WO2018192399A1 - 具有可调整性的伴随式随机重构密钥的序列加密方法 - Google Patents

具有可调整性的伴随式随机重构密钥的序列加密方法 Download PDF

Info

Publication number
WO2018192399A1
WO2018192399A1 PCT/CN2018/082638 CN2018082638W WO2018192399A1 WO 2018192399 A1 WO2018192399 A1 WO 2018192399A1 CN 2018082638 W CN2018082638 W CN 2018082638W WO 2018192399 A1 WO2018192399 A1 WO 2018192399A1
Authority
WO
WIPO (PCT)
Prior art keywords
random
segment
key
bit
pseudo
Prior art date
Application number
PCT/CN2018/082638
Other languages
English (en)
French (fr)
Inventor
徐智能
Original Assignee
徐智能
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 徐智能 filed Critical 徐智能
Priority to CA3060337A priority Critical patent/CA3060337A1/en
Priority to KR1020197033966A priority patent/KR20200015484A/ko
Priority to EP18788436.6A priority patent/EP3614620A4/en
Priority to JP2020505960A priority patent/JP2020517209A/ja
Priority to SG11201909664P priority patent/SG11201909664PA/en
Publication of WO2018192399A1 publication Critical patent/WO2018192399A1/zh
Priority to US16/654,045 priority patent/US10855458B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption

Definitions

  • the invention is mainly in the field of sequence cryptography in information security cryptography, and is mainly a sequence encryption method with adjustable concomitant random reconstruction key.
  • the encryption process of the sequence cipher is to obtain the ciphertext by using the pseudo-random sequence generated by the sequence cipher generator according to the seed key and the plaintext bit stream by bitwise XOR.
  • the sequence cipher encryption method can encrypt plaintext of any length as long as the period of the generated sequence cipher is large enough.
  • the serial cipher encryption method is faster than the block cipher encryption method.
  • the density of sequence encryption depends on the randomness of the sequence key produced by the sequence cipher generator. When the probability of acquiring the sequence key is small enough, the probability that the password is deciphered is small enough.
  • the object of the present invention is to overcome the deficiencies of the prior art and to provide a sequence encryption method with an adaptive concomitant random reconstruction key.
  • the object of the present invention is accomplished by the following technical solutions.
  • the sequence encryption method with the adjustable companion random reconstruction key is based on a random binary sequence, and the sequence encryption/decryption of the random sequence key is reconstructed along with the encryption process.
  • the method mainly includes the following steps:
  • the seed random sequence B i is derived from a pseudo-random reconstruction of the alternate random sequence B j , or directly from the alternate random sequence B j; wherein, B j contract as part of both the encryption and decryption of the seed random sequence B i B j according to the conventions of the pseudo random starting position agreed reconstruction or taken;
  • the ciphertext is generated by the XOR of the growth, inter-frequency ciphertext or mismatch.
  • the beneficial effects of the present invention are: using random random pseudo-random manipulation of the encryption logic process to realize full chaos and concealment of the key construction process, and blocking the ciphertext parsing path by the implicit agreement of the encryption/decryption.
  • 1 is a schematic diagram of a pseudo random construction seed random sequence with two alternate random sequences in the present invention
  • FIG. 2 is a schematic diagram of a staggered random reconstruction state of a key b s in the present invention
  • FIG. 3 is a schematic diagram of an encryption process of a pseudo-random reconstruction example in the present invention.
  • FIG. 3 b s pseudo-random bits from the reconstructed B, b j b j + L bits to intercept, m s extended length acquired by L s, c s according to the length L s m s exclusive or postponed Generated, E is the engine generated randomly for each encryption, and S is the feature number.
  • a function F whose range covers a random sequence or other determined range, and its independent variable may include a number of random values. Substituting a random value associated with or not related to this random sequence into this function obtains the length (in bits) of the bit segment in the random sequence, the binary start position of the bit segment, and other manipulation information, and thus The bit segment determined by the start position and length and other steps for further reconstruction of the obtained bit segment are reconstructed piece by piece to obtain a new random sequence.
  • the object of the present invention is to generate a seed random sequence by pseudo-random construction using a random number called an engine for an existing random number sequence, and then gradually obtain a random key bit segment from the seed random sequence by pseudo-random reconstruction to implement sequence encryption.
  • the pseudo-random reconstruction process of the key is accompanied by the whole process of encryption, in which each step uses the random number obtained by the pseudo-random reconstruction in the previous step to select the key bit segment and XOR encryption with the step-by-step plaintext segment.
  • Each step key segment is combined into a current encryption key.
  • Each step of random reconstruction may have a feature number involved in manipulating the random sequence of the seed sequence, and the entire reconstruction process presents a chaotic form determined by the randomness of the seed sequence.
  • the random number sequence reconstruction function forms a sequence of functions with the encryption process. This sequence of functions can be adjusted by the secret rules of both the add/ decrypt sides.
  • the instant key sequence obtained by manipulating the random seed sequence by the function sequence exhibits randomness and concealment, and has the effect of approximating one-time chaotic codebook.
  • Another important object of the present invention is based on the transitivity of an exclusive OR operation, in which each XOR is performed by a random number determined by the value of the previous key segment and a multi-frequency XOR of the constructed corresponding plurality of key segments. .
  • This random multi-frequency exclusive OR controlled by pseudo-random reconstruction causes the entire encryption process to exhibit a random nonlinear form of frequency conversion.
  • B ⁇ b i1 + 1 , b i1 + 2 , b i1 + 3 , ..., b i1+L1 ⁇ , ⁇ b i2+1 , b i2+2 , b i2+3 ,..., b i2+L2 ⁇ ,..., where L 1 , L 2 , ... depend on the previous bit of B The value of the segment is constructed.
  • B is an infinite random sequence b 1 , b 2 , b 3 , .
  • This process which is called pseudo-random reconstruction by the present invention, is accompanied by the XOR process of B and plaintext, and realizes the chaos of the B- random sequence element run.
  • B ⁇ b i1,1 , b i1,2 , b i1,3 ,...,b i1,L1 ⁇ , ⁇ b i2,1 ,b i2,2 ,b i2,3 ,...,b i2,L2 ⁇ ,...the alternative bit segments of one or more random sequences
  • B j ⁇ b j i1,1 ,b j i1,2 ,b j i1,3 ,...,b j i1,L1 ⁇ , ⁇ b j i2 ,1 ,b j i2,2 ,b j i2,3 ,...,b j i2,L2 ⁇ ,...Pseudo-random hopping or non-jumping.
  • B random sequence element runs more chaotic and has Concealed.
  • the present invention provides a method for pseudo-random reconstruction of the seed random sequence B in which the random number E is involved, which is implicitly agreed by both the encryption/decryption. This makes the encryption key further chaotic and concealed, while the seed random sequence used for different encryptions based on the same alternate random sequence has random variation.
  • the present invention also provides that the feature number S unique to each encrypted user participates in the above pseudo-random reconstruction. This allows random random variation of seed random sequences of different users based on the same alternate random sequence.
  • the pseudo-random reconstruction method of the present invention is applicable to both the pseudo-random reconstruction process of the seed random sequence B and the pseudo-random reconstruction process of the key B.
  • the pseudo-random reconstruction can be as follows according to the density (1) to (13). Any of the methods:
  • B j ⁇ b j 1 ,b j 2 ,...,b j n ⁇ as an alternate random sequence
  • B i ⁇ b i,1 ,b i,2 ,...,b i,n ⁇ as seeds
  • Random sequence i can be omitted when there is only one seed random sequence
  • B ⁇ b 1 , b 2 ,..., b n ⁇ .
  • the random sequence B 0 (or B) of any source is based on the target random segment or the relevant segment in the previous step ( If the value of the corresponding ciphertext bit segment b 0 ' s-1 (or b' s-1 ), 1 is determined by the positioning function P as the starting target bit segment b 0 s (or b s ) in the source random sequence
  • the start bit p; 2 determines the length l of the step source random bit b 0 s (or b s ) and the target random bit b s (or b s ) by the fixed length function L; 3 is pseudo randomized by 1 and/or 2
  • the starting position and/or length of the random source bit segment is constructed in place of the position and/or length in (1) above, and the target random bit segment is intercepted.
  • Another enhanced pseudo-random reconstruction is to determine the random source segment b j s-1 or b is- as the one of the above (4) or (5) or (6) or (7). 1 or b j,fj s-1 or b fj i,s-1 , one by one , select the source random sequence bit segment one by one to XOR the target bit segment.
  • the swap is performed by the pairing bit determined by the pairing function C according to the random value of the previous key segment or the associated bit segment.
  • the frequency is determined by the value of the previous frequency key segment or the associated bit segment by the delay function A for each frequency.
  • the growth value of the key segment, the source segment increases with this growth value, and the length of the XOR segment is increased by this type.
  • the length of the target segment is determined by the length of the initial segment (the starting position of the next target segment is still stepped by the target segment of the first frequency) and the growth operation portion of the target segment is backfilled to the source sequence. The corresponding location.
  • the result is that its growth bit has undergone several XOR pre-processing before the next XOR.
  • S can be one or more constants, a variable of a function, or a combination thereof.
  • the encryption process of the present invention is implemented as follows:
  • S0.2 Conventional physical feature quantity S (which may be a constant set and/or an element of a variable set, multiple elements, or integration of multiple elements) as a feature weight of the encrypted object participates in P, L, F, J , C, A operation.
  • b J (S0+i)%n denotes one of (1), (2), and (3) of the pseudo-random construction, and %n denotes the continuation from the beginning after the delay to the end of the random sequence.
  • b s Build(b fJ ' (s-1) ) indicates that one of (4), (5), (6), (7), (8), (9), (10), (11) is obtained.
  • the independent variables of P, L, F, and J and S and E J are pseudo-random multi-frequency construction seed random segments.
  • b' s represents the random value (the same below) contained in the bit segment b s .
  • F is a function for calculating the X-sequence XOR frequency
  • P is a function for calculating the start bit of the new bit segment
  • P is a function for calculating the start bit of the B-bit segment of multi-frequency XOR or frequency
  • b f ' s is the random value determined by the frequency b s (the same below)
  • step b fs s-bit segments by computing a unit obtained by the F s P s, L s, F s , J s new location of the determined segment B
  • the pairing function is selected by pairing function C for cf s between the X or X of each step.
  • the growth value is determined by the growth function A for c f s and b f s between the XORs of each step and the subsequent increments of the c f s in the plaintext , selecting the growing key bits in the same pseudo-random method as before, increasing the XOR by frequency
  • c f s represents the source bit segment (8""') after the match of the match before XOR
  • the process of generating the random key is generated by the encryption process in a wrong step, that is, according to the position of the previous step of the target sequence or the value of the random number of the relevant position, the positioning function, the fixed length function, the fixed frequency function, the jump function, and the opposite adjustment
  • the function, and the growth function determine the position, length, next-order XOR frequency of the next key, jump control when each key bit is selected, the offset control of each frequency target bit segment, and the growth control of the inter-frequency bit segment.
  • a pseudo-random reconstruction process is accompanied by encryption.
  • variable-frequency XOR process based on the ordered transferability of the XOR operation presents a nonlinear mixed form of the encryption process.
  • the logic process of the method for source random seed reconstruction can be adjusted.
  • expanding the reconstruction function into a general function can increase the chaos of random element runs.
  • the alternate seed random sequence B 1 , B 2 , ... does not have to be generated in the encryption process (for example, changed according to a secret convention), and thus can be associated with the manipulation functions P, L, F, J, C, A and S are stored in advance as communication secrets between the two parties. And this kind of contract can be changed and easy to maintain.
  • the plaintext can be prefixed with a garbled code to increase the difficulty of cracking.
  • the decryption process is the same as the encryption process, and only (S6) is changed to (S6'):
  • Embodiment 0 implements the simplest companion pseudo-random reconstruction process. Although not practical, the overall structure of the present invention is shown.
  • step size of m s is the same as the step size of b s
  • the decryption process is the same as the encryption process, and only (S6) is changed to (S6'):
  • P(m s ), P( b s ), and P( b f s ) are the start time clear text, the current step key bit, and the start bit of the current frequency key bit.
  • %2048 means to renew from the beginning after not only reaching the last position.
  • Embodiment 1 implements a simple variable length variable frequency and backward pseudo-random reconstruction process.
  • Embodiment 2 implements the encryption process of the previous step key segment random value pseudo-random reconstruction step key.
  • the random sequence B T is defined as longer than B.
  • Embodiment 3 implements a process of scheduling another random sequence to implement a pseudo-random reconstruction key from a random value obtained in the previous step.
  • Embodiment 4 implements a process of controlling pseudo-random reconstruction of a key according to the progress of a ciphertext sequence.
  • c' s-1 represents the value of the previous step ciphertext according to the approximate calculation unit, and the chaos of the key element run length is further improved.
  • c's-1 is the generated item of the corresponding constructor when encrypting
  • c's-1 is the source term of the corresponding constructor when decrypting
  • Embodiment 5 implements the run of the plain text indirect scheduling pseudo-random reconstruction key (note: the calculation unit length is 20 bits).
  • Embodiment 6 implements a process of implementing a pseudo-random reconstruction key from a random value and a plurality of feature values acquired from the previous step.
  • the chaos of positioning and fixed-frequency travel is also further improved.
  • Embodiment 7 implements a process of pseudo-randomly selecting a random sequence of step seed to reconstruct a key from a plurality of seed random sequences.
  • Embodiment 8 implements a process of simultaneously implementing a pseudo-random reconstruction key using a plurality of seed random sequences.
  • the chaos of positioning and fixed-frequency travel is also further improved.
  • the decryption process is the same as the encryption process, and only (S6 9 ) is changed to (S6 9 '):
  • Embodiment 9 implements a process of scheduling multiple seed random sequences directly from the previous step to directly encrypt the plaintext multi-frequency XOR.
  • J 2 ⁇ j 2 1 ,j 2 2 ,...,j 2 L ⁇ , where j 2 1 is the first position of B 2 [ b' s-1 ], which is sequentially extended;
  • J f,1 ⁇ j f,1 1 ,j f,1 2 ,...,j f,1 L ⁇ , where j f,1 1 is the first bit of B 1 [ b' f-1 s ], in turn Prolong
  • J f,2 ⁇ j f,2 1 ,j f,2 2 ,...,j f,2 L ⁇ , where j f,2 1 is the first position of B 2 [ b' f-1 s ], in turn Prolong
  • Embodiment 10 implements a multi-frequency encryption process in which a plurality of key segment bits are directly hopped or not skipped to a plaintext bit segment.
  • Example 11 Decomposition of (S6 9 ) in Example 9:
  • Embodiment 11 implements an encryption process with pseudo-random reconstruction with bit-pairing.
  • a f,s L f-1,s +S%F s
  • step S the ciphertext does not take the extended part, but all the bits of the extended part are backfilled to the corresponding position in the plaintext to participate in the next XOR.
  • the splicing delay is spliced from the ciphertext, and when the ciphertext reaches the end, the delay is stopped.
  • step S the explicit text does not take the extended part, but all the bits of the extended part are backfilled to the corresponding position of the ciphertext to participate in the next XOR.
  • step source bit segment has been processed by the S step part, that is to say, the initial part of the target bit segment of step S+1 is both X-ORed by the S-step key and XORed by the S+1-step key. . Since the steps follow the pseudo-random convention step by step, the process does not change during decryption, so the decryption can still restore the plaintext.
  • Embodiment 12 achieves variation in the length of the segment of each frequency difference. This makes the companion pseudo-random reconstruction method more tend to be the effect of the codebook.
  • Embodiment 13 implements a non-sequential pseudo-random reconstruction process of a seed random sequence.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种基于随机二进制序列,具有可调整性的伴随式随机重构密钥的序列加密方法,本方法的主要特征是:(1)使用已存在的随机序列在每次加密初始动态构造种子随机序列。(2)使用种子随机序列以定长或不定长的位段伪随机构造随机密钥。(3)随机密钥的伪随机构造过程伴随加密过程。(4)利用异或运算的传递性实现密钥对明文的变频非线性异或。(5)通过特征量和其他操控量以及伪随机构造函数的调整实现密钥构造的调整,进而在不增加时间复杂度的前提下实现加密密度的调整。(6)这种伴随式伪随机重构密钥方法中使用的特征量或其他操控量不可能在多项式时间复杂度内被反推。本方法的基本原理是:利用随机序列的随机性伪随机操控加密逻辑过程进而实现密钥构造过程的充分混沌和隐蔽,以加/解密双方隐性约定的密约阻断对密文的解析途径。

Description

具有可调整性的伴随式随机重构密钥的序列加密方法 技术领域
本发明于信息安全密码学中的序列密码学领域,主要是一种具有可调整性的伴随式随机重构密钥的序列加密方法。
背景技术
序列密码的加密过程是用序列密码发生器根据种子密钥产生的伪随机序列与明文比特流逐位异或得到密文。只要产生的序列密码的周期足够大,序列密码加密方法可以加密任何长度的明文。相对于分组密码加密方法,序列密码加密方法速度更快。序列加密的密度依赖于序列密码发生器所产序列密钥的随机度。当获取序列密钥的概率足够小时,密码被破译的概率就足够小。
发明内容
本发明的目的在于克服现有技术存在的不足,而提供一种具有可调整性的伴随式随机重构密钥的序列加密方法。
本发明的目的是通过如下技术方案来完成的。这种具有可调整性的伴随式随机重构密钥的序列加密方法,基于随机二进制序列,伴随加密过程重构随机序列密钥的序列加/解密,其方法主要包括如下步骤:
(1)、通过已存在的随机序列在每次加密初始动态构造种子随机序列B i,种子随机序列B i源自于备用随机序列B j的伪随机重构,或直接取自于备用随机序列B j;其中,B j作为加解密双方的契约的一部分,种子随机序列B i根据约定对B j从约定位置开始伪随机重构或截取;
(2)、使用种子随机序列B i以定长或不定长的位段伪随机构造随机密钥 B;随机密钥 B的生成过程伴随着加/解密过程,通过对种子随机序列B i中各个位的伪随机重构逐步生成;通过加/解密双方的隐秘约定选取每一步异或密钥位段,包括对明文的异或频率、各频率的位段起始位置、位段长度,这种隐秘约定确定了伪随机重构的过程;
(3)、通过定长或不定长的位段对明文分段进行加/解密,每段明文与伪随机重构所获取的若干相应密钥位段进行定频或变频、频间增长或不增长、频间密文对调或不对调的异或产生密文。
本发明的有益效果为:利用随机序列的随机性伪随机操控加密逻辑过程进而实现密钥构造过程的充分混沌和隐蔽,以加/解密双方隐性约定的密约阻断对密文的解析途径。
附图说明
图1为本发明中以两个备用随机序列顺延伪随机构造种子随机序列的示意图;
图2为本发明中密钥 b s 的错步随机重构状态的示意图;
图3为本发明中一个伪随机重构实例的加密过程示意图。
附图标记说明:图3中 b s 由伪随机重构从B中b j位到b j+L位截取,m s按L s长度顺延获取,c s按L s长度对m s顺延异或生成,E是为每次加密随机生成的引擎,S为特征数。
具体实施方式
下面将结合附图对本发明做详细的介绍,可以理解的是,对本领域技术人员来说,对本发明的技术方案及发明构思加以等同替换或改变都应属于本发明所附的权利要求的保护范围。
首先引入一个被本发明称之为伪随机重构的概念:一个函数F其值域覆盖一个随机序列或其他确定的范围,其自变量可以包括若干随机值。以与这个随机序列相关或不相关的随机值代入这个函数获取这一随机序列中的位段的长度(以位为单位)、位段的二进制起始位置及其它操控信息,进而以这样的起始位置和长度所确定的位段以及其他对所获位段进一步重构的步骤逐段重构获得新的随机序列的过程。
本发明的目的基于对已存在随机数序列使用被称为引擎的随机数通过伪随机构造生成种子随机序列,进而逐步通过伪随机重构从种子随机序列中获取随机密钥位段以实现序列加密。密钥的伪随机重构过程伴随加密全程,其中每一步使用前一步伪随机重构所得的随机数选取密钥位段与当步明文位段进行异或加密。各步密钥位段组合为当次加密密钥。每步随机重构可有特征数参与操控种子序列的当步随机位段,整个重构过程呈现由种子序列的随机性确定的混沌形态。随机数序列重构函数随着加密进程形成函数序列。这个函数序列可以由加/解密双方预约的隐秘规则调整。这种由函数序列操控随机种子序列获得的即时密钥序列呈现随机性和隐蔽性,具有近似一次一密乱码本的效应。
本发明的另一重要目的基于异或运算的传递性,每一步异或都由前一步密钥位段的值所确定的随机次数与所构造的相应多个密钥位段实施多频异或。这种由伪随机重构操控的随机多频异或使得整个加密过程呈现变频的随机非线性形态。
上述两条基本原理进一步表述如下:
对有限随机序列进行无限伪随机重构构成无限随机序列。设B如下:b 1,b 2,b 3,…,b n为一有限二进制随机序列,假定b n+1=b 1,b n+2=b 2,…,b 2n+1=b 1,b 2n+2=b 2,…,并且以如下随机数序列L=L 1,L 2,…对B进行重构得到 B={b i1+1,b i1+2,b i1+3,…,b i1+L1},{b i2+1,b i2+2,b i2+3,…,b i2+L2},…,其中,L 1,L 2,…依赖于 B的前一位段之值构造。于是, B为无限随机序列 b 1 , b 2 , b 3 ,…。这种被本发明称之为伪随机重构的过程伴随 B与明文的异或过程,实现 B随机序列元素游程的混沌。当上述 B={b i1,1,b i1,2,b i1,3,…,b i1,L1},{b i2,1,b i2,2,b i2,3,…,b i2,L2},…以一个或多个随机序列的备选位段B j={b j i1,1,b j i1,2,b j i1,3,…,b j i1,L1},{b j i2,1,b j i2,2,b j i2,3,…,b j i2,L2},…伪随机跳跃或不跳跃选取后有序逐一配对异或时, B随机序列元素游程更加混沌并具有隐蔽性。
对于明文某一位段m s={m s1,m s2,m s3,…,m sL},以有限个 b s1 ={b i1,b i2,b i3,…,b iL}, b s2 ={b j1,b j2,b j3,…,b jL},…进行多重异或,
Figure PCTCN2018082638-appb-000001
对其结果同密钥( b s1 , b s2 ,…)的再一次多重异或依然可以还原明文,
Figure PCTCN2018082638-appb-000002
当这种多重异或的频率由前一步密钥位段或相关位段的随机值伪随机确定并且随机分布于加密过程时,对明文的异或过程呈现变频的非线性形态。
为确保密钥的隐蔽性和混沌度,本发明提供由加/解密双方隐形约定的以驱动随机数E参与的种子随机序列B的伪随机重构的方法。这使得加密密钥进一步混沌和隐蔽的同时,基于相同备用随机序列的不同次加密采用的种子随机序列具有随机性变异。本发明还提供各加密用户特有的特征数S参与上述伪随机重构。这使得基于相同备用随机序列的不同用户的种子随机序列具有随机性变异。
本发明的伪随机重构方法既适用于种子随机序列B的伪随机重构过程又适用于密钥 B的伪随机重构过程,伪随机重构可根据密度需要采用如下(1)至(13)中任一方法:
(1)定义B j={b j 1,b j 2,…,b j n}为备用随机序列,B i={b i,1,b i,2,…,b i,n}为种子随机序列(当只有一个种子随 机序列时i可以省略), B={ b 1 , b 2 ,…, b n }。
(2)以约定方式(如通过E和/或S参与的运算)确定起始位b 0 0(或b 0)并对任一源随机序列B 0(或B)按固定长度顺延/倒退截取目标随机序列B(或 B)。
(3)分别以约定方式(如通过E和/或S参与的运算)确定的起始位b j 0(或b i,0)对多于一个的源随机序列B j(或B i)按固定长度顺延/倒退分段有序配对异或获取目标随机序列B(或 B)。
(4)分别以约定方式(如通过E和/或S参与的运算)确定的起始位b j 0(或b i,0)对一个或多于一个的源随机序列B j(或B i)按固定长度顺延/倒退分段逐一配对多频异或获取目标随机序列B(或 B)。
(5)按约定方式确定起始位位段之值b 00(或b’ 0)后,对任一源随机序列B 0(或B)根据前一步目标随机位段或相关位段(如相应密文位段)之值b 0s-1(或b’ s-1),①以定位函数P确定当步目标位段b 0 s(或b s)在源随机序列中的起始位p;②以定长函数L确定当步源随机位段b 0 s(或b s)和目标随机位段b s(或 b s )的长度l;③以①和/或②伪随机构造随机源位段的起始位置和/或长度替代前述(1)中的位置和/或长度,截取目标随机位段。
(6)按约定方式确定起始位位段之值b j0(或b i0)后,对多于一个的源随机序列B j(或B i)根据前一步目标随机位段或相关位段之值b js-1(或b is-1),①以定位函数P分别确定各源随机序列中的起始位b j s(或b i,s);②以定长函数L确定当步各源随机位段l;③以①和/或②伪随机确定各随机源位段的起始位置和/或长度替代前述(2)中的位置和/或长度,逐个有序配对异或获取目标随机位段b s(或 b s )。
(7)按约定方式确定起始位位段之值b j0(或b i0)后,对多于一个的源随机序列B j(或B i)根据前一步目标随机位段或相关位段之值b js-1(或b is-1),①以定位函数P分别确定各源随机序列中的起始位b j s(或b i,s);②以定长函数L确定当步各源随机位段l;③以定频函数F确定频度值f j(或f i);进行下述④或⑤的处理以获取目标随机位段:④对各源随机序列以顺延方式或上述①和/或②的方式替代(1)或(2)中的方式选取源随机位段组b j,1 s,b j,1+1 s,b j,1+2 s,…,b j,1+fj s(或b i 1 s,b i 1+1 s,b i 1+2 s,…,b i 1+fi s)逐个有序配对多频异或后,以其结果作为目标随机位段b s(或 b s );或者,⑤对每一源随机序列逐一以③选取异或频率f j(或f i),然后以顺延方式或上述①和/或②替代(1)或(2)或(3)中的方式选取源随机位段组b j,1 s,b j,1+1 s,b j,1+2 s,…,b j,1+fj s(或b i 1 s,b i 1+1 s,b i 1+2 s,…,b i 1+fi s)逐一配对多频异或(各个b j s(或b i,s)的异或频度不同)后,以其结果作为目标随机位段。
(8)对于(4)、(5)、(6)伪随机重构还存在一种增强混沌度的伪随机重构步骤。即:构造选取当步源随机序列位段的位跳跃函数J(其自变量是前一步密钥位段或相关位段所确定的l个随机值,其值域为l个J(b js-1)或J(b is-1),J(b js-1)或J(b is-1)满足0≦J(b js-1)或0≦J(b is-1)),从P所确定的源随机序列位置p开始依据跳跃函数,跳跃(当J(b js-1)>0)或不跳跃(J(b is-1)=0时)地逐位提取当步密钥位段的各个位,直至达到L所确定的当步目标位段长度l。
(9)另一种加强的伪随机重构是按上述(4)或(5)或(6)或(7)的方式之一确定当步源随机 位段b j s-1或b is-1或b j,fj s-1或b fj i,s-1,逐一逐频选取源随机序列位段对目标位段逐一异或。
(10)对上述伪随机重构(8)可以有进一步加强的伪随机重构操作步:在加密时每频异或之后对目标位段(在解密时每频异或之前对源位段)按前一步密钥位段或相关位段的随机值由配对函数C所确定的配对位实施对换。
(11)对上述伪随机重构(9)还存在另一加强的伪随机重构形式:对各频由延升函数A按前一频密钥位段或相关位段之值确定当频密钥位段的增长值,源位段随此增长值相应增长,以此类推逐频增长异或位段长度。当步运算完成后,仍以初始位段长度确定当步目标位段长度(下一步目标位段的起始位置依然按首频目标位段步进)并将目标位段的增长运算部分回填至源序列的相应位置。其结果是:其增长位在下一步异或之前已进行了若干次异或预处理,这些异或预处理在解密过程中由于其伪随机重构依然由同样密钥位段或相应位段之值确定,其逆运算过程是同构的逆向过程。此加强形式使得伴随式伪随机重构更加接近一次一密乱码本的效应。
(12)对于(4)、(5)、(6)、(7)、(8)、(9)、(10)伪随机重构还存在一种同理不同形式的变通伪随机重构方式。即:将由P、L、F、J、C、A所确定的位段改变为从另一随机序列提取或者从不同的源随机序列中混合提取。以这样的随机位段构成随机密钥的效果依然具有隐蔽和混沌特质。
(13)上述(4)、(5)、(6)、(7)、(8)、(9)、(10)中,P、L、F、J、C、A函数可以增加S作为自变量以实现具有S特征的伪随机重构。S可以是一个或多个常量、函数的变量、或者它们的组合。
(14)目标序列各个位段的获取方法可以以约定方式混合使用上述伪随机重构方式。
本发明的加密过程按如下步骤实施:
(S0.1)预生成一组或多组备用种子随机序列:B 1:b 1 1,b 1 2,b 1 3,…,b 1 n;B 2:b 2 1,b 2 2,b 2 3,…,b 2 n;…。
(S0.2)约定物理特征量S(可以是常量集和/或变量集之一个元素、多个元素、或多个元素的整合)作为加密对象的特征权值参与P、L、F、J、C、A的运算。为每次加密生成(或从已生成集合中随机选择)数量与备用随机序列匹配的驱动引擎随机数E 1,E 2,…,作为伪随机构造的触发元(确定伪随机构造的起始状态)。
(S0.3)伪随机重构种子随机序列B={b 1,b 2,b 3,…,b s,…,b n}(可以是一个或多个,当使用多于一个种子随机序列时可用任意下述方法逐个伪随机构造):
以E定位s 0后,顺延构造  b i=b J (S0+i)%n  i=1,2,3,…,n       (1)
或者
以E定位s 0后,随机构造  b s=Build(b J(s-1))  s=1,2,3,…,n       (1’)
或者
以E定位s 0后,随机多频构造  b s=Build(b fJ(s-1))  s=1,2,3,…,n       (1”)
其中:
b J (S0+i)%n表示伪随机构造的(1)、(2)、(3)之一,%n表示顺延至随机序列末尾后从头续延。
Build(b J(s-1))表示以(4)、(5)、(6)、(7)、(8)、(9)、(10)、(11)之一获取的P、L、F、J的自变量和S、E J共同伪随机构造种子随机位段。
b s=Build(b fJ(s-1))表示以(4)、(5)、(6)、(7)、(8)、(9)、(10)、(11)之一获取的P、L、F、J的自变量和S、E J共同伪随机多频构造种子随机位段。
(S1)计算L s
(S1.1)当明文步进至L s小于或等于剩余明文长度时,
L s=L(S,b’ s-1),                (2)
L为计算新位段长度的函数,对s=1取L(S,b’ s-1)不为0的任意b’ 0(例如b’ (E+S)%n);
b’ s表示位段b s所载之随机值(下同)。
(S1.2)当明文步进至L s大于剩余明文长度时,进行最后位段处理:
L s=剩余明文长度                 (3)
(S2)计算
F s=F(S,b’ s-1),                   (4)
F为计算第s位段异或频率的函数
对s=1同(S1.1);
(S3)计算
P s=P(S,b’ s-1),                    (5)
P为计算新位段起始位的函数
对s=1同(S1.1);
(S4)多频重复异或中B位段步进控制变量
b f s=P(S,b f-1s)               (6)
P为计算多频异或各频的B位段起始位的函数
b f s为当频密钥位段(下同)
b fs为当频b s所确定的随机值(下同)
对s=1并且f=1,同(S1.1);
(S5)伪随机重构得到
(S5.1)
b fs s =b fs s(P s,L s)其中f s=1,2,…,F s;b 1 s(P s,L s)=b s(P s,L s)        (7)
b fs s为由前一步位段计算单位所得F s个由P s、L s、F s、J s确定的B的新位段
或者
(S5.2)
Figure PCTCN2018082638-appb-000003
其中
Figure PCTCN2018082638-appb-000004
表示以P定位后,以J(b is-1)确定的跳跃或不跳跃获取的L s位的拼接位段
(S6)顺延选取m s=m s-1+L s-1,并取m s的步长同 b s 的步长,
(S6.1)做当步异或
Figure PCTCN2018082638-appb-000005
或者
(S6.2)做当步多频异或
Figure PCTCN2018082638-appb-000006
或者
(S6.3)对(8’),在各步异或之间对c f s以配对函数C选取配对位进行对调
Figure PCTCN2018082638-appb-000007
c f s表示位段的匹配位对调后的目标位段(8”)
同时/或者
(S6.4.1)对(8)/(8’),在各步异或之间对c f s和b f s以增长函数A确定增长值并对c f s以明文的随后位增长位段,以与之前相同的伪随机方法选取增长的密钥位,逐频增长异或
(S6.4.2)按L s确定的长度截取当步密文位段(同(8”))
(S6.4.3)将累计增长的异或位段的增长逐位回填到明文的相应位
(S7)步进
S=S+1                  (9)
本发明的解密过程:(8)、(8’)、(8”)改为(8”’)、(8””)、(8””’)
Figure PCTCN2018082638-appb-000008
Figure PCTCN2018082638-appb-000009
Figure PCTCN2018082638-appb-000010
c f s表示异或前的匹配位对调后的源位段(8””’)
注意:(1)当有密文间接参与密钥游程时,例如实施例4、实施例5中,在解密时伪随机重构操控函数的相应自变量需要从目标随机序列改为源随机序列;(2)当采用多频间位配对对调方式时,对异或处理之后的目标配对对调处理前提至异或处理之前的源配对对调处理。
发明特征说明
(1) B源自于随机序列B 1、B 2,…的不同随机位段的伪随机重构,依然是随机序列。由于随机序列各元素间相互无关,对其实施依赖于随机元素的位置、长度、频率变化的重构所得到的序列密钥依然是随机序列。这种依赖于种子随机序列B的目标随机密钥 B具有隐蔽性。
(2)随机密钥的生成过程伴随着加密过程错步生成,即:根据目标序列前一步所在位置或相关位置的随机数的值通过定位函数、定长函数、定频函数、跳跃函数、对调函数、和增长函数确定下一步密钥的位置、 长度、下一步异或频率及各密钥位选取时的跳跃控制、各频目标位段的对调控制、和频间位段的增长控制,这种伪随机重构过程伴随加密全程。
(3)基于异或运算的有序可传递性的变频异或过程呈现加密过程非线性混合的形态。
(4)本方法对源随机种子重构的逻辑过程可以调整。特别,将重构函数扩充成泛函数,可增加随机元素游程的混沌度。
(5)引擎随机数E和特征量S的介入使得每次加密过程和每个加密对象都具有独特性。S的变化将提升本发明的应用空间:
(5.1)在加密过程中,P、L、F、J、C、A允许使用多个S=S 1,S 2,S 3,…,S n参与伪随机重构,而且,各个S i是否参与伪随机重构由前一步位段或相关位段之值操控。
(5.2)当S为一族常量S j时,就支持基于相同备用随机序列B J的若干分别占有序列密钥 B i 的多族明文序列加密。当S为多个函数生成的多族变量时,就支持基于相同备用随机序列B J的以独占序列密钥 B f 实现的明文序列加密体系。
(6)作为应用选择之一,备用种子随机序列B 1,B 2,…不必须在加密过程中生成(例如按隐秘约定变更),因此可以与操控函数P、L、F、J、C、A以及S一起作为加/解密双方的隐秘契约事先存储于通讯双方。并且这种契约可以变更、易于维护。
(7)在实际应用中,明文可以前缀一段乱码以增加破解难度。
(8)各步伪随机重构过程具有相同的运算量,加密全程的时间复杂度为O((P+L+F+J)*n)。
(9)由于P、L、F、J、C、A函数以前一步密钥位段或相关位段的随机值作为自变量计算并随机使用了取模运算使得S不可能在多项式时间复杂度内被反推(任意需要带入的其他操控量同样具有此特性)。
实施例
本发明将通过如下实施例做进一步说明:
实施例0:
(S0.1)选择随机序列长度n为2048;选择1组备用随机种子序列:B 1:b 1 1,b 1 2,b 1 3,…,b 1 n;对任意确定的引擎数E1使用P=(E+S)%2048,得到B 1的起始位置p。从p开始顺延提取B 1并在到达b 1 n后从b 1 0续延,得到即时随机种子序列B={b 1 p,b 1 p1+1,…,b 1 p1+2,b 1 n,b 1 1,…,b 1 p-1}。
(S0.2)选择每步的计算单位长度为8(1byte),则(1)相应随机值最大为255;(2)B长度为256bytes,可以组成256个元素的字符数组B[256]。
(S1)定义L s=8。
(S2)定义F s=1。
(S3)计算,明文位段步进量P(m s)=P(m s-1)+L s-1=P(m s-1)+8,密钥的位段步进量P( b s)=(P( b s-1)+L s-1)%2048=(P( b s-1)+8)%2048。
(S4)多频重复异或中B位段步进量0(因为F s=1)。
(S5) b s =b s(P s,L s,F s)=b s-1+8。
(S6)作当步异或
Figure PCTCN2018082638-appb-000011
(S7)S=S+1。
解密过程与加密过程相同,仅将(S6)改成(S6’):
(S6’)
Figure PCTCN2018082638-appb-000012
实施例0实现了最简单的伴随式伪随机重构流程。尽管实用意义不大,但展示了本发明的整体结构。
实施例1:
(S0.1)选择随机序列长度n为2048;选择2组备用随机种子序列:B 1:b 1 1,b 1 2,b 1 3,…,b 1 n;B 2:b 2 1,b 2 2,b 2 3,…,b 2 n;对任意确定的引擎数E1、E2使用P=(E+S)%2048,得到B 1、B 2的起始位置p 1、p 2;分别从p 1、p 2开始对B 1、B 2顺延配对异或,得到即时随机种子序列B={b 1 p1Λb 2 p2,b 1 (p1+1)%2048Λb 2 (p2+1)%2048,…,b 1 (p1+n)%2048Λb 2 (p2+n)%2048}={b 1,b 2,b 3,…}。
(S0.2)选择每步的计算单位长度为8(1byte),则(1)相应随机值最大为255;(2)B长度为256bytes,可以组成256个元素的字符数组B[256]。
(S1)定义L s
(S1.1)当步进至剩余明文大于等于L s时,L s=B[P s-1%256]%16+1;
(S1.2)当步进至剩余明文短于L s时,强置L s=剩余明文长度。
(S2)定义F s=B[P s-1/8]%2+1。
(S3)明文位段步进P(m s)=P(m s-1)+L s-1,密钥位段步进P( b s)=(P( b s-1)+L s-1)%2048
(S4)多频重复异或中B位段步进P( b f s)=(P( b f-1 s)+L s)%2048
(S5) b s =b s(P s,L s),当F s=1时;或者 b f(2) s =b f(2) s(P s,L s),当F s=2时
(S6)当步异或
Figure PCTCN2018082638-appb-000013
当F s=1时;
或者
Figure PCTCN2018082638-appb-000014
当F s=2时
其中,取m s的步长同 b s 的步长
(S7)S=S+1
解密过程与加密过程相同,仅将(S6)改成(S6’):
(S6’)
Figure PCTCN2018082638-appb-000015
当F s=1时;
或者
Figure PCTCN2018082638-appb-000016
当F s=2时。
P(m s)、P( b s)、P( b f s)分别为当步明文位、当步密钥位、当频密钥位的起始位。
%2048表示当不仅到达末位后从头续延。
实施例1实现了简单的变长变频顺延式伪随机重构过程。
实施例2:
对实施例1作如下变更:
(S0.1 2)选择随机序列长度n为524288;选择2组备用随机种子序列:B 1:b 1 1,b 1 2,b 1 3,…,b 1 n;B 2:b 2 1,b 2 2,b 2 3,…,b 2 n;对任意确定的引擎数E1、E2以P为p s(B i)=(p s-1(B i)*12345+1103515245+E i+S)%524288 计算p 1、p 2,计算种子随机序列B={b 1,b 2,b 3,…}={b 1 p1Λb 2 p2,b 1 (p1+1)%524288Λb 2 (p2+1)%524288,…,b 1 (p1+n)% 524288Λb 2 (p2+n)%524288}。
(S0.2 2)选择每步的计算单位长度为16(2bytes),则(1)相应随机值最大为65535;(2)B长度为65536bytes,可以组成65536个元素的字符数组B[65536]。
(S1.1 2)定义L s=B[P s-1%65536]%68+64,当步进至剩余明文大于等于L s时;
(S1.2 2)当步进至剩余明文小于L s时,强置L s=剩余明文长度(解密中可以不改变L S,而是在计算完成后舍弃冗余明文)
(S2 2)定义F s=(S+B[P s-1%65536])%8+16
(S3 2)将实施例(S3)中的B定位改为
P( b s)=(B[(P( b s-1)+S)%65536]+1103515245)%524288
(S4 2)将实施例(S4)中的B定位改为
P( b f s)=(B[(P( b f-1 s)+S)%65536]+1103515245)%524288,
f=1,2,…,F s;P( b f( 1) s)=P( b s)。
由上述变更:(1)增加了多频异或的异或频度;(2)将密钥B的位段选取方式由顺延方式改成以前一步的值确定位置的伪随机方式,提升了相应位段选取的混沌度;(3)在(S1.1 2)中模数是68,而不是64或32,这使得位段选取的最长长度可能是最短长度的两倍以上。
实施例2实现了以前一步密钥位段随机值伪随机重构当步密钥的加密过程。
实施例3:
对实施例2作如下变更:
(S0.4 3)另行定义随机序列B T等长于B。
(S2 3)定义F s=(S+B[ b’ s-1%65536])%8+16
(S3 3)将实施例(S3 2)中的B定位改为对B T的定位:
P( b T s)=(B[( b’ s-1+S)%65536]+1103515245)%524288
(S4 3)将实施例(S4 2)中的B定位改为
P( b T, f s)=(B[( b’ f-1 s+S)%65536]+1103515245)%524288;
f=1,2,…,F s;P( b T,f( 1) s)=P( b T s);。
由上述变更:从B中获取随机值对B T进行伪随机重构同样使 B具有隐蔽和混沌特质。
实施例3实现了从前一步获取的随机值调度另一个随机序列实现伪随机重构密钥的过程。
实施例4:
对实施例2作如下变更:
(S0.4 4)定义密文C当步所达到的位长度为c s
(S1.1 4)对位段长度进行修改:L s=B[P s-1%65536]%(c s-1/8)+64;
由上述变更:利用已生成密文的进度选取 B的异或位段并未改变 B的隐蔽和混沌特质。
实施例4实现了根据密文序列的进度控制伪随机重构密钥的过程。
实施例5:
对实施例2作如下变更:
(S0.2 5)选择每步的计算单位长度为20(2.5bytes),则相应最大随机值远大于65535,对其取模65536,依然遍布于以byte字符数组B[65536]。
(S7 5)将(S3 2)中的B定位函数由公式i=( bs-1*S)%3对如下3个函数选择:
Figure PCTCN2018082638-appb-000017
P[ 1]( b s)=(B[ b’ s-1/8]+(S*12347))%524288;
P[ 2]( b s)=(B[( b’ s-1+S+1103515245)%65536])%524288;
其中,c’ s-1表示按所约计算单位对前一步密文所取之值,则密钥元素游程的混沌度得以进一步提升。
注意:(1)此例的解密算法要做改动:在加密时c’ s-1是相应构造函数的生成项,在解密时c’ s-1是相应构造函数的源项;(2)并未用密文位段构造密钥位段,而是用其改变密钥构造的游程。
实施例5实现了明文间接调度伪随机重构密钥的游程(注意:计算单位长度是20位)。
实施例6:
对实施例2作如下变更:
(S0.4 6)定义数组S[2]={用户手机号;用户姓名;};
(S0.5 6)定义K=S[ b s-1%2];
(S2 6)定义F s=(S[ b’ s-1%2]+B[P s-1/8])%8+16;
(S3 6)将(S3 2)中的B定位改为
P( b s)=(B[( b’ s-1+(S[ b’ s-1%2]))%65536])%524288;
(S4 6)将(S4 2)中的B定位改为
P( b f s)=(B[( b’ f-1 s+(S[ b’ s-1%2]))%65536])%524288,f=1,2,…,F s
则定位、定频游程的混沌度得以进一步提升。
实施例6实现了从前一步获取的随机值和多个特征值实现伪随机重构密钥的过程。
实施例7:
对实施例2作如下变更:
(S0.1 7)增加一组备用随机种子序列:B 3:b 3 1,b 3 2,b 3 3,…,b 3 n。并用同样方法由B 2、B 3生成另一种子随机序列B 2
(S0.4 7)定义种子序列数组B[2]={B 1,B 2};
(S0.5 7)定义G=B[ b s-1]%2+1;
(S2 7)定义F s=(S+B G[P s-1/8])%8+16;
对实施例6作如下变更:
(S3 7)将(S3 2)中的B定位改为P( b s)=(B G[( b’ s-1+(S[ b’ s-1%2]))%65536])%524288;
(S4 7)将(S4 2)中的B定位改为P( b f s)=(B G[( b’ f-1 s+(S[ b’ f-1 s%2]))%65536])%524288;
则定位、定频游程的混沌度同样得以进一步提升。
实施例7实现了从多个种子随机序列中伪随机选取当步种子随机序列重构密钥的过程。
实施例8:
对实施例2作如下变更:
(S0.1 8)增加一组备用随机种子序列:B 3:b 3 1,b 3 2,b 3 3,…,b 3 n。并用同样方法由B 2、B 3生成另一种子随机序列B 2
(S0.4 8)定义种子序列数组B[2]={B 1,B 2};
(S0.5 8)定义G=B[ b s-1 %2]+1;
(S2 8)定义F s=(K+B G[P s-1/8])%8+16;
(S3 8)将(S3 2)中的B定位改为
Figure PCTCN2018082638-appb-000018
(S4 8)将(S4 2)中的B定位改为
Figure PCTCN2018082638-appb-000019
则定位、定频游程的混沌度同样得以提升。
实施例8实现了同时使用多个种子随机序列实现伪随机重构密钥的过程。
实施例9:
对实施例2作如下变更:
(S0.1 9)增加一组备用随机种子序列:B 3:b 3 1,b 3 2,b 3 3,…,b 3 n。并用同样方法由B 2、B 3生成另一种子随机序列B 2
(S0.4 9)定义种子序列数组B[2]={B 1,B 2};
(S0.5 9)定义G=B[ b’ s-1 %2];
(S2 9)定义F s=(B G[ b’ s-1 /8])%8+8;
(S3 9)将(S3 2)中的B定位改为两个种子的分别定位P( b 1 ,s)=B 1[( b’ s-1 +S)%65536],
                                          P( b 2 ,s)=B 2[( b’ s-1 +S)%65536];
(S4 9)将(S4 2)中的B定位改为两个种子的分别定位P( b f 1, s)=B 1[( b’ f-1 s +S)%65536],
                                          P( b f 2, s)=B 2[( b’ f-1 s +S)%65536];
f=0,1,…,F s
并将加密过程定义为:
(S6 9)当步异或
Figure PCTCN2018082638-appb-000020
则定位、定频游程的混沌度同样得以进一步提升。
解密过程与加密过程相同,仅将(S6 9)改成(S6 9’):
Figure PCTCN2018082638-appb-000021
实施例9实现了从前一步获取的随机值调度多个种子随机序列直接对明文多频异或加密的过程。
实施例10:
对实施例9作如下变更:
(S5 10)实现跳跃或不跳跃密钥伪随机重构
(S5.1 10)定义J 1={j 1 1,j 1 2,…,j 1 L},其中j 1 1为B 1[ b’ s-1 ]的第一位,依次顺延;
J 2={j 2 1,j 2 2,…,j 2 L},其中j 2 1为B 2[ b’ s-1 ]的第一位,依次顺延;
J f,1={j f,1 1,j f,1 2,…,j f,1 L},其中j f,1 1为B 1[ b’ f-1 s ]的第一位,依次顺延;
J f,2={j f,2 1,j f,2 2,…,j f,2 L},其中j f,2 1为B 2[ b’ f-1 s ]的第一位,依次顺延;
f=1,2,…,F s(注意J的自变量域不是B 1[(P (b s-1 )+16)%65536])
(S5.2 10)
按下述公式从B i中分别根据上述J数组元素顺延跳跃或不跳跃选取各位拼接构造密钥位段
Figure PCTCN2018082638-appb-000022
实施例10实现了跳跃或不跳跃选取多个密钥段位直接对明文位段的多频加密过程。
实施例11:对实施例9中(S6 9)进行分解:
(S0.6 11)建立配对函数C f确定对调位为当步起始位之后的L/2+8,L/2-8
(S6.1 11)分解(S6 9)为F s步:
Figure PCTCN2018082638-appb-000023
(S6.2 11)在每一步异或之后对目标位段c fs进行配对对调:
c fL/2+8<=>c fL/2-8
注意:在解密时上述配对对调是在(S6.1 11)的各步异或之前对源位段(密文)实施。
实施例11实现的是带有位配对对调的伪随机重构的加密过程。
实施例12:
(S6.2.0 12)将实施例11中(S6.2 11)在每频中按A计算所得增长度进行一次位长延升
A f,s=L f-1,s+S%F s
(S6.2.1 12)对每一频异或目标从明文中拼接延升位,当明文到达结尾时停止延升(解密时是从密文中拼接延升位)
Figure PCTCN2018082638-appb-000024
(S6.2.2 12)第S步密文不取延生部分,而是将延生部分的所有位回填至明文的相应位,参与下一步异或。
解密过程与加密过程相同,仅将(S6.2 12)进行(S6.2 12’)的变更:
(S6.2.1 12’)对每一频异或目标从密文中拼接延升位,当密文到达结尾时停止延升
(S6.2.2 12’)第S步明文不取延生部分,而是将延生部分的所有位回填至密文的相应位,参与下一步 异或。
注意:当步源位段已经被S步部分处理过,也就是说第S+1步目标位段的起始部分既被S步密钥异或过又被S+1步密钥异或过。由于各步按部就班地遵循伪随机约定,在解密时该过程并未变化,所以解密依然可以还原明文。
实施例12实现了各频异或的位段长度的变异。这使得伴随式伪随机重构方法更加趋于一次一密乱码本的效应。
实施例13:
对实施例2作如下变更:
(S0.1 13)选择随机序列长度n为524288;选择2组备用随机种子序列:B 1:b 1 1,b 1 2,b 1 3,…,b 1 n;B 2:b 2 1,b 2 2,b 2 3,…,b 2 n;对任意确定的引擎数E1、E2以P为p i=((p i-1+1)*12345+1103515245+E+S)%524288计算p 1、p 2
(S0.3 13)定义F j s=(S+B[P j s-1%65536])%8+16
(S0.4 13)定义B j定位函数P(b j s)=B[(b’ j s-1+S)%65536]%524288
(S0.5 13)定义种子随机序列伪随机重构的位段长度L s
(S0.5.1 13)当备用随机序列B i的剩余长度大于等于L s时,L s=B 1[b’ s-1%65536]%16+64;
(S0.5.2 13)当备用随机序列B i的剩余长度短于L s时,强置L s=剩余明文长度。
(S0.6 13) b j s =b j s(P j s,L j s,F j s)
(S0.7 13)当步异或
Figure PCTCN2018082638-appb-000026
(S0.8 13)S=S+1
则获取种子随机序列的混沌度得以提升。
实施例13实现的是一种种子随机序列的非顺延式伪随机重构过程。
上述各实施例中使用的各种操控函数都具有很大的可调整空间,为伴随式伪随机构造方法提供了充分的应用空间。

Claims (10)

  1. 一种具有可调整性的伴随式随机重构密钥的序列加密方法,其特征在于:基于随机二进制序列,伴随加密过程重构随机序列密钥的序列加/解密,其方法主要包括如下步骤:
    (1)、通过已存在的随机序列在每次加密初始动态构造种子随机序列B i,种子随机序列B i源自于备用随机序列B j的伪随机重构,或直接取自于备用随机序列B j;其中,B j作为加解密双方的契约的一部分,种子随机序列B i根据约定对B j从约定位置开始伪随机重构或截取;
    (2)、使用种子随机序列B i以定长或不定长的位段伪随机构造随机密钥 B;随机密钥 B的生成过程伴随着加/解密过程,通过对种子随机序列B i中各个位的伪随机重构逐步生成;通过加/解密双方的隐秘约定选取每一步异或密钥位段,包括对明文的异或频率、各频率的位段起始位置、位段长度,这种隐秘约定确定了伪随机重构的过程;
    (3)、通过定长或不定长的位段对明文分段进行加/解密,每段明文与伪随机重构所获取的若干相应密钥位段进行定频或变频、频间增长或不增长、频间密文对调或不对调的异或产生密文。
  2. 根据权利要求1所述的具有可调整性的伴随式重构随机序列异或方法,其特征在于:所述的隐秘约定由约定的构造函数实现,这种函数采用下述随机值作为自变量:①前一步密钥位段根据伪随机重构隐秘约定所确定的随机值,或者②其他随机序列的伪随机约定位段根据伪随机重构隐秘约定所确定随机值,或者③根据伪随机重构隐秘约定由前一步密文位段之值所确定的随机值。
  3. 根据权利要求1所述的具有可调整性的伴随式重构随机序列异或方法,其特征在于:
    (1)、对明文逐段进行加/解密的过程中明文位段依次顺延:明文位段的长度依赖于密钥位段的长度,密钥位段 b s 的长度l以及在种子随机序列B i中的起始位置p由加/解密双方约定的契约决定;同一明文位段可以由多个密钥位段依次进行多频异或,多频异或的频率f由加解密双方约定的契约决定;
    (2)、确定当步密钥位段 b s 的位置p是按前一步密钥位段 b s-1 的位置顺延或倒退;即:依据前一步位段的位置后移或前移若干位,当密钥 b s 的位置p顺延或倒退到达种子随机序列B的末位或头位后,从头位或末位开始续延或续退;
    (3)、确定当步密钥位段 b s 的长度l是选取前一步密钥位段 b s-1 的长度作为当步位段 b s 的长度;
    (4)、确定当步异或频率f是取频率为正整数,当选取频率为1时对种子随机序列B的伪随机重构过程呈现与明文等距顺延或倒退的形态,当选取频率大于1时对种子随机序列B的伪随机重构过程呈现与明文倍距跳跃顺延或倒退的形态;
    (5)、以上述所得密钥位段 b s 逐步对明文位段进行定频异或加密。
  4. 根据权利要求1或3所述的具有可调整性的伴随式重构随机序列异或方法,其特征在于:通过如下步骤提升加密密度:
    (1)、确定对伪随机重构的当步位段之值的计算单位,以前一步 b s-1 位段的约定起始位置和约定长度来确定计算单位;
    (2)、随机密钥 B当步位段 b s 的起始位置p s由随机密钥 B的前一步所在位段 b s-1 或相关位段的随机数按当次计算单位所取的随机值和特征量S通过定位函数P确定,P是满足其值域覆盖种子随机序列B全程的任意函数,即:P的值域P( b s )满足0<P( b s )≤n,n为B元素的最大位置;
    (3)、随机密钥 B当步位段 b s 的长度l由随机密钥 B的前一步所在位段 b s-1 或相关位段的随机数的值和特征量S通过定长函数L确定,L可以是值域大于0的任意函数,即:L的值域L( b s )满足0<L( b s )≤n,n为B元素的最大位置;
    (4)、随机密钥位段b s对明文位段m s的异或频率f由随机密钥 B的前一步所在段位 b s-1 或相关位段的随机值和特征量S通过定频函数F确定,F是满足其值域大于0的任意函数;
    (5)、通过步骤(2)和/或(3)所选p和/或l替代前述p和/或l,确定种子随机序列B中的密钥位段b s,通过步骤(4)确定当步异或频率f,当f大于1时,以顺延方式在B中选取f个位段,或按步骤(2)的方式在B中随机定位选取f个位段b s,b s2,…,b sf,以上述所选密钥位段对当步明文位段m s进行f次多频有序异或。
  5. 根据权利要求1或3或4所述的具有可调整性的伴随式重构随机序列异或方法,其特征在于:通过如下步骤进一步提升加密密度:
    (1)、以多个种子随机序列B i(i=1,2,3,…,m;m为任意正整数)伪随机构造随机密钥 B,构造方法为:(a)以约定过程根据前一步密钥位段 b s-1 或相关位段之值伪随机选取多个b i,s;(b)以约定过程根据前一步密钥位段 b s-1 或相关位段之值伪随机选取b i,s之一作为当步密钥位段 b s ;或者,(c)对b i,s,(i=1,2,3,…,m)逐个有序配对异或后,用所产生的结果作为当步密钥位段 b s
    (2)、通过上述(1).(b)或者(1).(c)所构密钥位段 b b 及同样方法构造的 b f s 对明文位段m s实施f频有序异或;
    或者
    (3)、通过上述(1).(a)所构各种子位段b i,s直接作为m个密钥位段,并以前述任意P、L、F方法逐一选取 b f i,s ,然后逐个或混合地对明文位段m s实施m*f的多频异或。
  6. 根据权利要求1或3或4或5所述的具有可调整性的伴随式重构随机序列异或方法,其特征在于:通过如下步骤进一步提升加密密度:
    (1)构造选取当步密钥位段的位跳跃函数J;
    (2)从p所确定源随机序列位置开始依据跳跃函数J,在获取 b i,s 和/或 b f i,s 时,跳跃或不跳跃地逐位提取当步或当频各个密钥位段的各位直至达到l长度;
    (3)以上述5.(2)或5.(3)的方式,对明文位段m s实施多频有序异或。
  7. 根据权利要求1或3或4或5或6所述的具有可调整性的伴随式重构随机序列异或方法,其特征在于:在多频异或过程中根据伪随机密约增加对多频异或频间目标位段的位配对对调的步骤:
    (1)构造选取当步目标位段的位配对函数C;
    (2)在以上述5.(2)或5.(3)的方式加密时对各频目标位段按所选配对位实施对调;
    并且
    (3)在以上述5.(2)或5.(3)的逆方式解密时对源位段(密文)按所选配对位实施对调。
  8. 根据权利要求1或3或4或5或6或7所述的具有可调整性的伴随式重构随机序列异或方法,其特征在于:在多频异或过程中根据伪随机密约增加逐频增长异或位段长度的步骤:
    (1)构造当步频间位段长度延升函数A;
    (2)在以上述5.(2)或5.(3)的方式加密时对源位段(明文)和密钥位段按所定增长值逐频延升;
    并且
    (3)在以上述5.(2)或5.(3)的方式解密时对源位段(密文)和密钥位段按所定增长值逐频延升;
    (4)当步目标位段仍然选取非增长的位段长度;
    (5)将计算中位段的累计增长位回填至源随机序列的相应位置。
  9. 根据权利要求1或3或4或5或6所述的具有可调整性的伴随式重构随机序列异或方法,其特征在于:增加备用随机序列、实现对种子随机序列伪随机构造的步骤,以提升种子随机序列B的混沌度:
    (1)、为构建种子随机序列B预生成多于一个备用随机序列B j,使用数量与B j匹配的被称为引擎的即次随机数E j,建立定位函数P 0和特征量S,在以E j和S驱动P j 0确定各个B j的起始位置后,逐位段有序以b j s和b j-1 s异或获取b s,异或过程中当任一B j到达末位后从头开始续延B j位直至达到种子随机序列B所需长度;
    (2)、由b j s-1或b s-1的位段通过P、L、F、J、C、A方法替代(1)的相应伪重构要素生成方法以确定种子随机序列B的对应位段,逐段构建种子随机序列B,被生成的种子随机序列B的长度根据需要变更;
    (3)、对于多种子随机序列B i,重复实施上述(1)、(2)获取不同B i
  10. 根据权利要求4或5或6或7或8或9所述的具有可调整性的伴随式重构随机序列异或方法,其特征在于:参与伪随机重构的特征量S是一个常量或函数变量、多个常量或函数变量或多个常量或函数变量的整合;
    (1)、在加密过程中,P、L、F、J、C、A允许使用多个S=S 1,S 2,S 3,…,S m参与伪随机重构,而且,各个S i是否参与伪随机重构由操控函数K通过上述任一方法伪随机确定,即:随机从m个S i中选取k个参与计算,k≤m;
    (2)、当S为多组伪随机重构的特征量S j时,支持基于共同种子随机序列B i的j个各自占有序列密钥 B j 的j族明文序列加密,当S为多个函数生成的多组变量时,支持基于共同种子随机序列B i(i=1,2,3,…,k)的各自独占序列密钥 B j 实现的明文序列加密体系。
PCT/CN2018/082638 2017-04-17 2018-04-11 具有可调整性的伴随式随机重构密钥的序列加密方法 WO2018192399A1 (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
CA3060337A CA3060337A1 (en) 2017-04-17 2018-04-11 Sequence encryption method accompanying adjustable random reconfiguration of key
KR1020197033966A KR20200015484A (ko) 2017-04-17 2018-04-11 조절 가능한 동반식 랜덤 재구성 키를 갖는 시퀀스 암호화 방법
EP18788436.6A EP3614620A4 (en) 2017-04-17 2018-04-11 SEQUENCE ENCRYPTION PROCESS COMBINED WITH ADJUSTABLE RANDOM RECONFIGURATION OF A KEY
JP2020505960A JP2020517209A (ja) 2017-04-17 2018-04-11 キーを付随式で調整可能にランダムに再構成するシーケンス暗号化方法
SG11201909664P SG11201909664PA (en) 2017-04-17 2018-04-11 Sequence encryption method accompanying adjustable random reconfiguration of key
US16/654,045 US10855458B2 (en) 2017-04-17 2019-10-16 Sequence encryption method accompanying adjustable random reconfiguration of key

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710249427.9A CN107196760B (zh) 2017-04-17 2017-04-17 具有可调整性的伴随式随机重构密钥的序列加密方法
CN201710249427.9 2017-04-17

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/654,045 Continuation US10855458B2 (en) 2017-04-17 2019-10-16 Sequence encryption method accompanying adjustable random reconfiguration of key

Publications (1)

Publication Number Publication Date
WO2018192399A1 true WO2018192399A1 (zh) 2018-10-25

Family

ID=59871763

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/082638 WO2018192399A1 (zh) 2017-04-17 2018-04-11 具有可调整性的伴随式随机重构密钥的序列加密方法

Country Status (8)

Country Link
US (1) US10855458B2 (zh)
EP (1) EP3614620A4 (zh)
JP (1) JP2020517209A (zh)
KR (1) KR20200015484A (zh)
CN (1) CN107196760B (zh)
CA (1) CA3060337A1 (zh)
SG (2) SG11201909664PA (zh)
WO (1) WO2018192399A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2702078C1 (ru) * 2018-11-06 2019-10-03 Михаил Викторович Яковлев Способ защиты командно-измерительной системы космического аппарата (КА) от несанкционированного вмешательства нелегитимным пользователем

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106953875A (zh) * 2017-04-26 2017-07-14 吉林大学珠海学院 基于多密钥流密码的顺序加密方法
CN108616351B (zh) * 2018-03-26 2020-09-18 山东大学 一种全动态加密解密方法及加密解密装置
WO2019231481A1 (en) * 2018-05-29 2019-12-05 Visa International Service Association Privacy-preserving machine learning in the three-server model
CN109255245A (zh) * 2018-08-13 2019-01-22 海南新软软件有限公司 一种本地密钥保护方法、装置及系统
CN113472514A (zh) * 2020-06-29 2021-10-01 徐智能 复重构密钥的序列加密方法
US20210119812A1 (en) * 2020-12-23 2021-04-22 Intel Corporation Time-based multi-dimensional key recreation mechanism using puf technologies
CN113630386B (zh) * 2021-07-15 2023-05-09 金杉 一种加解密方法、装置及其通信系统
CN116032476B (zh) * 2023-03-30 2023-06-02 北京点聚信息技术有限公司 基于序列分解的电子合同内容智能加密方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007092098A2 (en) * 2005-12-21 2007-08-16 Motorola Inc. Data sequence encryption and decryption
CN103117850A (zh) * 2011-11-16 2013-05-22 中国科学院华南植物园 一种基于随机序列数据库的密码系统
CN103560876A (zh) * 2013-11-22 2014-02-05 北京航空航天大学 一种使用基于混沌的随机时钟的加密方法及装置
CN104809407A (zh) * 2015-05-05 2015-07-29 南京信息工程大学 云存储前端数据加解密及校验方法和系统

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5414771A (en) * 1993-07-13 1995-05-09 Mrj, Inc. System and method for the creation of random sequences and for the cryptographic protection of communications
US5541996A (en) * 1994-12-12 1996-07-30 Itt Corporation Apparatus and method for a pseudo-random number generator for high precision numbers
FR2742616B1 (fr) * 1995-12-18 1998-01-09 Cit Alcatel Dispositif de chiffrement et dispositif de dechiffrement d'informations transportees par des cellules a mode de transfert asynchrone
US6430170B1 (en) * 1999-05-27 2002-08-06 Qualcomm Inc. Method and apparatus for generating random numbers from a communication signal
ATE368981T1 (de) * 2000-03-29 2007-08-15 Vadium Technology Inc Einmalige pad-verschlüsselung mit zentralschlüsseldienst und schlüsselfähigen zeichen
US7170997B2 (en) * 2000-12-07 2007-01-30 Cryptico A/S Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data
US6931128B2 (en) * 2001-01-16 2005-08-16 Microsoft Corporation Methods and systems for generating encryption keys using random bit generators
US20090245516A1 (en) * 2008-02-26 2009-10-01 Pasupuleti Sureshbabu Ravikiran Method and system for high entropy encryption using an unpredictable seed based on user regisration time
US20030016823A1 (en) * 2001-07-05 2003-01-23 Shine Chung Method and apparatus of using irrational numbers in random number generators for cryptography
US20040086117A1 (en) * 2002-06-06 2004-05-06 Petersen Mette Vesterager Methods for improving unpredictability of output of pseudo-random number generators
EP1475920A4 (en) * 2002-12-03 2005-03-02 Matsushita Electric Ind Co Ltd KEY SHARING SYSTEM, SHARED KEY CREATING DEVICE, AND SHARED KEY RESTORING DEVICE
DE10352401A1 (de) * 2003-11-10 2005-06-16 Micronas Gmbh Verfahren zur Speicherung von Daten in einem Wahlzugriffspeicher und Verschlüsselungs- und Entschlüsselungsvorrichtung
FR2862394B1 (fr) * 2003-11-18 2006-02-17 Atmel Grenoble Sa Generateur de sequences binaires aleatoires
JP4774509B2 (ja) * 2005-05-13 2011-09-14 国立大学法人お茶の水女子大学 擬似乱数発生システム
US8019802B2 (en) * 2005-08-24 2011-09-13 Qualcomm Incorporated Cryptographically secure pseudo-random number generator
US8145917B2 (en) * 2005-12-30 2012-03-27 Nokia Corporation Security bootstrapping for distributed architecture devices
FR2897451A1 (fr) * 2006-02-13 2007-08-17 France Telecom Dispositif et procede de cryptographie pour generer des nombres pseudo-aletoires
JP2009258141A (ja) * 2006-06-30 2009-11-05 Kiyoto Yui 無限乱数発生装置を用いた無限暗号化・復号装置及び無限暗号化装置
CN100464584C (zh) * 2006-11-21 2009-02-25 北京中星微电子有限公司 实现信号加密的视频监控系统和视频监控方法
JP5102536B2 (ja) * 2007-05-17 2012-12-19 Kddi株式会社 ストリーム暗号の暗号化装置、復号化装置、暗号化方法、復号化方法およびプログラム
EP2423903B1 (en) * 2009-04-24 2014-07-16 Nippon Telegraph And Telephone Corporation Encryption apparatus, deccryption apparatus, encryption method, decryption method, security method, program, and recording medium
CN103004129B (zh) * 2010-07-23 2015-04-08 日本电信电话株式会社 加密装置、解密装置、加密方法、解密方法、程序及记录介质
US20120057704A1 (en) * 2010-09-07 2012-03-08 Futurewei Technologies, Inc. System and Method for Providing Security in a Wireless Communications System
US9465582B1 (en) * 2010-11-18 2016-10-11 The Boeing Company Significant random number generator
US9344278B2 (en) * 2011-10-18 2016-05-17 Broadcom Corporation Secure data transfer using random ordering and random block sizing
US8767954B2 (en) * 2011-12-01 2014-07-01 Colloid, Llc Methods and systems for deriving a cryptographic framework
US20140185808A1 (en) * 2012-12-31 2014-07-03 Cloud Star Corporation Apparatus, systems, and methods for encryption key distribution
US20140270165A1 (en) * 2013-03-15 2014-09-18 Alexandre Andre DURAND Cryptographic system based on reproducible random sequences
DE102013205168A1 (de) * 2013-03-22 2014-09-25 Robert Bosch Gmbh Verfahren zum Erzeugen einer zufälligen Ausgangsbitfolge
DE102013205166A1 (de) * 2013-03-22 2014-09-25 Robert Bosch Gmbh Verfahren zum Erzeugen einer Einwegfunktion
KR101443575B1 (ko) * 2013-04-29 2014-09-23 한국전자통신연구원 이진 난수열을 정수 난수로 변환하는 장치 및 방법
WO2016135726A1 (en) * 2015-02-25 2016-09-01 Secret Double Octopus Ltd. Method and system for authenticating and preserving the integrity of communication, secured by secret sharing
US10348704B2 (en) * 2015-07-30 2019-07-09 Helder Silvestre Paiva Figueira Method for a dynamic perpetual encryption cryptosystem
US11057205B2 (en) * 2017-12-05 2021-07-06 Marc Leo Prince Seed key expansion method and its uses

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007092098A2 (en) * 2005-12-21 2007-08-16 Motorola Inc. Data sequence encryption and decryption
CN103117850A (zh) * 2011-11-16 2013-05-22 中国科学院华南植物园 一种基于随机序列数据库的密码系统
CN103560876A (zh) * 2013-11-22 2014-02-05 北京航空航天大学 一种使用基于混沌的随机时钟的加密方法及装置
CN104809407A (zh) * 2015-05-05 2015-07-29 南京信息工程大学 云存储前端数据加解密及校验方法和系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3614620A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2702078C1 (ru) * 2018-11-06 2019-10-03 Михаил Викторович Яковлев Способ защиты командно-измерительной системы космического аппарата (КА) от несанкционированного вмешательства нелегитимным пользователем

Also Published As

Publication number Publication date
CA3060337A1 (en) 2018-10-25
EP3614620A1 (en) 2020-02-26
SG10202011550VA (en) 2021-01-28
EP3614620A4 (en) 2021-03-24
CN107196760B (zh) 2020-04-14
KR20200015484A (ko) 2020-02-12
CN107196760A (zh) 2017-09-22
US10855458B2 (en) 2020-12-01
SG11201909664PA (en) 2019-11-28
US20200195430A1 (en) 2020-06-18
JP2020517209A (ja) 2020-06-11

Similar Documents

Publication Publication Date Title
WO2018192399A1 (zh) 具有可调整性的伴随式随机重构密钥的序列加密方法
Barakat et al. An introduction to cryptography
Wang et al. HCTR: A variable-input-length enciphering mode
KR101516574B1 (ko) 형태보존 암호화를 위한 가변길이 블록암호 장치 및 방법
US20020048364A1 (en) Parallel block encryption method and modes for data confidentiality and integrity protection
US8509427B2 (en) Hybrid mode cryptographic method and system with message authentication
KR101593169B1 (ko) 페이스텔 구조의 가변길이 블록암호 장치 및 방법
Albrecht et al. Cold boot key recovery by solving polynomial systems with noise
US9331848B1 (en) Differential power analysis resistant encryption and decryption functions
JP2008516296A (ja) 擬群を用いる、暗号法の基本要素、エラーコーディング、及び擬似ランダム数改善方法
JP2001007800A (ja) 暗号化装置および方法
Kuang et al. Quantum safe lightweight cryptography with quantum permutation pad
AlTawy et al. Differential fault analysis of Streebog
WO2019225735A1 (ja) データ処理装置、方法及びコンピュータプログラム
Petrides Cryptanalysis of the public key cryptosystem based on the word problem on the Grigorchuk groups
Minematsu A short universal hash function from bit rotation, and applications to blockcipher modes
Greene et al. ARADI and LLAMA: Low-Latency Cryptography for Memory Encryption
WO2006085283A1 (en) High speed encryption and decryption
Ye et al. Hern & heron: Lightweight aead and hash constructions based on thin sponge (v1)
Yin et al. Fast S-box security mechanism research based on the polymorphic cipher
Siddesh et al. AN EFFICIENT VLSI ARCHITECTURE FOR AES AND its FPGA IMPLEMENTATION
Saeb The stone cipher-192 (sc-192): A metamorphic cipher
Ahmad et al. Comparative study between stream cipher and block cipher using RC4 and Hill Cipher
Hasan et al. Variable Rounds Block Cipher Algorithm Design
Tomassini et al. Nonuniform cellular automata for cryptography

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18788436

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020505960

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 3060337

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20197033966

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2018788436

Country of ref document: EP

Effective date: 20191118