CN107277048A - A kind of encrypting and decrypting method for communication authentication - Google Patents
A kind of encrypting and decrypting method for communication authentication Download PDFInfo
- Publication number
- CN107277048A CN107277048A CN201710617990.7A CN201710617990A CN107277048A CN 107277048 A CN107277048 A CN 107277048A CN 201710617990 A CN201710617990 A CN 201710617990A CN 107277048 A CN107277048 A CN 107277048A
- Authority
- CN
- China
- Prior art keywords
- key
- matrix
- encrypting
- data
- decrypting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000004891 communication Methods 0.000 title claims abstract description 16
- 239000011159 matrix material Substances 0.000 claims abstract description 98
- 230000008569 process Effects 0.000 claims abstract description 14
- 230000009466 transformation Effects 0.000 claims abstract description 14
- 238000006467 substitution reaction Methods 0.000 claims description 19
- 230000005540 biological transmission Effects 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 10
- 238000004364 calculation method Methods 0.000 description 7
- 238000005096 rolling process Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000006073 displacement reaction Methods 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000012827 research and development Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000011017 operating method Methods 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000004224 protection Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of encrypting and decrypting method for communication authentication, is related to communication technique field, and the security of data is transmitted during for ensureing remote-control key with vehicle remote certification, and the encrypting and decrypting method includes:S10. the key request of encrypting and decrypting program is responded, to be authenticated according to key request to encrypting and decrypting program;S20. certification passes through rear startup encrypting and decrypting program;S30. a clear packets and a key are inputted, and copy to the clear packets in one matrix, obtain initial matrix State1, by obtaining final state matrix State to the initial matrix State1 computings being encrypted, and a ciphertext block is exported according to state matrix State, so that data to be encrypted;S40. the decryption to data is realized by table lookup operations and to the inverse transformation of ciphering process.When the present invention solves remote-control key with vehicle remote certification the problem of the security of transmission data.
Description
Technical field
The present invention relates to communication technique field, more particularly to a kind of encrypting and decrypting method for communication authentication.
Background technology
At present, only there is oneself special remote-control key identifying algorithm in individual host factory, and these algorithms are typically all main frame
Factory's internal algorithm, hardly results in the information of correlation, in addition, and most of main engine plants are all using some calculations recognized within the industry
Method is remotely controlled the encrypting and decrypting certification of key, and the algorithm of main flow is including following several:
1.Keeloq rolling code AESs
Keeloq technologies are rolling code encryption technologies.Source code is encrypted with Keeloq rolling code AESs, can
Produce highly confidential rolling code.Because the code transmitted every time is all different, it will not repeat, even if so having identical former
Beginning code, can not also be decoded password, because code is different and different with transmission time, and traditional illegally enters
Invading means (such as intercept, scan) all becomes meaningless.Keeloq technologies, as a kind of new and high technology of secrecy, are that one kind is more
Change, anti-intercepting and capturing, safe and reliable encoding by code hopping decryption technology.
But, the technology encrypted based on hardware of Microchip companies, as people are required not vehicle safety performance
Disconnected to improve, defect is also gradually revealed, and is mainly manifested in the following aspects:
(1) hardware, which is encrypted, make it that system upgrade and expanded function are more difficult;
(2) data transmission efficiency compares relatively low;
(3) cost is higher, vulnerable.
2.DES algorithms
DES algorithms have tri- suction parameters of Key, Data, Mode.Wherein Key is 8 bytes totally 64, and significance bit is 56
Position, is the working key of DES algorithms;Data is also 8 bytes 64, is data to be encrypted or decrypted;Mode is DES
Working method, have encryption or decryption two kinds.DES algorithm synthesis uses a variety of cryptographic techniques, wherein the predominantly displacement of character
And upset.The main feature of the algorithm is exactly that enciphering rate is fast, and security is higher.It is a large amount of in encryption compared to other AESs
Have great advantage in data.What also cracked in addition to the method for exhaustion without effective ways.
However, with the development of technology, DES technologies are more and more challenged, due to DES technologies only have 64 it is close
Key, someone can just decode DES passwords in the time less than one day with the method for exhaustion, during the decoding declaration DES of DES passwords
The termination in generation.So, DES has a fatal defect, that is, key management.Because DES uses secret key cryptography, and
And key length only has 56 bits.Therefore all use under normal circumstances and key distribution just is carried out to key before communicating, and it is right
Different objects, uses different keys.This considerably increases the extra expense of system.
3.AES algorithms
Aes algorithm, also known as Rijndael algorithms, it with its it is succinct, efficient, safe the characteristics of, be suitable for automobile remote-control
The less application environment of this controller resource of key.The key length that aes algorithm can be supported can for 128,192 or
256, one side key digit is long, and another aspect ciphering process is complicated so that the algorithm is difficult to crack, as data plus
The main flow in close field.
Aes algorithm includes round transformation algorithm and key schedule.Round transformation algorithm is become by word classifying, row displacement
Change, mixcolumns and expanded keys XOR are constituted, as Nk=4 and Nb=4, the iteration number of turns is 10, wherein preceding 9 wheel
Conversion is different with last round transformation.Aes algorithm ciphering process is as follows:128 plaintexts and 128 keys perform XOR fortune
After calculation, into word classifying, shiftrows, mixcolumns, result will be obtained and carry out xor operation with expanded keys,
Referred above to a circulation, so repeatedly 9 times, expanded keys each time are different from, and perform result again after being circulated throughout for 9 times
Word classifying and shiftrows, finally perform XOR with the 10th expanded keys (with preceding 9 differences), obtain
To 128 ciphertexts.
But, in order to ensure the security of algorithm, the operand that aes algorithm is related to it is larger, it is necessary to memory space it is bigger,
Requirement for chip is higher.Meanwhile, AES is the open generally acknowledged advanced encryption algorithm in the whole world, for some security requirements not
It is very high system, aes algorithm need not be used.In addition, this algorithm is public algorithm, unsuitable main engine plants are extended to internal logical
With change algorithm.
The content of the invention
The invention aims to provide a kind of encrypting and decrypting method for communication authentication, to ensure the peace of AES
The feasibility of full property and decipherment algorithm.
Another object of the present invention be to solve encryption-decryption algorithm of the prior art system extension it is difficult and
The problem of cipher key management difficult or memory space requirement can not be generalized in enterprise's generalization algorithm greatly.
Especially, the invention provides a kind of encrypting and decrypting method for communication authentication, for ensure remote-control key with
The security of data is transmitted during vehicle remote certification, the encrypting and decrypting method includes:
S10. the key request of encrypting and decrypting program is responded, to enter according to the key request to the encrypting and decrypting program
Row certification;
S20. certification starts the encrypting and decrypting program by rear;
S30. a clear packets and a key are inputted, and the clear packets are copied in a matrix, initial square is obtained
Battle array State1, by obtaining final state matrix State to the initial matrix State1 computings being encrypted, and according to
The state matrix State exports a ciphertext block, so that data to be encrypted;
S40. the decryption to data is realized by table lookup operations and to the inverse transformation of ciphering process.
Further, the step of encryption or decryption oprerations includes:
S300. the initial matrix State1 is negated, obtain matrix State2, and by the matrix State2 with
First round key carries out InvAddRoundKey computing, obtains matrix State3;
S400. interative computation is encrypted to the matrix State3 according to self-defined substitution table, until iteration total value is followed
Ring terminates, wherein, the iteration total value is determined by the length of the key;
S500. after iteration total value circulation terminates, final state matrix State is obtained, and according to described final
State matrix State export corresponding ciphertext block.
Further, the encryption iteration step of the step S400 includes:
S401. the matrix State3 is replaced using the self-defined substitution table, obtains matrix State4;
S402. Applying Elementary Row Operations are carried out to the State4, obtains matrix State5, then the matrix State5 is carried out
Elementary rank transform, obtains matrix State6;
S403. inverible transform is carried out to the matrix State6, obtains matrix State7, and by the matrix State7 with
Next round key carries out InvAddRoundKey, return to step S401.
Further, the inverible transform of the step S403 is Linear Invertible Transforms, and it includes state-transition matrix,
The inverible transform process is:
The state-transition matrix does multiplying with the matrix State6 and obtains matrix State7;
Wherein, the component of the state-transition matrix is by 00,01,02 and 03 composition.
Further, the definition rule of the self-defined substitution table of the step S400 be according to presetting mode or
Formulate in a random fashion, to ensure the security of encryption iteration data.
Further, the remote control key system of the vehicle includes receiving controller, and the reception controller is loaded with close
Key service routine, is authenticated including according to the key request to encrypting and decrypting program:
S100. requestor sends key request to cipher key service program, and the cipher key service program produces random number, and
The random number of generation is sent to requestor;
S101. the random number is encrypted according to first key data for the requestor, and by the encryption
Data are sent to the cipher key service program;
S102. the data of the encryption are decrypted according to the second key data for the cipher key service program, and by institute
The data and the random number for stating decryption are compared,
Wherein, if the data of the decryption are consistent with the random number, certification success, otherwise, authentification failure;
S103. determined whether to send key request according to authentication result, if certification success, sends, otherwise do not send
Further, first key data and the second key data are identical key data.
Further, in the S102, the cipher key service program is according to number of second key data to the encryption
According to being decrypted,
If certification success, is sent to the requestor, and start the encrypting and decrypting by second key data
Program;
If authentification failure, second key data will not be sent to the requestor, not start described add
Close decryption program.
Further, first round key is generated by the initial key by key schedule forward direction extension;
Next round key by the last round of key during the encryption iteration by the key schedule just
To extension generation.
Beneficial effects of the present invention can be:
First, the encrypting and decrypting program by data key be encrypted or decryption oprerations during, in iteration
Cycle-index in the matrix State3 is replaced according to self-defined substitution table, and the matrix state4 obtained after replacement is carried out
Elementary row-column transform obtains matrix state6, then obtains matrix state7 to matrix State6 progress Linear Invertible Transforms, with
One round key carries out InvAddRoundKey, and such loop iteration is to realize the computing of encryption iteration.Wherein, due to matrix state7 be by
Matrix State6 carries out Linear Invertible Transforms and obtained, and in inverible transform, invertible matrix is selected by 00,01,02 and 03 element
The state-transition matrix of composition, and the state-transition matrix can not think Special matrix or unit matrix, in this way, and prior art
The scheme of encrypting and decrypting is compared, on the one hand, the scheme of encryption-decryption algorithm of the present invention can ensure that the data after encryption can
While realizing decryption oprerations, additionally it is possible to ensure the security of encryption data;On the other hand, the reversible square being made up of simple elements
Battle array can simplify the process of cryptographic calculation, so as to improve the efficiency of cryptographic calculation.
Secondly as self-defined substitution table laying down a regulation according to presetting mode or formulates in a random fashion,
And this lays down a regulation and is only limited to the inside of enterprise, i.e., in the case where the enterprise is underground, consumer or other enterprises can not obtain
To laying down a regulation for the self-defined substitution table, so that have no way of learning the specific operating process encrypted or decrypted, it is therefore, described to add
Close decipherment algorithm is able to ensure that the security of data transfer, to ensure that enterprises technical information can be protected effectively.
Furthermore, the encrypting and decrypting method for communication authentication of the present invention can be subjected to unified definition and be generalized to vehicle
It on the platform of remote-control key, can not only ensure the security of vehicle authentication, and researcher can be improved for enterprise
Efficiency of research and development, so as to shorten the construction cycle of product, reduce development cost, while researcher can be improved by theory
Research is applied to the ability in real work, and the long term growth for enterprise has a huge impact.
According to the accompanying drawings to the detailed description of the specific embodiment of the invention, those skilled in the art will be brighter
Above-mentioned and other purposes, the advantages and features of the present invention.
Brief description of the drawings
Some specific embodiments of the present invention are described in detail by way of example, and not by way of limitation with reference to the accompanying drawings hereinafter.
Identical reference denotes same or similar part or part in accompanying drawing.It should be appreciated by those skilled in the art that these
What accompanying drawing was not necessarily drawn to scale.In accompanying drawing:
Fig. 1 is the schematic diagram of vehicle remote control system according to an embodiment of the invention;
Fig. 2 is the indicative flowchart of encrypting and decrypting method according to an embodiment of the invention;
Fig. 3 is the indicative flowchart of encryption according to an embodiment of the invention or decryption;
Fig. 4 is the indicative flowchart of encryption iteration algorithm in step S400 according to Fig. 1;
Fig. 5 is self-defined substitution table according to an embodiment of the invention;
Fig. 6 is numerical value byte inquiry table in accordance with another embodiment of the present invention.
Embodiment
In communication field, the problem of safety and function of keeping secret have become consumer's growing interest constantly increases in vehicle
Plus communications applications safety and function of keeping secret are integrated into wider vehicle platform.The remote control key system one of vehicle
As by one be arranged on vehicle on reception controller and the i.e. unlimited remote control car key group of a transmitter carried by user
Into transmitter is typically in closed mode, is just worked when pressing button or needing to send data, is now one-way communication shape
State.Fig. 1 is the schematic diagram of vehicle remote control system according to an embodiment of the invention, and the system typically may include peace
The transceiver controller 22 that reception controller 11 and user at car body controller or anti-theft controller can be carried with, should
Transceiver controller 22 can both send data, and data can be received again, wherein, receiving controller 11 can be by microcontroller 1, low
Frequently the human interface device such as (LF) device 2, high frequency radio wave (UHF) receiver 3, button 4 and LED light 5 constitutes, transmitting-receiving
Controller 22 can be made up of human interface devices such as microcontroller 6, rf control unit 7, button 8 and LED9.Transceiver controller 22
Coding 10 (UHF, which is sent, to be responded) is sent to controller 11 is received by radio device, encryption is received receiving controller 11
After coding 10, start cipher key service program and perform challenge/response authentication;After certification success, key is stored in internal memory and supplies encrypting and decrypting
Program is used, and encrypting and decrypting program is loaded in transceiver controller 22, and cipher key service program is loaded in reception controller 11, institute
State encrypting and decrypting program and cipher key service program and decryption communication certification is encrypted by rf control unit 7 automatically, that is, complete to add
Close or decrypting process.
Fig. 2 is the indicative flowchart of the encrypting and decrypting method according to one embodiment of the invention, to ensure remote-control key
The security of data is transmitted during with vehicle remote certification.The encrypting and decrypting method can typically include:
S10. the key request of encrypting and decrypting program is responded, to enter according to the key request to the encrypting and decrypting program
Row certification;
S20. certification starts the encrypting and decrypting program by rear;
S30. a clear packets and a key are inputted, and the clear packets are copied in a matrix, initial square is obtained
Battle array State1, by obtaining final state matrix State to the initial matrix State1 computings being encrypted, and according to
The state matrix State exports a ciphertext block, so that data to be encrypted;
S40. in the method for data deciphering, it can be realized by table lookup operations and to the inverse transformation of ciphering process pair
The decryption of the data.
As shown in figure 3, encryption or decryption can include following operating procedure:
S300. the initial matrix State1 is negated, obtain matrix State2, and by the matrix State2 with
First round key carries out InvAddRoundKey computing, obtains matrix State3;
S400. interative computation is encrypted to the matrix State3 according to self-defined substitution table, until iteration total value is followed
Ring terminates, wherein, the iteration total value is determined by the length of the key;
S500. after iteration total value circulation terminates, final state matrix State is obtained, and according to described final
State matrix State export corresponding ciphertext block.
As shown in figure 4, primary iteration value i is 1, step S400 encryption iteration step can include:
S401. the matrix State3 is replaced using the self-defined substitution table, obtains matrix State4;
S402. Applying Elementary Row Operations are carried out to the State4, obtains matrix State5, then the matrix State5 is carried out
Elementary rank transform, obtains matrix State6;
S403. inverible transform is carried out to the matrix State6, obtains matrix State7, and by the matrix State7 with
Next round key carries out InvAddRoundKey, iterative value i=i+1.When i is not more than iteration total value, return to step S401;When i is more than
During iteration total value, into step S500.
Wherein, the first round key is generated by the initial key by key schedule forward direction extension, next round key
Generated by the last round of key during the encryption iteration by key schedule forward direction extension.
Wherein, the inverible transform of the step S403 can be Linear Invertible Transforms, i.e., with an invertible matrix and institute
State matrix State6 and do multiplying and obtain matrix State7, wherein, in order to ensure that the data after encryption can realize decryption
Operation, the invertible matrix selects state-transition matrix;Meanwhile, in order to ensure the security of encryption data, the invertible matrix is not
Basic unit matrix or Special matrix can be selected;In addition, the process in order to which cryptographic calculation can be simplified, the invertible matrix
Component is made up of simplest data 00,01,02 and 03.Inverible transform is carried out to the matrix State6 as shown in Equation 1:
It is so designed that, compared with the scheme of prior art encrypting and decrypting, on the one hand, the scheme of encryption-decryption algorithm of the present invention
While can ensureing that the data after encrypting can realize decryption oprerations, it can be ensured that the security of encryption data;The opposing party
Face, the invertible matrix being made up of simple elements can simplify the process of cryptographic calculation, so as to improve the efficiency of cryptographic calculation.
In addition, in step S401, matrix State3 is replaced using self-defined substitution table and belongs to nonlinear transformation,
Further to strengthen the security of encryption-decryption algorithm, laying down a regulation for the self-defined substitution table can be according to presetting mode
Or formulate in a random fashion, therefore, it is difficult to crack the encryption-decryption algorithm.The encryption-decryption algorithm can use such as Fig. 5
Shown self-defined substitution table.
Because laying down a regulation for the self-defined substitution table can make according to presetting mode or in a random fashion
It is fixed, and this lays down a regulation and is only limited to the inside of enterprise, i.e., in the case where the enterprise is underground, consumer or other enterprises can not
Laying down a regulation for the self-defined substitution table is obtained, so as to have no way of learning the specific operating process encrypted or decrypted, therefore, encryption
Decipherment algorithm can ensure the security of data transfer, to ensure that enterprises technical information can be effectively protected.
In the embodiment in fig 6, for the ease of computing to reduce operation times, the distributive law formula based on linear operation:
The computing of formula 1 can by way of tabling look-up, numerical operation is converted into the mode tabled look-up obtain operation result with
State7 is obtained, as shown in fig. 6, the numerical value inquiry mode can reduce the data of intermediate operations generation, accelerates arithmetic speed,
The operand of data and the memory space of chip can be reduced while further improving cryptographic security.
In Fig. 2 to Fig. 6 implementation, due in the encrypting and decrypting method except self-defined substitution table enters to matrix State3
Row replacement belongs to outside nonlinear transformation, and other can be realized by corresponding inverse transformation and decrypted, i.e., after decruption key is obtained,
It is that can be achieved to the corresponding inverse transformation of ciphertext progress by the order opposite to the encrypting step.Wherein, for AES
Byte replacement operation can realize that other computings are all linear invertible computings, all may be used by the byte substitution table backstepping of query graph 5
To obtain specific data result by corresponding inverse transformation to realize decryption computing.
In order to further enhance the security of key, cipher key service program can be communicated to encrypting and decrypting program
Certification, i.e., be authenticated according to key request to encrypting and decrypting program, can include the step of certification,
S100. requestor sends key request to cipher key service program, and the cipher key service program produces random number, and
The random number of generation is sent to requestor;
S101. the random number is encrypted according to first key data for requestor, and by the data of the encryption
Send to the cipher key service program;
S102. the data of encryption are decrypted according to the second key data for cipher key service program, and by the decryption
Data are compared with random number, when the data of the decryption are consistent with the random number, certification success, when the decryption
When data are consistent with the random number, authentification failure;
S103. determined whether to send key request according to authentication result, when the authentication is successful, then can be close by described second
Key data are sent to the requestor, and start the encrypting and decrypting program;When the authentication fails, then will not be by described second
Key data is sent to the requestor, from without starting the encrypting and decrypting program.
Wherein, first key data and the second key data are identical key data.
The encrypting and decrypting method is subjected to unified definition and is generalized on the platform of remote control key, can not only be protected
The security of vehicle authentication is demonstrate,proved, and the efficiency of research and development of researcher can be improved for enterprise, so as to shorten product
Construction cycle, reduce development cost, while the ability that theoretical research is applied in real work by researcher can be improved,
Long term growth for enterprise has a huge impact.
A kind of encrypting and decrypting method for communication authentication of the present invention is also applied to other related data protections
Field, such as engine anti-theft Verification System and Intelligent key tele-control system, with to data during communication authentication
Safety is protected.
In the embodiment in figure 1, microcontroller 1 and microcontroller 6 can use DS89C440 or PIC18F8490;Radio frequency
Controller can use MAX7044 or MAX1479 or TRF6901.Often there is FREESCALE (to fly using chip in vehicle remote control apparatus
Think karr) MC9S08QG8, TI MSP430F2121, NXP PCF7961, PCF7936, MICROCHIP HCS300 systems
Row, PIC series, and NEC chips.
So far, although those skilled in the art will appreciate that detailed herein have shown and described multiple showing for the present invention
Example property embodiment, still, still can be direct according to present disclosure without departing from the spirit and scope of the present invention
It is determined that or deriving many other variations or modifications for meeting the principle of the invention.Therefore, the scope of the present invention is understood that and recognized
It is set to and covers other all these variations or modifications.
Claims (9)
1. a kind of encrypting and decrypting method for communication authentication, data are transmitted during for ensureing remote-control key with vehicle remote certification
Security, the encrypting and decrypting method includes:
S10. the key request of encrypting and decrypting program is responded, to recognize according to the key request the encrypting and decrypting program
Card;
S20. certification starts the encrypting and decrypting program by rear;
S30. a clear packets and a key are inputted, and the clear packets are copied in a matrix, initial matrix is obtained
State1, by obtaining final state matrix State to the initial matrix State1 computings being encrypted, and according to institute
State state matrix State and export a ciphertext block, so that data to be encrypted;
S40. the decryption to data is realized by table lookup operations and to the inverse transformation of ciphering process.
2. encrypting and decrypting method according to claim 1, wherein, include the step of the encryption or decryption oprerations:
S300. the initial matrix State1 is negated, obtains matrix State2, and by the matrix State2 and first
Round key carries out InvAddRoundKey computing, obtains matrix State3;
S400. interative computation is encrypted to the matrix State3 according to self-defined substitution table, until iteration total value circulates knot
Beam, wherein, the iteration total value is determined by the length of the key;
S500. after iteration total value circulation terminates, final state matrix State is obtained, and according to the final shape
State matrix State exports corresponding ciphertext block.
3. encrypting and decrypting method according to claim 1, wherein, the encryption iteration step of the step S400 includes:
S401. the matrix State3 is replaced using the self-defined substitution table, obtains matrix State4;
S402. Applying Elementary Row Operations are carried out to the State4, obtains matrix State5, then the matrix State5 carried out elementary
Rank transformation, obtains matrix State6;
S403. inverible transform is carried out to the matrix State6, obtains matrix State7, and by the matrix State7 with it is next
Round key carries out InvAddRoundKey, return to step S401.
4. encrypting and decrypting method according to claim 2, wherein, the inverible transform of the step S403 is linearly may be used
Inverse transformation, it includes state-transition matrix, and the inverible transform process is:
The state-transition matrix does multiplying with the matrix State6 and obtains matrix State7;
Wherein, the component of the state-transition matrix is by 00,01,02 and 03 composition.
5. encrypting and decrypting method according to claim 3, the definition rule of the self-defined substitution table of the step S400
Then to formulate according to presetting mode or in a random fashion, to ensure the security of encryption iteration data.
6. encrypting and decrypting method according to claim 4, wherein, the remote control key system of the vehicle, which includes receiving, to be controlled
Device, the reception controller is loaded with cipher key service program, and bag is authenticated to encrypting and decrypting program according to the key request
Include:
S100. requestor sends key request to cipher key service program, and the cipher key service program produces random number, and will production
The raw random number is sent to requestor;
S101. the random number is encrypted according to first key data for the requestor, and by the data of the encryption
Send to the cipher key service program;
S102. the data of the encryption are decrypted according to the second key data for the cipher key service program, and by the solution
Close data are compared with the random number,
Wherein, if the data of the decryption are consistent with the random number, certification success, otherwise, authentification failure;
S103. determined whether to send key request according to authentication result, if certification success, sends, otherwise do not send.
7. encrypting and decrypting method according to claim 5, wherein, first key data and the second key data are identical
Key data.
8. encrypting and decrypting method according to claim 6, wherein, in the S102, the cipher key service program according to
The data of the encryption are decrypted second key data,
If certification success, is sent to the requestor, and start the encrypting and decrypting program by second key data;
If authentification failure, second key data will not be sent to the requestor, be solved with not starting the encryption
Close program.
9. the encrypting and decrypting method according to claim any one of 1-8, wherein,
First round key is generated by the initial key by key schedule forward direction extension;
Next round key is expanded by the last round of key during the encryption iteration by key schedule forward direction
Exhibition generation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710617990.7A CN107277048B (en) | 2017-07-26 | 2017-07-26 | Encryption and decryption method for communication authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710617990.7A CN107277048B (en) | 2017-07-26 | 2017-07-26 | Encryption and decryption method for communication authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107277048A true CN107277048A (en) | 2017-10-20 |
CN107277048B CN107277048B (en) | 2020-04-24 |
Family
ID=60078579
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710617990.7A Active CN107277048B (en) | 2017-07-26 | 2017-07-26 | Encryption and decryption method for communication authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107277048B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108989024A (en) * | 2018-06-29 | 2018-12-11 | 百度在线网络技术(北京)有限公司 | Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car |
CN109902498A (en) * | 2019-02-27 | 2019-06-18 | 南京师范大学 | Data ciphering method, data decryption method and corresponding device and equipment |
CN114710324A (en) * | 2022-03-16 | 2022-07-05 | 深圳市风云实业有限公司 | Cross-network tunnel message transmission method based on cipher book replacement encryption and decryption |
CN114844728A (en) * | 2022-07-04 | 2022-08-02 | 道格特半导体科技(江苏)有限公司 | Serialized data secure communication method and big data platform |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1925401A (en) * | 2006-10-12 | 2007-03-07 | ***(集团)有限公司北京市分公司 | Internet access system and method |
CN101277186A (en) * | 2007-03-30 | 2008-10-01 | 北京握奇数据***有限公司 | Method for implementing exterior authentication using asymmetry key algorithm |
CN102970129A (en) * | 2012-11-16 | 2013-03-13 | 深圳光启创新技术有限公司 | Time information-based signal encrypting and decrypting method and time information-based signal encrypting and decrypting device |
JP2013105100A (en) * | 2011-11-15 | 2013-05-30 | Tokai Rika Co Ltd | Data converter |
CN103516512A (en) * | 2013-10-21 | 2014-01-15 | 深圳市芯通信息科技有限公司 | Encryption and decryption method and encryption and decryption device based on AES (advanced encryption standard) algorithm |
CN104184579A (en) * | 2014-09-12 | 2014-12-03 | 南京航空航天大学 | Lightweight block cipher VH algorithm based on dual pseudo-random transformation |
CN106850221A (en) * | 2017-04-10 | 2017-06-13 | 四川阵风科技有限公司 | Information encryption and decryption method and device |
CN106921486A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | The method and apparatus of data encryption |
-
2017
- 2017-07-26 CN CN201710617990.7A patent/CN107277048B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1925401A (en) * | 2006-10-12 | 2007-03-07 | ***(集团)有限公司北京市分公司 | Internet access system and method |
CN101277186A (en) * | 2007-03-30 | 2008-10-01 | 北京握奇数据***有限公司 | Method for implementing exterior authentication using asymmetry key algorithm |
JP2013105100A (en) * | 2011-11-15 | 2013-05-30 | Tokai Rika Co Ltd | Data converter |
CN102970129A (en) * | 2012-11-16 | 2013-03-13 | 深圳光启创新技术有限公司 | Time information-based signal encrypting and decrypting method and time information-based signal encrypting and decrypting device |
CN103516512A (en) * | 2013-10-21 | 2014-01-15 | 深圳市芯通信息科技有限公司 | Encryption and decryption method and encryption and decryption device based on AES (advanced encryption standard) algorithm |
CN104184579A (en) * | 2014-09-12 | 2014-12-03 | 南京航空航天大学 | Lightweight block cipher VH algorithm based on dual pseudo-random transformation |
CN106921486A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | The method and apparatus of data encryption |
CN106850221A (en) * | 2017-04-10 | 2017-06-13 | 四川阵风科技有限公司 | Information encryption and decryption method and device |
Non-Patent Citations (1)
Title |
---|
李京,等: ""AES改进算法在CCMP协议中的应用"", 《延边大学学报(自然科学版)》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108989024A (en) * | 2018-06-29 | 2018-12-11 | 百度在线网络技术(北京)有限公司 | Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car |
CN109902498A (en) * | 2019-02-27 | 2019-06-18 | 南京师范大学 | Data ciphering method, data decryption method and corresponding device and equipment |
CN109902498B (en) * | 2019-02-27 | 2023-08-18 | 南京师范大学 | Data encryption method, data decryption method, and corresponding devices and equipment |
CN114710324A (en) * | 2022-03-16 | 2022-07-05 | 深圳市风云实业有限公司 | Cross-network tunnel message transmission method based on cipher book replacement encryption and decryption |
CN114710324B (en) * | 2022-03-16 | 2024-02-13 | 深圳市风云实业有限公司 | Cross-network tunnel message transmission method based on cipher-key replacement encryption and decryption |
CN114844728A (en) * | 2022-07-04 | 2022-08-02 | 道格特半导体科技(江苏)有限公司 | Serialized data secure communication method and big data platform |
Also Published As
Publication number | Publication date |
---|---|
CN107277048B (en) | 2020-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101447870B (en) | Safe storage method of private key based on technology of distributed password | |
CN103413109B (en) | A kind of mutual authentication method of radio frequency identification system | |
CN105743645B (en) | Stream code key generating means, method and data encryption, decryption method based on PUF | |
CA2754268C (en) | Split key secure access system | |
CN107277048A (en) | A kind of encrypting and decrypting method for communication authentication | |
CN102185694A (en) | Electronic file encrypting method and system based on fingerprint information | |
CN111931533B (en) | Authentication method for multi-owner RFID tag | |
CN102238430A (en) | Personalized whitebox descramblers | |
Mousavi et al. | Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems) | |
CN113098675B (en) | Binary data encryption system and method based on polynomial complete homomorphism | |
Majumder et al. | Secure data communication and cryptography based on DNA based message encoding | |
CN103607276A (en) | Grouping encryption method based on random functions and resisting to known plaintext cipher attacks | |
Alemami et al. | Advanced approach for encryption using advanced encryption standard with chaotic map | |
CN107070637A (en) | A kind of data encryption/decryption method of overlapping packet | |
CN101739540A (en) | Label reader-writer and data communication method and system of radio frequency label | |
CN104618092A (en) | Information encryption method and system | |
Tang et al. | A one-time pad encryption algorithm based on one-way hash and conventional block cipher | |
Zhang | Cryptanalyzing an image cryptosystem based on circular inter-intra pixels bit-level permutation | |
Lv et al. | AES encryption algorithm keyless entry system | |
CN106302457A (en) | A kind of data communications method and system | |
KR101807259B1 (en) | Apparatus and methdo for encoding | |
CN103746795B (en) | Method for realizing Magpie encryption and decryption | |
CN106788968A (en) | It is applied to the implementation method of the security coprocessor of WIA-PA agreements | |
CN111914967B (en) | Elliptic curve radio frequency identification bidirectional authentication method with random parameter entrusted storage | |
US20220417012A1 (en) | Method for performing cryptographic operations in a processing device, corresponding processing device and computer program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |