CN111835506A - Information safety digital encryption method based on one-time-use cipher book - Google Patents
Information safety digital encryption method based on one-time-use cipher book Download PDFInfo
- Publication number
- CN111835506A CN111835506A CN201910321141.6A CN201910321141A CN111835506A CN 111835506 A CN111835506 A CN 111835506A CN 201910321141 A CN201910321141 A CN 201910321141A CN 111835506 A CN111835506 A CN 111835506A
- Authority
- CN
- China
- Prior art keywords
- digital
- information
- vector
- time
- double
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 239000013598 vector Substances 0.000 claims abstract description 77
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 22
- 238000004891 communication Methods 0.000 claims abstract description 18
- MHABMANUFPZXEB-UHFFFAOYSA-N O-demethyl-aloesaponarin I Natural products O=C1C2=CC=CC(O)=C2C(=O)C2=C1C=C(O)C(C(O)=O)=C2C MHABMANUFPZXEB-UHFFFAOYSA-N 0.000 claims description 12
- 238000005259 measurement Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 238000005516 engineering process Methods 0.000 description 16
- 238000010586 diagram Methods 0.000 description 8
- 238000005192 partition Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 4
- 230000007547 defect Effects 0.000 description 3
- 230000007812 deficiency Effects 0.000 description 3
- 230000009466 transformation Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 239000002184 metal Substances 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- PCTMTFRHKVHKIS-BMFZQQSSSA-N (1s,3r,4e,6e,8e,10e,12e,14e,16e,18s,19r,20r,21s,25r,27r,30r,31r,33s,35r,37s,38r)-3-[(2r,3s,4s,5s,6r)-4-amino-3,5-dihydroxy-6-methyloxan-2-yl]oxy-19,25,27,30,31,33,35,37-octahydroxy-18,20,21-trimethyl-23-oxo-22,39-dioxabicyclo[33.3.1]nonatriaconta-4,6,8,10 Chemical compound C1C=C2C[C@@H](OS(O)(=O)=O)CC[C@]2(C)[C@@H]2[C@@H]1[C@@H]1CC[C@H]([C@H](C)CCCC(C)C)[C@@]1(C)CC2.O[C@H]1[C@@H](N)[C@H](O)[C@@H](C)O[C@H]1O[C@H]1/C=C/C=C/C=C/C=C/C=C/C=C/C=C/[C@H](C)[C@@H](O)[C@@H](C)[C@H](C)OC(=O)C[C@H](O)C[C@H](O)CC[C@@H](O)[C@H](O)C[C@H](O)C[C@](O)(C[C@H](O)[C@H]2C(O)=O)O[C@H]2C1 PCTMTFRHKVHKIS-BMFZQQSSSA-N 0.000 description 1
- OROGSEYTTFOCAN-DNJOTXNNSA-N codeine Chemical compound C([C@H]1[C@H](N(CC[C@@]112)C)C3)=C[C@H](O)[C@@H]1OC1=C2C3=CC=C1OC OROGSEYTTFOCAN-DNJOTXNNSA-N 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- OROGSEYTTFOCAN-UHFFFAOYSA-N hydrocodone Natural products C1C(N(CCC234)C)C2C=CC(O)C3OC2=C4C1=CC=C2OC OROGSEYTTFOCAN-UHFFFAOYSA-N 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an information security digital encryption method based on a one-time-use codebook, which comprises the following steps: the host characteristic information of the file and the information specific to the communication equipment used by the file are utilized to form front and back background information, so that a double-track double-block K grouping digital vector association structure is formed, partial characteristic information in the background information is extracted to be used as a digital key for encrypting plaintext information, a functional dynamic encryption algorithm is adopted to encrypt and modulate a symbol dictionary, a one-time-use digital cipher book with the background information is generated, and a public digital cipher of the plaintext information is generated. The information security digital encryption method based on the one-time-use codebook provided by the invention is organically combined with a third-party transmission SSL/TLS communication protocol password system, thereby effectively ensuring the security of big data and information in the Internet environment. The method is suitable for completing the encryption task of the plaintext information by utilizing the characteristic that the private confidential information and the public information are asymmetric under the condition that the background information of the internet environment is not completely transparent.
Description
Technical Field
The invention relates to an information security digital encryption method based on a one-time-use codebook.
Background
The technologies related to passwords are various, namely invisible and visible, and digital and non-digital. However, they all have a common feature that: digital cryptography is generated around multiple keys generated from a fixed codebook, and there is a close relationship between each cryptography.
The general cryptosystem is an information host a of information (message) W, and performs public key encryption processing on W to be encrypted by using an encryption algorithm of a symmetric key Q or an asymmetric private key PW and a public key GW to generate a public password MW, and transmits the password MW to a third party C.
And after receiving the encrypted password MW, the access receiver B decrypts the MW by using the private key and a decryption algorithm to restore the information W. (transmitting side C: radio transmission/Internet transmission).
The most important core method is the generation technology of the fixed codebook which is used for multiple times and a series of encryption technologies generated by the generation technology. There are three current types of development:
Password-Based (PBE-Password-Based Encryption) technology
In order to ensure the flexibility and the safety intensity of the fixed codebook. A Password-Based Password (PBE-passed Based Encryption) is generated. And generating a symmetric key (KEK), and encrypting the information (W) by the sender (A) to form a ciphertext (MW). And after receiving the ciphertext MW, the receiving party B decrypts the MW by using the symmetric key KEK and restores the information W.
Two, asymmetric cipher based (PGP-Pretty Good Privacy) cipher system
Since symmetric cipher KEK is easily stolen and compromised by third party, cipher software written by Philips Queenmann (PhilipZimmermann) in 1990 was improved to asymmetric cipher based (PGP-Pretty Good Privacy) cipher system.
PGP is currently the best and most secure way of encryption. The representative software in this regard is the PGP encryption software in the united states. The core idea of such software is to protect files using logical partitions, e.g., logical partition E: the hard disk partition protected by the PGP needs to be opened by inputting a password each time the partition is opened, and files in the partition are absolutely safe. When the partition is no longer needed, it can be closed and removed from the desktop, and when opened again, a password needs to be entered. Without password, the software developer himself cannot decrypt! PGP is the most popular file encryption software worldwide. Its source code is open, withstands the cracking challenge of thousands of top hackers, and the fact proves that PGP is the most secure encryption software in the world at present. Its only disadvantage is that PGP currently has no official chinese version and the legal version is extremely expensive. Since PGP technology is a technology that the U.S. national security agency prohibits export.
Third, based on asymmetric cipher (SSL/TLS- -Secure Socket Layer/Transport Layer security) internet cipher system
SSL/TLS is a cryptographic communication protocol method widely used in Web servers, and is a communication between a client and a server. They all follow a Protocol called HTTP (HyperText Transfer Protocol) for communication. The Web browser is called an HTTP client, and the Web server is called an HTTP server. SSL/TLS is a secure communication technology which is realized by combining technologies such as a symmetric key, a public key password, a one-way hash function, a message authentication code, a pseudo-random generator, a digital signature and the like in the communication between a Web server and a Web browser. Furthermore, SSL/TLS can also switch cipher suites to use more robust cryptographic algorithms.
The most important TLS protocol in the SSL/TLS system is the TLS protocol, which is divided into two parts: the TLS recording protocol is in conjunction with the TLS handshake protocol.
TLS recording protocol: and the system is responsible for compression, encryption and data authentication of the message.
TLS handshake protocol: it has 4 subprotocols: handshake protocol, cipher specification change protocol, warning protocol and application data protocol. Handshake protocol: and the system is responsible for negotiating and deciding a cryptographic algorithm and a shared secret key between the client and the server. Cipher specification change protocol: and is responsible for transmitting a signal for changing the encryption mode to the communication object. Warning protocol: and is responsible for communicating the error to the other party when the error occurs. Application data protocol: a protocol to convey application data carried over TLS to a communicating object. The handshake protocol is the focus: after the information exchange between the client and the server is completed, the application data protocol is switched to.
The client obtains the legal public key of the server, and server authentication is completed.
The server obtains the legal public key of the client and completes the client authentication.
The client and server generate a shared key for use in cryptographic communications.
The client and server generate a shared key for use in the message authentication code.
SSL/TLS is a cryptographic communication method that is used frequently throughout the world under the current internet.
With the rapid development of computer technology and digital technology, digital cryptography is also advancing. The main technical direction of the development of the current information data security technology is as follows: the development of the one-way hash function computing technology is directed to a new encryption algorithm with high-strength one-way hash function values.
1. Series of MD
MD4 is a one-way hash function designed by Rivet in 1990, capable of producing a 128-bit hash value (RFC1186, revised RFC 1320).
MD5 is a one-way hash function designed by Rivet in 1991 that can produce a 128-bit hash value (RFC 1321). The strong impact resistance of MD5 has been compromised and is currently unsafe.
2、RIPEMD-160
RiPEMD-160 was a one-way hash function designed in 1996 by HansDobbertin, AntonoBosselaers, and BartPrenee that was able to produce a 160-bit hash value.
RIPEMD-160 is also a revision of the RIPEMD one-way hash function designed by the EU RIPE project. Which comprises the following steps: RIPEMD-128, RIPEMD-256, RIPEMD-320, and the like. The strong impact resistance of RIPEMD has been overcome in 2004, but RIPEMD-160 has not yet been overcome. The digital encryption system currently used in bitcoin is ripemm-160.
3. SHA series
SHA-1 was designed by NIST (National Institute of Standards and Technology, U.S. National Standards and Technology) in 1993 to produce a 160-bit hash value one-way hash function. It was released as SHA as a Federal information processing Standard Specification (FIPS PUB 180) in the United states, and a revised version (FIPS PUB180-1) released in 1995 was called SHA-1. The NIST then designed a series of SHAs as follows:
SHA-256 is capable of generating 256-bit hash values to produce one-way hash functions
SHA-384 is capable of generating a 384-bit hash value one-way hash function
SHA-512 is capable of generating 512-bit hash values to produce one-way hash functions
SHA-2(SHA-256, SHA-384, SHA-512) these one-way hash functions were published in 2002 as a new edition (FIPSPUB 180-2) concurrently with SHA-1. The strong impact resistance of SHA-1 has been overcome in 2005, but SHA-2 has not yet been overcome. SHA-3 is the next generation one-way hash function SHA-3 that was set out in 2005 by NIST (National Institute of Standards and Technology ) to replace SHA-1. A one-way hash function algorithm of Keccak is employed. At present, the Internet (SSL/TLS- -Secure Socket Layer/Transport Layer Security cryptosystem mainly adopts the SHA-2 standard.
All the above cryptographic techniques can be referred to as traditional digital cryptographic techniques, and the main problems are:
1. conventional digital cryptography uses fixed codebooks multiple times.
Defects and deficiencies: the security is limited, and once the fixed codebook is revealed, the security is invalid. The actual requirements of large information amount and quick change in modern times cannot be met.
2. Traditional digital cryptography uses a professional-specific one-way hash function, and the hash value uses binary bits of fixed length, such as 128 bits and 256 bits of SHA-2, and the maximum length is 512 bits, and only SHA-3 can be unlimited in length. Defects and deficiencies: is controlled by international export and has high cost.
3. The above conventional digital cryptographic methods all adopt a single structure of a single digital unit.
Defects and deficiencies: the encryption key is generated independently of the background information of the information W to be encrypted.
There are secondary problems:
1. the traditional cryptographic methods all adopt:
the information W is directly encrypted, and the encryption method is only related to W and is not related to technical parameters of a Client browser end and a Server end of the transmission communication equipment.
2. The traditional cryptographic methods all adopt:
the information W is directly encrypted, and the encryption method is only related to W and is not related to the background information of the information host A and the information access receiver B.
Disclosure of Invention
The invention provides an information security digital encryption method based on a one-time-use codebook, which is organically combined with a third-party transmission SSL/TLS communication protocol password system to completely solve the problems of big data and information security in the Internet environment. In order to achieve the purpose, the invention adopts the following technical scheme:
the invention discloses an information security digital encryption method based on a one-time-use codebook, which comprises the following steps: the host characteristic information of the file and the information specific to the communication equipment used by the file are utilized to form front and back background information, so that a double-track double-block K grouping digital vector association structure is formed, partial characteristic information in the background information is extracted to be used as a digital key for encrypting plaintext information, a functional dynamic encryption algorithm is adopted to encrypt and modulate a symbol dictionary, a one-time-use digital cipher book with the background information is generated, and a public digital cipher of the plaintext information is generated.
The information security digital encryption method based on the one-time-use codebook provided by the invention is organically combined with a third-party transmission SSL/TLS communication protocol password system, thereby effectively ensuring the security of big data and information in the Internet environment. The method is suitable for completing the encryption task of the plaintext information by utilizing the characteristic that the private confidential information and the public information are asymmetric under the condition that the background information of the internet environment is not completely transparent.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention:
FIG. 1 shows a dual-rail dual-block K-block grouped random feature number vector correlator according to an embodiment of the present inventionWorking principle diagram of (1).
FIG. 2 is a diagram of a private secret digital key of an embodiment of the present inventionModulation schematic diagram.
FIG. 3 shows a private public digital key according to an embodiment of the present inventionModulation schematic diagram.
Detailed Description
The present invention will now be described in detail with reference to the drawings and specific embodiments, wherein the exemplary embodiments and descriptions of the present invention are provided to explain the present invention without limiting the invention thereto.
Example (b):
basic concept and mathematical principle of digital encryption modulation algorithm
suppose thatThe vector is an L-dimensional positive integer digital vector group with the digital length of M bits and the unit of a measurement system of L, and the vector can be divided into K block groups.
When the K is greater than 1, the composition,namely an L-dimensional digital vector unit of the monorail K-block set:
Can be written as:when the K is equal to 1,ghosting into a common single-rail L-dimensional vectorIs a positive integer number set.
suppose thatThe length of the number is M bits, the unit of a measurement system is L, and the number can be divided into two L-dimensional positive integer number vector groups of K block:
Suppose thatThe vector is a two L-dimension positive integer number vector group which has the number length of M bits and the unit of a measurement system of L and can be divided into K block groups. In particular, when K is 1, inIn (1),
Fourthly, the double-track single-block digital vector correlation body without parameters:
ThenIs two double-track single-block digital vector correlation bodies, and forms a plane in the L-dimensional digital vector space, which is called a digital cipher plane MMS. In MMS surfaceIn the method, a concomitant L-dimensional double-rail single-region digital vector association body exists
suppose thatThe vector is a two L-dimension positive integer number vector group which has the number length of M bits and the unit of a measurement system of L and can be divided into K block groups. Unless otherwise specified, it is assumed that M.ltoreq.13, l.ltoreq.10, 1 < L < + ∞ and L is a positive integer. When K is 2, is prepared fromThe formed association is used as follows:to indicate. Here:
suppose that:for the (foreground) first digital vector,is (background) second digital vector, and w (x) is information plaintext.
For the sake of simplicity, it is preferred that,
definition 1:by usingRepresenting a set of digital vectors of background parametric information representing the foreground.
Definition 2:by usingA set of digitally encoded vectors representing a character set of information w (x) to be encrypted.
Definition 3:by usingRepresenting a background parametric information digital vector set representing a background.
Definition 4:by usingThe digital code vector group represents a character set of a background keyword keyw (x)/passw (x) subjected to encryption control processing.
Therefore, the temperature of the molten metal is controlled,in thatWhen background B changes and continues to be subdivided into K-1 groups, thenWhile the changes constitute a K-1 sub-group. At this time, fromThe formed association can be usedTo indicate. Thus, there are:
Encryption modulation algorithm of information plaintext W (x)
Suppose thatThe vector is two L-dimensional positive integer number vector groups, wherein the number length is M bits, the unit of a measurement system is L, and the vector can be divided into two K-block groups. At this time, fromAnd (3) forming a digital vector correlation body:
definition 5: v is a vector consisting of 2 digitsThe dimension of the formed measurement space is L. V can be divided into independent subspaces V1,V2,…Vi,…VK,ViIs the ith subspace of V (i ═ 1, 2, …, K).
Definition 6: represented by t is a vectorForming a subscript value of the metric space V, and using B1,B2,B3,…,Bk-1,BkRepresenting each subspace ViOf subscriptsMaximum value (i ═ 1, 2, …, K, L ═ BK)。
Definition 7: by mi=Bi-Bi-1(i ═ 1, 2, …, K) denotes the subspace ViDimension (d) of (a). And in t e (B)i-1,Bi]On each subspace, there is m1=B1,m2=B2-B1,...,mK=BK-BK-1,(BK=L,1≤t≤L)。
When M is less than or equal to 13 and l is 10, the compound is prepared fromThe formed double-rail double-block K grouping digital vector correlator comprises:
Deriving the cryptographic transformation: v (t) ═ p (t) + q (t)
in particular: in the last vector subspace VKIn the above, order: m isK=N,τ∈(BK-1,BK]And (τ ═ 0, 1, 2, …, N) andperforming linear transformation: pWZ(BK-1+1+τ)=MB(τ)(t=BK-1+1+ τ) then a new dual-rail doublet group K grouped digital vector association is generated:
DMAC (c) character encoding dictionary by adopting high-dimensional one-way hash functional power algorithmConcocting to obtainThe functional derivation of (1) to (1) correspondence transform. Thus, a new character-number code mapping relationship is generated:thus, a new digital code dictionary is created:
note 2: DMAC (DMAC) is a special one-way hash functional power calculation method;
In newly generated functional digital cipher booksIn the modulation process of (3), the correlation bodyBackground conditions of (2):
is stationary. But when taking local digital vectorsFor pseudo-random number subspacesThen, generating a double-track double-block K grouping random number vector correlation body:digital cipher bookA digital codebook with random parameters R is modulated:
The first party (information host A) encrypts the information plaintext W (x) needing to be kept secret, and then generates a digital password file MW (x) for storage. When the second party (information accessing person B) needs to access information, the numeric code mw (x) is transmitted by the third party (intermediary C) to the second party (information accessing recipient B). A series of associated information comprising A, B, C and environment D where ABC is located constitutes a context:
The encryption conditions that are uniquely determined and are only relevant to ABCD are constituted:
under the condition, the communication characteristic authentication information of the third party C/S is added
Forming a double-rail double-block K grouped random number vector correlation body:
DMAC (c) pair symbol dictionary by functional power algorithmModulation is performed, thereby producing a random functional digital codebook with third party authentication:
Note 5: r represents a band random parameter;
note 6: t represents a band communication authentication parameter.
FIG. 1 shows a dual-rail dual-block K-block grouped random feature number vector correlator according to an embodiment of the present inventionWorking principle diagram of (1).
Definition 8: (digital password) in a one-time-use digital codebook:
after generation. Plaintext W (x) in digital cipherIn (1), the corresponding valueA digital cipher referred to as plaintext w (x).
Definition 9: (private digital code) whenWhen the private information is obtained, the private digital cipher book is:plaintext W (x) in digital cipherIn (1), the corresponding valueA private digital cipher referred to as plaintext w (x).
Definition 10: (public digital code) isIn the case of public information, the public digital codebook is:plaintext W (x)In public digital cipher booksIn (1), the corresponding valueA public digital cipher referred to as plaintext w (x).
In the digital codebook:in the modulation process, the correlation condition of the double-track double-block K-1 grouping digital vector is utilized:
composing a universal digital associationAdopting functional power algorithm DMAC (c) to make first modulation to produce general digital cipher bookConstructing a digital vector with foreground by using foreground conditions and according to special rulesSpecial text keyw (x) of key words, using numeric cipher bookGenerating a key digital vector private digital cipher corresponding to KeyW (x)
FIG. 2 is a diagram of a private confidential digital key of an embodiment of the present inventionModulation scheme of
Will be provided withAs background conditional digit vectorsAnother part of the informationThus, a new vector with foreground digits is generatedDouble-track double-block K grouping digital vector correlation body of keyword features:
DMAC (c) pair symbol dictionary by functional power algorithmAnd carrying out secondary modulation again. Obtaining new one-time-use vector with foreground digitsDigital codebook of key feature information:
thus, in the cipher bookWith foreground digital vector of the password pass W (x)Private public digital cryptography of features
Therefore, the temperature of the molten metal is controlled,becomes the key digital vector encryption information (private confidential digital key) that is most important to the completion of the encryption task for the password pass w (x). Then is connected toBecomes the private public digital key of w (x).
FIG. 3 shows a private public digital key according to an embodiment of the present inventionModulation scheme of
Definition 13: when in useAs public foreground digital vectorsWhen the temperature of the water is higher than the set temperature,when in useThe keyword KeyW (x) is composed ofWhen the key word KeyW (x) and the password pass W (x) are combined to form the public digital passwordWithThe privacy feature of (1). It is called a public digital code and is noted as:
from the above definition alone:andthere is no relationship of association. Only foreground conditionsAndhave different values. But in the actual encryption modulation process, the background condition is adoptedTo change the personality ofAndthe association relationship of (2). Thereby implementing the modulation function of the (private/public) associated encryption. The specific implementation process is as follows:
grouping private digital vector associations with a dual-rail dual-group K:
adopting functional power algorithm DMAC (c) to character dictionaryThe first modulation is performed. Generating a private universal digital codebook:in the foreground conditionA set of keywords keyw (x) is extracted. Using private digital codebooksModulate W (x) private secret digital keyReuse ofCalculated as a parameter, partially replacing the associationIn (1)Namely: using functional power algorithm DMAC (c) for character dictionaryA second modulation is performed to create a new one-time-use private digital codebook with foreground featuresWhereby the private public key of the password passw (x) can be modulated out
In public digital codeIn the modulation process of (2), the digital key is disclosed as a private public keyCalculated as a common parameter, partially replacing a common double-track double-block K-block grouped digital vector associationIn (1)Namely: using functional power algorithm DMAC (c) for character dictionaryA third modulation is performed, thereby generating a new one-time use with prospectPublic digital codebook of key word KeyW (x) and password pass W (x)Thereby modulating the image with foregroundPublic digital code of plaintext information W (x) of characteristic KeyW (x)/PassW (x)
FIG. 4 shows a public digital cipher according to an embodiment of the present inventionModulation scheme of
Due to the fact thatAnduse the foreground vectorKey keyw (x) and password passw (x). Then the public digital codeWith the proprietary features of the plaintext w (x). Thereby realizing a private public digital keyWith public digital codeThe associated modulation of (2).
Digital cipher decryption algorithm for digital secret information MW (x)
When the information host A needs to decrypt the digital secret message MW (x) in different places or at different times, the public digital password is firstly obtainedThen, the private secret digital key is generated by A itselfModulating a private public digital key with a private key word and a password KeyW (x)/PassW (x)To be provided withCalculated as a common parameter, partially replacing a common double-track double-block K-block grouped digital vector associationIn (1)Namely: thereby generating a one-time-use digital cipher with a private keyPublic digital cipher book with key featuresThen the received public digital codeUsing character dictionariesCarry out digital comparison calculation to obtainThe corresponding UTF-8/16 is uniformly encoded. Therefore, the information plaintext W (x) is restored, and the public password is realizedDecryption to W (x).
The technical solutions provided by the embodiments of the present invention are described in detail above, and the principles and embodiments of the present invention are explained herein by using specific single examples, and the descriptions of the embodiments above are only used to help understanding the principles of the embodiments of the present invention; meanwhile, for a person skilled in the art, according to the embodiments of the present invention, there may be variations in the specific implementation manners and application ranges, and in summary, the content of the present description should not be construed as a limitation to the present invention.
Claims (3)
1. An information security digital encryption method based on a one-time-use cipher book is characterized by comprising the following steps:
suppose thatThe length of the number is M bits, the unit of a measurement system is L, and the number can be divided into two L-dimensional positive integer number vector groups of K block:
the information receiver B transmits the digital information of the third party C/S and the communication network environment D, and the background condition is constructed according to a certain rule:plus pseudo-random number vector quantum spaceComposing federated encryption conditionsCommunication characteristic authentication digital information added with third party C/SForming double-track double-block K grouped random number vector association bodyDMAC (c) pair symbol dictionary by functional power algorithmModulating, thereby producing a random digital codebook with third party authentication,
i.e. one-time-use digital codebooks:
2. The information security digital encryption method based on the one-time-use codebook of claim 1, characterized in that:
using a dual-rail double-block K-1 grouping digital vector correlation condition:
and (3) forming a random number vector correlation body:adopting functional power algorithm DMAC (c) to modulate for the first time to generate a random universal digital cipher book:
using the foreground conditions:
constructing a vector with foreground digits according to a specific ruleSpecial text keyw (x) of keywords, using universal numeric codebookGenerating a key number corresponding to KeyW (x)Word vector private digital keyWill be provided withAs background conditional digit vectorsIs transmitted to the other part of the information,thereby generating a new digital vector with foregroundDouble-track double-block K grouping digital vector correlation body of keyword features:
3. The information security digital encryption method based on the one-time-use codebook of claim 2, characterized in that:
in the foreground conditionExtract a group of keywords KeyW (x), and use the private digital cipher bookModulating out the private public digital key of the password passW (x)To be provided withCalculated as a common parameter, partially replacing a common double-track double-block K-block grouped digital vector associationIn (1)Namely:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910321141.6A CN111835506B (en) | 2019-04-18 | 2019-04-18 | Information security digital encryption method based on one-time use codebook |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910321141.6A CN111835506B (en) | 2019-04-18 | 2019-04-18 | Information security digital encryption method based on one-time use codebook |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111835506A true CN111835506A (en) | 2020-10-27 |
CN111835506B CN111835506B (en) | 2023-06-27 |
Family
ID=72912162
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910321141.6A Active CN111835506B (en) | 2019-04-18 | 2019-04-18 | Information security digital encryption method based on one-time use codebook |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111835506B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080130895A1 (en) * | 2006-10-25 | 2008-06-05 | Spyrus, Inc. | Method and System for Deploying Advanced Cryptographic Algorithms |
CN101355422A (en) * | 2008-07-16 | 2009-01-28 | 冯振周 | Novel authentication mechanism for encrypting vector |
CN102710605A (en) * | 2012-05-08 | 2012-10-03 | 重庆大学 | Information security management and control method under cloud manufacturing environment |
CN103177415A (en) * | 2013-04-08 | 2013-06-26 | 上海理工大学 | Transform domain optical holographic watermarking algorithm based on colored image characteristic area |
CN109218013A (en) * | 2018-10-10 | 2019-01-15 | 青岛科技大学 | Cover the binary data communication encryption method on plaintext symbol boundary |
-
2019
- 2019-04-18 CN CN201910321141.6A patent/CN111835506B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080130895A1 (en) * | 2006-10-25 | 2008-06-05 | Spyrus, Inc. | Method and System for Deploying Advanced Cryptographic Algorithms |
CN101355422A (en) * | 2008-07-16 | 2009-01-28 | 冯振周 | Novel authentication mechanism for encrypting vector |
CN102710605A (en) * | 2012-05-08 | 2012-10-03 | 重庆大学 | Information security management and control method under cloud manufacturing environment |
CN103177415A (en) * | 2013-04-08 | 2013-06-26 | 上海理工大学 | Transform domain optical holographic watermarking algorithm based on colored image characteristic area |
CN109218013A (en) * | 2018-10-10 | 2019-01-15 | 青岛科技大学 | Cover the binary data communication encryption method on plaintext symbol boundary |
Non-Patent Citations (1)
Title |
---|
晏国勋: "加密技术下的信息安全", 《网络安全技术与应用》 * |
Also Published As
Publication number | Publication date |
---|---|
CN111835506B (en) | 2023-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Debnath et al. | Brief review on journey of secured hash algorithms | |
CN101262341A (en) | A Hybrid Encryption Method in Conference System | |
GB2551865A (en) | Improved stream cipher system | |
Saini et al. | Triple security of data in cloud computing | |
CN107181584B (en) | Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof | |
CN103942500B (en) | Hash ciphertext re-encryption method based on noise and decryption method after re-encryption | |
CN104378198A (en) | Voice encryption method based on block cipher system | |
CN108270545A (en) | A kind of improved DES data encryption algorithm based on mobile Internet | |
Saikumar | DES-Data Encryption Standard | |
CN104486756B (en) | A kind of encryption and decryption method and system of close writing paper short message | |
US8458452B1 (en) | System and method for encryption and decryption of data transferred between computer systems | |
Widiasari | Combining advanced encryption standard (AES) and one time pad (OTP) encryption for data security | |
Chaloop et al. | Enhancing Hybrid Security Approach Using AES And RSA Algorithms | |
Tahir et al. | A scheme for the generation of strong icmetrics based session key pairs for secure embedded system applications | |
CN112422278A (en) | Byte-oriented random multi-table replacement encryption and decryption method | |
Dubey et al. | An innovative data security techniques using cryptography and steganographic techniques | |
CN111835506B (en) | Information security digital encryption method based on one-time use codebook | |
KR102304831B1 (en) | Encryption systems and method using permutaion group based cryptographic techniques | |
Pushpa | Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms | |
Neforawati et al. | Message digest 5 (md-5) decryption application using python-based dictionary attack technique | |
CN108768923A (en) | A kind of real-time encrypted method of chat of the Encryption Algorithm based on Quantum Reversible Logic circuit | |
CN103942501B (en) | Hash ciphertext re-encrypting method and decryption method after re-encryption | |
Chen et al. | An image encryption algorithm based on SM4 and Base64 | |
CN114430549A (en) | White box encryption and decryption method and device suitable for wireless communication | |
CN115550058B (en) | Shared file transparent encryption method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |