Nothing Special   »   [go: up one dir, main page]

CN111835506A - Information safety digital encryption method based on one-time-use cipher book - Google Patents

Information safety digital encryption method based on one-time-use cipher book Download PDF

Info

Publication number
CN111835506A
CN111835506A CN201910321141.6A CN201910321141A CN111835506A CN 111835506 A CN111835506 A CN 111835506A CN 201910321141 A CN201910321141 A CN 201910321141A CN 111835506 A CN111835506 A CN 111835506A
Authority
CN
China
Prior art keywords
digital
information
vector
time
double
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910321141.6A
Other languages
Chinese (zh)
Other versions
CN111835506B (en
Inventor
王强
林云侯
刘星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jiaxin Future Technology Co ltd
Original Assignee
Guangzhou Jiaxin Future Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jiaxin Future Technology Co ltd filed Critical Guangzhou Jiaxin Future Technology Co ltd
Priority to CN201910321141.6A priority Critical patent/CN111835506B/en
Publication of CN111835506A publication Critical patent/CN111835506A/en
Application granted granted Critical
Publication of CN111835506B publication Critical patent/CN111835506B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information security digital encryption method based on a one-time-use codebook, which comprises the following steps: the host characteristic information of the file and the information specific to the communication equipment used by the file are utilized to form front and back background information, so that a double-track double-block K grouping digital vector association structure is formed, partial characteristic information in the background information is extracted to be used as a digital key for encrypting plaintext information, a functional dynamic encryption algorithm is adopted to encrypt and modulate a symbol dictionary, a one-time-use digital cipher book with the background information is generated, and a public digital cipher of the plaintext information is generated. The information security digital encryption method based on the one-time-use codebook provided by the invention is organically combined with a third-party transmission SSL/TLS communication protocol password system, thereby effectively ensuring the security of big data and information in the Internet environment. The method is suitable for completing the encryption task of the plaintext information by utilizing the characteristic that the private confidential information and the public information are asymmetric under the condition that the background information of the internet environment is not completely transparent.

Description

Information safety digital encryption method based on one-time-use cipher book
Technical Field
The invention relates to an information security digital encryption method based on a one-time-use codebook.
Background
The technologies related to passwords are various, namely invisible and visible, and digital and non-digital. However, they all have a common feature that: digital cryptography is generated around multiple keys generated from a fixed codebook, and there is a close relationship between each cryptography.
The general cryptosystem is an information host a of information (message) W, and performs public key encryption processing on W to be encrypted by using an encryption algorithm of a symmetric key Q or an asymmetric private key PW and a public key GW to generate a public password MW, and transmits the password MW to a third party C.
And after receiving the encrypted password MW, the access receiver B decrypts the MW by using the private key and a decryption algorithm to restore the information W. (transmitting side C: radio transmission/Internet transmission).
The most important core method is the generation technology of the fixed codebook which is used for multiple times and a series of encryption technologies generated by the generation technology. There are three current types of development:
Password-Based (PBE-Password-Based Encryption) technology
In order to ensure the flexibility and the safety intensity of the fixed codebook. A Password-Based Password (PBE-passed Based Encryption) is generated. And generating a symmetric key (KEK), and encrypting the information (W) by the sender (A) to form a ciphertext (MW). And after receiving the ciphertext MW, the receiving party B decrypts the MW by using the symmetric key KEK and restores the information W.
Two, asymmetric cipher based (PGP-Pretty Good Privacy) cipher system
Since symmetric cipher KEK is easily stolen and compromised by third party, cipher software written by Philips Queenmann (PhilipZimmermann) in 1990 was improved to asymmetric cipher based (PGP-Pretty Good Privacy) cipher system.
PGP is currently the best and most secure way of encryption. The representative software in this regard is the PGP encryption software in the united states. The core idea of such software is to protect files using logical partitions, e.g., logical partition E: the hard disk partition protected by the PGP needs to be opened by inputting a password each time the partition is opened, and files in the partition are absolutely safe. When the partition is no longer needed, it can be closed and removed from the desktop, and when opened again, a password needs to be entered. Without password, the software developer himself cannot decrypt! PGP is the most popular file encryption software worldwide. Its source code is open, withstands the cracking challenge of thousands of top hackers, and the fact proves that PGP is the most secure encryption software in the world at present. Its only disadvantage is that PGP currently has no official chinese version and the legal version is extremely expensive. Since PGP technology is a technology that the U.S. national security agency prohibits export.
Third, based on asymmetric cipher (SSL/TLS- -Secure Socket Layer/Transport Layer security) internet cipher system
SSL/TLS is a cryptographic communication protocol method widely used in Web servers, and is a communication between a client and a server. They all follow a Protocol called HTTP (HyperText Transfer Protocol) for communication. The Web browser is called an HTTP client, and the Web server is called an HTTP server. SSL/TLS is a secure communication technology which is realized by combining technologies such as a symmetric key, a public key password, a one-way hash function, a message authentication code, a pseudo-random generator, a digital signature and the like in the communication between a Web server and a Web browser. Furthermore, SSL/TLS can also switch cipher suites to use more robust cryptographic algorithms.
The most important TLS protocol in the SSL/TLS system is the TLS protocol, which is divided into two parts: the TLS recording protocol is in conjunction with the TLS handshake protocol.
TLS recording protocol: and the system is responsible for compression, encryption and data authentication of the message.
TLS handshake protocol: it has 4 subprotocols: handshake protocol, cipher specification change protocol, warning protocol and application data protocol. Handshake protocol: and the system is responsible for negotiating and deciding a cryptographic algorithm and a shared secret key between the client and the server. Cipher specification change protocol: and is responsible for transmitting a signal for changing the encryption mode to the communication object. Warning protocol: and is responsible for communicating the error to the other party when the error occurs. Application data protocol: a protocol to convey application data carried over TLS to a communicating object. The handshake protocol is the focus: after the information exchange between the client and the server is completed, the application data protocol is switched to.
The client obtains the legal public key of the server, and server authentication is completed.
The server obtains the legal public key of the client and completes the client authentication.
The client and server generate a shared key for use in cryptographic communications.
The client and server generate a shared key for use in the message authentication code.
SSL/TLS is a cryptographic communication method that is used frequently throughout the world under the current internet.
With the rapid development of computer technology and digital technology, digital cryptography is also advancing. The main technical direction of the development of the current information data security technology is as follows: the development of the one-way hash function computing technology is directed to a new encryption algorithm with high-strength one-way hash function values.
1. Series of MD
MD4 is a one-way hash function designed by Rivet in 1990, capable of producing a 128-bit hash value (RFC1186, revised RFC 1320).
MD5 is a one-way hash function designed by Rivet in 1991 that can produce a 128-bit hash value (RFC 1321). The strong impact resistance of MD5 has been compromised and is currently unsafe.
2、RIPEMD-160
RiPEMD-160 was a one-way hash function designed in 1996 by HansDobbertin, AntonoBosselaers, and BartPrenee that was able to produce a 160-bit hash value.
RIPEMD-160 is also a revision of the RIPEMD one-way hash function designed by the EU RIPE project. Which comprises the following steps: RIPEMD-128, RIPEMD-256, RIPEMD-320, and the like. The strong impact resistance of RIPEMD has been overcome in 2004, but RIPEMD-160 has not yet been overcome. The digital encryption system currently used in bitcoin is ripemm-160.
3. SHA series
SHA-1 was designed by NIST (National Institute of Standards and Technology, U.S. National Standards and Technology) in 1993 to produce a 160-bit hash value one-way hash function. It was released as SHA as a Federal information processing Standard Specification (FIPS PUB 180) in the United states, and a revised version (FIPS PUB180-1) released in 1995 was called SHA-1. The NIST then designed a series of SHAs as follows:
SHA-256 is capable of generating 256-bit hash values to produce one-way hash functions
SHA-384 is capable of generating a 384-bit hash value one-way hash function
SHA-512 is capable of generating 512-bit hash values to produce one-way hash functions
SHA-2(SHA-256, SHA-384, SHA-512) these one-way hash functions were published in 2002 as a new edition (FIPSPUB 180-2) concurrently with SHA-1. The strong impact resistance of SHA-1 has been overcome in 2005, but SHA-2 has not yet been overcome. SHA-3 is the next generation one-way hash function SHA-3 that was set out in 2005 by NIST (National Institute of Standards and Technology ) to replace SHA-1. A one-way hash function algorithm of Keccak is employed. At present, the Internet (SSL/TLS- -Secure Socket Layer/Transport Layer Security cryptosystem mainly adopts the SHA-2 standard.
All the above cryptographic techniques can be referred to as traditional digital cryptographic techniques, and the main problems are:
1. conventional digital cryptography uses fixed codebooks multiple times.
Defects and deficiencies: the security is limited, and once the fixed codebook is revealed, the security is invalid. The actual requirements of large information amount and quick change in modern times cannot be met.
2. Traditional digital cryptography uses a professional-specific one-way hash function, and the hash value uses binary bits of fixed length, such as 128 bits and 256 bits of SHA-2, and the maximum length is 512 bits, and only SHA-3 can be unlimited in length. Defects and deficiencies: is controlled by international export and has high cost.
3. The above conventional digital cryptographic methods all adopt a single structure of a single digital unit.
Defects and deficiencies: the encryption key is generated independently of the background information of the information W to be encrypted.
There are secondary problems:
1. the traditional cryptographic methods all adopt:
the information W is directly encrypted, and the encryption method is only related to W and is not related to technical parameters of a Client browser end and a Server end of the transmission communication equipment.
2. The traditional cryptographic methods all adopt:
the information W is directly encrypted, and the encryption method is only related to W and is not related to the background information of the information host A and the information access receiver B.
Disclosure of Invention
The invention provides an information security digital encryption method based on a one-time-use codebook, which is organically combined with a third-party transmission SSL/TLS communication protocol password system to completely solve the problems of big data and information security in the Internet environment. In order to achieve the purpose, the invention adopts the following technical scheme:
the invention discloses an information security digital encryption method based on a one-time-use codebook, which comprises the following steps: the host characteristic information of the file and the information specific to the communication equipment used by the file are utilized to form front and back background information, so that a double-track double-block K grouping digital vector association structure is formed, partial characteristic information in the background information is extracted to be used as a digital key for encrypting plaintext information, a functional dynamic encryption algorithm is adopted to encrypt and modulate a symbol dictionary, a one-time-use digital cipher book with the background information is generated, and a public digital cipher of the plaintext information is generated.
The information security digital encryption method based on the one-time-use codebook provided by the invention is organically combined with a third-party transmission SSL/TLS communication protocol password system, thereby effectively ensuring the security of big data and information in the Internet environment. The method is suitable for completing the encryption task of the plaintext information by utilizing the characteristic that the private confidential information and the public information are asymmetric under the condition that the background information of the internet environment is not completely transparent.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention:
FIG. 1 shows a dual-rail dual-block K-block grouped random feature number vector correlator according to an embodiment of the present invention
Figure BSA0000182085040000051
Working principle diagram of (1).
FIG. 2 is a diagram of a private secret digital key of an embodiment of the present invention
Figure BSA0000182085040000052
Modulation schematic diagram.
FIG. 3 shows a private public digital key according to an embodiment of the present invention
Figure BSA0000182085040000053
Modulation schematic diagram.
FIG. 4 is a diagram of an embodiment of the present invention with a foreground
Figure BSA0000182085040000061
Public numeric code of characteristic KeyW (x)/PassW (x)
Figure BSA0000182085040000062
Modulation schematic diagram.
Detailed Description
The present invention will now be described in detail with reference to the drawings and specific embodiments, wherein the exemplary embodiments and descriptions of the present invention are provided to explain the present invention without limiting the invention thereto.
Example (b):
basic concept and mathematical principle of digital encryption modulation algorithm
One-rail K-block digital vector unit:
Figure BSA0000182085040000063
suppose that
Figure BSA0000182085040000064
The vector is an L-dimensional positive integer digital vector group with the digital length of M bits and the unit of a measurement system of L, and the vector can be divided into K block groups.
When the K is greater than 1, the composition,
Figure BSA0000182085040000065
namely an L-dimensional digital vector unit of the monorail K-block set:
Figure BSA0000182085040000066
is a group of digital vectors consisting of positive integer digital information.
Can be written as:
Figure BSA0000182085040000067
when the K is equal to 1,
Figure BSA0000182085040000068
ghosting into a common single-rail L-dimensional vector
Figure BSA0000182085040000069
Is a positive integer number set.
Two-rail K-block digital vector correlation body:
Figure BSA00001820850400000610
suppose that
Figure BSA00001820850400000611
The length of the number is M bits, the unit of a measurement system is L, and the number can be divided into two L-dimensional positive integer number vector groups of K block:
Figure BSA0000182085040000071
is composed of
Figure BSA0000182085040000072
Double-rail K-block digital vector correlation body:
Figure BSA0000182085040000073
three, double track single block digit vector correlation body
Figure BSA0000182085040000074
Suppose that
Figure BSA0000182085040000075
The vector is a two L-dimension positive integer number vector group which has the number length of M bits and the unit of a measurement system of L and can be divided into K block groups. In particular, when K is 1, in
Figure BSA0000182085040000076
In (1),
Figure BSA0000182085040000077
wherein,
Figure BSA0000182085040000078
are common L-dimensional positive integer number vectors.
Balance
Figure BSA0000182085040000079
Is an L-dimensional double-rail single-block digital vector correlation body.
Fourthly, the double-track single-block digital vector correlation body without parameters:
order:
Figure BSA00001820850400000710
is taken as the origin point of the image,
Figure BSA00001820850400000711
is a moving point.
Then
Figure BSA00001820850400000712
Is two double-track single-block digital vector correlation bodies, and forms a plane in the L-dimensional digital vector space, which is called a digital cipher plane MMS. In MMS surfaceIn the method, a concomitant L-dimensional double-rail single-region digital vector association body exists
Figure BSA00001820850400000713
Figure BSA0000182085040000081
A is called companion matrix, and
Figure BSA0000182085040000082
Figure BSA0000182085040000083
called B a derivative matrix, and
Figure BSA0000182085040000084
hence, call
Figure BSA0000182085040000085
Is composed of
Figure BSA0000182085040000086
Associated digital vector correlation without parameters
Balance
Figure BSA0000182085040000087
Is composed of
Figure BSA0000182085040000088
Of a parameterless derived digital vector correlator
By derived transformation
Figure BSA0000182085040000089
Namely:
Figure BSA00001820850400000810
the encryption function of the digital password is realized.
Fifthly, grouping the double-track double-block K into a digital vector correlation body:
Figure BSA00001820850400000811
suppose that
Figure BSA00001820850400000812
The vector is a two L-dimension positive integer number vector group which has the number length of M bits and the unit of a measurement system of L and can be divided into K block groups. Unless otherwise specified, it is assumed that M.ltoreq.13, l.ltoreq.10, 1 < L < + ∞ and L is a positive integer. When K is 2, is prepared from
Figure BSA00001820850400000813
The formed association is used as follows:
Figure BSA00001820850400000814
to indicate. Here:
Figure BSA00001820850400000815
suppose that:
Figure BSA00001820850400000816
for the (foreground) first digital vector,
Figure BSA00001820850400000817
is (background) second digital vector, and w (x) is information plaintext.
For the sake of simplicity, it is preferred that,
definition 1:
Figure BSA00001820850400000818
by using
Figure BSA00001820850400000819
Representing a set of digital vectors of background parametric information representing the foreground.
Definition 2:
Figure BSA00001820850400000820
by using
Figure BSA00001820850400000821
A set of digitally encoded vectors representing a character set of information w (x) to be encrypted.
Definition 3:
Figure BSA00001820850400000822
by using
Figure BSA00001820850400000823
Representing a background parametric information digital vector set representing a background.
Definition 4:
Figure BSA00001820850400000824
by using
Figure BSA00001820850400000825
The digital code vector group represents a character set of a background keyword keyw (x)/passw (x) subjected to encryption control processing.
Therefore, the temperature of the molten metal is controlled,
Figure BSA0000182085040000091
in that
Figure BSA0000182085040000092
When background B changes and continues to be subdivided into K-1 groups, then
Figure BSA0000182085040000093
While the changes constitute a K-1 sub-group. At this time, from
Figure BSA0000182085040000094
The formed association can be used
Figure BSA0000182085040000095
To indicate. Thus, there are:
Figure BSA0000182085040000096
and scale
Figure BSA0000182085040000097
Is a double-track double-block K grouping digital vector correlation body,
for brevity, this is:
Figure BSA0000182085040000098
wherein
Figure BSA0000182085040000099
Is the Kth group.
Encryption modulation algorithm of information plaintext W (x)
Functional digital cipher book
Figure BSA00001820850400000910
Modulation of
Suppose that
Figure BSA00001820850400000911
The vector is two L-dimensional positive integer number vector groups, wherein the number length is M bits, the unit of a measurement system is L, and the vector can be divided into two K-block groups. At this time, from
Figure BSA00001820850400000912
And (3) forming a digital vector correlation body:
Figure BSA00001820850400000913
definition 5: v is a vector consisting of 2 digits
Figure BSA00001820850400000914
The dimension of the formed measurement space is L. V can be divided into independent subspaces V1,V2,…Vi,…VK,ViIs the ith subspace of V (i ═ 1, 2, …, K).
Definition 6: represented by t is a vector
Figure BSA00001820850400000915
Forming a subscript value of the metric space V, and using B1,B2,B3,…,Bk-1,BkRepresenting each subspace ViOf subscriptsMaximum value (i ═ 1, 2, …, K, L ═ BK)。
Definition 7: by mi=Bi-Bi-1(i ═ 1, 2, …, K) denotes the subspace ViDimension (d) of (a). And in t e (B)i-1,Bi]On each subspace, there is m1=B1,m2=B2-B1,...,mK=BK-BK-1,(BK=L,1≤t≤L)。
When M is less than or equal to 13 and l is 10, the compound is prepared from
Figure BSA00001820850400000916
The formed double-rail double-block K grouping digital vector correlator comprises:
Figure BSA0000182085040000101
and comprises the following components: t is more than or equal to 1 and less than or equal to L
Deriving the cryptographic transformation: v (t) ═ p (t) + q (t)
Deriving a numerical vector:
Figure BSA0000182085040000102
functional derivative encryption transformation:
Figure BSA0000182085040000103
functional-derived numerical vector:
Figure BSA0000182085040000104
in particular: in the last vector subspace VKIn the above, order: m isK=N,τ∈(BK-1,BK]And (τ ═ 0, 1, 2, …, N) and
Figure BSA0000182085040000105
performing linear transformation: pWZ(BK-1+1+τ)=MB(τ)(t=BK-1+1+ τ) then a new dual-rail doublet group K grouped digital vector association is generated:
Figure BSA0000182085040000106
DMAC (c) character encoding dictionary by adopting high-dimensional one-way hash functional power algorithm
Figure BSA0000182085040000107
Concocting to obtain
Figure BSA0000182085040000108
The functional derivation of (1) to (1) correspondence transform. Thus, a new character-number code mapping relationship is generated:
Figure BSA0000182085040000109
thus, a new digital code dictionary is created:
Figure BSA00001820850400001010
therefore, it is called a functional digital codebook:
Figure BSA00001820850400001011
note 1: code dictionary with MB (tau) as character
Figure BSA00001820850400001012
UTF-8/16 Unicode of the # character Z (τ) in (1);
note 2: DMAC (DMAC) is a special one-way hash functional power calculation method;
note 3: vWZRTMB (τ) as a correlator
Figure BSA0000182085040000111
The value at point τ.
Random functional digital cipher book
Figure BSA0000182085040000112
In newly generated functional digital cipher books
Figure BSA0000182085040000113
In the modulation process of (3), the correlation body
Figure BSA0000182085040000114
Background conditions of (2):
Figure BSA0000182085040000115
is stationary. But when taking local digital vectors
Figure BSA0000182085040000116
For pseudo-random number subspaces
Figure BSA0000182085040000117
Then, generating a double-track double-block K grouping random number vector correlation body:
Figure BSA0000182085040000118
digital cipher book
Figure BSA0000182085040000119
A digital codebook with random parameters R is modulated:
Figure BSA00001820850400001110
hence, it is called a random functional digital codebook
Figure BSA00001820850400001111
Note 4:
Figure BSA00001820850400001112
RND (x) is a pseudo-random function for a pseudo-random number vector.
Disposable digital cipher book
Figure BSA00001820850400001113
The first party (information host A) encrypts the information plaintext W (x) needing to be kept secret, and then generates a digital password file MW (x) for storage. When the second party (information accessing person B) needs to access information, the numeric code mw (x) is transmitted by the third party (intermediary C) to the second party (information accessing recipient B). A series of associated information comprising A, B, C and environment D where ABC is located constitutes a context:
Figure BSA00001820850400001114
plus a pseudorandom number space
Figure BSA00001820850400001115
The encryption conditions that are uniquely determined and are only relevant to ABCD are constituted:
Figure BSA0000182085040000121
under the condition, the communication characteristic authentication information of the third party C/S is added
Figure BSA0000182085040000122
Forming a double-rail double-block K grouped random number vector correlation body:
Figure BSA0000182085040000123
DMAC (c) pair symbol dictionary by functional power algorithm
Figure BSA0000182085040000124
Modulation is performed, thereby producing a random functional digital codebook with third party authentication:
Figure BSA0000182085040000125
the method is called as follows: disposable digital cipher book
Figure BSA0000182085040000126
Note 5: r represents a band random parameter;
note 6: t represents a band communication authentication parameter.
FIG. 1 shows a dual-rail dual-block K-block grouped random feature number vector correlator according to an embodiment of the present invention
Figure BSA0000182085040000127
Working principle diagram of (1).
Definition 8: (digital password) in a one-time-use digital codebook:
Figure BSA0000182085040000128
after generation. Plaintext W (x) in digital cipher
Figure BSA0000182085040000129
In (1), the corresponding value
Figure BSA00001820850400001210
A digital cipher referred to as plaintext w (x).
Definition 9: (private digital code) when
Figure BSA00001820850400001211
When the private information is obtained, the private digital cipher book is:
Figure BSA00001820850400001212
plaintext W (x) in digital cipher
Figure BSA00001820850400001213
In (1), the corresponding value
Figure BSA00001820850400001214
A private digital cipher referred to as plaintext w (x).
Definition 10: (public digital code) is
Figure BSA00001820850400001215
In the case of public information, the public digital codebook is:
Figure BSA00001820850400001216
plaintext W (x)In public digital cipher books
Figure BSA00001820850400001217
In (1), the corresponding value
Figure BSA0000182085040000131
A public digital cipher referred to as plaintext w (x).
Private secret digital key
Figure BSA0000182085040000132
With private public digital keys
Figure BSA0000182085040000133
In the digital codebook:
Figure BSA0000182085040000134
in the modulation process, the correlation condition of the double-track double-block K-1 grouping digital vector is utilized:
Figure BSA0000182085040000135
composing a universal digital association
Figure BSA0000182085040000136
Adopting functional power algorithm DMAC (c) to make first modulation to produce general digital cipher book
Figure BSA0000182085040000137
Constructing a digital vector with foreground by using foreground conditions and according to special rules
Figure BSA00001820850400001319
Special text keyw (x) of key words, using numeric cipher book
Figure BSA0000182085040000138
Generating a key digital vector private digital cipher corresponding to KeyW (x)
Figure BSA0000182085040000139
Definition 11: here, the
Figure BSA00001820850400001310
Equivalent to PW (x), called private secret digital key, noted
Figure BSA00001820850400001311
FIG. 2 is a diagram of a private confidential digital key of an embodiment of the present invention
Figure BSA00001820850400001312
Modulation scheme of
Will be provided with
Figure BSA00001820850400001313
As background conditional digit vectors
Figure BSA00001820850400001314
Another part of the information
Figure BSA00001820850400001315
Thus, a new vector with foreground digits is generated
Figure BSA00001820850400001320
Double-track double-block K grouping digital vector correlation body of keyword features:
Figure BSA00001820850400001316
DMAC (c) pair symbol dictionary by functional power algorithm
Figure BSA00001820850400001317
And carrying out secondary modulation again. Obtaining new one-time-use vector with foreground digits
Figure BSA00001820850400001318
Digital codebook of key feature information:
Figure BSA0000182085040000141
thus, in the cipher book
Figure BSA0000182085040000142
With foreground digital vector of the password pass W (x)
Figure BSA0000182085040000143
Private public digital cryptography of features
Figure BSA0000182085040000144
Definition 12: here, the
Figure BSA0000182085040000145
Equivalent to GW (x), called private public digital key, noted
Figure BSA0000182085040000146
Therefore, the temperature of the molten metal is controlled,
Figure BSA0000182085040000147
becomes the key digital vector encryption information (private confidential digital key) that is most important to the completion of the encryption task for the password pass w (x). Then is connected to
Figure BSA0000182085040000148
Becomes the private public digital key of w (x).
FIG. 3 shows a private public digital key according to an embodiment of the present invention
Figure BSA0000182085040000149
Modulation scheme of
Private public digital key
Figure BSA00001820850400001410
With public digital code
Figure BSA00001820850400001411
Associated modulation of
Definition 13: when in use
Figure BSA00001820850400001412
As public foreground digital vectors
Figure BSA00001820850400001413
When the temperature of the water is higher than the set temperature,
Figure BSA00001820850400001414
when in use
Figure BSA00001820850400001415
The keyword KeyW (x) is composed of
Figure BSA00001820850400001416
When the key word KeyW (x) and the password pass W (x) are combined to form the public digital password
Figure BSA00001820850400001417
With
Figure BSA00001820850400001418
The privacy feature of (1). It is called a public digital code and is noted as:
Figure BSA00001820850400001419
from the above definition alone:
Figure BSA00001820850400001420
and
Figure BSA00001820850400001421
there is no relationship of association. Only foreground conditions
Figure BSA00001820850400001422
And
Figure BSA00001820850400001423
have different values. But in the actual encryption modulation process, the background condition is adopted
Figure BSA00001820850400001424
To change the personality of
Figure BSA00001820850400001425
And
Figure BSA00001820850400001426
the association relationship of (2). Thereby implementing the modulation function of the (private/public) associated encryption. The specific implementation process is as follows:
grouping private digital vector associations with a dual-rail dual-group K:
Figure BSA00001820850400001427
adopting functional power algorithm DMAC (c) to character dictionary
Figure BSA00001820850400001428
The first modulation is performed. Generating a private universal digital codebook:
Figure BSA00001820850400001429
in the foreground condition
Figure BSA00001820850400001430
A set of keywords keyw (x) is extracted. Using private digital codebooks
Figure BSA00001820850400001431
Modulate W (x) private secret digital key
Figure BSA00001820850400001432
Reuse of
Figure BSA00001820850400001433
Calculated as a parameter, partially replacing the association
Figure BSA0000182085040000151
In (1)
Figure BSA0000182085040000152
Namely:
Figure BSA0000182085040000153
Figure BSA0000182085040000154
using functional power algorithm DMAC (c) for character dictionary
Figure BSA0000182085040000155
A second modulation is performed to create a new one-time-use private digital codebook with foreground features
Figure BSA0000182085040000156
Whereby the private public key of the password passw (x) can be modulated out
Figure BSA0000182085040000157
In public digital code
Figure BSA0000182085040000158
In the modulation process of (2), the digital key is disclosed as a private public key
Figure BSA0000182085040000159
Calculated as a common parameter, partially replacing a common double-track double-block K-block grouped digital vector association
Figure BSA00001820850400001510
In (1)
Figure BSA00001820850400001511
Namely:
Figure BSA00001820850400001512
Figure BSA00001820850400001513
using functional power algorithm DMAC (c) for character dictionary
Figure BSA00001820850400001514
A third modulation is performed, thereby generating a new one-time use with prospect
Figure BSA00001820850400001515
Public digital codebook of key word KeyW (x) and password pass W (x)
Figure BSA00001820850400001516
Thereby modulating the image with foreground
Figure BSA00001820850400001517
Public digital code of plaintext information W (x) of characteristic KeyW (x)/PassW (x)
Figure BSA00001820850400001518
FIG. 4 shows a public digital cipher according to an embodiment of the present invention
Figure BSA00001820850400001519
Modulation scheme of
Due to the fact that
Figure BSA00001820850400001520
And
Figure BSA00001820850400001521
use the foreground vector
Figure BSA00001820850400001522
Key keyw (x) and password passw (x). Then the public digital code
Figure BSA00001820850400001523
With the proprietary features of the plaintext w (x). Thereby realizing a private public digital key
Figure BSA00001820850400001524
With public digital code
Figure BSA00001820850400001525
The associated modulation of (2).
Digital cipher decryption algorithm for digital secret information MW (x)
When the information host A needs to decrypt the digital secret message MW (x) in different places or at different times, the public digital password is firstly obtained
Figure BSA0000182085040000161
Then, the private secret digital key is generated by A itself
Figure BSA0000182085040000162
Modulating a private public digital key with a private key word and a password KeyW (x)/PassW (x)
Figure BSA0000182085040000163
To be provided with
Figure BSA0000182085040000164
Calculated as a common parameter, partially replacing a common double-track double-block K-block grouped digital vector association
Figure BSA0000182085040000165
In (1)
Figure BSA0000182085040000166
Namely:
Figure BSA0000182085040000167
Figure BSA0000182085040000168
thereby generating a one-time-use digital cipher with a private key
Figure BSA0000182085040000169
Public digital cipher book with key features
Figure BSA00001820850400001610
Then the received public digital code
Figure BSA00001820850400001611
Using character dictionaries
Figure BSA00001820850400001612
Carry out digital comparison calculation to obtain
Figure BSA00001820850400001613
The corresponding UTF-8/16 is uniformly encoded. Therefore, the information plaintext W (x) is restored, and the public password is realized
Figure BSA00001820850400001614
Decryption to W (x).
Figure BSA00001820850400001615
Figure BSA00001820850400001616
The technical solutions provided by the embodiments of the present invention are described in detail above, and the principles and embodiments of the present invention are explained herein by using specific single examples, and the descriptions of the embodiments above are only used to help understanding the principles of the embodiments of the present invention; meanwhile, for a person skilled in the art, according to the embodiments of the present invention, there may be variations in the specific implementation manners and application ranges, and in summary, the content of the present description should not be construed as a limitation to the present invention.

Claims (3)

1. An information security digital encryption method based on a one-time-use cipher book is characterized by comprising the following steps:
suppose that
Figure FSA0000182085030000011
The length of the number is M bits, the unit of a measurement system is L, and the number can be divided into two L-dimensional positive integer number vector groups of K block:
Figure FSA0000182085030000012
by
Figure FSA0000182085030000013
Forming a double-rail K-block digital vector correlation body:
Figure FSA0000182085030000014
the foreground condition is formed by the digital information of the information host A:
Figure FSA0000182085030000015
the information receiver B transmits the digital information of the third party C/S and the communication network environment D, and the background condition is constructed according to a certain rule:
Figure FSA0000182085030000016
plus pseudo-random number vector quantum space
Figure FSA0000182085030000017
Composing federated encryption conditions
Figure FSA0000182085030000018
Communication characteristic authentication digital information added with third party C/S
Figure FSA0000182085030000021
Forming double-track double-block K grouped random number vector association body
Figure FSA0000182085030000022
DMAC (c) pair symbol dictionary by functional power algorithm
Figure FSA0000182085030000023
Modulating, thereby producing a random digital codebook with third party authentication,
i.e. one-time-use digital codebooks:
Figure FSA0000182085030000024
wherein the information plaintext W (x) is in the digital codebook
Figure FSA0000182085030000025
Corresponding value of
Figure FSA0000182085030000026
A digital cipher of information plaintext W (x).
2. The information security digital encryption method based on the one-time-use codebook of claim 1, characterized in that:
using a dual-rail double-block K-1 grouping digital vector correlation condition:
Figure FSA0000182085030000027
and (3) forming a random number vector correlation body:
Figure FSA0000182085030000028
adopting functional power algorithm DMAC (c) to modulate for the first time to generate a random universal digital cipher book:
Figure FSA0000182085030000029
using the foreground conditions:
Figure FSA0000182085030000031
constructing a vector with foreground digits according to a specific rule
Figure FSA0000182085030000032
Special text keyw (x) of keywords, using universal numeric codebook
Figure FSA0000182085030000033
Generating a key number corresponding to KeyW (x)Word vector private digital key
Figure FSA0000182085030000034
Will be provided with
Figure FSA0000182085030000035
As background conditional digit vectors
Figure FSA0000182085030000036
Is transmitted to the other part of the information,
Figure FSA0000182085030000037
thereby generating a new digital vector with foreground
Figure FSA0000182085030000038
Double-track double-block K grouping digital vector correlation body of keyword features:
Figure FSA0000182085030000039
DMAC (c) pair symbol dictionary by functional power algorithm
Figure FSA00001820850300000310
Modulating for the second time to obtain new one-time-use digital vector with foreground
Figure FSA00001820850300000311
Digital codebook of key information:
Figure FSA00001820850300000312
thereby modulating the private public digital key of the password pass W (x)
Figure FSA00001820850300000313
3. The information security digital encryption method based on the one-time-use codebook of claim 2, characterized in that:
in the foreground condition
Figure FSA00001820850300000314
Extract a group of keywords KeyW (x), and use the private digital cipher book
Figure FSA00001820850300000315
Modulating out the private public digital key of the password passW (x)
Figure FSA00001820850300000316
To be provided with
Figure FSA00001820850300000317
Calculated as a common parameter, partially replacing a common double-track double-block K-block grouped digital vector association
Figure FSA00001820850300000318
In (1)
Figure FSA00001820850300000319
Namely:
Figure FSA00001820850300000320
Figure FSA0000182085030000041
using functional power algorithm DMAC (c) for character dictionary
Figure FSA0000182085030000042
A third modulation is performed to generate a new one-time-use private public digital key
Figure FSA0000182085030000043
Public digital cipher book
Figure FSA0000182085030000044
Public digital cipher for generating plaintext information W (x)
Figure FSA0000182085030000045
CN201910321141.6A 2019-04-18 2019-04-18 Information security digital encryption method based on one-time use codebook Active CN111835506B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910321141.6A CN111835506B (en) 2019-04-18 2019-04-18 Information security digital encryption method based on one-time use codebook

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910321141.6A CN111835506B (en) 2019-04-18 2019-04-18 Information security digital encryption method based on one-time use codebook

Publications (2)

Publication Number Publication Date
CN111835506A true CN111835506A (en) 2020-10-27
CN111835506B CN111835506B (en) 2023-06-27

Family

ID=72912162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910321141.6A Active CN111835506B (en) 2019-04-18 2019-04-18 Information security digital encryption method based on one-time use codebook

Country Status (1)

Country Link
CN (1) CN111835506B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080130895A1 (en) * 2006-10-25 2008-06-05 Spyrus, Inc. Method and System for Deploying Advanced Cryptographic Algorithms
CN101355422A (en) * 2008-07-16 2009-01-28 冯振周 Novel authentication mechanism for encrypting vector
CN102710605A (en) * 2012-05-08 2012-10-03 重庆大学 Information security management and control method under cloud manufacturing environment
CN103177415A (en) * 2013-04-08 2013-06-26 上海理工大学 Transform domain optical holographic watermarking algorithm based on colored image characteristic area
CN109218013A (en) * 2018-10-10 2019-01-15 青岛科技大学 Cover the binary data communication encryption method on plaintext symbol boundary

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080130895A1 (en) * 2006-10-25 2008-06-05 Spyrus, Inc. Method and System for Deploying Advanced Cryptographic Algorithms
CN101355422A (en) * 2008-07-16 2009-01-28 冯振周 Novel authentication mechanism for encrypting vector
CN102710605A (en) * 2012-05-08 2012-10-03 重庆大学 Information security management and control method under cloud manufacturing environment
CN103177415A (en) * 2013-04-08 2013-06-26 上海理工大学 Transform domain optical holographic watermarking algorithm based on colored image characteristic area
CN109218013A (en) * 2018-10-10 2019-01-15 青岛科技大学 Cover the binary data communication encryption method on plaintext symbol boundary

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
晏国勋: "加密技术下的信息安全", 《网络安全技术与应用》 *

Also Published As

Publication number Publication date
CN111835506B (en) 2023-06-27

Similar Documents

Publication Publication Date Title
Debnath et al. Brief review on journey of secured hash algorithms
CN101262341A (en) A Hybrid Encryption Method in Conference System
GB2551865A (en) Improved stream cipher system
Saini et al. Triple security of data in cloud computing
CN107181584B (en) Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof
CN103942500B (en) Hash ciphertext re-encryption method based on noise and decryption method after re-encryption
CN104378198A (en) Voice encryption method based on block cipher system
CN108270545A (en) A kind of improved DES data encryption algorithm based on mobile Internet
Saikumar DES-Data Encryption Standard
CN104486756B (en) A kind of encryption and decryption method and system of close writing paper short message
US8458452B1 (en) System and method for encryption and decryption of data transferred between computer systems
Widiasari Combining advanced encryption standard (AES) and one time pad (OTP) encryption for data security
Chaloop et al. Enhancing Hybrid Security Approach Using AES And RSA Algorithms
Tahir et al. A scheme for the generation of strong icmetrics based session key pairs for secure embedded system applications
CN112422278A (en) Byte-oriented random multi-table replacement encryption and decryption method
Dubey et al. An innovative data security techniques using cryptography and steganographic techniques
CN111835506B (en) Information security digital encryption method based on one-time use codebook
KR102304831B1 (en) Encryption systems and method using permutaion group based cryptographic techniques
Pushpa Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
Neforawati et al. Message digest 5 (md-5) decryption application using python-based dictionary attack technique
CN108768923A (en) A kind of real-time encrypted method of chat of the Encryption Algorithm based on Quantum Reversible Logic circuit
CN103942501B (en) Hash ciphertext re-encrypting method and decryption method after re-encryption
Chen et al. An image encryption algorithm based on SM4 and Base64
CN114430549A (en) White box encryption and decryption method and device suitable for wireless communication
CN115550058B (en) Shared file transparent encryption method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant