-04-28 | 2015-02-26 | 加密方法、程序和系统 |
US15/304,465 US20170041133A1 (en) | 2014-04-28 | 2015-02-26 | Encryption method, program, and system |
EP15786055.2A EP3131230B1 (en) | 2014-04-28 | 2015-02-26 | Encryption method, program, and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2014-092261 | 2014-04-28 | ||
JP2014092261 | 2014-04-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015166701A1 true WO2015166701A1 (ja) | 2015-11-05 |
Family
ID=54358442
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2015/055603 WO2015166701A1 (ja) | 2014-04-28 | 2015-02-26 | 暗号化方法、プログラム、および、システム |
Country Status (5)
Country | Link |
---|---|
US (1) | US20170041133A1 (ja) |
EP (1) | EP3131230B1 (ja) |
JP (1) | JP5992651B2 (ja) |
CN (1) | CN106165340B (ja) |
WO (1) | WO2015166701A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105827408A (zh) * | 2015-12-03 | 2016-08-03 | 中国航天系统工程有限公司 | 一种基于时间戳技术的工业网络安全传输方法 |
EP3193487A1 (en) * | 2016-01-15 | 2017-07-19 | Industry-Academic Cooperation Foundation Dankook University | Encryption/decryption device and encryption/decryption method |
JP2019535041A (ja) * | 2013-05-14 | 2019-12-05 | カラ パートナーズ エルエルシー | コンピュータセキュリティを強化するための技術、可変語長エンコーディング、および可変長デコーディング |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108664803B (zh) * | 2018-04-04 | 2022-03-22 | 中国电子科技集团公司第三十研究所 | 一种基于密码的文档内容细粒度访问控制系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11331619A (ja) * | 1998-05-20 | 1999-11-30 | Oki Data Corp | 通信装置 |
WO2008114829A1 (ja) * | 2007-03-19 | 2008-09-25 | Tokyo Denki University | 暗号装置、復号装置、暗号プログラム、復号プログラム、及び記録媒体 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE322257B (ja) * | 1969-06-11 | 1970-04-06 | Ericsson Telefon Ab L M | |
US5438622A (en) * | 1994-01-21 | 1995-08-01 | Apple Computer, Inc. | Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing an offset in the pseudorandom sequence |
JP3086887B2 (ja) * | 1996-08-08 | 2000-09-11 | 株式会社ローレルインテリジェントシステムズ | 情報伝達方法、情報発信方法、情報再生方法及び通信装置 |
US6307940B1 (en) * | 1997-06-25 | 2001-10-23 | Canon Kabushiki Kaisha | Communication network for encrypting/deciphering communication text while updating encryption key, a communication terminal thereof, and a communication method thereof |
JPH1141245A (ja) * | 1997-07-22 | 1999-02-12 | Fujitsu Ltd | 秘匿通信システム |
JP3864675B2 (ja) * | 2000-03-09 | 2007-01-10 | 株式会社日立製作所 | 共通鍵暗号装置 |
US20020048364A1 (en) * | 2000-08-24 | 2002-04-25 | Vdg, Inc. | Parallel block encryption method and modes for data confidentiality and integrity protection |
FR2814877B1 (fr) * | 2000-10-02 | 2003-01-03 | Mitsubishi Electric Inf Tech | Sequence d'estimation de canal et procede d'estimation d'un canal de transmission qui utilise une telle sequence d'estimation de canal |
DK1376922T3 (da) * | 2001-04-03 | 2014-10-27 | Mitsubishi Electric Corp | Krypteringsindretning |
US20040247116A1 (en) * | 2002-11-20 | 2004-12-09 | Boren Stephen Laurence | Method of generating a stream cipher using multiple keys |
US20060177065A1 (en) * | 2005-02-09 | 2006-08-10 | Wal-Mart Stores, Inc. | System and methods for encrypting data utilizing one-time pad key |
JP4912772B2 (ja) * | 2005-09-22 | 2012-04-11 | 富士通株式会社 | 暗号化方法,暗号復号化方法,暗号化装置,暗号復号化装置,送受信システムおよび通信システム |
WO2009020060A1 (ja) * | 2007-08-06 | 2009-02-12 | Nec Corporation | 共通鍵ブロック暗号化装置、共通鍵ブロック暗号化方法及びプログラム |
US8363834B1 (en) * | 2008-07-22 | 2013-01-29 | Tara Chand Singhal | Systems and methods for complex encryption keys |
US8194858B2 (en) * | 2009-02-19 | 2012-06-05 | Physical Optics Corporation | Chaotic cipher system and method for secure communication |
CN102012993B (zh) * | 2010-11-29 | 2012-07-11 | 北京卓微天成科技咨询有限公司 | 一种数据选择加密解密方法及装置 |
WO2014030706A1 (ja) * | 2012-08-23 | 2014-02-27 | 日本電気株式会社 | 暗号化データベースシステム、クライアント装置およびサーバ、暗号化データ加算方法およびプログラム |
CN103678975B (zh) * | 2013-12-20 | 2017-01-04 | 大连大学 | 基于混沌系统的身份认证仿真系统 |
-
2015
- 2015-02-26 WO PCT/JP2015/055603 patent/WO2015166701A1/ja active Application Filing
- 2015-02-26 JP JP2016509164A patent/JP5992651B2/ja active Active
- 2015-02-26 US US15/304,465 patent/US20170041133A1/en not_active Abandoned
- 2015-02-26 EP EP15786055.2A patent/EP3131230B1/en active Active
- 2015-02-26 CN CN201580019435.3A patent/CN106165340B/zh active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11331619A (ja) * | 1998-05-20 | 1999-11-30 | Oki Data Corp | 通信装置 |
WO2008114829A1 (ja) * | 2007-03-19 | 2008-09-25 | Tokyo Denki University | 暗号装置、復号装置、暗号プログラム、復号プログラム、及び記録媒体 |
Non-Patent Citations (1)
Title |
---|
ANAND DESAI: "New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack", ADVANCES IN CRYPTOLOGY - CRYPTO, vol. 2000, 2000, pages 394 - 412, XP001003411, ISSN: 0302-9743 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2019535041A (ja) * | 2013-05-14 | 2019-12-05 | カラ パートナーズ エルエルシー | コンピュータセキュリティを強化するための技術、可変語長エンコーディング、および可変長デコーディング |
JP7261163B2 (ja) | 2013-05-14 | 2023-04-19 | カラ パートナーズ エルエルシー | コンピュータセキュリティを強化するための技術、可変語長エンコーディング、および可変長デコーディング |
CN105827408A (zh) * | 2015-12-03 | 2016-08-03 | 中国航天系统工程有限公司 | 一种基于时间戳技术的工业网络安全传输方法 |
EP3193487A1 (en) * | 2016-01-15 | 2017-07-19 | Industry-Academic Cooperation Foundation Dankook University | Encryption/decryption device and encryption/decryption method |
Also Published As
Publication number | Publication date |
---|---|
CN106165340A (zh) | 2016-11-23 |
US20170041133A1 (en) | 2017-02-09 |
EP3131230B1 (en) | 2019-12-25 |
JP5992651B2 (ja) | 2016-09-14 |
CN106165340B (zh) | 2020-06-16 |
JPWO2015166701A1 (ja) | 2017-04-20 |
EP3131230A1 (en) | 2017-02-15 |
EP3131230A4 (en) | 2017-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107086915B (zh) | 一种数据传输方法、数据发送端及数据接收端 | |
JP6665204B2 (ja) | データ暗号化装置及び方法、並びにデータ復号化装置及び方法 | |
US8401186B2 (en) | Cloud storage data access method, apparatus and system based on OTP | |
CN105406969B (zh) | 数据加密装置及方法 | |
KR102397579B1 (ko) | 부채널 분석 방지를 위한 화이트박스 암호 방법 및 장치 | |
JP2020503564A (ja) | 曖昧さの増加 | |
EP3178190B1 (en) | Encoder, decoder and method | |
RU2666281C2 (ru) | Электронное устройство блочного шифрования, подходящее для обфускации | |
WO2013150880A1 (ja) | 暗号化装置、復号化装置、暗号化方法、復号化方法、及びプログラム | |
JP5992651B2 (ja) | 暗号化方法、プログラム、および、システム | |
Rajput et al. | An improved cryptographic technique to encrypt text using double encryption | |
CN113098675A (zh) | 基于多项式完全同态的二进制数据加密系统及方法 | |
JP6187624B1 (ja) | 情報処理装置、情報処理方法及びプログラム | |
JP2008035305A (ja) | 暗号化方法及びデータ秘匿方法 | |
Tiwari et al. | Block based text data partition with RC4 encryption for text data security | |
CN117375836A (zh) | 基于rsa加密算法的长文本分段加解密方法及系统 | |
KR20170103321A (ko) | 보안성이 강화된 순서보존 암호화 방법 및 장치 | |
US7539305B2 (en) | Schryption method and device | |
KR101440680B1 (ko) | 중국인 나머지 정리에 기반한 준동형 암복호화 방법 및 이를 이용한 장치 | |
JP6631989B2 (ja) | 暗号化装置、制御方法、及びプログラム | |
Charru et al. | Improved Cryptography Algorithm to Enhanced Data Security | |
KR101553148B1 (ko) | 비트 확장 방식을 이용한 암호화 장치 및 방법 | |
KR102626974B1 (ko) | 화이트박스 암호의 비밀키 보호를 위한 방법 및 시스템 | |
JP4763972B2 (ja) | 暗号化情報伝送方法、コンピュータプログラム及び通信システム | |
JP5293612B2 (ja) | 暗号化装置、復号装置、暗号化方法、復号方法およびプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15786055 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2016509164 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15304465 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2015786055 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2015786055 Country of ref document: EP |