Movatterモバイル変換


[0]ホーム

URL:


CN109218013A - Cover the binary data communication encryption method on plaintext symbol boundary - Google Patents

Cover the binary data communication encryption method on plaintext symbol boundary
Download PDF

Info

Publication number
CN109218013A
CN109218013ACN201811177377.9ACN201811177377ACN109218013ACN 109218013 ACN109218013 ACN 109218013ACN 201811177377 ACN201811177377 ACN 201811177377ACN 109218013 ACN109218013 ACN 109218013A
Authority
CN
China
Prior art keywords
encryption
plaintext
bit
encryptor
bits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811177377.9A
Other languages
Chinese (zh)
Inventor
沃尔夫冈·安德雷亚斯·哈朗
谭非
其他发明人请求不公开姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao University of Science and Technology
Original Assignee
Qingdao University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao University of Science and TechnologyfiledCriticalQingdao University of Science and Technology
Priority to CN201811177377.9ApriorityCriticalpatent/CN109218013A/en
Publication of CN109218013ApublicationCriticalpatent/CN109218013A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The present invention relates to the binary data communication encryption methods for covering plaintext symbol boundary comprising by means of encryption equipment, and passes through protocol communication and the decipher of decryption and algorithm of the encryption equipment encryption with synchronous operation;Encryption equipment, encryption have the algorithm of synchronous operation with decryptor decryption, and randomly selected parameter is by encryption equipment;This method is this assumes that the symbol of final plaintext letter and ciphertext letter all uses a little binary coding representations;The present invention has rational design, compact-sized and easy to use.

Description

Cover the binary data communication encryption method on plaintext symbol boundary
Technical field
The present invention relates to the binary data communication encryption methods for covering plaintext symbol boundary.
Background technique
A large amount of technology has been developed over time and has carried out encrypting traffic, and universal operating principle can be in numberIt is described as follows on.
That to be transmitted is information symbol (plaintext) s0, s1 from any alphabet S ... sequence.Message is by havingThe sender of encryption function encrypts, and is transmitted to recipient's decryption with reversed decryption function.According to Ke Ke Hough principle, thisTwo kinds of functions are usually disclosed, but are parameterized by key K, pass through secrecy and reliable channel between communication unitArrange key K.According to this key, sender and recipient can generate state by state transition function f in discrete time t > 0Sequence
σt+1=f (σt, K)
And key stream is obtained by key stream generating function g
zt=g (σt, K).
Original state σ0It can be disclosed, can also be exported from key K.Then pass through invertible mapping in plain text
ct=h (zt, st)
State is relatively connected with key stream and ciphertext, and such ciphertext can be by applying back mapping
st=h-1(zt, ct)
It is decrypted.Key stream sequence must be as similar to real random sequence as possible.In the feelings of self-synchronizing stream cryptosystemUnder condition, state σt+1Determination additionally depend on the ciphertext symbol c ultimately producedt..., ct-l+1, wherein l is fixed and l >=1,.
When each possible ciphertext can from cleartext information with identical probability encryption generation, and completely can notIt is systematically released from ciphertext in plain text, referred to as perfact secrecy.According to the philosophy of the information theory of Shannon, only when canCan number of keys at least with possible message number as many when, just think that encryption system is Perfect Secrecy.Therefore, keyQuantity also at least with the quantity of possible ciphertext as many, and the quantity that the quantity of ciphertext must at least with possible plaintextAs many.
However, encryption method used at present uses the same key, therefore password point usually in longer time sectionAnalysis is fragile on learning.Such as, it has been shown that the asymmetric cryptosystem being widely used according to the 768 of RSA method keys is at leastTheoretically it has been cracked.Even if symmetric cryptosystem data encryption standards (DES) is also considered as unsafe, it is not recommended thatFor practical application.Other methods, if Triple-DES or Advanced Encryption Standard (AES) are presently believed to be safe, onlyBecause current existing computing capability can't all try all keys one time.Common encryption method has been cracked, orPerson will be cracked within the foreseeable time, so their key generally has to be stored in government organs.Therefore, from long-range nextIt sees, due to the uniqueness that the key according to Shannon's theorems uses, only the Fu Namu enciphered method or disposal password of overall safetyOriginally it is only reasonable.
If a digital cipher be it is random and it is equally distributed selected, it is long as digital massage and only uses oneIt is secondary, it is known as disposal password sheet.This means that providing the key bit determined at random for each message bit, pass throughExclusive or generates ciphertext.Since all keys are generated with identical probability, attacker is also based on phase to the hypothesis of plaintextSame probability.Because system eavesdrops no information foundation, the chance very little of the disposal password used is guessed.Even if thisBe on rare occasion it is possible, there will not be too many harvest, because next message is added by another one time keyIt is close.
Such a fact is utilized in some nearest encryption technologies, i.e., (reversible) mapping of dijection not only can be used, andIt and can also be that the relationship of surjection mapping is encrypted using reverse-power.The two methods permission of short summary below is addingAn icon is randomly choosed when close plaintext symbol from one group of possible encryption.This increases the length of ciphertext naturally.
According to the symbol of letter in plain text by bijective map to the equivalence class of the pictorial symbol in usually bigger image collection.In order to be encrypted to plaintext symbol, pictorial symbol be it is randomly selected from the equivalence class of corresponding image collection, makeObtaining ciphertext can not be attacked as far as possible with statistical method.Plaintext symbol by pictorial symbol one-to-one correspondence be substituted for ciphertext, here it is forWhat can directly infer the boundary between plaintext symbol as every other known method from the boundary between pictorial symbolThe reason of.
The character of (Latin) plaintext letter is mapped to one by one first on the element of another disclosed alphabet.This instituteThe element of the Denier letter of meaning is indicated by the letter of fixed quantity.If identical letter is mutually tight in Denier plaintextIt suffers, is then inserted into special letter W between them.The each letter for the Denier plaintext so modified can actual encrypted itPreceding repetition any as needed.After decryption, all duplicate letters and W letter are deleted, and reduction Denier is in plain text.With arbitrary figureAs key, node alphabetic flag.In order to carry out secret information exchange, sender and recipient agree to such oneA figure is as key and a node as starting point.Ciphertext can regard as by along have extension Denier plaintext alphabetic flagNode (or several, an if necessary) path corresponding to side flag sequence composition.Since recipient knows starting point,It can move in specified Bian Tu and read the label of arrival node to decrypt.Boundary between plaintext symbol is visibleGround travels to ciphertext, because it is the direction instruction of the regular length by being used to roam in (key) figure from node-to-nodeComposition.Regardless of start node, this is immediately arrived between the letter in extension Denier in plain text (including Denier plaintext)Boundary, element and plaintext symbol correspond.Although extending Denier in plain text on the basis of Denier plaintext with W letterIt is extended with duplicate letter and can not see whether bearing data corresponds to extra W or other are duplicate in ciphertextLetter however, the boundary of original letter and additional letter does not disappear during encryption, but is kept former in direction instructionSample, to provide the point of attack for cryptanalysis.
All other known encryption method has in common that their data elements to be transmitted, either bit,Alphanumeric symbol still includes the byte of binary data, individually or in groups, is always encrypted as unmodified unit,Therefore, can readily determine that the quantity of data item in ciphertext and between boundary.The information theory model of Shannon encryption systemIt is also using this default, restrictive basic assumption as foundation.Therefore, the number on the boundary such as between data element and theyThe information of amount etc also by observable and is unencrypted transferred in ciphertext.Under normal conditions, plaintext symbol and ciphertext symbolIt is corresponding.Even if using block cipher, also hardly using 256 data cells are greater than, in plain text with the symbol in ciphertextIt is that very close position is arranged or be at least placed in identical sequence.Therefore, in plaintext and ciphertext, corresponding symbolIt can easily be matched, this, which to crack the password used, becomes to be more easier.
All known encryption methods always always encrypt the data element of transmission as unmodified unit.It is fragrantThe information theory model of agriculture cryptographic system is also based on this restrictive basic assumption.Accordingly, with respect between plaintext symbolThe information of boundary and their quantity also by observable and is unencrypted transmitted in ciphertext: under normal conditions, plaintext symbolIt is corresponding with ciphertext symbol.Because even symbol is also arranged in plain text and in ciphertext with identical sequence using block cipher,Or their position is closer to each other, so this makes corresponding symbol can be matched easily in plain text and in ciphertextObtaining decryption becomes to be more easier.
Summary of the invention
The encryption method on the cover plaintext symbol boundary in the present invention is different from the prior art.Skill to be solved by this inventionArt problem is generally speaking to provide a kind of binary data communication encryption method for covering plaintext symbol boundary;This method is to will transmitBinary data not only carry out encryption safe in information theory but also mask the boundary between the plaintext symbol of encryption.In detailThin the technical issues of solving and acquirement beneficial effect in aftermentioned content and combine content in specific embodiment to specifically describe.
A kind of binary data communication encryption method for covering plaintext symbol boundary, by means of encryption equipment, and passes through agreementCommunication and decryption have the decipher of the algorithm of synchronous operation with encryption equipment encryption;Encryption equipment, encryption have with decryptor decryptionThere is the algorithm of synchronous operation, randomly selected parameter is m by encryption equipmentt
This method is this assumes that the symbol of final plaintext letter and ciphertext letter all uses a little binary coding representations;It shouldMethod includes the following steps;
Step 1, firstly, determining random selection one in each state of ciphering sequence and mark encrypted simultaneouslyNumber of bits;Then, identification bit bit pattern is replaced with different identification bit digits and the encryption bit pattern that is longer than;Secondly, from true random selection encryption in the ciphertext group of the plaintext bit pattern, and the non-public affairs are connected to via public's unknown relationThe reverse-power of open relation is surjection;
Step 2, the encryption equipment and decipher being in communication with each other, which import at the time point of true random to ciphering sequence, updates shapeState, and the parameter value updated and encryption and decryption relationship are determined for ciphering sequence;
Step 3, firstly, in each state of ciphering sequence, determine any selection and be used to indicate letter in plain textThe unrelated and different number of bits of number of bits, and it is encrypted;Then Fu Namu is combined in the ciphering processMethod generates one time key.
Encryption equipment includes USB plug, for carrying out data transmission with external equipment and charging;Output register, length n> mt, when each cryptographic operation, the code character of corresponding ASCII fromat is used to export;Have 2 by readingnA dataThe read-only memory of word to n-bit bit length is encrypted;Microcontroller, output end are connect with USB plug, receive output depositThe code character of device output;Input register receives the random value and parameter m of microcontroller outputt;Read-only memory, inputEnd is connect with input register output end;Its storage address by input register content and n-mtThe bit of a stochastic productionConnection is formed;Shift register receives and processes the input traffic of microcontroller output, output end and input registerInput terminal connection.
In each state of ciphering sequence, identification bit digit to be encrypted redefines in any way.
Step 4 encrypts the data packet for transmitting between encryption equipment and decipher;
Step 5 uses randomness in the encryption of data communication.
In step 3, the interconnection of the binary code of plaintext symbol is established in functional relation, and close in functionIt fastens and identifies bit mode in individual step 1 for each of to be encrypted, in respective image group in a manner of true randomSelection encryption, and the gesture of the image collection is greater than 1.
Status switch σ is generated to the key K of encryption, key K transfer function ft+1=f (σt, K);
Functional relation connection is established, is included the following steps,
Step A, firstly, in each state σtIn, true random selects mtA identification bit position encrypts together, wherein parametermtIt is odd number and the number of bits k for being different from plaintext letter character coding;
Step B, for every m in streamtA bit is according to State-dependence relationship
It obtains with n > mtThe encryption of a identification bit position;{ 0,1 }nIn element pass through RtWithIn it is everyA element is associated;{ 0,1 }nEach element beAn element effective ciphertext;
Step C, the reverse-power of formula (1), which is established, which becomes surjection, maps
Underground processing is carried out to this decryption function formula (3);Uniquely disclose,It is finite aggregate { 0,1 }nTo another finite aggregateIt is all map in any one;
Step D, firstly, according to σtIn the encryption equipment of state, the lower m of plaintext symbol boundary that data flow is ignored streamt1 bit of > is sent to the position before input register;Then, after real random value being distributed to input registern-mtA position;Then, read-only memory is read using the content of input register as address;Finally, by covering and encryptingOperate implementation relation Rt
Firstly, the bit bit pattern read from memory indicates ciphertext, and output register is written in step E;Then, joinNumber n is by the integral multiple of selection number:
N=N × l formula (4);L >=1,
6 positions are taken out from output register every time secondly, dividing l times, and are associated with one effectively by being added with 32Ascii character;Again, which is transferred to decipher using puppy parc in a data network;And then, it is decryptingIn device, corresponding reverse operating executes in reverse order, in as the received ascii character of ciphertext, subtracts 32 and extracts NA least significant bit links up the N bits in l group, passes through mappingDecrypt its result;In next step, by seekingLocation and reading are stored in the value table of read-only memory;Finally, reconfiguring plaintext symbol from the bit vectors obtained.
Step F, during operation, the length that encryption equipment arrives input register one on the time point that true random selectsChange parameter m in rangetValue, and correspondingly identify the encryption of each self application be related to the equipment and mirror image building and operation solutionClose equipment just encrypt in it is fragmentary variation reach an agreement.
Step 6 generates one time key, needs random number or random bit sequences for parameter assignment and definition encryption relationship;
Step 7, the ciphering sequence and disposal password that encryption equipment is covered to decipher transmission;
Firstly, it is m that binary data packets in step 4, which are divided into length,tData segment, true random select RtThe figure of seriesPicture, and it is connected into the image of n bit length;Then, the bit chain obtained is encrypted with the one time key of equal length.
Step 8, firstly, generating real random value;Then, the table index insertion of true random selection is covered and is addedIt is converted in close transmission data packet with starting state;Secondly, ROM module is fixedly mounted in encryption equipment and decipher;Again, index is directed toward the parameter inside read-only memory, seed and the relationship for encrypting and covering.
Beneficial effects of the present invention description without being limited thereto, in order to preferably be easy to understand, specific embodiment part intoMore detailed description is gone.
Detailed description of the invention
Fig. 1 is structural schematic diagram of the invention.
Specific embodiment
It, can be in encryption sequence due to being indicated in plain text with ciphertext symbol with binary system in the realization of the technology of cryptographic systemRandom selection one is determined in each state of column and identification bit digit encrypted simultaneously, this identification bit digit onrelevantAnd it is different from the number of bits of plaintext alpha code, thus can not be again from the boundary derived in ciphertext between plaintext symbol.
The binary data communication encryption method for covering plaintext symbol boundary by means of by means of encryption equipment, and passes through associationView communication and decryption have the decipher of the algorithm of synchronous operation with encryption equipment encryption;
Encryption equipment, encryption have the algorithm of synchronous operation with decryptor decryption, and randomly selected parameter is by encryption equipmentmt;Encryption equipment includes USB plug, for carrying out data transmission with external equipment and charging;Output register, length n > mt,When each cryptographic operation, the code character of corresponding ASCII fromat is used to export;Have 2 by readingnA data word arrivesThe read-only memory of n-bit bit length is encrypted;Microcontroller, output end are connect with USB plug, receive output registerThe code character of output;Input register receives the random value and parameter m of microcontroller outputt;Read-only memory, input terminalIt is connect with input register output end;Its storage address by input register content and n-mtThe bit of a stochastic production connectsIt connects to be formed;Shift register receives and processes the input traffic of microcontroller output, output end and input registerInput terminal connection.
This method is this assumes that the symbol of final plaintext letter and ciphertext letter all uses a little binary coding representations;CauseThis, the most common form of bit bit pattern replacement be used to encrypt, thus in this ciphering process, between plaintext symbolBoundary is to become blurred.This approach includes the following steps,
Step 1, firstly, determining random selection one in each state of ciphering sequence and mark encrypted simultaneouslyNumber of bits;Then, identification bit bit pattern is replaced with different identification bit digits and the encryption bit pattern that is longer than;Secondly, from true random selection encryption in the ciphertext group of the plaintext bit pattern, and the non-public affairs are connected to via public's unknown relationThe reverse-power of open relation is surjection;
Step 2, the encryption equipment and decipher being in communication with each other, which import at the time point of true random to ciphering sequence, updates shapeState, and the parameter value updated and encryption and decryption relationship are determined for ciphering sequence;
Step 3 determine any selection and and is used to indicate the ratio of letter in plain text in each state of ciphering sequenceThe unrelated and different number of bits of special digit, and it is encrypted.
Further, in each state of ciphering sequence, identification bit digit to be encrypted redefines in any way.
Further, Fu Namufa, the one time key of generation are combined in the ciphering process.
Step 4 encrypts the data packet for transmitting between encryption equipment and decipher, only meets in decryptionIt just can be with the content of recovery data packets when the corresponding expectation of source and ciphering sequence state.
Step 5 uses randomness in the encryption of data communication, to allow according in the above method, it is only necessary toSender determines random value.
For each plaintext bit pattern, pass through in the associated ciphertext group of the unknown and randomly selected relationship of the public from itTrue random selection encryption.This method and Fu Namu enciphered method combine, and the one time key of generation can not be cracked,That is can not be restored in plain text by generating all possible one time key.In addition, this method is used directly to disappearThe certification of breath.
Further, in step 3, the interconnection of the binary code of plaintext symbol is established in functional relation, andBit mode is identified in individual step 1 for each of to be encrypted in functional relation, corresponding in a manner of true randomImage group selection encryption, and the gesture of the image collection is greater than 1;So ciphertext number of bits has also exceeded the bit bit pattern of encryptionLength, this method changes that bandwidth is rare and message should example as short as possible.Due to such cover, thus by closeThe point of attack of code analysis has been eliminated.
Specifically, key K transfer function f generates status switch σ based on the key K to encryptiont+1=f (σt, K);
It establishes in functional relation connection and includes the following steps,
Step A, firstly, in each state σtIn, true random selects mtA identification bit position encrypts together, wherein parametermtIt is odd number and the number of bits k for being different from plaintext letter character coding;Thus eliminating the need the boundaries between plaintext symbol.
Step B, for every m in streamtA bit is according to State-dependence relationship
It obtains with n > mtThe encryption of a identification bit position;Parameter n is not less than mt, avoiding information can lose, also etc.In mt, to solve the disadvantage that the above-mentioned prior art.And function h is compared, relationship RtNeed not be mapping.{ 0,1 }nIn element it is logicalCross RtWithIn each element it is associated, exist in this wayIn can be encrypted with the selection of true random.ThisOutside, { 0,1 }nEach element beAn element effective ciphertext, to make full use of existing encryption mayProperty.
Step C, the reverse-power of formula (1), which is established, which becomes surjection, maps
In the presence of decryption property.With Ke Ke Hough principle on the contrary, carrying out underground processing to this decryption function formula (3),It is accordingly used in the relationship R of encryptiontIt is not only not well known, nor is function.Uniquely disclose,It is finite aggregateIt closes { 0,1 }nTo another finite aggregateIt is all map in any one;
Burst of data stream is made of the information symbol that length is k bit.In general, in current information technology, k ginsengSeveral values is 8, and a symbol is a byte, it is comprising binary data or at ASCII (ASCII)In by 7 bits indicate an alphanumeric character and a parity check bit.
Step D, firstly, according to σtIn the encryption equipment of state, the lower m of plaintext symbol boundary that data flow is ignored streamt1 bit of > is sent to the position before input register;Then, after real random value being distributed to input registern-mtA position;Then, read-only memory is read using the content of input register as address;Finally, by covering and encryptingOperate implementation relation Rt
Firstly, the bit bit pattern read from memory indicates ciphertext, and output register is written in step E;Then, outIn actually consideration and without general limitation, parameter n is by the integral multiple of selection number (such as 6):
N=N × l formula (4);L >=1,
6 positions are taken out from output register every time secondly, dividing l times, and are associated with one effectively by being added with 32Ascii character;Again, which is transferred to decipher using puppy parc in a data network;And then, it is decryptingIn device, corresponding reverse operating executes in reverse order, in as the received ascii character of ciphertext, subtracts 32 and extracts NA least significant bit links up the N bits in l group, passes through mappingDecrypt its result;In next step, by seekingLocation and reading are stored in the value table of read-only memory;Finally, reconfiguring plaintext symbol from the bit vectors obtained.
Further, above situation has made data encryption of the invention is very difficult to be cracked.Only attacker possesses oneDetermine the ciphertext of degree and carry out analysis appropriate (computing capability necessary to ignoring completely thus) could to decrypt.Through the inventionThe appearance arranged below that can prevent the sufficiently long ciphertext generated by selection parameter and encryption relationship.Step F, in the operation phaseBetween, encryption equipment changes parameter m on the time point that true random selects in one to input register length rangetValue,And correspondingly identify the encryption of each self application be related to the equipment and mirror image building and operation decryption device just encrypt in it is fragmentaryVariation is reached an agreement.
For example, the length n of output register is allowed to be fixed as 24, and allow the selection parameter m from { 1,3 ..., 19 }t.OftenA cryptographic operation can transmit the code character of 4 ASCII fromats.The relationship for realizing encryption is that have 2 by reading24A dataThe read-only memory of 24 bit lengths of word is realized.Storage address is by by input register content and 24-mtIt is a randomThe bit of generation is together in series and is formed.The read-only memory of this capacity corresponds to the prior art, and can be with micro-controlDevice processed is placed on together in light small shell.These equipment can be submitted to individual in person, and be installed by them, such as certainlyIn dynamicization equipment, one secrecy for secret information transmitting of this process description and reliable channel.The owner of equipmentThe data to be transmitted can also be encrypted from Anywhere using, for example, in bank transaction.A kind of plaintext symbol edge maskThe simplification variant of encryption is to provide R in the form of PRBS pseudo-random bit sequence and numbertContent and parameter value.It is sent out in random timeIn raw state conversion process, relationship R is redefined in sender and recipienttWith parameter mt
With pseudo random number on the contrary, really random number sequence is uncertain.Their randomness is unrelated with initial value,And the random number for repeating to generate under identical boundary condition does not have identical value.For the purpose of encryption, really withMachine number is better than pseudo random number.The known method for generating physical randomness is usually to adopt to natural physics signal sourceIt is carried out on the basis of sample, such as radioactive decay or observes hot Johnson-in resistance, Zener diode and transistorNyquist noise.
Random value derives from chaos system, significant effort to be paid is cracked, in order to be analyzed accordingly, in addition to necessityComputing capability except, it is also necessary to largely intercept ciphertext.
In order to cope with this extremely low risk by further increasing code obfuscation and diffusion, the data to be transmitted in addition toIt covers and also needs disposal password outside encryption:
Step 6 generates one time key, needs random number or random bit sequences for parameter assignment and definition encryption relationship
Step 7, the ciphering sequence and disposal password that encryption equipment is covered to decipher transmission;
Firstly, it is m that binary data packets in step 4, which are divided into length,tData segment, true random select RtThe figure of seriesPicture, and it is connected into the image of n bit length;Then, the bit chain obtained is encrypted with the one time key of equal length;
The execution sequence of the two steps can exchange once in a while in the time that true random selects.For encrypting and coverThe various and random variations of lid, not the selection of the realization modification of the thin nothing left of hard iron includes further step below,It prevents the ciphering sequence that length is suitble to cryptanalysis and is generated by determining parameter value and relationship from the beginning.SubstantiallyTransmission cryptographic variable as few as possible and the truly random value of use as much as possible between communication equipment.
Step 8, firstly, generating real random value;Then, the table index insertion of true random selection is covered and is addedIt is converted in close transmission data packet with starting state;Secondly, ROM module is fixedly mounted in encryption equipment and decipher;Again, index is directed toward the parameter inside read-only memory, seed and the relationship for encrypting and covering.
The production of ROM module, the transmission for transporting and being installed as secret information provide secrecy and reliableChannel can correspond to the transaction verification code method of Web bank.
The present invention has the advantages that passing through selection parameter mt≠ k and n > mt, realize by the side between the symbol in ciphertextBoundary can no longer be inferred to the boundary of symbol in clear data stream easily.Due to n > mt, this organizes possible encryption element and is converted intoOne very big image set, this makes the cryptanalysis of attacker become extremely difficult.ForWhereinIt is surjection mapping, the quantity of all possible relationship isFor practical purposes, m is selectedtIt is 10 that=17 and n=24, which is exactly the order of magnitude,946.701A difference relationship, this is oneA considerable quantity.A possibility that this group of relationship includes all bit bit maps, n-mtA redundant position, each position0 or 1 can be inserted, is so inserted into output bit modelIn a position again with encryption element bitValue connect together.
By combine disposal password and cover plaintext symbol boundary encryption, password obscure and diffusion increases, can notDisposal password can be generated algorithmically by again to crack encryption, specifically be restored by generating all possible disposal passwordBecoming in plain text can not.
As another advantage, according to the method for the present invention and its and the combination of a password the instant of message may be implementedVerifying, because their high complexity is without any additional effort.In order to verify the source of the data packet received, connectDebit only needs to check whether certain data fields include desired value.If data packet is not from correct sender, or solutionIt is close to malfunction with the operand or other problems for having used mistake when going and covering, then obtained bit model can always deviate.

Claims (9)

Translated fromChinese
1.一种掩盖明文符号边界的二进制数据通信加密法,其特征在于:借助于加密器,以及通过协议通信且解密与加密器加密具有同步运行的算法的解密器;加密器,其加密与解密器解密具有同步运行的算法,加密器将随机选择的参数为mt1. a binary data communication encryption method that covers the boundary of plaintext symbols, it is characterized in that: by means of encryptor, and by protocol communication and decryption and encryptor encryption have the decryptor of the algorithm running synchronously; encryptor, its encryption and decryption The encryptor decrypts an algorithm that runs synchronously, and the encryptor will randomly select the parameter mt ;该方法前提是假设最终的明文字母和密文字母的符号都用些二进制编码表示;该方法包括以下步骤;The premise of the method is to assume that the symbols of the final plaintext letters and ciphertext letters are represented by some binary codes; the method includes the following steps;步骤一,首先,在加密序列的每个状态中确定随机选择一个并同时被加密的标识比特位数;然后,用不同的标识比特位数且长于的加密位模式对标识比特位模式进行替换;其次,从经由公众未知关系连接到该明文位模式的密文组中真正随机选择加密,且该非公开关系的逆关系是满射;Step 1, at first, in each state of the encrypted sequence, determine to randomly select one and be encrypted at the same time the number of identification bits; Then, replace the identification bit pattern with the encrypted bit pattern of different identification bits and longer than; Second, the encryption is truly randomly selected from the set of ciphertexts connected to the plaintext bit pattern via a public unknown relation, and the inverse relation of the nonpublic relation is surjective;步骤二,相互通信的加密器和解密器在真正随机的时间点给加密序列导入更新状态,并为加密序列确定更新的参数值以及加密和解密关系;Step 2, the mutually communicating encryptor and decryptor import the update state to the encrypted sequence at a truly random time point, and determine the updated parameter value and the encryption and decryption relationship for the encrypted sequence;步骤三,首先,在加密序列的每个状态中,确定任一选择的且与用来表示明文字母的比特位数无关且不同的比特位数,并对其进行加密;然后在所述加密过程中结合弗纳姆法,产生一次性密钥。Step 3: First, in each state of the encryption sequence, determine any selected number of bits that is independent of and different from the number of bits used to represent plaintext letters, and encrypt it; then in the encryption process Combined with Vernham's method, a one-time key is generated.2.根据权利要求1所述的掩盖明文符号边界的二进制数据通信加密法,其特征在于:加密器包括USB插头,用于与外部设备进行数据传输与充电;输出寄存器,其长度n>mt,每次加密操作时候,将对应的ASCII格式的代码字符用于输出;通过读取具有2n个数据字到n比特位长的只读存储器进行加密;微控制器,其输出端与USB插头连接,接收输出寄存器输出的代码字符;输入寄存器,接收微控制器输出的随机值与参数mt;只读存储器,输入端与输入寄存器输出端连接;其存储器地址由输入寄存器的内容与n-mt个随机生产的比特连接形成;移位寄存器,其接收并处理微控制器输出的输入数据流,其输出端与输入寄存器的输入端连接。2. the binary data communication encryption method of masking plaintext symbol boundary according to claim 1, is characterized in that: encryptor comprises USB plug, is used for carrying out data transmission and charging with external equipment; Output register, its length n>mt , in each encryption operation, the corresponding ASCII format code characters are used for output; encryption is performed by reading a read-only memory with 2n data words to an n-bit length; the output of the microcontroller is connected to the USB plug connection, receive the code character output by the output register; input register, receive the random value and parameter mt output by the microcontroller; read-only memory, the input end is connected with the output end of the input register; its memory address is determined by the content of the input register and nmt A randomly generated bit connection is formed; the shift register, which receives and processes the input data stream output by the microcontroller, the output terminal of which is connected to the input terminal of the input register.3.根据权利要求1所述的掩盖明文符号边界的二进制数据通信加密法,其特征在于:在加密序列的每个状态中,待加密的标识比特位数以任意方式重新确定。3. the binary data communication encryption method of masking the boundary of plaintext symbols according to claim 1, is characterized in that: in each state of encryption sequence, the identification bit number to be encrypted is re-determined in an arbitrary manner.4.根据权利要求1所述的掩盖明文符号边界的二进制数据通信加密法,其特征在于:步骤四,对用于在加密器与解密器之间传输的数据包进行加密;4. the binary data communication encryption method of masking plaintext symbol boundary according to claim 1, is characterized in that: step 4, is used to encrypt the data packet that is transmitted between encryptor and decryptor;步骤五,在数据通信的加密中使用随机性。The fifth step is to use randomness in the encryption of data communication.5.根据权利要求4所述的掩盖明文符号边界的二进制数据通信加密法,其特征在于:在步骤三中,在函数关系上建立明文符号的二进制码的相互连接,并且在函数关系上对于要加密的每个单独的步骤一中标识比特位模式,以真正随机的方式在相应图像组选择加密,且该图像集合的势大于1。5. the binary data communication encryption method of masking plaintext symbol boundary according to claim 4, it is characterised in that: in step 3, on functional relation, establish the mutual connection of the binary code of plaintext symbol, and on functional relation for Each individual step one of encryption identifies the bit pattern, selects encryption in the corresponding group of pictures in a truly random manner, and the potential of this set of pictures is greater than 1.6.根据权利要求5所述的掩盖明文符号边界的二进制数据通信加密法,其特征在于:对加密的密钥K,密钥K转换函数f生成状态序列σt+1=f(σt,K);6. the binary data communication encryption method of masking plaintext symbol boundary according to claim 5, is characterized in that: to encrypted key K, key K conversion function f generates state sequence σt+1 =f(σt , K);建立函数关系连接,包括以下步骤,Establishing a functional relational connection includes the following steps,步骤A,首先,在每个状态σt中,真正随机选择mt个标识比特位一起加密,其中,参数mt是奇数并且不同于明文字母符号编码的比特位数k;Step A, first, in each state σt , select mt identification bits at random to encrypt together, wherein the parameter mt is an odd number and is different from the number of bits k encoded by the plaintext alphabetic symbol;步骤B,对于流中的每mt个比特位根据状态依赖关系Step B, for every mt bits in the stream according to the state dependency得出具有n>mt个标识比特位的加密;{0,1}n中的元素通过Rt中的每个元素相关联;{0,1}n的每个元素都是的一个元素的有效密文;An encryption with n>mt identification bits is obtained; the elements in {0, 1}n are determined by Rt and is associated with each element in ; each element of {0, 1}n is the valid ciphertext of an element of ;步骤C,将公式(1)的逆关系建立成为满射映射Step C, the inverse relationship of formula (1) is established as a surjective mapping对这个解密函数公式(3)进行不公开处理;唯一公开的是,是有限集合{0,1}n到另一个有限集合的所有可映射中的任意一个;This decryption function formula (3) is not publicly processed; the only thing that is disclosed is, is a finite set {0, 1}n to another finite set Any of all mappables of ;步骤D,首先,在根据σt状态的加密器中,把数据流忽略的明文符号边界把流的下mt>1个比特位发送到输入寄存器前面的位置;然后,将真正的随机值分配给输入寄存器的后n-mt个位置;接着,以输入寄存器的内容作为地址读取只读存储器;最后,通过掩盖和加密操作实现关系RtStep D, first, in the encryptor according to the state of σt , the plaintext symbol boundary ignored by the data stream is sent to the position in front of the input register with the lower mt > 1 bits of the stream; then, the real random value is assigned Give the last nmt positions of the input register; then, read the read-only memory with the content of the input register as the address; finally, realize the relation Rt by masking and encrypting operations;步骤E,首先,从存储器读取的比特位模式表示密文,并写入输出寄存器;然后,参数n为被选择数的整数倍:Step E, first, the bit pattern read from the memory represents the ciphertext, and written into the output register; then, the parameter n is an integer multiple of the selected number:n=N×l 公式(4);l≥1,n=N×l Formula (4); l≥1,其次,分l次每次从输出寄存器中取出6个位,并通过与32相加关联到一个有效的ASCII字符;再次,该ASCII字符在数据网络中使用通用协议传输给解密器;紧接着,在解密器中,相应的反向操作以相反的顺序执行,在作为密文接收的ASCII字符中,减去32并提取N个最低有效位,将l个组中的N个比特位联接起来,通过映射解密其结果;下一步,通过寻址和读取存储在只读存储器的值表;最后,从获得的比特向量重新组合明文符号。Second, 6 bits are taken out of the output register each time in l times, and are associated with a valid ASCII character by adding 32; again, the ASCII character is transmitted to the decryptor using a common protocol in the data network; then, In the decryptor, the corresponding reverse operations are performed in reverse order, in the ASCII characters received as ciphertext, subtract 32 and extract the N least significant bits, concatenate the N bits in the l groups, by mapping The result is decrypted; next, by addressing and reading a table of values stored in read-only memory; finally, the plaintext symbols are reassembled from the obtained bit vector.7.根据权利要求6所述的掩盖明文符号边界的二进制数据通信加密法,其特征在于:步骤F,在操作期间,加密器在真正随机选择的时间点上在一到输入寄存器的长度范围内改变参数mt的值,并相应地识别各自适用的加密关系该设备和镜像构建和运行的解密设备就加密中的零星变化达成一致。7. the binary data communication encryption method of masking plaintext symbol boundary according to claim 6, is characterized in that: step F, during operation, encryptor is in the length scope to input register at the time point of really random selection Vary the value of the parameter mt and identify the respective applicable encryption relationship accordingly. The device and the decryption device on which the image is built and run agree on sporadic changes in encryption.8.根据权利要求7所述的掩盖明文符号边界的二进制数据通信加密法,其特征在于:步骤六,生成一次性密钥,为参数赋值和定义加密关系需要随机数或随机位序列;8. the binary data communication encryption method of masking plaintext symbol boundary according to claim 7, is characterized in that: step 6, generates one-time key, needs random number or random bit sequence for parameter assignment and definition encryption relation;步骤七,加密器向解密器传输掩盖的加密序列与一次性密码;Step 7: The encryptor transmits the masked encrypted sequence and the one-time password to the decryptor;首先,将步骤四中二进制数据包分成长度为mt的数据段,真正随机选择Rt系列的图像,并串联成n位长的图像;然后,用相同长度的一次性密钥加密得出的比特链。First, the binary data packet in step 4 is divided into data segments of length mt , the images of the Rt series are truly randomly selected, and concatenated into n-bit long images; then, encrypted with a one-time key of the same length. Bitchain.9.根据权利要求8所述的掩盖明文符号边界的二进制数据通信加密法,其特征在于:步骤八,首先,生成真正的随机值;然后,将真正随机选择的表索引插入掩盖和加密的传输数据包中以启动状态转换;其次,只读存储器模块固定安装在加密器与解密器中;再次,索引指向只读存储器里面的参数,种子值和用于加密和掩盖的关系。9. the binary data communication encryption method of masking plaintext symbol boundary according to claim 8, is characterized in that: step 8, at first, generate real random value; Then, the table index of real random selection is inserted into the transmission of masking and encryption In the data packet, the state transition is started; secondly, the read-only memory module is fixedly installed in the encryptor and decryptor; thirdly, the index points to the parameters in the read-only memory, the seed value and the relationship used for encryption and masking.
CN201811177377.9A2018-10-102018-10-10Cover the binary data communication encryption method on plaintext symbol boundaryPendingCN109218013A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201811177377.9ACN109218013A (en)2018-10-102018-10-10Cover the binary data communication encryption method on plaintext symbol boundary

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201811177377.9ACN109218013A (en)2018-10-102018-10-10Cover the binary data communication encryption method on plaintext symbol boundary

Publications (1)

Publication NumberPublication Date
CN109218013Atrue CN109218013A (en)2019-01-15

Family

ID=64982952

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201811177377.9APendingCN109218013A (en)2018-10-102018-10-10Cover the binary data communication encryption method on plaintext symbol boundary

Country Status (1)

CountryLink
CN (1)CN109218013A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111694877A (en)*2019-03-122020-09-22通用电气公司Multivariate time series data search
CN111835506A (en)*2019-04-182020-10-27广州佳欣未来科技有限公司Information safety digital encryption method based on one-time-use cipher book
CN112000912A (en)*2020-08-242020-11-27湖南凯迪工程科技有限公司Method and system for constructing front-end and back-end separation of website
CN112887079A (en)*2021-03-112021-06-01中国石油大学(华东)Transformation encryption algorithm based on generation of random bit sequence
CN114938271A (en)*2022-04-292022-08-23浙江工业大学One-time pad method based on state machine

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1241352C (en)*1997-04-022006-02-08亚历山大·安得烈耶维奇·莫尔多维安 Method for Encrypting Binary-Encoded Information
DE102005006713B4 (en)*2005-02-152013-10-31Wolfgang Halang Method for binary data encryption

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1241352C (en)*1997-04-022006-02-08亚历山大·安得烈耶维奇·莫尔多维安 Method for Encrypting Binary-Encoded Information
DE102005006713B4 (en)*2005-02-152013-10-31Wolfgang Halang Method for binary data encryption

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WOLFGANG A. HALANG 等: "Hybrid-time Chaotic Encryption and Sender Authentication of Data Packets in Automation Networks", 《IFAC PROCEEDINGS VOLUMES》*
WOLFGANG A. HALANG 等: "Secure Cloud Computing", 《RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY》*

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111694877A (en)*2019-03-122020-09-22通用电气公司Multivariate time series data search
CN111694877B (en)*2019-03-122024-02-20通用电气公司Multi-element time series data search
CN111835506A (en)*2019-04-182020-10-27广州佳欣未来科技有限公司Information safety digital encryption method based on one-time-use cipher book
CN112000912A (en)*2020-08-242020-11-27湖南凯迪工程科技有限公司Method and system for constructing front-end and back-end separation of website
CN112000912B (en)*2020-08-242023-10-31湖南凯迪工程科技有限公司Method and system for separating front end from back end of constructed website
CN112887079A (en)*2021-03-112021-06-01中国石油大学(华东)Transformation encryption algorithm based on generation of random bit sequence
CN112887079B (en)*2021-03-112022-10-04中国石油大学(华东) A Transform Encryption Algorithm Based on a Random Bit Sequence
CN114938271A (en)*2022-04-292022-08-23浙江工业大学One-time pad method based on state machine
CN114938271B (en)*2022-04-292024-10-25浙江工业大学 One-time pad method based on state machine

Similar Documents

PublicationPublication DateTitle
JP7353375B2 (en) End-to-end double ratchet encryption with epoch key exchange
CN109218013A (en)Cover the binary data communication encryption method on plaintext symbol boundary
CN106656475B (en)Novel symmetric key encryption method for high-speed encryption
US8687810B2 (en)Chaotic cipher system and method for secure communication
TWI673992B (en)Entwined encryption and error correction
JPH09120260A (en) How to encrypt or decrypt
CN102724041A (en)Steganography-based key transmission and key updating method
Abusukhon et al.A novel network security algorithm based on private key encryption
KR20200055672A (en)Encryption systems and method using permutaion group based cryptographic techniques
Teh et al.A Chaos‐Based Authenticated Cipher with Associated Data
Abusukhon et al.Secure network communication based on text-to-image encryption
Kumar et al.A novel approach of symmetric key cryptography
Wu et al.JAMBU lightweight authenticated encryption mode and AES-JAMBU
Sermeno et al.Modified Vigenere cryptosystem: An integrated data encryption module for learning management system
JP2011512762A (en) P2P communication method that makes tampering, wiretapping and hacking impossible in a multi-subscriber network
CN109257161A (en)Binary data encrypts equipment and encryption method
KR100551992B1 (en) Application data encryption and decryption method
CN107846422A (en)A kind of configuration file ciphered compressed of gateway and the method for decryption decompression
DisinaRobust Caesar Cipher against frequency cryptanalysis using bi-directional shifting
CN115277064B (en)Data encryption and data decryption methods and devices, electronic equipment and medium
Kadry et al.An improvement of RC4 cipher using vigenère cipher
Arun et al.AES based Text to Pixel Encryption using Color Code Conversion by Modulo Arithmetic
Young et al.Backdoor attacks on black-box ciphers exploiting low-entropy plaintexts
US20200287710A1 (en)Single stream one time pad with encryption with expanded entropy
Vidhya et al.Format preserving encryption using feistel cipher

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20190115


[8]ページ先頭

©2009-2025 Movatter.jp