CN107277048A - A kind of encrypting and decrypting method for communication authentication - Google Patents

A kind of encrypting and decrypting method for communication authentication Download PDF

Info

Publication number
CN107277048A
CN107277048A CN201710617990.7A CN201710617990A CN107277048A CN 107277048 A CN107277048 A CN 107277048A CN 201710617990 A CN201710617990 A CN 201710617990A CN 107277048 A CN107277048 A CN 107277048A
Authority
CN
China
Prior art keywords
key
matrix
encrypting
data
decrypting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710617990.7A
Other languages
Chinese (zh)
Other versions
CN107277048B (en
Inventor
郑利利
熊想涛
路影
欧建平
刘伟
姜峰
贾丹丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Geely Holding Group Co Ltd
Zhejiang Geely Automobile Research Institute Co Ltd
Original Assignee
Zhejiang Geely Holding Group Co Ltd
Zhejiang Geely Automobile Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Geely Holding Group Co Ltd, Zhejiang Geely Automobile Research Institute Co Ltd filed Critical Zhejiang Geely Holding Group Co Ltd
Priority to CN201710617990.7A priority Critical patent/CN107277048B/en
Publication of CN107277048A publication Critical patent/CN107277048A/en
Application granted granted Critical
Publication of CN107277048B publication Critical patent/CN107277048B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of encrypting and decrypting method for communication authentication, is related to communication technique field, and the security of data is transmitted during for ensureing remote-control key with vehicle remote certification, and the encrypting and decrypting method includes:S10. the key request of encrypting and decrypting program is responded, to be authenticated according to key request to encrypting and decrypting program;S20. certification passes through rear startup encrypting and decrypting program;S30. a clear packets and a key are inputted, and copy to the clear packets in one matrix, obtain initial matrix State1, by obtaining final state matrix State to the initial matrix State1 computings being encrypted, and a ciphertext block is exported according to state matrix State, so that data to be encrypted;S40. the decryption to data is realized by table lookup operations and to the inverse transformation of ciphering process.When the present invention solves remote-control key with vehicle remote certification the problem of the security of transmission data.

Description

A kind of encrypting and decrypting method for communication authentication
Technical field
The present invention relates to communication technique field, more particularly to a kind of encrypting and decrypting method for communication authentication.
Background technology
At present, only there is oneself special remote-control key identifying algorithm in individual host factory, and these algorithms are typically all main frame Factory's internal algorithm, hardly results in the information of correlation, in addition, and most of main engine plants are all using some calculations recognized within the industry Method is remotely controlled the encrypting and decrypting certification of key, and the algorithm of main flow is including following several:
1.Keeloq rolling code AESs
Keeloq technologies are rolling code encryption technologies.Source code is encrypted with Keeloq rolling code AESs, can Produce highly confidential rolling code.Because the code transmitted every time is all different, it will not repeat, even if so having identical former Beginning code, can not also be decoded password, because code is different and different with transmission time, and traditional illegally enters Invading means (such as intercept, scan) all becomes meaningless.Keeloq technologies, as a kind of new and high technology of secrecy, are that one kind is more Change, anti-intercepting and capturing, safe and reliable encoding by code hopping decryption technology.
But, the technology encrypted based on hardware of Microchip companies, as people are required not vehicle safety performance Disconnected to improve, defect is also gradually revealed, and is mainly manifested in the following aspects:
(1) hardware, which is encrypted, make it that system upgrade and expanded function are more difficult;
(2) data transmission efficiency compares relatively low;
(3) cost is higher, vulnerable.
2.DES algorithms
DES algorithms have tri- suction parameters of Key, Data, Mode.Wherein Key is 8 bytes totally 64, and significance bit is 56 Position, is the working key of DES algorithms;Data is also 8 bytes 64, is data to be encrypted or decrypted;Mode is DES Working method, have encryption or decryption two kinds.DES algorithm synthesis uses a variety of cryptographic techniques, wherein the predominantly displacement of character And upset.The main feature of the algorithm is exactly that enciphering rate is fast, and security is higher.It is a large amount of in encryption compared to other AESs Have great advantage in data.What also cracked in addition to the method for exhaustion without effective ways.
However, with the development of technology, DES technologies are more and more challenged, due to DES technologies only have 64 it is close Key, someone can just decode DES passwords in the time less than one day with the method for exhaustion, during the decoding declaration DES of DES passwords The termination in generation.So, DES has a fatal defect, that is, key management.Because DES uses secret key cryptography, and And key length only has 56 bits.Therefore all use under normal circumstances and key distribution just is carried out to key before communicating, and it is right Different objects, uses different keys.This considerably increases the extra expense of system.
3.AES algorithms
Aes algorithm, also known as Rijndael algorithms, it with its it is succinct, efficient, safe the characteristics of, be suitable for automobile remote-control The less application environment of this controller resource of key.The key length that aes algorithm can be supported can for 128,192 or 256, one side key digit is long, and another aspect ciphering process is complicated so that the algorithm is difficult to crack, as data plus The main flow in close field.
Aes algorithm includes round transformation algorithm and key schedule.Round transformation algorithm is become by word classifying, row displacement Change, mixcolumns and expanded keys XOR are constituted, as Nk=4 and Nb=4, the iteration number of turns is 10, wherein preceding 9 wheel Conversion is different with last round transformation.Aes algorithm ciphering process is as follows:128 plaintexts and 128 keys perform XOR fortune After calculation, into word classifying, shiftrows, mixcolumns, result will be obtained and carry out xor operation with expanded keys, Referred above to a circulation, so repeatedly 9 times, expanded keys each time are different from, and perform result again after being circulated throughout for 9 times Word classifying and shiftrows, finally perform XOR with the 10th expanded keys (with preceding 9 differences), obtain To 128 ciphertexts.
But, in order to ensure the security of algorithm, the operand that aes algorithm is related to it is larger, it is necessary to memory space it is bigger, Requirement for chip is higher.Meanwhile, AES is the open generally acknowledged advanced encryption algorithm in the whole world, for some security requirements not It is very high system, aes algorithm need not be used.In addition, this algorithm is public algorithm, unsuitable main engine plants are extended to internal logical With change algorithm.
The content of the invention
The invention aims to provide a kind of encrypting and decrypting method for communication authentication, to ensure the peace of AES The feasibility of full property and decipherment algorithm.
Another object of the present invention be to solve encryption-decryption algorithm of the prior art system extension it is difficult and The problem of cipher key management difficult or memory space requirement can not be generalized in enterprise's generalization algorithm greatly.
Especially, the invention provides a kind of encrypting and decrypting method for communication authentication, for ensure remote-control key with The security of data is transmitted during vehicle remote certification, the encrypting and decrypting method includes:
S10. the key request of encrypting and decrypting program is responded, to enter according to the key request to the encrypting and decrypting program Row certification;
S20. certification starts the encrypting and decrypting program by rear;
S30. a clear packets and a key are inputted, and the clear packets are copied in a matrix, initial square is obtained Battle array State1, by obtaining final state matrix State to the initial matrix State1 computings being encrypted, and according to The state matrix State exports a ciphertext block, so that data to be encrypted;
S40. the decryption to data is realized by table lookup operations and to the inverse transformation of ciphering process.
Further, the step of encryption or decryption oprerations includes:
S300. the initial matrix State1 is negated, obtain matrix State2, and by the matrix State2 with First round key carries out InvAddRoundKey computing, obtains matrix State3;
S400. interative computation is encrypted to the matrix State3 according to self-defined substitution table, until iteration total value is followed Ring terminates, wherein, the iteration total value is determined by the length of the key;
S500. after iteration total value circulation terminates, final state matrix State is obtained, and according to described final State matrix State export corresponding ciphertext block.
Further, the encryption iteration step of the step S400 includes:
S401. the matrix State3 is replaced using the self-defined substitution table, obtains matrix State4;
S402. Applying Elementary Row Operations are carried out to the State4, obtains matrix State5, then the matrix State5 is carried out Elementary rank transform, obtains matrix State6;
S403. inverible transform is carried out to the matrix State6, obtains matrix State7, and by the matrix State7 with Next round key carries out InvAddRoundKey, return to step S401.
Further, the inverible transform of the step S403 is Linear Invertible Transforms, and it includes state-transition matrix, The inverible transform process is:
The state-transition matrix does multiplying with the matrix State6 and obtains matrix State7;
Wherein, the component of the state-transition matrix is by 00,01,02 and 03 composition.
Further, the definition rule of the self-defined substitution table of the step S400 be according to presetting mode or Formulate in a random fashion, to ensure the security of encryption iteration data.
Further, the remote control key system of the vehicle includes receiving controller, and the reception controller is loaded with close Key service routine, is authenticated including according to the key request to encrypting and decrypting program:
S100. requestor sends key request to cipher key service program, and the cipher key service program produces random number, and The random number of generation is sent to requestor;
S101. the random number is encrypted according to first key data for the requestor, and by the encryption Data are sent to the cipher key service program;
S102. the data of the encryption are decrypted according to the second key data for the cipher key service program, and by institute The data and the random number for stating decryption are compared,
Wherein, if the data of the decryption are consistent with the random number, certification success, otherwise, authentification failure;
S103. determined whether to send key request according to authentication result, if certification success, sends, otherwise do not send
Further, first key data and the second key data are identical key data.
Further, in the S102, the cipher key service program is according to number of second key data to the encryption According to being decrypted,
If certification success, is sent to the requestor, and start the encrypting and decrypting by second key data Program;
If authentification failure, second key data will not be sent to the requestor, not start described add Close decryption program.
Further, first round key is generated by the initial key by key schedule forward direction extension;
Next round key by the last round of key during the encryption iteration by the key schedule just To extension generation.
Beneficial effects of the present invention can be:
First, the encrypting and decrypting program by data key be encrypted or decryption oprerations during, in iteration Cycle-index in the matrix State3 is replaced according to self-defined substitution table, and the matrix state4 obtained after replacement is carried out Elementary row-column transform obtains matrix state6, then obtains matrix state7 to matrix State6 progress Linear Invertible Transforms, with One round key carries out InvAddRoundKey, and such loop iteration is to realize the computing of encryption iteration.Wherein, due to matrix state7 be by Matrix State6 carries out Linear Invertible Transforms and obtained, and in inverible transform, invertible matrix is selected by 00,01,02 and 03 element The state-transition matrix of composition, and the state-transition matrix can not think Special matrix or unit matrix, in this way, and prior art The scheme of encrypting and decrypting is compared, on the one hand, the scheme of encryption-decryption algorithm of the present invention can ensure that the data after encryption can While realizing decryption oprerations, additionally it is possible to ensure the security of encryption data;On the other hand, the reversible square being made up of simple elements Battle array can simplify the process of cryptographic calculation, so as to improve the efficiency of cryptographic calculation.
Secondly as self-defined substitution table laying down a regulation according to presetting mode or formulates in a random fashion, And this lays down a regulation and is only limited to the inside of enterprise, i.e., in the case where the enterprise is underground, consumer or other enterprises can not obtain To laying down a regulation for the self-defined substitution table, so that have no way of learning the specific operating process encrypted or decrypted, it is therefore, described to add Close decipherment algorithm is able to ensure that the security of data transfer, to ensure that enterprises technical information can be protected effectively.
Furthermore, the encrypting and decrypting method for communication authentication of the present invention can be subjected to unified definition and be generalized to vehicle It on the platform of remote-control key, can not only ensure the security of vehicle authentication, and researcher can be improved for enterprise Efficiency of research and development, so as to shorten the construction cycle of product, reduce development cost, while researcher can be improved by theory Research is applied to the ability in real work, and the long term growth for enterprise has a huge impact.
According to the accompanying drawings to the detailed description of the specific embodiment of the invention, those skilled in the art will be brighter Above-mentioned and other purposes, the advantages and features of the present invention.
Brief description of the drawings
Some specific embodiments of the present invention are described in detail by way of example, and not by way of limitation with reference to the accompanying drawings hereinafter. Identical reference denotes same or similar part or part in accompanying drawing.It should be appreciated by those skilled in the art that these What accompanying drawing was not necessarily drawn to scale.In accompanying drawing:
Fig. 1 is the schematic diagram of vehicle remote control system according to an embodiment of the invention;
Fig. 2 is the indicative flowchart of encrypting and decrypting method according to an embodiment of the invention;
Fig. 3 is the indicative flowchart of encryption according to an embodiment of the invention or decryption;
Fig. 4 is the indicative flowchart of encryption iteration algorithm in step S400 according to Fig. 1;
Fig. 5 is self-defined substitution table according to an embodiment of the invention;
Fig. 6 is numerical value byte inquiry table in accordance with another embodiment of the present invention.
Embodiment
In communication field, the problem of safety and function of keeping secret have become consumer's growing interest constantly increases in vehicle Plus communications applications safety and function of keeping secret are integrated into wider vehicle platform.The remote control key system one of vehicle As by one be arranged on vehicle on reception controller and the i.e. unlimited remote control car key group of a transmitter carried by user Into transmitter is typically in closed mode, is just worked when pressing button or needing to send data, is now one-way communication shape State.Fig. 1 is the schematic diagram of vehicle remote control system according to an embodiment of the invention, and the system typically may include peace The transceiver controller 22 that reception controller 11 and user at car body controller or anti-theft controller can be carried with, should Transceiver controller 22 can both send data, and data can be received again, wherein, receiving controller 11 can be by microcontroller 1, low Frequently the human interface device such as (LF) device 2, high frequency radio wave (UHF) receiver 3, button 4 and LED light 5 constitutes, transmitting-receiving Controller 22 can be made up of human interface devices such as microcontroller 6, rf control unit 7, button 8 and LED9.Transceiver controller 22 Coding 10 (UHF, which is sent, to be responded) is sent to controller 11 is received by radio device, encryption is received receiving controller 11 After coding 10, start cipher key service program and perform challenge/response authentication;After certification success, key is stored in internal memory and supplies encrypting and decrypting Program is used, and encrypting and decrypting program is loaded in transceiver controller 22, and cipher key service program is loaded in reception controller 11, institute State encrypting and decrypting program and cipher key service program and decryption communication certification is encrypted by rf control unit 7 automatically, that is, complete to add Close or decrypting process.
Fig. 2 is the indicative flowchart of the encrypting and decrypting method according to one embodiment of the invention, to ensure remote-control key The security of data is transmitted during with vehicle remote certification.The encrypting and decrypting method can typically include:
S10. the key request of encrypting and decrypting program is responded, to enter according to the key request to the encrypting and decrypting program Row certification;
S20. certification starts the encrypting and decrypting program by rear;
S30. a clear packets and a key are inputted, and the clear packets are copied in a matrix, initial square is obtained Battle array State1, by obtaining final state matrix State to the initial matrix State1 computings being encrypted, and according to The state matrix State exports a ciphertext block, so that data to be encrypted;
S40. in the method for data deciphering, it can be realized by table lookup operations and to the inverse transformation of ciphering process pair The decryption of the data.
As shown in figure 3, encryption or decryption can include following operating procedure:
S300. the initial matrix State1 is negated, obtain matrix State2, and by the matrix State2 with First round key carries out InvAddRoundKey computing, obtains matrix State3;
S400. interative computation is encrypted to the matrix State3 according to self-defined substitution table, until iteration total value is followed Ring terminates, wherein, the iteration total value is determined by the length of the key;
S500. after iteration total value circulation terminates, final state matrix State is obtained, and according to described final State matrix State export corresponding ciphertext block.
As shown in figure 4, primary iteration value i is 1, step S400 encryption iteration step can include:
S401. the matrix State3 is replaced using the self-defined substitution table, obtains matrix State4;
S402. Applying Elementary Row Operations are carried out to the State4, obtains matrix State5, then the matrix State5 is carried out Elementary rank transform, obtains matrix State6;
S403. inverible transform is carried out to the matrix State6, obtains matrix State7, and by the matrix State7 with Next round key carries out InvAddRoundKey, iterative value i=i+1.When i is not more than iteration total value, return to step S401;When i is more than During iteration total value, into step S500.
Wherein, the first round key is generated by the initial key by key schedule forward direction extension, next round key Generated by the last round of key during the encryption iteration by key schedule forward direction extension.
Wherein, the inverible transform of the step S403 can be Linear Invertible Transforms, i.e., with an invertible matrix and institute State matrix State6 and do multiplying and obtain matrix State7, wherein, in order to ensure that the data after encryption can realize decryption Operation, the invertible matrix selects state-transition matrix;Meanwhile, in order to ensure the security of encryption data, the invertible matrix is not Basic unit matrix or Special matrix can be selected;In addition, the process in order to which cryptographic calculation can be simplified, the invertible matrix Component is made up of simplest data 00,01,02 and 03.Inverible transform is carried out to the matrix State6 as shown in Equation 1:
It is so designed that, compared with the scheme of prior art encrypting and decrypting, on the one hand, the scheme of encryption-decryption algorithm of the present invention While can ensureing that the data after encrypting can realize decryption oprerations, it can be ensured that the security of encryption data;The opposing party Face, the invertible matrix being made up of simple elements can simplify the process of cryptographic calculation, so as to improve the efficiency of cryptographic calculation.
In addition, in step S401, matrix State3 is replaced using self-defined substitution table and belongs to nonlinear transformation, Further to strengthen the security of encryption-decryption algorithm, laying down a regulation for the self-defined substitution table can be according to presetting mode Or formulate in a random fashion, therefore, it is difficult to crack the encryption-decryption algorithm.The encryption-decryption algorithm can use such as Fig. 5 Shown self-defined substitution table.
Because laying down a regulation for the self-defined substitution table can make according to presetting mode or in a random fashion It is fixed, and this lays down a regulation and is only limited to the inside of enterprise, i.e., in the case where the enterprise is underground, consumer or other enterprises can not Laying down a regulation for the self-defined substitution table is obtained, so as to have no way of learning the specific operating process encrypted or decrypted, therefore, encryption Decipherment algorithm can ensure the security of data transfer, to ensure that enterprises technical information can be effectively protected.
In the embodiment in fig 6, for the ease of computing to reduce operation times, the distributive law formula based on linear operation:
The computing of formula 1 can by way of tabling look-up, numerical operation is converted into the mode tabled look-up obtain operation result with State7 is obtained, as shown in fig. 6, the numerical value inquiry mode can reduce the data of intermediate operations generation, accelerates arithmetic speed, The operand of data and the memory space of chip can be reduced while further improving cryptographic security.
In Fig. 2 to Fig. 6 implementation, due in the encrypting and decrypting method except self-defined substitution table enters to matrix State3 Row replacement belongs to outside nonlinear transformation, and other can be realized by corresponding inverse transformation and decrypted, i.e., after decruption key is obtained, It is that can be achieved to the corresponding inverse transformation of ciphertext progress by the order opposite to the encrypting step.Wherein, for AES Byte replacement operation can realize that other computings are all linear invertible computings, all may be used by the byte substitution table backstepping of query graph 5 To obtain specific data result by corresponding inverse transformation to realize decryption computing.
In order to further enhance the security of key, cipher key service program can be communicated to encrypting and decrypting program Certification, i.e., be authenticated according to key request to encrypting and decrypting program, can include the step of certification,
S100. requestor sends key request to cipher key service program, and the cipher key service program produces random number, and The random number of generation is sent to requestor;
S101. the random number is encrypted according to first key data for requestor, and by the data of the encryption Send to the cipher key service program;
S102. the data of encryption are decrypted according to the second key data for cipher key service program, and by the decryption Data are compared with random number, when the data of the decryption are consistent with the random number, certification success, when the decryption When data are consistent with the random number, authentification failure;
S103. determined whether to send key request according to authentication result, when the authentication is successful, then can be close by described second Key data are sent to the requestor, and start the encrypting and decrypting program;When the authentication fails, then will not be by described second Key data is sent to the requestor, from without starting the encrypting and decrypting program.
Wherein, first key data and the second key data are identical key data.
The encrypting and decrypting method is subjected to unified definition and is generalized on the platform of remote control key, can not only be protected The security of vehicle authentication is demonstrate,proved, and the efficiency of research and development of researcher can be improved for enterprise, so as to shorten product Construction cycle, reduce development cost, while the ability that theoretical research is applied in real work by researcher can be improved, Long term growth for enterprise has a huge impact.
A kind of encrypting and decrypting method for communication authentication of the present invention is also applied to other related data protections Field, such as engine anti-theft Verification System and Intelligent key tele-control system, with to data during communication authentication Safety is protected.
In the embodiment in figure 1, microcontroller 1 and microcontroller 6 can use DS89C440 or PIC18F8490;Radio frequency Controller can use MAX7044 or MAX1479 or TRF6901.Often there is FREESCALE (to fly using chip in vehicle remote control apparatus Think karr) MC9S08QG8, TI MSP430F2121, NXP PCF7961, PCF7936, MICROCHIP HCS300 systems Row, PIC series, and NEC chips.
So far, although those skilled in the art will appreciate that detailed herein have shown and described multiple showing for the present invention Example property embodiment, still, still can be direct according to present disclosure without departing from the spirit and scope of the present invention It is determined that or deriving many other variations or modifications for meeting the principle of the invention.Therefore, the scope of the present invention is understood that and recognized It is set to and covers other all these variations or modifications.

Claims (9)

1. a kind of encrypting and decrypting method for communication authentication, data are transmitted during for ensureing remote-control key with vehicle remote certification Security, the encrypting and decrypting method includes:
S10. the key request of encrypting and decrypting program is responded, to recognize according to the key request the encrypting and decrypting program Card;
S20. certification starts the encrypting and decrypting program by rear;
S30. a clear packets and a key are inputted, and the clear packets are copied in a matrix, initial matrix is obtained State1, by obtaining final state matrix State to the initial matrix State1 computings being encrypted, and according to institute State state matrix State and export a ciphertext block, so that data to be encrypted;
S40. the decryption to data is realized by table lookup operations and to the inverse transformation of ciphering process.
2. encrypting and decrypting method according to claim 1, wherein, include the step of the encryption or decryption oprerations:
S300. the initial matrix State1 is negated, obtains matrix State2, and by the matrix State2 and first Round key carries out InvAddRoundKey computing, obtains matrix State3;
S400. interative computation is encrypted to the matrix State3 according to self-defined substitution table, until iteration total value circulates knot Beam, wherein, the iteration total value is determined by the length of the key;
S500. after iteration total value circulation terminates, final state matrix State is obtained, and according to the final shape State matrix State exports corresponding ciphertext block.
3. encrypting and decrypting method according to claim 1, wherein, the encryption iteration step of the step S400 includes:
S401. the matrix State3 is replaced using the self-defined substitution table, obtains matrix State4;
S402. Applying Elementary Row Operations are carried out to the State4, obtains matrix State5, then the matrix State5 carried out elementary Rank transformation, obtains matrix State6;
S403. inverible transform is carried out to the matrix State6, obtains matrix State7, and by the matrix State7 with it is next Round key carries out InvAddRoundKey, return to step S401.
4. encrypting and decrypting method according to claim 2, wherein, the inverible transform of the step S403 is linearly may be used Inverse transformation, it includes state-transition matrix, and the inverible transform process is:
The state-transition matrix does multiplying with the matrix State6 and obtains matrix State7;
Wherein, the component of the state-transition matrix is by 00,01,02 and 03 composition.
5. encrypting and decrypting method according to claim 3, the definition rule of the self-defined substitution table of the step S400 Then to formulate according to presetting mode or in a random fashion, to ensure the security of encryption iteration data.
6. encrypting and decrypting method according to claim 4, wherein, the remote control key system of the vehicle, which includes receiving, to be controlled Device, the reception controller is loaded with cipher key service program, and bag is authenticated to encrypting and decrypting program according to the key request Include:
S100. requestor sends key request to cipher key service program, and the cipher key service program produces random number, and will production The raw random number is sent to requestor;
S101. the random number is encrypted according to first key data for the requestor, and by the data of the encryption Send to the cipher key service program;
S102. the data of the encryption are decrypted according to the second key data for the cipher key service program, and by the solution Close data are compared with the random number,
Wherein, if the data of the decryption are consistent with the random number, certification success, otherwise, authentification failure;
S103. determined whether to send key request according to authentication result, if certification success, sends, otherwise do not send.
7. encrypting and decrypting method according to claim 5, wherein, first key data and the second key data are identical Key data.
8. encrypting and decrypting method according to claim 6, wherein, in the S102, the cipher key service program according to The data of the encryption are decrypted second key data,
If certification success, is sent to the requestor, and start the encrypting and decrypting program by second key data;
If authentification failure, second key data will not be sent to the requestor, be solved with not starting the encryption Close program.
9. the encrypting and decrypting method according to claim any one of 1-8, wherein,
First round key is generated by the initial key by key schedule forward direction extension;
Next round key is expanded by the last round of key during the encryption iteration by key schedule forward direction Exhibition generation.
CN201710617990.7A 2017-07-26 2017-07-26 Encryption and decryption method for communication authentication Active CN107277048B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710617990.7A CN107277048B (en) 2017-07-26 2017-07-26 Encryption and decryption method for communication authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710617990.7A CN107277048B (en) 2017-07-26 2017-07-26 Encryption and decryption method for communication authentication

Publications (2)

Publication Number Publication Date
CN107277048A true CN107277048A (en) 2017-10-20
CN107277048B CN107277048B (en) 2020-04-24

Family

ID=60078579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710617990.7A Active CN107277048B (en) 2017-07-26 2017-07-26 Encryption and decryption method for communication authentication

Country Status (1)

Country Link
CN (1) CN107277048B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108989024A (en) * 2018-06-29 2018-12-11 百度在线网络技术(北京)有限公司 Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car
CN109902498A (en) * 2019-02-27 2019-06-18 南京师范大学 Data ciphering method, data decryption method and corresponding device and equipment
CN114710324A (en) * 2022-03-16 2022-07-05 深圳市风云实业有限公司 Cross-network tunnel message transmission method based on cipher book replacement encryption and decryption
CN114844728A (en) * 2022-07-04 2022-08-02 道格特半导体科技(江苏)有限公司 Serialized data secure communication method and big data platform

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925401A (en) * 2006-10-12 2007-03-07 ***(集团)有限公司北京市分公司 Internet access system and method
CN101277186A (en) * 2007-03-30 2008-10-01 北京握奇数据***有限公司 Method for implementing exterior authentication using asymmetry key algorithm
CN102970129A (en) * 2012-11-16 2013-03-13 深圳光启创新技术有限公司 Time information-based signal encrypting and decrypting method and time information-based signal encrypting and decrypting device
JP2013105100A (en) * 2011-11-15 2013-05-30 Tokai Rika Co Ltd Data converter
CN103516512A (en) * 2013-10-21 2014-01-15 深圳市芯通信息科技有限公司 Encryption and decryption method and encryption and decryption device based on AES (advanced encryption standard) algorithm
CN104184579A (en) * 2014-09-12 2014-12-03 南京航空航天大学 Lightweight block cipher VH algorithm based on dual pseudo-random transformation
CN106850221A (en) * 2017-04-10 2017-06-13 四川阵风科技有限公司 Information encryption and decryption method and device
CN106921486A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 The method and apparatus of data encryption

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925401A (en) * 2006-10-12 2007-03-07 ***(集团)有限公司北京市分公司 Internet access system and method
CN101277186A (en) * 2007-03-30 2008-10-01 北京握奇数据***有限公司 Method for implementing exterior authentication using asymmetry key algorithm
JP2013105100A (en) * 2011-11-15 2013-05-30 Tokai Rika Co Ltd Data converter
CN102970129A (en) * 2012-11-16 2013-03-13 深圳光启创新技术有限公司 Time information-based signal encrypting and decrypting method and time information-based signal encrypting and decrypting device
CN103516512A (en) * 2013-10-21 2014-01-15 深圳市芯通信息科技有限公司 Encryption and decryption method and encryption and decryption device based on AES (advanced encryption standard) algorithm
CN104184579A (en) * 2014-09-12 2014-12-03 南京航空航天大学 Lightweight block cipher VH algorithm based on dual pseudo-random transformation
CN106921486A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 The method and apparatus of data encryption
CN106850221A (en) * 2017-04-10 2017-06-13 四川阵风科技有限公司 Information encryption and decryption method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李京,等: ""AES改进算法在CCMP协议中的应用"", 《延边大学学报(自然科学版)》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108989024A (en) * 2018-06-29 2018-12-11 百度在线网络技术(北京)有限公司 Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car
CN109902498A (en) * 2019-02-27 2019-06-18 南京师范大学 Data ciphering method, data decryption method and corresponding device and equipment
CN109902498B (en) * 2019-02-27 2023-08-18 南京师范大学 Data encryption method, data decryption method, and corresponding devices and equipment
CN114710324A (en) * 2022-03-16 2022-07-05 深圳市风云实业有限公司 Cross-network tunnel message transmission method based on cipher book replacement encryption and decryption
CN114710324B (en) * 2022-03-16 2024-02-13 深圳市风云实业有限公司 Cross-network tunnel message transmission method based on cipher-key replacement encryption and decryption
CN114844728A (en) * 2022-07-04 2022-08-02 道格特半导体科技(江苏)有限公司 Serialized data secure communication method and big data platform

Also Published As

Publication number Publication date
CN107277048B (en) 2020-04-24

Similar Documents

Publication Publication Date Title
CN101447870B (en) Safe storage method of private key based on technology of distributed password
CN103413109B (en) A kind of mutual authentication method of radio frequency identification system
CN105743645B (en) Stream code key generating means, method and data encryption, decryption method based on PUF
CA2754268C (en) Split key secure access system
CN107277048A (en) A kind of encrypting and decrypting method for communication authentication
CN102185694A (en) Electronic file encrypting method and system based on fingerprint information
CN111931533B (en) Authentication method for multi-owner RFID tag
CN102238430A (en) Personalized whitebox descramblers
Mousavi et al. Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems)
CN113098675B (en) Binary data encryption system and method based on polynomial complete homomorphism
Majumder et al. Secure data communication and cryptography based on DNA based message encoding
CN103607276A (en) Grouping encryption method based on random functions and resisting to known plaintext cipher attacks
Alemami et al. Advanced approach for encryption using advanced encryption standard with chaotic map
CN107070637A (en) A kind of data encryption/decryption method of overlapping packet
CN101739540A (en) Label reader-writer and data communication method and system of radio frequency label
CN104618092A (en) Information encryption method and system
Tang et al. A one-time pad encryption algorithm based on one-way hash and conventional block cipher
Zhang Cryptanalyzing an image cryptosystem based on circular inter-intra pixels bit-level permutation
Lv et al. AES encryption algorithm keyless entry system
CN106302457A (en) A kind of data communications method and system
KR101807259B1 (en) Apparatus and methdo for encoding
CN103746795B (en) Method for realizing Magpie encryption and decryption
CN106788968A (en) It is applied to the implementation method of the security coprocessor of WIA-PA agreements
CN111914967B (en) Elliptic curve radio frequency identification bidirectional authentication method with random parameter entrusted storage
US20220417012A1 (en) Method for performing cryptographic operations in a processing device, corresponding processing device and computer program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant