WO2022001885A1 - 复重构密钥的序列加密方法 - Google Patents
复重构密钥的序列加密方法 Download PDFInfo
- Publication number
- WO2022001885A1 WO2022001885A1 PCT/CN2021/102451 CN2021102451W WO2022001885A1 WO 2022001885 A1 WO2022001885 A1 WO 2022001885A1 CN 2021102451 W CN2021102451 W CN 2021102451W WO 2022001885 A1 WO2022001885 A1 WO 2022001885A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bit
- pseudo
- segment
- length
- logic
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 82
- 239000002131 composite material Substances 0.000 title abstract description 16
- 230000004060 metabolic process Effects 0.000 claims abstract description 135
- 238000011069 regeneration method Methods 0.000 claims abstract description 98
- 230000008929 regeneration Effects 0.000 claims abstract description 97
- 230000000739 chaotic effect Effects 0.000 claims abstract description 87
- 230000002503 metabolic effect Effects 0.000 claims abstract description 61
- 230000008569 process Effects 0.000 claims abstract description 44
- 238000004364 calculation method Methods 0.000 claims description 137
- 238000010276 construction Methods 0.000 claims description 111
- 238000000605 extraction Methods 0.000 claims description 54
- 230000008707 rearrangement Effects 0.000 claims description 42
- 239000000284 extract Substances 0.000 claims description 39
- 230000007704 transition Effects 0.000 claims description 31
- 238000004804 winding Methods 0.000 claims description 26
- 239000002207 metabolite Substances 0.000 claims description 25
- 230000000750 progressive effect Effects 0.000 claims description 25
- 238000006243 chemical reaction Methods 0.000 claims description 19
- 230000010354 integration Effects 0.000 claims description 15
- 230000011218 segmentation Effects 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 10
- 230000003698 anagen phase Effects 0.000 claims description 9
- 230000002441 reversible effect Effects 0.000 claims description 7
- 230000000737 periodic effect Effects 0.000 claims description 6
- 239000000872 buffer Substances 0.000 claims description 3
- 230000008094 contradictory effect Effects 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 230000001172 regenerating effect Effects 0.000 claims description 2
- 230000029087 digestion Effects 0.000 claims 1
- 230000008676 import Effects 0.000 claims 1
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 230000006872 improvement Effects 0.000 abstract description 2
- 238000009472 formulation Methods 0.000 description 24
- 230000000694 effects Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 11
- 230000003111 delayed effect Effects 0.000 description 9
- 230000008859 change Effects 0.000 description 8
- 206010052428 Wound Diseases 0.000 description 5
- 208000027418 Wounds and injury Diseases 0.000 description 5
- 238000009826 distribution Methods 0.000 description 5
- 230000012010 growth Effects 0.000 description 5
- 238000012805 post-processing Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000000295 complement effect Effects 0.000 description 3
- 150000001875 compounds Chemical class 0.000 description 3
- 238000006073 displacement reaction Methods 0.000 description 3
- 230000008030 elimination Effects 0.000 description 3
- 238000003379 elimination reaction Methods 0.000 description 3
- 238000007781 pre-processing Methods 0.000 description 3
- 238000004886 process control Methods 0.000 description 3
- 101000888552 Xenopus laevis CLIP-associating protein 1-B Proteins 0.000 description 2
- YTAHJIFKAKIKAV-XNMGPUDCSA-N [(1R)-3-morpholin-4-yl-1-phenylpropyl] N-[(3S)-2-oxo-5-phenyl-1,3-dihydro-1,4-benzodiazepin-3-yl]carbamate Chemical compound O=C1[C@H](N=C(C2=C(N1)C=CC=C2)C1=CC=CC=C1)NC(O[C@H](CCN1CCOCC1)C1=CC=CC=C1)=O YTAHJIFKAKIKAV-XNMGPUDCSA-N 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 125000004122 cyclic group Chemical group 0.000 description 2
- 238000009792 diffusion process Methods 0.000 description 2
- 238000009923 sugaring Methods 0.000 description 2
- 238000009827 uniform distribution Methods 0.000 description 2
- 101100247669 Quaranfil virus (isolate QrfV/Tick/Afghanistan/EG_T_377/1968) PB1 gene Proteins 0.000 description 1
- 101150025928 Segment-1 gene Proteins 0.000 description 1
- 101100242902 Thogoto virus (isolate SiAr 126) Segment 1 gene Proteins 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- FFBHFFJDDLITSX-UHFFFAOYSA-N benzyl N-[2-hydroxy-4-(3-oxomorpholin-4-yl)phenyl]carbamate Chemical compound OC1=C(NC(=O)OCC2=CC=CC=C2)C=CC(=C1)N1CCOCC1=O FFBHFFJDDLITSX-UHFFFAOYSA-N 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000002508 compound effect Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000005284 excitation Effects 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 238000011423 initialization method Methods 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 230000037323 metabolic rate Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000009828 non-uniform distribution Methods 0.000 description 1
- 230000006798 recombination Effects 0.000 description 1
- 238000005215 recombination Methods 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 208000011580 syndromic disease Diseases 0.000 description 1
- 230000002195 synergetic effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Definitions
- the invention relates to the field of information security cryptography, and relates to a sequence encryption method for complex and reconstructed keys.
- Cipheral Patent Application No.: 201710249427.9 discloses a sequence encryption method based on a random binary sequence with an adjustable concomitant random reconstruction key.
- the main features of the method are: (1) Dynamically construct a seed using an existing random sequence random sequence. (2) Use the seed random sequence to pseudo-randomly construct a random key with a fixed-length or variable-length bit segment. (3) The pseudo-random construction process of the random key accompanies the encryption process. (4) Using the transitivity of the XOR operation to realize the frequency conversion nonlinear XOR of the plaintext of the key pair. (5) The adjustment of the key structure is realized by the adjustment of the feature quantity and other manipulation quantities and the pseudo-random construction function, and then the encryption density is adjusted without increasing the time complexity.
- the invention discloses a method for implementing a chaotic computing structure by using a key and a structural configuration quantity to configure a structural manipulation quantity, and then implementing the chaotic bit-segment stream sequence encryption with its scheduling matching compound logic.
- the purpose of the present invention is achieved through the following concept: constructing a chaotic computing structure based on composite logic, and encrypting plaintext by round-by-round (or segment-by-segment) bits of indefinite length determined by pseudo-random.
- the key bit segment construction source (or construction source) and the key bit segment manipulation source (or manipulation source) are pseudo-randomly reconstructed segment by segment according to the configuration of the computing structure, and the control source is pseudo-randomly manipulated using the control source.
- the key bit segment of the regenerated key is reconstructed bit by bit round by round. Further, the regenerated key bit segment sequence generated segment by segment is integrated to implement an infinite non-circulating bit segment stream sequence encryption.
- the key to achieving the goal of the concept is: scheduling bit fetching logic, bit metabolism logic, bit reconstruction logic (including pseudo-random bit bit rearrangement logic and pseudo-random bit bit conversion logic, see the description of several points) complex reconstruction 'pseudo-random Extract the unmetabolized structural source bit by dislocation or extract the regenerated key bit segment sequence of the metabolized structural source bit' by repositioning, and then: (1) Use the chaotic computing structure to resolve the regeneration key bit generated from the finite set The periodic rate of the segment sequence, (2) the staggered superposition of more than one regenerated key bit segment sequence to realize the intertwining between the regenerated key bit segment sequences and the embedded pseudo-random bit bit entanglement.
- Technical solutions include:
- the chaotic computing structure is constructed by the key through the structure configuration, which supports the bit-by-bit segment sequence encryption that pseudo-randomly determines the computing parameters of each segment.
- the initial value of the dynamic driving vector, the maximum/minimum value of the length of the bit segment, and the selection pool (or the selection pool) of the key bit segment are determined pseudo-randomly according to the structure configuration quantity and the key secretly agreed by the encryption/decryption parties.
- the pseudo-random update round by round selects the construction and manipulation sources in the pool, the length of the encrypted bit segment, etc., to construct the chaotic regeneration key Bit segment sequence, and further amplify the chaotic effect through the power-level superposition of the logical structure of the wrong segment, and integrate the infinite non-cyclic bit-segment stream encryption based on the bit-segment sequence of the regeneration key (bit-segment stream encryption).
- the beneficial effects of the present invention are: in order to adapt to the breakthrough improvement of computing power, a secure encryption method with high efficiency, high density and broad application space is provided.
- the present invention uses a concept called chaotic computing structure in this specification: using pseudo-randomly varied computing parameters in the encryption process to cause chaos in the encrypted computing trajectory, forcing the attacker to face the chaotic computing form.
- the uncertainty of the chaotic computing structure driven by the key provides a broad space for logical integration for bit-segment stream sequence encryption.
- the pseudo-random change of the chaotic trajectory of encryption/decryption based on logical integration is controllable by both encryption and decryption, but the attacker faces the chaotic trajectory shape.
- the chaotic computing form generated by this chaotic computing structure of the present invention includes the following aspects: pseudo-random variation of structural manipulation quantities generated by using different keys, pseudo-random variation of computational parameters regenerated segment by segment from the structural manipulation quantities in the encryption process, and Encryption logic unit integration form (input/output of bit fetching logic, bit metabolizing logic and bit reconstruction logic and their matching effects) in the encryption process driven by calculation parameters, and the construction form (length and structure rule) of the regenerated key bit segment ), the pseudo-random change of the integrated form of the regenerated key bit segment (staggered segment stacking and embedded pseudo-random bit bit winding).
- the invention uses the selection pool as the carrier of the construction source and the manipulation source, and the content of the selection pool is replaced segment by segment with the encryption process.
- this specification calls it the key bit segment work pool (or work pool).
- the working pool expands segment by segment with the reconstruction of the regenerated key bit segment until the selection pool is filled.
- This specification calls this phase the growth phase of the working pool. After the growth period, the working pool reaches the mature period, and the working pool is still replaced with the reconstruction of the regenerated key bit segment during the mature period.
- the growth in the growth phase of the working pool and the replacement in the mature stage are collectively referred to as the metabolism (or metabolism) of the working pool (or the selection pool).
- the present invention adds a pseudo-plaintext random string (or called pseudo-plaintext) unrelated to the content of the plaintext before the plaintext.
- Pseudo-plaintext has the following characteristics: (1) Since the random string is not identifiable, it is impossible to distinguish whether the attack on the pseudo-plaintext is successful or not. During the growth stage of the working pool, the pseudo-plaintext is embedded into the working pool piece by piece, and after the working pool reaches the mature stage, the pseudo-plaintext has the equivalent effect of the key. (2) The pseudo-plaintext is not a key, but a random string independently constructed by the encryption party to expand the working pool during the growth period, and is regarded as a fee code after decryption.
- Pseudo-plaintext has the function of further chaotic computing process in the encryption process. Different pseudo-plaintexts lead to differences in the construction source and manipulation source when encrypting the formal plaintext, which in turn leads to differences in the bit sequence of the regeneration key.
- 'dislocation extraction' refers to the bits with different extraction positions in different times
- 'relocation extraction' is Refers to the bit with the same position extracted from different times.
- Bit fetching logic and bit metabolizing logic are important logical units to realize 'pseudo-random dislocation to extract unmetabolized structural source bits or repositioning to extract metabolized structural source bits'. Their integrated effect is integral to the infinite non-circulating system of the present invention.
- the composite logic structure of the present invention needs to contain more than one kind of bit fetching logic and bit metabolism logic. Different bit-taking logics and bit-metabolizing logics can be integrated into calculation models of different combinations, and the mis-segment stacking logic structure formed by using different bit-taking logics and bit-metabolizing logics in conjunction can improve the security of the present invention exponentially.
- the bit fetching logic presented in this specification includes the key bit segment progressive bit fetching logic (or called progressive bit fetching logic), the key bit segment progressive chain bit fetching logic (or called progressive chain bit fetching logic), The key bit segment bit-jump bit-taking logic (or bit-jump bit-taking logic), and the key bit-segment sequential extraction bit-extracting logic (or called the sequential bit-extracting logic), the bit metabolism logic shown in this specification includes the key bit The segment selection pool has a deferred metabolization logic (or referred to as deferred metabolization logic) and the key bit segment selection pool is extracted bit metabolite logic (or referred to as extracted bit metabolite logic).
- the composite logic structure of the present invention can also accommodate other bit fetching logic and bit metabolism logic.
- the present invention allows pseudo-random bit rearrangement to generate regeneration key bits after the bits string is extracted. segment, which is called pseudo-random bit rearrangement in this specification
- the present invention also needs to perform (1) pseudo-random bit resetting on the original metabolizing source pseudo-random string (that is, the output pseudo-random string output by the bit-taking logic before generating the regeneration key bit segment, the same below) before the metabolism of the working pool. row, at the same time (2) invert the bit value bit by bit (0 to 1 or 1 to 0, or interchangeable), (3) add sugar.
- This specification will rearrange the pseudo-random bits of the original metabolic source pseudo-random string, Swap and sugar are collectively called pseudo-random bit conversion (See the relationship between bit fetching logic and bit metabolism logic for details).
- the present invention uses a dynamic drive vector throughout the entire computational process.
- the dynamic driving vector alternates round by round (or metabolism).
- the initial value of the dynamic driving vector used in this specification is pseudo-randomly generated by the key, and it is still feasible to change this initial value to the initial value secretly agreed upon by the encryption/decryption parties instead of the key generated. This does not involve the structure of the encryption operation, and is not further explained in this specification.
- this specification divides the description of the sequence encryption method for complex and reconstructed keys into three logic components for description: (1) a single complex and reconstructed logical structure, (2) ) Integration of bit fetching logic and bit metabolism logic, (3) staggered and superimposed logic structure.
- the core of the present invention (A) Constructing a chaotic computing structure, metabolizing the working pool segment by segment in the encryption process, and then extracting the control source and construction source carried by the working pool segment by segment to control the bit in the control source. The bits in the source are constructed, and the key bit segment is regenerated by pseudo-random complex reconstruction. (B) Based on the chaotic computing structure, integrate the bit fetching logic and the bit metabolism logic to construct a regeneration key bit of 'pseudo-random dislocation to extract unmetabolized structural source bits or repositioning to extract metabolized structural source bits' The segment is infinite without looping the build logic. (C) Based on the chaotic calculation structure, the staggered-segment stacking encryption is realized for more than one different regeneration key bit sequence.
- the chaotic computing structure extends the effect of 'pseudo-random dislocation to extract unmetabolized tectonic source bits or relocation to extract metabolized tectonic source bits'.
- the expansion effect of chaotic computing structure can be clearly seen only on the basis of the basic operating principle of bit extraction that has been metabolized to construct the source bit. Therefore, this specification inserts a description of the expansion effect of the chaotic computing structure after explaining the integration of the bit fetching logic and the bit metabolism logic.
- this specification selects a non-superimposed & single metabolic model configured by progressive bit logic/delayed metabolite logic as Example 1, progressive chain bit logic/delayed metabolite logic and bit hopping logic
- the double-superposition & double-metabolism-staggered superposition model of the bit logic/extracted bit metabolism logic configuration is taken as Example 2.
- Other combination models are not excluded.
- Some logic units (or logic steps) in the present invention can be omitted or not omitted, and the omission or non-omission is selected according to different logic combinations (for example, pseudo-random bit rearrangement) It can be selected according to different situations), and the illustrations in this specification will not be omitted except for specific situations. Because this logical unit is still part of the logical structure, showing it is helpful to see the logical association.
- pos_chain(j,k) 0,1,2, ... L max -L min
- (2) is used for the set composed of each position chain
- (3) is used for the position element set.
- pos_chain(j) specifically refers to a certain position chain demarcated by j
- pos_chain(j, k) refers specifically to a certain position element demarcated by j and k.
- L max -L min chain number of positions but rather refers to the position of chain concentration ls i -L min locations chain pos_chain(ls i -L min ) is the position chain pos_chain(ls i -L min ) of the r-th metabolized in 2s-1 times of repeated metabolization (see notes to 4.5.3.2 and 4.5.4.4 in the staggered stacking logic structure ).
- each embodiment adopts a new catalogue label according to the subject, wherein, except for the catalogue label indicating the theme prefix (such as: 'the encryption/decryption calculation formula and calculation unit 7 of the embodiment 1'), the descriptions of other embodiments in the text.
- the directory labels of all refer to the directory labels of the current theme (eg, 'repeat steps 11 to 19...' in decryption 20 in the encryption/decryption process control of embodiment 2 refers to decryption 11 to 19 of embodiment 2).
- FIG. 1 is a schematic diagram of the principle of a single complex reconstruction logic structure.
- Fig. 2 is a schematic diagram of the supporting working principle of the progressive bit-lifting logic and the deferred bit-lifting metabolism logic.
- FIG. 3 is a schematic diagram of the matching working principle of the progressive chain bit-taking logic and the extracted bit-metabolizing logic.
- FIG. 4 is a schematic diagram of the matching working principle of the bit-hopping bit-fetching logic and the extracted bit-metabolizing logic.
- FIG. 5 is a schematic diagram of the metabolic effect of delayed elevation.
- Figure 6 is a schematic diagram of the metabolic effect of the extracted site.
- FIG. 7 is a schematic diagram showing the principle of a simple staggered and superimposed logic structure.
- FIG. 8 is a schematic diagram of the logical structure of the staggered-segment stacking with embedded pseudo-random bit entanglement.
- Fig. 8' is a schematic diagram of the calculation process of the staggered-segment stacking logic embedded in pseudo-random bit wrapping.
- FIG. 9 is a schematic diagram of a logical structure of a staggered segment stacking with embedded pseudo-random bit entanglement in a different embedding position from that in FIG. 8 .
- the composite logic structure in the present invention is the basis for realizing the reconstructed regenerated key bit segment sequence and its integration.
- this specification divides the composite logic structure into three logical components (single complex reconstruction logic structure, integration of bit fetching logic and bit metabolism logic, and staggered and superimposed logic structure) for description. . Since the efficiency of the chaotic computing structure to eliminate the periodic rate of the regenerated key bit sequence is based on the integration of the bit fetching logic and the bit metabolism logic, the chaotic computing structure is inserted after the integration of the bit fetching logic and the bit metabolism logic is explained. The expansion of the effect of random dislocation extraction of unmetabolized structural source bits or re-extraction of metabolized structural source bits.
- the staggered superposition logic structure is the compound effect of the chaotic computing structure of the present invention, and achieves the goal of the present invention.
- a single complex reconstruction logic structure realizes the process of reconstructing and regenerating the key bit segment sequence by pseudo-random scheduling of the key: in the preprocessing at the beginning of encryption/decryption, the present invention uses the combination of the structure configuration amount secretly agreed by the encryption/decryption parties
- the key configures the structure control amount, supports the pseudo-random reconstruction of the calculation parameters segment by segment from the structure control amount in the encryption/decryption process, and implements the control of each logic unit.
- the chaotic computing structure realized based on this manipulation cooperates with the bit fetching logic and the bit metabolism logic to jointly support the pseudo-random dislocation to extract the unmetabolized key bit segment to construct the source bit or re-extract the existing bit.
- the metabolized key bit segment constructs the source bit' operation.
- Figure 1 shows the encryption process. Since the decryption process only has non-structural differences from the encryption process in (1) preprocessing and post-processing, and (2) there are non-structural differences in the metabolic sources during the growth phase of the working pool, the decryption process will not be described in detail, but only in the Explain when necessary.
- Figure 1 Represents a computing unit identified by Pnnn, rvnnn represents the output of a Pnnn, It specifically indicates bit fetch logic or bit metabolism logic, s001 indicates encrypted object, Indicates the structural manipulation amount (such as rV002) and manipulation source (such as key) of the referred computing unit, represents the connection relationship between computing units, Specifically, a pseudo-random bit rearrangement, Specifically refers to a pseudo-random bit conversion, Refers to pseudo-random bit conversion from the original metabolic source pseudo-random string
- 1.3 Pseudo-randomly configure the structure control amount by encrypting/decrypting the structure configuration amount and key secretly agreed by both parties.
- the maximum length of bit segment (or L max ) marked as rV001 and the minimum length of bit segment (Min length of bit segment, or L min ) P002 marked as rV002
- the length of the selection pool (Source pool, or Spool) and the initial length of the work pool (Source work pool, or Spool work ) P003 marked as the initial value of the dynamic drive vector (vector 0 ) P004 of rV003, marked as The End-Of-Plaintext (or EOP) P005 of rV004, and the initial position chain set pos_chain, etc.
- a pseudo-plaintext P006 (pseudo plaintext, or pM) marked as rV005 is generated proportionally.
- the bit logic m001 determines the initial position of the construction source and the manipulation source in the working pool, determines the initial metabolism target area in the selection pool according to the selected bit metabolism logic m002, and reconstructs other calculation parameters.
- a pseudo-plaintext bit segment pM i with a length equal to ls i is sequentially appended to the tail of the working pool or inserted into the working pool bit by bit pseudo-randomly until the working pool reaches the maturity stage.
- the decrypted pseudo-plaintext bit segment pM i with length equal to ls i is appended to the tail of the working pool or inserted into the working pool bit by bit pseudo-randomly until the working pool reaches the maturity stage.
- 1.5.5.2.1 Perform pseudo-random bit conversion on the original metabolic source pseudo-random string (the output of m001 in Figure 1) with an equal-length position chain pos_chain (ls i -L min ) (The pseudo-random rearrangement must be different from 1.5.3. For example: metabolize the position chain pos_chain(ls i -L min ) before the pseudo-random bit rearrangement) to generate a pseudo-random string of metabolites.
- 1.5.5.2.2 Use the pseudo-random string of the metabolic source obtained in 1.5.5.2.1 and the bit metabolism logic m002 to metabolize the work pool Spool work .
- bit fetching logic and bit metabolism logic includes the correlation control between bit fetching logic and bit metabolism logic, and the bit reconstruction logic supporting this correlation control (including pseudo-random bit rearrangement logic and pseudo-random bit conversion). logic), the metabolism and initialization of the position chain pos_chain, the metabolism of the dynamic driving vector vector i .
- Figure 2 In order to express the correlation between the bit fetching logic and the bit metabolism logic, Figure 2, Figure 3, and Figure 4 all show the two alternately.
- the bit fetching logic and bit metabolism logic are regulated by the chaotic computing structure.
- the chaotic computing structure, bit fetching logic and bit metabolism logic jointly support the infinite non-cyclic operation of "pseudo-random dislocation to extract unmetabolized structural source bits or repositioning to extract metabolized structural source bits".
- FIG. 2 shows the progressive bit logic of the i-th regenerated key bit segment (the first row) and the i+1-th regenerated key bit segment (the third row).
- the starting byte C of the construction source of the i+1-th regenerated key bit segment is extended by one byte from the starting byte C of the construction source of the i-th regenerated key bit segment (extended to the end of the working pool and then continued from the beginning) .
- the difference between the progressive chain bit logic and the progressive bit logic is that the order of the sequentially arranged byte segments in the construction source is changed to the order arranged according to the position elements in the position chain.
- FIG. 2 shows the progressive chain bit logic of the i-th regenerated key bit segment (the first row) and the i+1-th regenerated key bit segment (the third row).
- the chain fetch logic interleaves the extracted bits of the metabolite logic for round i (second row) and round i+1 (fourth row) of implementation.
- the starting byte C of the construction source of the i+1-th regenerated key bit segment is extended by one byte from the starting byte C of the construction source of the i-th regenerated key bit segment (extended to the end of the working pool and then continued from the beginning) .
- FIG. 4 shows the bit-hopping logic diagram of the i-th regenerated key bit segment (the first row) and the i+1-th regenerated key bit segment (the second row).
- the bit-fetch logic interleaves the i-th round (first row) and the i+1-th round (second row) of the extracted bit metabolism logic of the implementation.
- the construction source pickarea i consists of the bit string from the construction source start bit pickstart i,0 to the tail of the selection pool and the bit string from the selection pool head to the construction source start bit pickstart i, The bits strings before 0 are spliced together.
- the construction source start bit pickstart i,0 of each round is determined pseudo-randomly by the dynamic driving vector vector i (for example, the value expressed by the dynamic driving vector vector i is modulo the length of the work pool (Spool work )).
- the feature of the deferred bit extraction logic is that there are no unextracted bits in the rotation period of the construction source (that is, the repetition period when the construction source progresses by byte round by round in the working pool). Therefore, the key bit segment is regenerated. Sequences have higher usage of the worker pool.
- the construction source pickarea i in each round consists of ls i bytes that extend from the construction source start byte pickstart i (the extension reaches the end of the working pool and continues from the beginning).
- Bit metabolism logic is one of the keys to realize the present invention. This manual introduces two kinds of bit metabolism logic: deferred bit metabolism logic and extracted bit metabolism logic. Around the composite logic structure of the present invention, there are several other metabolic logics related to the bit metabolism logic that need to be explained: the working pool bit metabolism in the growth phase, the dynamic driving vector vector i metabolism, and the position chain pos_chain metabolism.
- the feature of the metabolization logic of deferred promotion is that there is no unmetabolized bit in the rotation period of the metabolic target area (that is, the repetition period when the metabolic target area progresses by bytes in the working pool round by round). higher coverage.
- the byte overlapping with the starting position E of the manipulation source (other bytes are not excluded) is selected as the starting byte metabolstart i of the metabolization target area of the deferred metabolization.
- the metabolism of the dynamic driving vector vector i is one of the keys to ensure the randomness of the key bit segment of the complex reconstruction.
- bit fetching logic The correlation between bit fetching logic and bit metabolism logic
- bit fetching logic and bit metabolizing logic are to realize the infinite non-recycling regeneration key bit sequence of 'pseudo-random dislocation to extract unmetabolized structural source bits or double-bit extraction of metabolized structural source bits'. one of the keys.
- Different matching of the two can construct different regenerated key bit segment sequences, and achieve different coverage ratios of the regenerated key bit segment sequences to the set of natural numbers. Its effect is particularly obvious in the wrong-segment stacking encryption of multiple regenerated key bit-segment sequences.
- Figures 2, 3, and 4 each show one set, which basically summarizes the features of various sets.
- Figure 2 shows the matching working form of the progressive bit logic and the deferred bit metabolism logic.
- Figure 3 shows the matching working form of the progressive chain bit logic and the extracted bit metabolism logic.
- Figure 4 shows the working state of the bit-hopping logic matching with the extracted bit metabolism logic.
- bit fetching logic directly acts on the current round of encryption, and the bit metabolism logic affects subsequent rounds of encryption.
- the randomness of the regeneration key bit segment of the subsequent round is higher when the starting position of the metabolic target area is selected as the starting position of the manipulation source.
- the deferred metabolization logic of deferred promotion matches the logic of non-deferred promotion, although there will be bits that are not metabolized in the work pool of the current round, but because the construction source does not exist in the rotation cycle of the work pool For bits that have not been metabolized, the deferred metabolization logic has a higher overall metabolic rate for the working pool during the round-by-round deferred encryption process, which makes the working pool have a higher coverage rate for the set of natural numbers.
- Figure 6 shows the difference between the non-progressive chain taking logic/extracted bit metabolism logic matching and the progressive chain taking logic/extracted bit metabolism logic matching.
- the extraction bits in the former correspond to the order of metabolites. In the latter, since the extraction bits are arranged in the order specified by the position chain, the extraction bits are pseudo-randomly displaced from the metabolites.
- the logic of deferred bit extraction and bit extraction may form a security loophole, so it is not suitable for use in a single complex and reconstructed encryption model.
- the logic of deferred bit extraction and bit extraction may form a security loophole, so it is not suitable for use in a single complex and reconstructed encryption model.
- due to its higher utilization rate of the working pool it is better to mix the delayed bit extraction logic and the non-sequential extraction bit extraction logic in the staggered overlay encryption of multiple regenerated key bit segment sequences.
- bit metabolism logic matched with the deferred extraction bit logic must be the deferred extraction metabolism logic.
- the purpose of the pseudo-random bit rearrangement is to update the '0'/'1' arrangement based on the original '0'/'1' ratio in the working pool.
- bit-by-bit while pseudo-random bit rearrangement The purpose of the swap is to eliminate the proportional imbalance of the '0' and '1' bit values that may appear in the working pool, and to block the diffusion of this imbalance during the construction of the regenerated key bit segment sequence.
- Sugaring refers to: using the pseudo-random variation characteristics of the calculation parameters in the chaotic computing structure, according to the state of the intermittent appearance of the calculation parameters (for example: (a), when the position element of a specific position in the position chain is equal to 0 or ls i ; or (b) ), when the value of a certain byte of the dynamic driving vector vector i is equal to 0 or ls i ; (c), the above (a) or (b) are not contradictory combination is established.
- the exchange has a probability to cause the absolute uniformity of the distribution of '0' and '1' in the working pool, which will weaken the randomness of the regenerated key bit segment sequence, and the addition of sugar will destroy the absolute uniformity of this distribution. Due to the randomness of the distribution of metabolic targets and the intermittent nature of triggering conditions, the sugar treatment can still ensure the randomness of the distribution of '0' and '1' in the working pool.
- the pseudo-random bit rearrangement in must be the same as the pseudo-random bit-bit rearrangement Different from each other, which ensures the independence between the pseudo-random change trajectory of the regenerated key bit sequence and the pseudo-random change trajectory of the working pool replacement.
- the realization of 'pseudo-random dislocation extraction of unmetabolized construction source bits or double extraction of metabolized construction source bits' does not prove that the regenerated key bit segment sequence achieves an infinite loop.
- the invention adopts two measures to realize the infinite non-circular encryption of the regenerated key bit segment sequence: chaotic calculation structure and staggered segment superposition logic structure.
- chaotic calculation structure There is a probability that repeated sub-bit strings appear periodically in the chaotic computing structure elimination complex reconstruction key bit sequence, but this elimination cannot be proved to be complete.
- the staggered superposition logic structure of the regenerated key bit segment sequence performs the entanglement between different regenerated key bit segment sequences and the chaotic entanglement of the regenerated key bit segment sequence space in the transition pseudo-random string space in the encryption process. Completely block the periodicity of the change of the regenerated key bit segment sequence.
- the staggered superposition logical structure refers to the staggered superposition encryption structure of the plaintext bit segment by more than one different regeneration key bit segment sequence when the plaintext is encrypted based on the chaotic computing structure.
- the staggered-segment overlay encryption is essentially different from the repeated encryption of multiple regenerated key bit-segment sequences. It is a specific logic winding encryption implemented by two or more regenerated key bit segment sequences using chaotic computing structure. Since the single regenerated key bit sequence itself has a chaotic computing structure, the chaotic entanglement effect of the regenerated key bit sequence generated by their staggered superposition can achieve the power-level expansion of the chaotic effect of the single regeneration key bit sequence.
- the regenerated key bit-segment sequences participating in the mis-segment stacking are all based on the same chaotic computing structure, using the dislocation between different regenerated key bit-segment sequences and the same-scale cutting of regenerated key bit-segments, plaintext bit-segments, and ciphertext bit-segments. It realizes the intertwining of different regenerated key bit segment sequences in the encryption process.
- Such a logical structure can be further embedded in the pseudo-random bit entanglement of the transition pseudo-random string (see 4.5) in the encryption process.
- Figure 7 shows a simple staggered stacking logic structure.
- Figure 8 shows the staggered stacking logic structure with embedded pseudo-random bit wrapping.
- Figure 7 shows a simple mis-segment stacking logical structure of two regenerated key bit-segment sequences.
- the logic structure of more heavy and simple staggered superposition is the same.
- two regenerated key bit segment sequences (k1f i
- k1li i , i 0,1,...; k2f i
- k2li i , i 0,1,...; where '
- the reproduction key bit segment bsk1 i, bsk2 i are respectively cut into two half-sections, k1f i and k1l i, k2f i and k2l i.
- the first half of one regenerated key bit sequence is superimposed and encrypted with the second half of another regenerated key bit sequence (k1f i /k2l i-1 , k1l i /k2f i ).
- the length l1f i of the first half-bit segment of bsk1 i (i 0,1,2,).
- the simplest way of wrapping is to directly use the two half-segments of the two regenerated key bit segment sequences to alternately XOR the two half-segment error segments of the plaintext, which makes the plaintext always be replaced by different regenerated key bit segment sequences. Mis-segment overlay encryption. For more complicated wrapping, see the following staggered stacking logic structure with embedded pseudo-random bit wrapping.
- bit metabolism logic uses the delayed extraction bit metabolism logic, and other bit extraction logic uses the extracted bit metabolism logic.
- bit metabolism logic adopts the compound form alternately used by the extraction bit metabolism logic and the deferred bit extraction logic (bit bit extraction logic also adopts the compound form alternately used by the non-deferred bit extraction bit logic and the deferred bit extraction bit logic) .
- FIG. 8 shows two sets of staggered-segment stacking logic structures each containing two regenerated key bit-segment sequences embedded with three pseudo-random bit-wounds. The same is true for the logical structure of more multiple error segments superimposed with more times of pseudo-random bit entanglement.
- the pseudo-random bit wrapping is moved backward by half a key bit segment (that is, the pseudo-random bit wrapping is embedded in the sub-regenerating key bit segment sequence, see Figure 9).
- Figure 8 omits the processing of regenerated key bit segment construction, working pool metabolism, and stack scheduling in the process of stacking of staggered segments, and focuses on the integration of bit segment segmentation, synchronization processing, and embedded pseudo-random bit wrapping. See Figure 8' for the complete multi-staggered superposition calculation process of multiple embedded pseudo-random bit wrapping (to clearly show the operation sequence, the intermediate calculation step in Figure 8' only replaces the old computing element, the new computing element, calculations, and their results).
- the transition pseudo-random string refers to the generation of the previous regenerated key bit segment sequence between each re-encryption in the same round, or the pseudo-random bit bit entangled for the subsequent pseudo-random bit entangled or regenerated key bit sequence calculation. pseudo-random string.
- Pseudo-random bit winding refers to pseudo-randomly rearranging the order of each bit in a transition pseudo-random string. This processing leads to further bits between different rounds of transition pseudo-random strings under the staggered superposition logic structure. twine. Pseudo-random bit bit rearrangement with bit fetch logic Pseudo-random bit conversion with bit metabolism logic The difference between the pseudo-random bit rearrangement in : (1) the object of pseudo-random bit winding is a transitional pseudo-random string; (2) the winding needs to be easy to be reversible.
- the purpose of (1) is to realize rewinding in the vertical direction of the winding between different regenerated key bit segment sequences; the purpose of (2) is to ensure that it can be decrypted without increasing the amount of decryption calculation.
- This specification uses the position elements paired in sequence in the position chain pos_chain (ls i -L min ) with the same length of the bit segment to perform bit value swap on the bit pair in the specified transition pseudo-random string.
- the plaintext bit segment, the regenerated key bit segment, and the ciphertext bit segment are divided into the same scale; the sd in 4.2.2 is used to determine the bit segment segmentation scale: sd, ls i -sd.
- Each regenerated key bit segment in each group of regenerated key bit segment sequences follows the scale segmentation in 4.5.1: k1f i,q (length is sd), k1l i,q (length is ls i - sd), k2f i, q (length ls i -sd), k2l i, q ( length SD); plaintext bit segments also scale with segmentation Mf i (length sd), Ml i (length ls i- sd).
- the pseudorandom bit wrapping shown in FIG. 8 is implemented for the full bit segment of the first regenerated key bit segment. Due to the staggered segment effect, this pseudo-random bit wrapping acts on the transition pseudo-random string encrypted by the first regenerated key bit segment and the second half of the previous regenerated key bit segment and the first half of the current round.
- a transitional pseudo-random string encrypted by the regenerated key bit segment of the segment recombination which realizes another staggered winding between the preceding and following bit segments on the basis of the staggered winding between the two sets of mutually different regeneration key bit segment sequences.
- bit metabolism logic uses the extracted bit metabolism logic
- the deferred bit fetching logic uses the deferred bit fetching logic
- other bits fetch bits The logic uses the extracted bits of metabolic logic.
- bit metabolism logic should preferably adopt a mixed form of alternately used bit extraction logic and deferred bit extraction logic (bit extraction logic also adopts non-deferred bit extraction logic and deferred bit extraction logic. A composite form of alternate use of bit-fetching logic).
- 5.1.2 Determine the size of the key, select the size of the pool, and the size of the initial working pool according to the configuration logic, and load the initial working pool with the key according to the size of the initial working pool.
- Example 1 the non-superposition & single metabolism model matched with progressive bit logic/deferred displacement logic is selected as Example 1, and progressive chain displacement logic/deferred displacement logic and bit-hopping bit logic/extracted bit are selected.
- Example 2 The double-stacking & double-metabolism staggered stacking model with embedded pseudo-random bit-wound embedded in the metabolic logic is used as Example 2.
- the purpose is to: (1) explain the basic form of the composite logic structure and the correlation form of the chaotic computing structure with the bit fetching logic and bit metabolism logic through embodiment 1; (2) explain the more complex association form of the composite logic structure through embodiment 2 :
- Example 1 Non-superimposed & single metabolic model of the progressive-assignment logic/delayed-ascension metabolic logic configuration
- Embodiment 1 As the secret agreement of encryption/decryption, define the dynamic drive vector vector i of Embodiment 1 as the substring in the selection pool Spool:
- vectstart 0 is the byte position determined by the first three bytes of the key
- vectstart 0 ((Spool work [0]+Spool work [1]+Spool work [2])%640)/8,
- length(Spool work ) is the length of the work pool, and its initial value is the key length
- vectstart i is the first byte of the i-th dynamic drive vector in the work pool (continue from the beginning after reaching the end of the work pool),
- vector i is the dynamic driving vector of the i-th wheel
- the dynamic driving vector is shifted backward by one byte (continue from the beginning after reaching the end of the working pool),
- vector 0 [0] are the first two bytes of the initial dynamic drive vector vector 0.
- vector 0 [2] are the third and fourth bytes of the initial dynamic drive vector vector 0.
- the length of the padded pseudo-random string ms additn is L max .
- vector 0 [2] is the third byte of the initial dynamic drive vector vector 0.
- pickbyte i,0 (pickbyte i-1,0 +1)%workbyte(9)
- vector 0 is the initial driving vector
- Workbyte is the length of the work pool calculated in bytes (the same below),
- pickbyte i-1,0 is the first construction byte of the previous round
- pickbyte 0, 0 is the first construction byte of the first round
- pickbyte i, 0 in (9) is the construction byte of the i-th round head
- pickbyte i, 0 is incremented by one round in the work pool SPool work bytes (continue from the beginning after reaching the end of the worker pool).
- pickbyte i,j (pickbyte i,j-1 +1)%workbyte (9")
- pickbyte i,j is the jth construction byte of the i-th round, which is progressively advanced byte by byte in the work pool SPool work (continues from the beginning after reaching the end of the work pool).
- pickdrivelmt 0,0 ((pickbyte 0,0 +workbyte)*8-vector 0 [0])%length(Spool work ) (10)
- pickdrivelmt i,0 (pickdrivelmt i-1,0 +1)% workbyte (10')
- pickdrivelmt 0,0 is a position in the working pool, which differs from pickbyte 0,0 by a relative bit difference determined by the pseudo-random key of the key.
- Step j j+1, repeat the above 9.3.2 and 9.3.3 until the length of the output pseudo-random string reaches ls i .
- workbyte is the length of the work pool, in bytes.
- the metabolizebyte i,j is advanced byte by byte in the worker pool SPool work (continues from the beginning after reaching the end of the worker pool).
- metabolbit i (j) (metabolbit i (j-1)+1)%8 (12')
- the pos_chain(ls i -L min ) is metabolized in the manner described in 2.7 of the description of the sequence encryption method for the complex reconstructed key.
- step i i + 1, ls i is calculated, if the length of the plaintext bit segment is less than M i ls i is performed after the following encryption processing, or executes the loop 4-8.
- Example 1 The encryption/decryption calculation formula and calculation unit 10 metabolize the working pool with the logic of deferred lifting metabolism.
- Example 2 Progressive chain bit-taking logic/deferred bit-lifting metabolism logic and bit-hopping bit-taking logic/double-stacking & double-metabolism-staggered stacking model with embedded pseudo-random bit-wrapping supported by extracted bit-metabolism logic
- the regeneration key bit segment sequence group is identified by ( 1, 2 in bsk1 i,q , bsk2 i,q , see 4.5 of the staggered stacking logical structure) and the sub-label of the regenerated key bit segment sequence in the group ( q in bsk1 i,q , bsk2 i, q, see The staggered stacking logical structure 4.5) is merged into '1' or '2', and the stack is replaced by a single buffer.
- 9.1.1.1 Define the starting byte position of the construction source of the first regeneration key bit segment sequence in the work pool SPool work:
- pickarea1start 0 vector 0 % workbyte (14)
- pickarea1start i (pickarea1start i-1 +1)%workbyte (14')
- (14) is the start byte position of the first round construction source in the work pool SPool work
- (14') is the start byte position of the other round construction sources in the work pool SPool work .
- (15) is a construction source composed of ls i bytes starting from pickarea1start i (h is carried in bytes and continues from the beginning when it reaches the end of the working pool).
- pos_chain(ls i -L min ,j) is the jth position element in the position chain pos_chain(ls i -L min ) having the same length as the length of the bit segment.
- the metabolic target is the metabolic target area where the key bit segment sequence is first regenerated.
- pickstart2 i,0 vector i [2] % length(Spool work )
- the construction source pickarea2 i is composed of the bit string from the construction source starting position pickstart2 i,0 to the tail of the selection pool and the two bit strings from the selection pool head to the construction source starting position pickstart2 i,0 .
- pickdrivstart2 i,0 (pickstart2 i,0 +length(Spool work )-vector i [4]-1)%length(Spool work )
- the manipulation source pickdrivearea2 i is composed of the bit string from the starting position of the manipulation source pickdrivstart2 i,0 to the tail of the selection pool and the two bit strings from the head of the selection pool to the starting position of the manipulation source pickdrivstart2 i,0 .
- the first/second half-bit segment K1f i , K1l i (the first and second half-bit segment of the regeneration key bit segment of the first regeneration key bit segment sequence)
- the first/second half-bit segment of the secondary key K2f i , K2l i (the first and last half-bit segment of the regeneration key bit segment of the secondary key bit segment sequence)
- the first/second half-bit segment T1f i X2l i-1 , T11 i X2f i (the first/second half-bit segment encrypted with the secondary regeneration key bit segment sequence after implementing pseudo-random bit winding)
- Ciphertext first/second half-bit segment Cf i , Cl i (ciphertext first and second half-bit segment)
- K1l 0 ) of the first regeneration key bit segment sequence is constructed according to the encryption/decryption calculation formula and calculation unit 9 of Embodiment 2.
- K2l 0 ) of the secondary regeneration key bit segment sequence is constructed according to the encryption/decryption calculation formula and calculation unit 12 of the second embodiment.
- the working pool is metabolized in the growth phase with the plaintext bit segment M 0 (ie, the pseudo-plaintext pM 0 ) (refer to the single complex reconstruction logical structure 1.5.5.1).
- Nibble Nibble T1l 0 X generated after the transition time period after the half-section transition section K2f 0 after 11 rearranged encrypted key seq T1l 0 X2f 0.
- the extracted bits are metabolized using the extracted output pseudo-random string according to the encryption/decryption calculation formula and calculation unit 13 of Embodiment 2. If the pool is not working reach maturity, while the express bit segments M i (i.e., pseudo plaintext pM i) growing metabolic embodiment of the operating tank (see single complex reconfigurable logic structure 1.5.5.1).
- the decryption process Since the pseudo-random bit winding process is embedded in the encryption process, the decryption process must be processed in reverse encryption order after extracting the regenerated key bit segment and releasing the position chain pos_chain(ls i -L min ) used for the pseudo-random bit winding. :
- configuration structure control amount dynamic drive vector vector 0 , selection pool Spool, work pool SPool work , maximum length of bit segment L max , minimum length of bit segment L min , length of pseudo-plaintext pM , the end of the plaintext EOP, the position chain set pos_chain.
- the working pool is metabolized in the growth phase with the plaintext bit segment M 0 (ie, the pseudo-plaintext pM 0 ) (refer to the single complex reconstruction logical structure 1.5.5.1).
- the extracted bits are metabolized using the extracted output pseudo-random string according to the encryption/decryption calculation formula and calculation unit 13 of Embodiment 2.
- the present invention can configure the corresponding encryption model according to the needs of the application form, and the application range is wider. And it has some room for adjustment and integration with other methods.
- the present invention can adapt to the security needs of the increasing computing power. It can be proved that, except for brute force attacking the key, there is no attack algorithm with polynomial time complexity for cracking the key, that is, the present invention provides an example of P ⁇ nP.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Programmable Controllers (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Selective Calling Equipment (AREA)
- Input From Keyboards Or The Like (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
- Complex Calculations (AREA)
Abstract
Description
Claims (8)
- 一种复重构密钥的序列加密方法,其特征在于:使用密钥和结构配置量生成结构操控量,并利用结构操控量操控混沌计算结构调度配套的复合逻辑实现混沌的bit位段流序列加密;逐轮伪随机重构构造源和操控源并利用操控源伪随机操控构造源复重构再生密钥位段;利用对多于一个的再生密钥位段序列的整合实现不同再生密钥位段序列间错段缠绕;利用伪随机bit位缠绕实现与再生密钥位段序列间错段缠绕不相关的前后位段间的错段缠绕;发明核心包括三个紧密关联的计算:(A)构建混沌计算结构,在加密进程中逐段对工作池新陈代谢,进而对工作池承载的操控源、构造源逐段以操控源中的bit位操控bit取位逻辑提取构造源中的bit位,伪随机复重构再生密钥位段;(B)基于混沌计算结构,整合bit取位逻辑和bit代谢逻辑,构建‘伪随机错位提取未被代谢的构造源bit位或者重位提取已被代谢的构造源bit位’的再生密钥位段无限不循环构建逻辑;(C)基于混沌计算结构对多于一个的不同再生密钥位段序列实现错段叠加加密;技术方案包括:(1)由密钥通过计算结构配置量构建混沌计算结构,支撑伪随机确定各段计算参量的逐位段序列加密;(2)以密钥加载初始工作池,引领逐位段逻辑缠绕的混沌加密进程;(3)以加密方独立构建的伪明文扩展工作池,进一步混沌加密进程,提升安全阀值;(4)建立工作池逐轮代谢机制,配套配置bit取位逻辑和bit代谢逻辑,建立‘伪随机错位提取未被代谢的构造源bit位或者重位提取已被代谢的构造源bit位’的再生密钥位段构建逻辑;(5)以混沌计算结构消解所构建的再生密钥位段序列的有概率出现的周期律;(6)使用差异的构造源、操控源、bit取位逻辑和bit代谢逻辑,构造不同的再生密钥位段序列,并基于混沌计算结构实现不同再生密钥位段序列的嵌入伪随机bit位缠绕的错段叠加加密;(7)基于密钥建立明文结束符,化解明文结束位置与分段计算结束位置之间的错位并以明文结束符作为解密计算正确性的效验码。
- 根据权利要求1所述的复重构密钥的序列加密方法,其特征在于:由密钥通过结构配置量配置结构操控量,操控混沌的不定长分段加密计算:(1)使用密钥key结合结构配置量ctl init配置选取池Spool的长度,初始工作池Spool work的长度;(2)根据密钥伪随机确定初始动态驱动向量vector 0在工作池Spool work中的提取位置;(3)根据选取池Spool的长度和密钥的长度确定伪明文pM的长度;(4)根据初始动态驱动向量vector 0伪随机确定位段长度限定最大值L max、位段长度限定最小值L min;(5)根据初始动态驱动向量vector 0和密钥中其它bits串生成明文结束符EOP;(6)根据位段长度限定最大值L max及位段长度限定最小值L min构建位置链集pos_chain;(7)拼接伪明文pM、明文plaintext、明文结束符EOP,并追加长度为L max的补齐伪随机串ms additn,重构计算用明文M;(8)通过上述(1)至(6)所得结构操控量操控混沌计算结构加密被重构的明文M。
- 根据权利要求1所述的复重构密钥的序列加密方法,其特征在于:使用密钥key初始加载工作池SPool work,启动再生密钥位段序列的构建进程。
- 根据权利要求1所述的复重构密钥的序列加密方法,其特征在于:以加密方独立构建的与明文内容无关的伪明文pM扩展工作池SPool work;进而以密钥key和伪明文pM共同引领复重构再生密钥位段序列的进程,提升安全阀值。
- 根据权利要求1所述的复重构密钥的序列加密方法,其特征在于:依据计算结构的配置逐轮使用bit代谢逻辑代谢工作池SPool work,进而以操控源操控bit取位逻辑提取构造源的bit值,实现‘伪随机错位提取未被代谢的构造源bit位或者重位提取已被代谢的构造源bit位’的逐bit位复重构再生密钥位段逻辑;(1)以bit代谢逻辑实现工作池代谢,以bit取位逻辑从工作池中复重构再生密钥位段;(2)所列举的bit取位逻辑:(2.1)递进取位逻辑;以初始动态驱动向量vector 0伪随机确定首轮构造源在工作池中的起始字节pickstart 0,0;以初始动态驱动向量vector 0伪随机获取相对位差dif,dif<length(Spool work),在工作池中确定首轮操控源起始位置pickdrivstart 0,0=(pickstart 0,0+length(Spool work)-dif)%length(Spool work);逐轮递进一个字节,到达工作池Spool work尾端后从头续延,确定随后各轮:①构造源起始字节pickstart i,0=(pickstart i-1,0+8)%length(Spool work),②操控源起始位置pickdrivstart i,0=(pickdrivstart i-1,0+8)%length(Spool work);以工作池中从构造源起始字节开始的ls i个字节构成的字节段作为各轮构造源pickarea i;以工作池中从操控源起始位置开始的ls i的n倍个bit构成的bits串作为操控源pickdrivearea i,n为3或4或8;以操控源pickdrivearea i中顺序地每3或4或8个bits构成的bits串序列构成操控元序列,并提取各操控元中3个bits作为操控值构成操控值序列pickdriver i(j),j=0,1,2,…,ls i-1;顺序地配对操控值序列中的操控值和构造源中的构造字节pickdriver i(j)/pickarea i(j),j=0,1,2,…,ls i-1;逐对从操控值指定的构造字节的bit位之值作为输出bit值,拼接输出伪随机串tmp_str(j),j=0,1,2,…,ls i-1;(2.2)递进链取位逻辑;在配置混沌计算结构时,以位段长度限定最大值L max及位段长度限定最小值L min构建位置链集pos_chain并以密钥对其初始化;在工作池中以初始动态驱动向量vector 0伪随机确定首轮构造源起始字节pickstart 0,0;以初始动态驱动向量vector 0伪随机获取相对位差dif,dif<length(Spool work),在工作池中确定首轮操控源起始位置pickdrivstart 0,0=(pickstart 0,0+length(Spool work)-dif)%length(Spool work);逐轮递进一个字节,到达工作池Spool work尾端后从头续延,确定随后各轮中:①构造源起始字节pickstart i,0=(pickstart i-1,0+8)%length(Spool work),②操控源起始bit位pickdrivstart i,0=(pickdrivstart i-1,0 +8)%length(Spool work);以工作池中从构造源起始字节开始的ls i个字节构成的字节段作为构造源pickarea i;以工作池中从操控源起始位置开始的ls i的n,n为3或4或8,倍个bit所组成的bits串作为操控源pickdrivearea i;以操控源pickdrivearea i中顺序地每3或4或8个bit构成的bits串作为操控元构成操控元序列,并提取操控元中3个bits作为操控值构成操控值序列pickdriver i(j),j=0,1,2,…,ls i-1;顺序地配对操控值序列中的操控值和由位置链pos_chain(ls i-L min)中位置元pos_chain(ls i-L min,j)确定的构造源中的构造字节pickdriver i(j)/pickarea i(pos_chain(ls i-L min,j)),j=0,1,2,…,ls i-1;逐对以操控值指定的构造字节中的bit位之值作为输出bit值,拼接输出伪随机串tmp_str(j),j=0,1,2,…,ls i-1;(2.3)位跳跃取位逻辑;以动态驱动向量vector i伪随机确定各轮构造源起始位置pickstart i,0,并以构造源起始位置pickstart i,0到工作池尾端的bits串与从工作池头端到构造源起始位置pickstart i,0之前的bits串拼接构造源pickarea i;以动态驱动向量vector i伪随机获取相对位差dif,dif≤length(Spool work),在工作池中确定各轮操控源起始位置pickdrivstart i,0=(pickstart i,0+length(Spool work)-dif)%length(Spool work),并以操控源起始位置pickdrivstart i,0到工作池尾端的bits串与从工作池头端到操控源起始位置pickdrivstart i,0之前的bits串拼接操控源pickdrivearea i;从操控源中跳跃或不跳跃地提取ls i个定长bits子串作为位跳跃值构成位跳跃值序列junp_num(j),j=0,1,2,…,ls i-1,到达工作池尾部后从头续延;逐一,j=0,1,2,…,ls i-1,依位跳跃值序列中的各位跳跃值为间隔从构造源中跳跃地,到达工作池尾部后从头续延,确定被提取bit位,并以其值拼接输出伪随机串tmp_str(j),j=0,1,2,…,ls i-1;(2.4)顺延提位取位逻辑:由初始动态驱动向量vector 0伪随机确定首轮构造源起始字节pickstart 0;随后各轮构造源起始字节pickstart i逐轮顺延一个字节,顺延到达工作池尾端从头续延,pickstart i=(pickstart i-1+8)%length(Spool work);各轮中构造源pickarea i由从构造源起始字节pickstart i开始顺延的ls i个字节构成,顺延到达工作池尾端从头续延;令上述构造源pickarea i中首构造字节的被提取bit位为第0 bit位,随后构造字节的被提取bit位逐字节 提高一个bit位,达到7后从0续延,顺序地以构造字节的被提取bit位之值拼接输出伪随机串tmp_str(j),j=0,1,2,…,ls i-1;(3)所列举的bit代谢逻辑及其相关代谢:(3.1)对length(SPool work)<length(SPool)的成长期中的工作池SPool work的代谢:当length(Spool)-length(Spool work)≥ls i时,加密时追加或伪随机插入从明文中依序提取的长度为ls i的伪明文子串pM i到工作池SPool work并维护工作池SPool work长度length(Spool work)=length(Spool work)+ls i;解密时追加或伪随机插入从被解密明文中提取的长度为ls i的伪明文子串pM i到工作池SPool work并维护工作池SPool work长度length(Spool work)=length(Spool work)+ls i;当length(Spool)-length(Spool work)<ls i时,加密时追加或伪随机插入从明文中依序提取的长度为length(Spool)-length(Spool work)的伪明文子串pM i到工作池SPool work并且令length(Spool work)=length(Spool);解密时追加或伪随机插入从被解密明文中提取的长度为length(Spool)-length(Spool work)的伪明文子串pM i到工作池SPool work并且令length(Spool work)=length(Spool);工作池达到成熟期;(3.2)对length(SPool work)=length(SPool)的工作池SPool work成熟期,采用bit代谢逻辑代谢工作池:(3.2.1)顺延提位代谢逻辑:在工作池中从操控源起始位置pickdrivstart i,0起选取ls i个字节构成顺延提位代谢目标区metabolarea i;顺延提位代谢目标区metabolarea i在工作池中逐轮后移一个字节,到达工作池尾端从头续延;使用位置链pos_chain(ls i-L min)对原始代谢源随机串,即任意bit取位逻辑的输出伪随机串tmp_str(j),j=0,1,2,…,ls i-1,进行伪随机bit位转换 其中的伪随机bit重排必须与构造再生密钥位段时的伪随机bit位重排 互异,得到代谢源随机串metabolsrc i(j),j=0,1,2,…,ls i-1;设定在顺延提位代谢目标区metabolarea i首字节中的代谢bit位为第0 bit位,随后逐字节提高一个bit位,达到7后从0续延,作为顺延提位目标区各字节的代谢bit位,得到被代谢bit位序列metabolbit i(j),j=0,1,2,…,ls i-1;按序逐bit位以代谢源随机串metabolsrc i(j),j=0,1,2,…,ls i-1的bit位之值替换顺延提位目标区相应字节的代谢bit位之值metabolbit i(j)=metabolsrc i(j),j=0,1,2,…,ls i-1;(3.2.2)被提取位代谢逻辑:在任何bit取位逻辑构建输出伪随机串tmp_str(j),j=0,1,2,…,ls i-1时,顺序拼接其bit位作为被提取位序列pickedbit i(j),j=0,1,2,…,ls i-1;使用位置链pos_chain(ls i-L min)对原始代谢源伪随机串,即任意bit取位逻辑的输出伪随机串tmp_str(j),j=0,1,2,…,ls i-1,进行伪随机bit位转换 其中的伪随机bit重排必须与构造再生密钥位段时的伪随机bit位重排 互异,得到代谢源伪随机串metabolsrc i(j),j=0,1,2,…,ls i-1;实施被提取位代谢pickedbit i(j)=metabolsrc i(j),j=0,1,2,…,ls i-1;(3.3)利用密钥的随机性实现位置链pos_chain(ls i-L min)代谢:建立长度为(1/2)length(vector i)-1的空过渡位置链tmp_chain;顺序提取动态驱动向量vector i的每两个bits所表示之值作为跳跃值得到一个跳跃值序列rp j,j=0,1,…,min((1/2)length(vector i)-1,ls i-1);令p 0=rp 0,p j=p j-1+rp j+1,计算:①tmp_chain(j)=pos_chain(ls i-L min,p j)并②剔除位置元pos_chain(ls i-L min,p j),j=0,1,…,(1/2)length(vector i)-1;于是pos_chain(ls i-L min)部分或全部地伪随机导入tmp_chain;当(1/2)length(vector i)<ls i时,将新位置链tmp_chain中生成的(1/2)length(vector i)个位置元追加到被压缩了的位置链pos_chain(ls i-L min)的尾端;当(1/2)length(vector i)≥ls i时,以新位置链tmp_chain替换已使用位置链pos_chain(ls i-L min);(3.4)对动态驱动向量vector i以下述两者之一代谢(3.4.1)以在工作池中逐轮向后顺延一个字节的方式实现动态驱动向量vector i代谢;(3.4.2)逐轮以工作池中与前一轮动态驱动向量vector i-1互异的等长bits串与前一轮动态驱动向量vector i-1异或生成新的vector i;(4)在生成再生密钥位段前对输出伪随机串的伪随机bit位重排 在工作池代谢之前对原始代谢源伪随机串,即任意bit取位逻辑的输出伪随机串tmp_str(j),j=0,1,2,…,ls i-1,的伪随机bit位转换(4.2)基于位置链pos_chain(ls i-L min)的随机性实现对原始代谢源伪随机串,即任意bit取位逻辑的输出伪随机串tmp_str(j),j=0,1,2,…,ls i-1,的伪随机bit位转换 包括:(4.2.1)基于位置链pos_chain(ls i-L min)的随机性对原始代谢源伪随机串,由任意bit取位逻辑获取的输出伪随机串tmp_str(j),j=0,1,2,…,ls i-1,实施与(4.1)不同的伪随机bit位重排;(4.2.3)加糖:根据计算参量间隙性出现的状态触发以全‘0’或全‘1’的bit串替代代谢源伪随机串;计算参量间隙性出现的状态的例子:(a)、位置链中特定位置的位置元等于0或ls i,或者(b)、动态驱动向量vector i的某确定字节之值等于0或者ls i,或者(c)、上述(a)或(b)不矛盾地组合成立;(5)在混沌计算结构支撑下配套使用bit取位逻辑和bit代谢逻辑及所列其它相关逻辑,构建‘伪随机错位提取未被代谢的构造源bit位或者重位提取已被代谢的构造源bit位’的再生密钥位段序列。
- 根据权利要求1所述的复重构密钥的序列加密方法,其特征在于:以混沌计算结构消解被构建的再生密钥位段序列的有概率出现的周期律;(1)利用混沌计算结构造成的位段长度ls i的伪随机变化,打乱被代谢位变化的规律性;(2)利用混沌计算结构造成的位段长度ls i的伪随机变化,打乱被重复提取位之值变化的规律性。
- 根据权利要求1所述的复重构密钥的序列加密方法,其特征在于:基于混沌计算结构实现不同再生密钥位段序列间的错段缠绕并嵌入伪随机bit位缠绕实现前后位段间的错段缠绕的错段叠加加密;(1)基于混沌计算结构对明文位段、再生密钥位段、密文位段进行同尺度切分;(1.1)以由位段长度限定值L min、L max确定的λ,(1/2)L min≤λ<(1/2)L max,作为位段切分尺度sd;(1.2)以sd作为错段位差,确定两组数量同为s的再生密钥位段序列间的位差,s≥1;(2)构造差异的分属于不同切分的两组再生密钥位段序列;(2.1)建立两组再生密钥位段序列;首再生密钥位段序列组bsk1 i,q,次再生密钥位段序列组bsk2 i,q,q=1,2,…,s i=0,1,2,…其中q为隶属于各组的各再生密钥位段序列的下标,s为各组中再生密钥位段序列数,i为轮序号;(2.2)各组再生密钥位段序列中的再生密钥位段遵循尺度sd切分:k1f i,q,长度为sd;k1l i,q,长度为ls i-sd;k2f i,q,长度为ls i-sd;k2l i,q,长度为sd;对明文位段也进行同尺度切分:Mf i,长度为sd;Ml i,长度为ls i-sd;(2.3)为各再生密钥位段序列确定差异的bit取位逻辑、bit代谢逻辑、或者差异的构造源、操控源;(3)确定2s-1个逐轮以位置链pos_chain(ls i-L min,j),j=0,1,…,ls-1实现的伪随机bit位重排逻辑;(4)基于同尺度切分的嵌入伪随机bit位缠绕的不同再生密钥位段序列的错段叠加加密:(4.1)使用长度为sd的s个缓冲区存储次再生密钥位段序列组各后半密钥位段k2l i,q,q=1,2,…,s;(4.2)除首轮外,其他轮按下述顺序错段加密:(5)基于同尺度切分的嵌入伪随机bit位缠绕的不同再生密钥位段序列的错段解密:(5.1)在开始解密前建立:(1)长度为L max的位置链栈stack_chain,用于存储位置链;(2)长度为L max-sd的半段栈stack_k2f,用于存储s个次再生密钥位段的前半位段;(3)长度为sd的半段栈stack_k2l,用于存储下一轮错段拼接用的s个次再生密钥位段的后半位段;(4)长度为sd的错段半段栈s_stack_k2l,用于拷贝出前一轮存储在半段栈stack_k2l中的半密钥位段k2l i-1,q,以便拼接错段的次再生密钥位段k2l i-1,q||k2f i,q;(5)长度为L max的整段栈stack_bsk1,用于存储当前轮使用的首再生密钥位段;(5.2)除首轮外,在各轮解密之初将前一轮压入stack_k2l的全部次再生密钥位段的后半位段k2l i-1,q,q=0,1,…,s-1拷贝进s_stack_k2l,并清空stack_k2l;(5.3)除首轮外,各轮按照加密处理顺序实施s次计算量重构或提取:(1)复重构再生密钥位段bsk1 i,q 并压入整段栈stack_bsk1,并进行位置链pos_chain(ls i-L min)代谢;(2)将位置链pos_chain(ls i-L min)压入位置链栈stack_chain并进行位置链pos_chain(ls i-L min)代谢;(3)复重构再生密钥位段bsk2 i,q,q=0,1,…,s-1并压入半段栈stack_k2f、stack_k2l并进行位置链pos_chain(ls i-L min)代谢;(4)除第s次外,将位置链pos_chain(ls i-L min)压入位置链栈stack_chain并进行位置链pos_chain(ls i-L min)代谢;(5.4)除首轮外,其他轮按(5.3)的逆序错段解密:(5.5)各轮各次解密中半位段长度使用sd或ls i-sd,略去L max_ls i的多余部分。
- 根据权利要求1所述的复重构密钥的序列加密方法,其特征在于:以明文结束符EOP化解由混沌加密进程导致的明文结束位与加密结束位的错位;以明文结束符EOP作为解密计算正确性的效验码;(1)、在加/解密之初,根据初始动态驱动向量vector 0生成明文结束符EOP,及长度为位段长度限定最大值L max的追加伪随机串ms additn,将两者追加到明文尾端;(2)、加密过程中当计算所得位段长度ls i小于未加密明文的长度时停止计算;(3)、解密完成后以明文结束符EOP判定明文结束位置,并效验解密生成的明文的正确性。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA3184576A CA3184576A1 (en) | 2020-06-29 | 2021-06-25 | Sequence encryption method for composite rebuild of keys |
AU2021298570A AU2021298570B2 (en) | 2020-06-29 | 2021-06-25 | Sequence encryption method for composite rebuild of keys |
EP21830909.4A EP4160979A4 (en) | 2020-06-29 | 2021-06-25 | SEQUENCE ENCRYPTION METHODS FOR COMPOSITE KEY RECONSTRUCTION |
JP2022581664A JP2023532945A (ja) | 2020-06-29 | 2021-06-25 | 鍵を複合再構築するためのシーケンス暗号化方法 |
US17/505,509 US20220038256A1 (en) | 2020-06-29 | 2021-10-19 | Sequence encryption for refactoring reconstructed-key |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010602861 | 2020-06-29 | ||
CN202010602861.2 | 2020-06-29 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/505,509 Continuation US20220038256A1 (en) | 2020-06-29 | 2021-10-19 | Sequence encryption for refactoring reconstructed-key |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022001885A1 true WO2022001885A1 (zh) | 2022-01-06 |
Family
ID=77869222
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/102451 WO2022001885A1 (zh) | 2020-06-29 | 2021-06-25 | 复重构密钥的序列加密方法 |
Country Status (7)
Country | Link |
---|---|
US (1) | US20220038256A1 (zh) |
EP (1) | EP4160979A4 (zh) |
JP (1) | JP2023532945A (zh) |
CN (1) | CN113472514A (zh) |
AU (1) | AU2021298570B2 (zh) |
CA (1) | CA3184576A1 (zh) |
WO (1) | WO2022001885A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118018331B (zh) * | 2024-04-09 | 2024-06-18 | 江苏琦易数字科技有限公司 | 一种大数据云服务的隐私保护方法及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130142323A1 (en) * | 2011-12-01 | 2013-06-06 | Joseph P. Chiarella | Methods and systems for deriving a cryptographic framework |
CN107196760A (zh) * | 2017-04-17 | 2017-09-22 | 徐智能 | 具有可调整性的伴随式随机重构密钥的序列加密方法 |
CN108377180A (zh) * | 2018-03-29 | 2018-08-07 | 哈尔滨理工大学 | 一种基于stm32的无线保密通信系统 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5113444A (en) * | 1990-09-05 | 1992-05-12 | Arnold Vobach | Random choice cipher system and method |
WO2016038428A1 (en) * | 2014-09-14 | 2016-03-17 | Alexandre Durand | Cryptographic system based on reproducible random sequences |
-
2021
- 2021-06-22 CN CN202110693421.7A patent/CN113472514A/zh active Pending
- 2021-06-25 CA CA3184576A patent/CA3184576A1/en active Pending
- 2021-06-25 AU AU2021298570A patent/AU2021298570B2/en not_active Expired - Fee Related
- 2021-06-25 WO PCT/CN2021/102451 patent/WO2022001885A1/zh active Application Filing
- 2021-06-25 EP EP21830909.4A patent/EP4160979A4/en active Pending
- 2021-06-25 JP JP2022581664A patent/JP2023532945A/ja active Pending
- 2021-10-19 US US17/505,509 patent/US20220038256A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130142323A1 (en) * | 2011-12-01 | 2013-06-06 | Joseph P. Chiarella | Methods and systems for deriving a cryptographic framework |
CN107196760A (zh) * | 2017-04-17 | 2017-09-22 | 徐智能 | 具有可调整性的伴随式随机重构密钥的序列加密方法 |
CN108377180A (zh) * | 2018-03-29 | 2018-08-07 | 哈尔滨理工大学 | 一种基于stm32的无线保密通信系统 |
Non-Patent Citations (2)
Title |
---|
CHEN, LONGBIAO ET AL.: "Research on Image Encryption Technology Based on Chaos Theory", COMPUTER MEASUREMENT & CONTROL, no. 8, 25 August 2019 (2019-08-25), pages 254 - 257, XP055884553 * |
See also references of EP4160979A4 |
Also Published As
Publication number | Publication date |
---|---|
AU2021298570A1 (en) | 2023-02-09 |
CA3184576A1 (en) | 2022-01-06 |
JP2023532945A (ja) | 2023-08-01 |
AU2021298570B2 (en) | 2024-05-02 |
CN113472514A (zh) | 2021-10-01 |
US20220038256A1 (en) | 2022-02-03 |
EP4160979A1 (en) | 2023-04-05 |
EP4160979A4 (en) | 2024-07-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9871654B2 (en) | System for scrambling and methods for use therewith | |
CN101984574B (zh) | 一种数据加解密方法及装置 | |
US8509427B2 (en) | Hybrid mode cryptographic method and system with message authentication | |
Lucks | Faster luby-rackoff ciphers | |
US6259789B1 (en) | Computer implemented secret object key block cipher encryption and digital signature device and method | |
JP2010140026A (ja) | 連鎖暗号モードのための方法および装置 | |
US8712036B2 (en) | System for encrypting and decrypting a plaintext message with authentication | |
CN107196760B (zh) | 具有可调整性的伴随式随机重构密钥的序列加密方法 | |
US20020048364A1 (en) | Parallel block encryption method and modes for data confidentiality and integrity protection | |
WO2012071725A1 (zh) | 一种数据选择加密解密方法及装置 | |
AU2003273688B2 (en) | Method of generating a stream cipher using multiple keys | |
JPH09230787A (ja) | 暗号化方法および装置 | |
Shrimpton et al. | A modular framework for building variable-input-length tweakable ciphers | |
US10439802B2 (en) | System for scrambling and methods for use therewith | |
WO2022001885A1 (zh) | 复重构密钥的序列加密方法 | |
JP2003535378A (ja) | ビット単位の論理演算を使用した並列モジュロ演算 | |
US20010033654A1 (en) | W-EC1 encryption and decryption method and system | |
JP2003535363A (ja) | 複数の送信攻撃から暗号システムを保護する方法 | |
JP2003535500A (ja) | 暗号化されたメッセージの妥当性を確認する方法 | |
US8363829B2 (en) | System for descrambling and methods for use therewith | |
JP2003535499A (ja) | メッセージの終わりのマーカ | |
CN113055716A (zh) | 视频流实时加密方法及系统 | |
CN111130768B (zh) | 一种轻量级区块链中快速生成消息摘要的方法 | |
CN118473642A (zh) | 一种提升分组密码安全性的方法 | |
Wetzels et al. | Sponges and engines: an introduction to Keccak and Keyak |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21830909 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022581664 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 3184576 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202317000040 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2021830909 Country of ref document: EP Effective date: 20221228 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2021298570 Country of ref document: AU Date of ref document: 20210625 Kind code of ref document: A |