CN107968705A - A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system - Google Patents

A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system Download PDF

Info

Publication number
CN107968705A
CN107968705A CN201711213115.9A CN201711213115A CN107968705A CN 107968705 A CN107968705 A CN 107968705A CN 201711213115 A CN201711213115 A CN 201711213115A CN 107968705 A CN107968705 A CN 107968705A
Authority
CN
China
Prior art keywords
ciphertext
cyclic shift
obtains
picture
shift value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711213115.9A
Other languages
Chinese (zh)
Other versions
CN107968705B (en
Inventor
邹文斌
庄兆永
焦述铭
李霞
徐晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201711213115.9A priority Critical patent/CN107968705B/en
Publication of CN107968705A publication Critical patent/CN107968705A/en
Application granted granted Critical
Publication of CN107968705B publication Critical patent/CN107968705B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention is suitable for technical field of data processing, there is provided a kind of encryption method, including:According to default cyclic shift value and inverse values generation secrete key;Original plaintext is encrypted using secrete key, obtains initial ciphertext picture;Displacement upset is carried out to initial ciphertext picture according to cyclic shift value and inverse values, obtains accurate final ciphertext;By accurate final ciphertext input double random-phase encoding system, final ciphertext is obtained.The embodiment of the present invention by cyclic shift value and inverse values by generating secrete key, and extra encryption layer is built in original plaintext and double random-phase encoding system using the secrete key, because attack with known plaintext COA can not obtain correct cyclic shift and inverse values when to final ciphertext only attack, therefore secrete key can not be worth to according to correct cyclic shift and upset, so as to which the security of double random-phase encoding system can not can be strengthened by the embodiment of the present invention to being cracked by the encrypted final ciphertext of the embodiment of the present invention.

Description

A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system
Technical field
The invention belongs to technical field of data processing, more particularly to a kind of method for encryption/decryption for resisting attack with known plaintext, Enciphering/deciphering end and double random phase encrypting and deciphering system.
Background technology
The research of optical information security is increasingly taken seriously nearly ten years.Optical encryption system is widely used in information and adds The field such as close, authentification of message and Information hiding.In optical security encryption, information is optically rather than digital form is handled , therefore it has the advantages that various dimensions, high concurrency and processing speed are fast.
Double random-phase encoding (Double Random Phase Encoding, DRPE) system is making for nineteen ninety-five proposition Attempted first with optics encryption system into row information is encrypted.DRPE can be in 4f optical lens systems image area and Fourier Use in transform domain, can also be used in fractional number Fourier field, Fresnel domain.Although many achievements are achieved, DRPE technologies Still suffer from some difficulties and challenge, the security intensity such as DRPE systems are not high enough.
Passing, security breaches existing for optical encryption system are actively studied by academia, and propose attack algorithm to break The optical encryption system is solved, then improves its optical encryption system for the weakness present in the attack option again.Improved light Learning encryption system may further be cracked by new attack method.This is the side of cracking new in secure encryption system evolution Method and the new anti-iterative cycles progress process cracked between encryption safe system.For DRPE systems, exist and much attacked The method of hitting cracks the encryption system, and conventional common attack method has known plain text attack, chosen -plain attact, selection ciphertext to attack Hit and the attack method such as attack with known plaintext (Ciphertext Only Attack, COA).In these attack methods, only ciphertext It is the crack method most fatal to DRPE systems to attack COA, because attack with known plaintext COA can be individually illegal from cipher-text information Ground recovers in plain text, therefore DRPE systems have the security breaches of sternness.
The content of the invention
The technical problems to be solved by the invention are to provide a kind of method for encryption/decryption for resisting attack with known plaintext plus/solution Close end and double random phase encrypting and deciphering system, it is intended to which attack with known plaintext COA can be individually from cipher-text information in the prior art for solution In unlawfully recover in plain text, there is the problem of severe security breaches in DRPE systems.
The present invention is achieved in that a kind of encryption method, including:
According to default cyclic shift value and inverse values generation secrete key;
Original plaintext is encrypted using the secrete key, obtains initial ciphertext picture;
Displacement upset is carried out to the initial ciphertext picture according to the cyclic shift value and inverse values, is obtained accurate final close Text;
By the accurate final ciphertext input double random-phase encoding system, final ciphertext is obtained.
Further, it is described to be included according to default cyclic shift value and inverse values generation secrete key:
According to the cyclic shift value and inverse values generation key seed;
The key seed is inputted into random number generator, generates the secrete key.
Further, described to carry out displacement upset to original plaintext using the secrete key, obtaining initial ciphertext includes:
Binary coding is carried out to the original plaintext, obtains original binary in plain text;
The original binary is encrypted in plain text using the secrete key, obtains the initial ciphertext of binary sequence;
The initial ciphertext of the binary sequence is converted into the initial ciphertext picture.
Further, it is described displacement is carried out to the initial ciphertext picture according to the cyclic shift value and inverse values to turn over Turn, obtaining accurate final ciphertext includes:
Home position reference information is inserted into the initial ciphertext picture, obtains reference picture;
The reference picture is shifted according to the cyclic shift value, and according to the inverse values to the ginseng after displacement Examine picture to be overturn, obtain the final ciphertext of standard.
The embodiment of the present invention additionally provides a kind of encryption end, including:
Key generating unit, for generating secrete key according to default cyclic shift value and inverse values;
Plaintext encryption unit, for original plaintext to be encrypted using the secrete key, obtains initial ciphertext picture, Displacement upset is carried out to the initial ciphertext picture according to the cyclic shift value and inverse values, accurate final ciphertext is obtained, by institute Accurate final ciphertext input double random-phase encoding system is stated, obtains final ciphertext.
Further, the plaintext encryption unit is specifically used for:
According to the cyclic shift value and inverse values generation key seed;
The key seed is inputted into random number generator, generates the secrete key;
Binary coding is carried out to the original plaintext, obtains original binary in plain text;
The original binary is encrypted in plain text using the secrete key, obtains the initial ciphertext of binary sequence;
The initial ciphertext of the binary sequence is converted into the initial ciphertext picture;
Home position reference information is inserted into the initial ciphertext picture, obtains reference picture;
The reference picture is shifted according to the cyclic shift value, and according to the inverse values to the ginseng after displacement Examine picture to be overturn, obtain the final ciphertext of standard.
The embodiment of the present invention additionally provides a kind of decryption method, including:
By decruption key and final ciphertext input double random phase decryption system, accurate final ciphertext is obtained;
Displacement upset is carried out to the accurate final ciphertext according to decryption displacement upset information, obtains initial ciphertext picture;
Upset information generation secrete key is shifted according to the decryption, according to the secrete key to the initial ciphertext graph Piece is decrypted, and obtains original plaintext.
Further, described to carry out displacement upset to the accurate final ciphertext according to decryption displacement upset information, 4 obtain just Beginning ciphertext picture includes:
Cyclic shift is calculated in reference position information in home position reference information and the accurate final ciphertext It is worth (x0,y0) and inverse values fp, with the cyclic shift value (x0,y0) and inverse values fpUpset information is shifted as decryption;
By the accurate final ciphertext according to cyclic shift value (- x0,-y0) inverse values-fpShifted and overturn respectively, obtained To the initial ciphertext picture;
It is then described that upset information generation secrete key is shifted according to the decryption, according to the secrete key to described initial Ciphertext picture is decrypted, and obtaining original plaintext includes:
According to the cyclic shift value (x0,y0) and inverse values fpKey seed is generated, the key seed is inputted random Number generator, generates the secrete key;
The initial ciphertext picture is subjected to binary coding, obtains the initial ciphertext of binary sequence;
The initial ciphertext of the binary sequence is decrypted using the secrete key, obtains binary system in plain text;
The binary system is changed in plain text, obtains the original plaintext.
The embodiment of the present invention additionally provides a kind of decrypting end, including:
Ciphertext decryption unit, for decruption key and final ciphertext to be inputted double random phase decryption system, obtains standard most Whole ciphertext;
Initial decryption unit, for the reference position information in home position reference information and the accurate final ciphertext Cyclic shift value (x is calculated0,y0) and inverse values fp, with the cyclic shift value (x0,y0) and inverse values fpMoved as decryption Bit flipping information, by the accurate final ciphertext according to cyclic shift value (- x0,-y0) inverse values-fpShifted and overturn respectively, Obtain the initial ciphertext picture;
Plaintext decryption unit, for according to the cyclic shift value (x0,y0) and inverse values fpKey seed is generated, by institute Key seed input random number generator is stated, generates the secrete key, the initial ciphertext picture is subjected to binary system volume Code, is obtained the initial ciphertext of binary sequence, the initial ciphertext of the binary sequence is decrypted using the secrete key, is obtained To binary system in plain text, the binary system is changed in plain text, obtains the original plaintext.
The embodiment of the present invention additionally provides a kind of double random phase encrypting and deciphering system for resisting attack with known plaintext, including above-mentioned The encryption end and decrypting end.
Compared with prior art, the present invention beneficial effect is:The embodiment of the present invention is according to the cyclic shift of user preset Value and inverse values generation secrete key, and original plaintext is encrypted using the secrete key, obtain initial ciphertext picture, root Displacement upset is carried out to the initial ciphertext picture according to default cyclic shift value and inverse values, obtains accurate final ciphertext, finally will In the final ciphertext input double random-phase encoding system DRPE of the standard, final ciphertext is obtained.The embodiment of the present invention will be by that will circulate Shift value and inverse values generation secrete key, and using the secrete key in original plaintext and double random-phase encoding system DRPE One extra encryption layer of middle structure, because attack with known plaintext COA can not be circulated correctly when to final ciphertext only attack Displacement and inverse values, therefore secrete key can not be worth to according to correct cyclic shift and upset, so that can not be to passing through this The encrypted final ciphertext of inventive embodiments is cracked, and can strengthen double random-phase encoding system by the embodiment of the present invention Security.
Brief description of the drawings
Fig. 1 is a kind of flow chart of encryption method provided in an embodiment of the present invention;
Fig. 2 is a kind of structure diagram for encrypting end provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of decryption method provided in an embodiment of the present invention;
Fig. 4 is a kind of structure diagram of decrypting end provided in an embodiment of the present invention;
Fig. 5 is a kind of structure of double random phase encrypting and deciphering system for resisting attack with known plaintext provided in an embodiment of the present invention Schematic diagram;
Fig. 6 is a kind of work of double random phase encrypting and deciphering system for resisting attack with known plaintext provided in an embodiment of the present invention Flow chart.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Phase extraction step in existing COA crack methods is sunken there are one, although that is, COA crack methods can be broken Clear content is solved, but it is incorrect that it, which cracks the cyclic shift of the clear content of recovery and rollover states,.
Based on this, in embodiments of the present invention, it is proposed that confrontation attack with known plaintext double random phase encryption and decryption system In system, cyclic shift value and inverse values input by user are used to generate secrete key information and using the secrete key in original Begin to build an extra encryption layer between double random-phase encoding system DRPE in plain text.
Fig. 1 shows a kind of encryption method provided in an embodiment of the present invention, including:
S101, secrete key is generated according to default cyclic shift value and inverse values;
S102, is encrypted original plaintext using the secrete key, obtains initial ciphertext picture;
S103, carries out displacement upset to the initial ciphertext picture according to the cyclic shift value and inverse values, obtains standard Final ciphertext;
S104, by the accurate final ciphertext input double random-phase encoding system, obtains final ciphertext.
In above-mentioned steps S101, with (x0,y0) represent cyclic shift value, with fpInverse values are represented, with cyclic shift value (x0,y0) and inverse values fpAs encryption information, secrete key is generated according to the encryption information, specific steps include:According to circulation Shift value (x0,y0) and inverse values fpKey seed is generated, the key seed is inputted into random number generator, described in generation Secrete key.
In step s 102, original plaintext is encrypted using the step S101 secrete keys generated, specific encryption Process includes:Binary coding is carried out to the original plaintext, obtains original binary in plain text;Using the secrete key to institute State original binary to be encrypted in plain text, obtain the initial ciphertext of binary sequence;By the initial ciphertext conversion of the binary sequence For the initial ciphertext picture.In this step, the weakness cracked for existing COA attack methods to DRPE, that is, crack knowledge The incorrect weakness of cyclic shift value and inverse values not gone out, is generated hidden using the cyclic shift value and inverse values of user preset Key is hidden original plaintext is encrypted, it is safer by original plaintext by this simple cryptographic operation.Further, will The initial ciphertext of binary sequence is converted to the essence of initial ciphertext picture, is by the binary number in the initial ciphertext of binary sequence Decimal number is converted to, decimal number is the pixel of initial ciphertext picture.
In S103, the cyclic shift value and inverse values that reuse user preset obtain initially encryption in step S102 Ciphertext picture carries out displacement upset, and specific displacement switching process includes:Home position is inserted into the initial ciphertext picture Reference information, obtains reference picture;The reference picture is shifted according to the cyclic shift value, and according to the upset Value overturns the reference picture after displacement, obtains the final ciphertext of standard.
The encryption method provided through this embodiment, added between original plaintext and DRPE systems one it is extra plus The secrete key of close layer, encryption layer cyclic shift value set by the user and inverse values generation is realized, by this encryption method, The security of existing DRPE systems can be strengthened, solve the problems, such as attack with known plaintext COA.
Fig. 2 shows a kind of encryption end provided in an embodiment of the present invention, including:
Key generating unit 201, for generating secrete key according to default cyclic shift value and inverse values;
Plaintext encryption unit 202, for original plaintext to be encrypted using the secrete key, obtains initial ciphertext graph Piece, carries out displacement upset to the initial ciphertext picture according to the cyclic shift value and inverse values, obtains accurate final ciphertext, will The accurate final ciphertext input double random-phase encoding system, obtains final ciphertext.
Further, plaintext encryption unit 201 is specifically used for:
According to the cyclic shift value and inverse values generation key seed;
The key seed is inputted into random number generator, generates the secrete key;
Binary coding is carried out to the original plaintext, obtains original binary in plain text;
The original binary is encrypted in plain text using the secrete key, obtains the initial ciphertext of binary sequence;
The initial ciphertext of the binary sequence is converted into the initial ciphertext picture;
Home position reference information is inserted into the initial ciphertext picture, obtains reference picture;
The reference picture is shifted according to the cyclic shift value, and according to the inverse values to the ginseng after displacement Examine picture to be overturn, obtain the final ciphertext of standard.
For above-mentioned encryption method, Fig. 3 shows a kind of decryption method provided in an embodiment of the present invention, including:
S301, double random phase decryption system is inputted by decruption key and final ciphertext, obtains accurate final ciphertext;
S302, carries out displacement upset to the accurate final ciphertext according to decryption displacement upset information, obtains initial ciphertext graph Piece;
S303, shifts upset information generation secrete key, according to the secrete key to described initial according to the decryption Ciphertext picture is decrypted, and obtains original plaintext.
In step 301, user is using the encryption key of DRPE encryption systems as decruption key, by decruption key and finally In ciphertext input double random phase decryption system, decrypt to obtain accurate final ciphertext through the double random phase decryption system.
In step s 302, include reference position information in accurate final ciphertext, the home position used when encrypting is joined The reference position information examined in information and accurate final ciphertext is calculated, and the positional distance of the two is obtained, according to the positional distance Determine cyclic shift value (x0,y0) and inverse values fp, by cyclic shift value (x0,y0) and inverse values fp, as decryption displacement upset Information, determines to need the cyclic shift value (- x for shifting the final ciphertext of the standard with decryption displacement upset information0,-y0) and Inverse values-fp, according to the cyclic shift value (- x0,-y0) and inverse values-fpThe final ciphertext of the standard is shifted and overturn, is obtained To initial ciphertext picture.
In step S303, decrypting end is according to cyclic shift value (x0,y0) and inverse values fpKey seed is generated, by described in Key seed inputs random number generator, generates the secrete key, and the initial ciphertext picture is carried out binary coding, The initial ciphertext of binary sequence is obtained, the initial ciphertext of the binary sequence is decrypted using the secrete key, is obtained Binary system is changed in plain text in plain text, to the binary system, obtains the original plaintext.
Fig. 4 shows a kind of decrypting end provided in an embodiment of the present invention, including:
Ciphertext decryption unit 401, for decruption key and final ciphertext to be inputted double random phase decryption system, obtains standard Final ciphertext;
Initial decryption unit 402, for carrying out displacement upset to the accurate final ciphertext according to decryption displacement upset information, Obtain initial ciphertext picture.
Plaintext decryption unit 403, for shifting upset information generation secrete key according to the decryption, hides according to described The initial ciphertext picture is decrypted in key, obtains original plaintext.
Further, initial decryption unit 402 is specifically used for:According to home position reference information and the final ciphertext of standard In reference position information cyclic shift value (x is calculated0,y0) and inverse values fp, with the cyclic shift value (x0,y0) and turn over Turn value fpUpset information is shifted as decryption, by the accurate final ciphertext according to cyclic shift value (- x0,-y0) inverse values-fpPoint Do not shifted and overturn, obtain the initial ciphertext picture.
Plaintext decryption unit 403 is specifically used for:According to the cyclic shift value (x0,y0) and inverse values fpGenerate key kind Son, inputs random number generator by the key seed, generates the secrete key, and the initial ciphertext picture is carried out two Scale coding, obtains the initial ciphertext of binary sequence, and the initial ciphertext of the binary sequence is carried out using the secrete key Decryption, obtains binary system in plain text, and the binary system is changed in plain text, obtains the original plaintext.
Fig. 5 shows a kind of double random phase encrypting and deciphering system for resisting attack with known plaintext provided in an embodiment of the present invention, Including the encryption end shown in Fig. 2 and the decrypting end shown in Fig. 4.
In a particular application, an encryption end can correspond to one or more decrypting end, that is, encrypt end and complete to original After encryption of plaintext, the final ciphertext that encryption obtains is transferred to one or more decrypting end, decrypting end is passed according to encryption end Final key is decrypted in the encryption key used when defeated final ciphertext and encryption.In the present embodiment, end and decryption are encrypted End carries out encryption and decryption using symmetric mode, i.e., at encryption end using random number generator generation secrete key, then in decrypting end Secrete key is generated using same random number generator, what encryption end was used when final ciphertext is inputted DEPR encryption systems Encryption key is using decruption key when using the DRPE decryption systems final ciphertext is decrypted as decrypting end.
Decrypting end is when the final ciphertext to the transmission of encryption end is decrypted, it is necessary to using the raw bits arrived when using encryption Put reference information, the cyclic shift value of user preset and inverse values and encrypt the encryption key at end, pass through the encryption at the encryption end Key, home position reference information, cyclic shift value and the inverse values could complete the decryption to final ciphertext.
Fig. 6 show by it is provided in an embodiment of the present invention confrontation attack with known plaintext double random phase encrypting and deciphering system into Row encryption and decryption flow, including:
A, encrypt end and binary coding is carried out to original plaintext 2DC1, obtain original binary in plain text;
B, cyclic shift value (x of the end according to user setting is encrypted0,y0) and inverse values fpCombine generation key seed;
C, end is encrypted by key seed input random number generator generation secrete key;
D, encrypting end, to original binary, encryption obtains the initial ciphertext of binary sequence in plain text using secrete key;
E, the initial ciphertext of binary sequence is converted to initial ciphertext picture 703D by encryption end;
F, encryption end is inserted into home position reference information Y in initial ciphertext picture 703D and obtains reference picture, and according to Cyclic shift value (the x of user setting0,y0) and upset fpValue shifts reference picture and upset obtains accurate final ciphertext Y703D;
G, end is encrypted by accurate final ciphertext Y703D input double random-phase encoding systems DRPE, obtains final ciphertext;
H, final ciphertext is transferred to specific decrypting end by encryption end under unsafe condition environment;
I, decrypting end is using the key of double random-phase encoding system DRPE as decruption key, by the decruption key and finally The final ciphertext Y703D of standard that ciphertext input double random phase decryption system is decrypted;.
J, decrypting end is according to the home position reference information Y in the final ciphertext Y703D of standard of decryption, during with reference to according to encryption The positional distance that the home position reference information Y of insertion is calculated, cyclic shift value (x is determined with the positional distance being calculated0, y0) and upset fpValue, decrypting end will decrypt the obtained final ciphertext Y703D of standard according to circulation position (- x0,-y0) and upset-fp To initial ciphertext picture 703D;
K, decrypting end obtains the initial ciphertext of binary sequence to initial ciphertext picture 703D by binary coding;
L, decrypting end will decrypt obtained cyclic shift value (x0,y0) and upset fpValue, which combines, generates key seed;
M, random number generator of the decrypting end by key seed input as encryption end, generates secrete key;
N, decrypting end is decrypted the initial ciphertext of binary sequence according to secrete key, obtains decrypting binary in plain text;
O, the binary system that decrypting end obtains decryption is converted to decrypted plaintext 2DC1 in plain text.
In embodiments of the present invention, the existing attack with known plaintext found in being studied using double random-phase encoding system DRPE It is typically incorrect defect that COA, which cracks the cyclic shift of the clear content of recovery and rollover states, cyclic shift and upset State generates secrete key as key seed and plaintext is encrypted, and proposes that the enhanced double random phase of confrontation attack with known plaintext adds Close system, i.e., its first carry out symmetric cryptography before DRPE encryptions and then carry out DRPE encryptions again.Because attack with known plaintext The cyclic shift and rollover states for the plaintext that COA is cracked are typically incorrect, so its cyclic shift for calculating With inverse values and incorrect, therefore it cannot get secrete key, so the ciphertext encrypted through the embodiment of the present invention can be with From attack with known plaintext COA, the security of DRPE encryption systems is improved.
The embodiment of the present invention by symmetric cryptography and the technology that is combined of DRPE encryptions, can be widely applied to military affairs, government affairs, The information safety protection in the field such as commercial affairs, finance, individual privacy.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement made within refreshing and principle etc., should all be included in the protection scope of the present invention.

Claims (10)

  1. A kind of 1. encryption method, it is characterised in that including:
    According to default cyclic shift value and inverse values generation secrete key;
    Original plaintext is encrypted using the secrete key, obtains initial ciphertext picture;
    Displacement upset is carried out to the initial ciphertext picture according to the cyclic shift value and inverse values, obtains accurate final ciphertext;
    By the accurate final ciphertext input double random-phase encoding system, final ciphertext is obtained.
  2. 2. encryption method as claimed in claim 1, it is characterised in that described to be given birth to according to default cyclic shift value and inverse values Include into secrete key:
    According to the cyclic shift value and inverse values generation key seed;
    The key seed is inputted into random number generator, generates the secrete key.
  3. 3. encryption method as claimed in claim 1 or 2, it is characterised in that described to utilize the secrete key to original plaintext It is encrypted, obtaining initial ciphertext includes:
    Binary coding is carried out to the original plaintext, obtains original binary in plain text;
    The original binary is encrypted in plain text using the secrete key, obtains the initial ciphertext of binary sequence;
    The initial ciphertext of the binary sequence is converted into the initial ciphertext picture.
  4. 4. encryption method as claimed in claim 1, it is characterised in that it is described according to the cyclic shift value and inverse values to institute State initial ciphertext picture and carry out displacement upset, obtaining accurate final ciphertext includes:
    Home position reference information is inserted into the initial ciphertext picture, obtains reference picture;
    The reference picture is shifted according to the cyclic shift value, and according to the inverse values to the reference chart after displacement Piece is overturn, and obtains the final ciphertext of standard.
  5. 5. one kind encryption end, it is characterised in that including:
    Key generating unit, for generating secrete key according to default cyclic shift value and inverse values;
    Plaintext encryption unit, for original plaintext to be encrypted using the secrete key, obtains initial ciphertext picture, according to The cyclic shift value and inverse values carry out displacement upset to the initial ciphertext picture, accurate final ciphertext are obtained, by the standard Final ciphertext input double random-phase encoding system, obtains final ciphertext.
  6. 6. encryption end as claimed in claim 5, it is characterised in that the plaintext encryption unit is specifically used for:
    According to the cyclic shift value and inverse values generation key seed;
    The key seed is inputted into random number generator, generates the secrete key;
    Binary coding is carried out to the original plaintext, obtains original binary in plain text;
    The original binary is encrypted in plain text using the secrete key, obtains the initial ciphertext of binary sequence;
    The initial ciphertext of the binary sequence is converted into the initial ciphertext picture;
    Home position reference information is inserted into the initial ciphertext picture, obtains reference picture;
    The reference picture is shifted according to the cyclic shift value, and according to the inverse values to the reference chart after displacement Piece is overturn, and obtains the final ciphertext of standard.
  7. A kind of 7. decryption method, it is characterised in that including:
    By decruption key and final ciphertext input double random phase decryption system, accurate final ciphertext is obtained;
    Displacement upset decryption is carried out to the accurate final ciphertext according to decryption displacement upset information, obtains initial ciphertext picture;
    Upset information generation secrete key is shifted according to the decryption, according to the secrete key to the initial ciphertext picture into Row decryption, obtains original plaintext.
  8. 8. decryption method as claimed in claim 7, it is characterised in that it is described according to decryption displacement upset information to it is described it is accurate most Whole ciphertext is decrypted, and obtaining initial ciphertext picture includes:
    Cyclic shift value (x is calculated in reference position information in home position reference information and the accurate final ciphertext0, y0) and inverse values fp, with the cyclic shift value (x0,y0) and inverse values fpUpset information is shifted as decryption;
    By the accurate final ciphertext according to cyclic shift value (- x0,-y0) inverse values-fpShifted and overturn respectively, obtain institute State initial ciphertext picture;
    It is then described that upset information generation secrete key is shifted according to the decryption, according to the secrete key to the initial ciphertext Picture is decrypted, and obtaining original plaintext includes:
    According to the cyclic shift value (x0,y0) and inverse values fpKey seed is generated, the key seed is inputted into random digit Maker, generates the secrete key;
    The initial ciphertext picture is subjected to binary coding, obtains the initial ciphertext of binary sequence;
    The initial ciphertext of the binary sequence is decrypted using the secrete key, obtains binary system in plain text;
    The binary system is changed in plain text, obtains the original plaintext.
  9. A kind of 9. decrypting end, it is characterised in that including:
    Ciphertext decryption unit, for decruption key and final ciphertext to be inputted double random phase decryption system, obtains accurate final close Text;
    Initial decryption unit, calculates for the reference position information in home position reference information and the accurate final ciphertext Obtain cyclic shift value (x0,y0) and inverse values fp, with the cyclic shift value (x0,y0) and inverse values fpTurned over as decryption displacement Transfering the letter breath, by the accurate final ciphertext according to cyclic shift value (- x0,-y0) inverse values-fpShifted and overturn respectively, obtained The initial ciphertext picture;
    Plaintext decryption unit, for according to the cyclic shift value (x0,y0) and inverse values fpKey seed is generated, will be described close Key seed inputs random number generator, generates the secrete key, and the initial ciphertext picture is carried out binary coding, is obtained To the initial ciphertext of binary sequence, the initial ciphertext of the binary sequence is decrypted using the secrete key, obtains two System is changed in plain text in plain text, to the binary system, obtains the original plaintext.
  10. 10. a kind of double random phase encrypting and deciphering system for resisting attack with known plaintext, it is characterised in that including 5 or 6 institute of claim Decrypting end described in the encryption end stated and claim 9.
CN201711213115.9A 2017-11-28 2017-11-28 Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system Active CN107968705B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711213115.9A CN107968705B (en) 2017-11-28 2017-11-28 Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711213115.9A CN107968705B (en) 2017-11-28 2017-11-28 Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system

Publications (2)

Publication Number Publication Date
CN107968705A true CN107968705A (en) 2018-04-27
CN107968705B CN107968705B (en) 2021-02-02

Family

ID=61998838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711213115.9A Active CN107968705B (en) 2017-11-28 2017-11-28 Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system

Country Status (1)

Country Link
CN (1) CN107968705B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067517A (en) * 2018-06-22 2018-12-21 成都卫士通信息产业股份有限公司 Encryption, the communication means for decrypting device, encryption and decryption method and secrete key
CN110855437A (en) * 2019-11-18 2020-02-28 南京工程学院 Secure communication method and system based on liquid crystal light valve
CN111582284A (en) * 2020-04-27 2020-08-25 中国科学院信息工程研究所 Privacy protection method and device for image recognition and electronic equipment
CN111740830A (en) * 2020-08-12 2020-10-02 科大讯飞(苏州)科技有限公司 Information encryption and decryption method and device, information processing equipment and storage medium
CN112202757A (en) * 2020-09-27 2021-01-08 贵州航天计量测试技术研究所 Geographic coordinate shape-preserving encryption method
CN112953706A (en) * 2019-12-11 2021-06-11 中国电信股份有限公司 Information processing method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6002773A (en) * 1996-02-06 1999-12-14 The University Of Connecticut Method and apparatus for encryption
CN101086811A (en) * 2007-05-18 2007-12-12 中国科学院上海光学精密机械研究所 Method and apparatus for multiple image encryption using optical polarization state
CN100589380C (en) * 2008-02-03 2010-02-10 西北农林科技大学 Encryption method based on double-circular queue shift and transposition rule
CN105243635A (en) * 2015-08-21 2016-01-13 南昌大学 Image encryption method based on two-dimensional compression perception and chaotic system
CN105917381A (en) * 2015-07-07 2016-08-31 深圳大学 Cryptographic Cracking Method and Device Based on Double Random Phase Image Coding System
CN105931175A (en) * 2016-04-28 2016-09-07 广西师范大学 Novel image scrambling method based on chaotic technology
CN107392834A (en) * 2017-07-28 2017-11-24 江西农业大学 A kind of image encryption method of random rotation displacement

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6002773A (en) * 1996-02-06 1999-12-14 The University Of Connecticut Method and apparatus for encryption
CN101086811A (en) * 2007-05-18 2007-12-12 中国科学院上海光学精密机械研究所 Method and apparatus for multiple image encryption using optical polarization state
CN100589380C (en) * 2008-02-03 2010-02-10 西北农林科技大学 Encryption method based on double-circular queue shift and transposition rule
CN105917381A (en) * 2015-07-07 2016-08-31 深圳大学 Cryptographic Cracking Method and Device Based on Double Random Phase Image Coding System
CN105243635A (en) * 2015-08-21 2016-01-13 南昌大学 Image encryption method based on two-dimensional compression perception and chaotic system
CN105931175A (en) * 2016-04-28 2016-09-07 广西师范大学 Novel image scrambling method based on chaotic technology
CN107392834A (en) * 2017-07-28 2017-11-24 江西农业大学 A kind of image encryption method of random rotation displacement

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XIAOLI LIU 等: "Vulnerability to ciphertext-only attack of optical", 《OPTICS EXPRESS》 *
焦述铭 等: "QR code based noise-free optical encryption and decryption of a gray scale image", 《OPTICS COMMUNICATIONS》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067517A (en) * 2018-06-22 2018-12-21 成都卫士通信息产业股份有限公司 Encryption, the communication means for decrypting device, encryption and decryption method and secrete key
CN110855437A (en) * 2019-11-18 2020-02-28 南京工程学院 Secure communication method and system based on liquid crystal light valve
CN112953706A (en) * 2019-12-11 2021-06-11 中国电信股份有限公司 Information processing method and device
CN112953706B (en) * 2019-12-11 2022-09-06 天翼云科技有限公司 Information processing method and device
CN111582284A (en) * 2020-04-27 2020-08-25 中国科学院信息工程研究所 Privacy protection method and device for image recognition and electronic equipment
CN111582284B (en) * 2020-04-27 2023-04-07 中国科学院信息工程研究所 Privacy protection method and device for image recognition and electronic equipment
CN111740830A (en) * 2020-08-12 2020-10-02 科大讯飞(苏州)科技有限公司 Information encryption and decryption method and device, information processing equipment and storage medium
CN111740830B (en) * 2020-08-12 2020-12-11 科大讯飞(苏州)科技有限公司 Information encryption and decryption method and device, information processing equipment and storage medium
CN112202757A (en) * 2020-09-27 2021-01-08 贵州航天计量测试技术研究所 Geographic coordinate shape-preserving encryption method

Also Published As

Publication number Publication date
CN107968705B (en) 2021-02-02

Similar Documents

Publication Publication Date Title
CN107968705A (en) A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system
Li et al. Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure
Ye et al. An effective framework for chaotic image encryption based on 3D logistic map
Ye et al. Image encryption scheme based on blind signature and an improved Lorenz system
Soleymani et al. A chaotic cryptosystem for images based on Henon and Arnold cat map
Iqbal et al. An RGB image cipher using chaotic systems, 15-puzzle problem and DNA computing
Panduranga et al. Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher
CN104766264A (en) Partitioning double-layer self-adaptation diffusion image encryption method
CN104751401A (en) Novel piecewise linear chaotic mapping image encrypting and encoding method
Gafsi et al. Efficient encryption system for numerical image safe transmission
CN104881838B (en) One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method
CN104396182A (en) Method of encrypting data
CN103179319A (en) Method for encrypting digital images of double-chaos system
Sermeno et al. Modified Vigenere cryptosystem: An integrated data encryption module for learning management system
Godara et al. An improved algorithmic implementation of rail fence cipher
Jarjar et al. New technology of color image encryption based on chaos and two improved Vigenère steps
CN104050625B (en) A kind of plaintext builds the composite chaotic image encryption method of initial key
Nielson et al. Practical Cryptography in Python: Learning Correct Cryptography by Example
Mezaal et al. OTP encryption enhancement based on logical operations
Shrivas et al. A survey on visual cryptography techniques and their applications
CN109660695B (en) Color image encryption method based on genetic simulated annealing algorithm and chaotic mapping
CN105049208B (en) Data ciphering method based on dual challenge
Lokhande An Effective Way of using LSB Steganography in images along with Cryptography
CN114143413A (en) Image data PUF (physical unclonable function) security encryption system and encryption method
CN111314051B (en) Encryption and decryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant