CN1878059A - Grouping encryption and decryption algorithm - Google Patents

Grouping encryption and decryption algorithm Download PDF

Info

Publication number
CN1878059A
CN1878059A CN 200610090232 CN200610090232A CN1878059A CN 1878059 A CN1878059 A CN 1878059A CN 200610090232 CN200610090232 CN 200610090232 CN 200610090232 A CN200610090232 A CN 200610090232A CN 1878059 A CN1878059 A CN 1878059A
Authority
CN
China
Prior art keywords
computing
mould
key
algorithm
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200610090232
Other languages
Chinese (zh)
Inventor
叶季青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING FORTUNE INVESTMENT Co Ltd
Original Assignee
BEIJING FORTUNE INVESTMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING FORTUNE INVESTMENT Co Ltd filed Critical BEIJING FORTUNE INVESTMENT Co Ltd
Priority to CN 200610090232 priority Critical patent/CN1878059A/en
Publication of CN1878059A publication Critical patent/CN1878059A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses sectionalization encipher-decipher algorithm, which is characterized by the following: adopting 10-bit number for clear text and secret text as basic arithmetic unit; adopting 10-subtraction method for deciphering course; making the digital sequence length of obtained 10-bit secret text; reducing the problem of secret text inputting time and operating quantity.

Description

A kind of block encryption and decipherment algorithm
Technical field
The present invention relates to a kind of block encryption and decipherment algorithm, belong to digital anti-counterfeiting and field of information security technology.
Background technology
Cryptographic technique is a science and technology of research encryption and decryption conversion.Generally the file with protection to be encrypted is called expressly, and the file behind the enciphering transformation is called ciphertext.The process that expressly is transformed into ciphertext encrypting, is called deciphering with the ciphertext process expressly that is transformed into.Expressly the mutual conversion with ciphertext is reversible, and only has unique, free from error inverible transform.Transformation rule used when plaintext is encrypted is cryptographic algorithm, and transformation rule used when ciphertext is decrypted is decipherment algorithm, and cryptographic algorithm and decipherment algorithm are referred to as cryptographic algorithm.Usually, cryptographic algorithm and decipherment algorithm all are to carry out under the control of key, in order to increase the diversity of conversion.Used key of cryptographic algorithm (encryption key) and the identical cryptographic algorithm of the used key of decipherment algorithm (decruption key) are called the simple key cipher algorithm.The cryptographic algorithm that encryption key is different with decruption key is called the double-key cipher algorithm.
The simple key cipher algorithm can be divided into stream cipher algorithm and block cipher.The cryptographic algorithm that plaintext is encrypted bit by bit by character (as bit) is a stream cipher algorithm, and plaintext is divided into groups (containing a plurality of characters), and the cryptographic algorithm of encrypting by group is a block cipher.
Block encryption algorithm all is according to binary system at present, encrypts by bit.Announce the Data Encryption Standard of carrying out (DES) as the U.S. in 1977, nineteen ninety China and the IDEA (IDEA) of European scholar's co-present, the Advanced Encryption Standard that is used to replace DES (AES) of U.S.'s release in 2000 etc.
Binary block encryption algorithm derives from and serves the computer and the modern digital communication of the minimum unit binary digit (bit) of information representation and processing.For the purpose of the convenience of information conversion; block cipher inside all be divided into about (A, B) two parts; transformation results with the A part comes mould two to add the B part, and the transformation results mould two with the B part adds the A part again, and so loop iteration reaches the purpose of encipherment protection information.So block length must be 2 times of minimum unit, in the time of discontented 2 times, filling information makes it reach 2 times.Minimum unit is the needs that binary digit had both met Computer Processing and digital communication, with minimum filling information amount, reaches the highest charging efficiency again.
But some special occasions, the bill Serial No. (expressly) that shows as 10 system digital displays, after it was encrypted with the binary packet cryptographic algorithm, encrypted result was transformed into the Serial No. (ciphertext) of 10 systems again, and the 10 system ciphertext Serial No. length of this moment are than expressly long.If when by dialing ciphertext being imported into authentication center and verifies, elongated time and the operational ton called of making of ciphertext length increases.For example telephone code is false proof, and after with binary system encryption algorithm plain code being encrypted usually, its result (security code and ciphertext) is longer than plain code (expressly), when the consumer calls the true and false of security code inquiry commodity, has increased time and operational ton equally.
Summary of the invention
In order to solve in the field of information security technology existing cryptographic algorithm technology 10 system numbers are encrypted the back ciphertext than expressly long, when use is carried out the ciphertext checking as means such as phones, increase the time of ciphertext input and the problem of operational ton, the invention provides a kind of block encryption and decipherment algorithm.This block encryption algorithm is finished the encryption to 10 system Serial No.s.When expressly 10 system Serial No.s are block length, or block length equals expressly 10 system Serial No. length, and the length that the length of encrypted result equals to divide into groups adopts corresponding decipherment algorithm that ciphertext is decrypted.
For achieving the above object, the input plaintext and the key of this cryptographic algorithm are 10 system numbers, each function in the algorithm is a basic processing unit with 10 system numerals, modular arithmetic with mould 10 add, mould 10 subtracts, or mould 100 adds, mould 100 is kept to basic operation, and such processing makes this algorithm different with the various block ciphers that occurred.
Cryptographic algorithm of the present invention comprises cryptographic algorithm and decipherment algorithm.The step of cryptographic algorithm and decipherment algorithm is basic identical.
One aspect of the present invention relates to a kind of block encryption algorithm, to expressly encrypting, generates encrypted ciphertext, and this block encryption algorithm comprises that step is as follows:
1) to the plaintext P computing of dividing into groups;
2) encryption cycle iterative computation;
3) evolution and export ciphertext,
Wherein 2) the encryption cycle iterative computation comprises again:
A, digital extended computing;
The hybrid operation of b, key and variable;
C, nonlinear transformation computing;
D, information are covered computing;
E, assignment operation again;
A ring shift right computing of the key of f, block encryption algorithm,
Expressly P is one group of 10 system numeral P 1, P 2..., P i..., P m, 0≤i≤m, and digital Pi take off row a, b a kind of codomain,
a、0≤P i≤9
b、0≤P i≤99
Key K is one group of 10 system numeral K 1, K 2..., K i..., K m, 0≤i≤m, and digital K iGet P iCodomain, each function in the algorithm is a basic processing unit with 10 system numerals, wherein the modular arithmetic in the hybrid operation of b, key and variable is that mould 10 adds computing or mould 100 adds computing, the modular arithmetic that d, information are covered in the computing is that mould 10 adds computing or mould 100 adds computing, generates 10 system ciphertexts of a group encryption.
The present invention relates to a kind of packet deciphering algorithm on the other hand, and ciphertext is decrypted, and generates the plaintext of deciphering, and this packet deciphering algorithm comprises that step is as follows:
1) to the ciphertext C computing of dividing into groups;
2) decryption rounds iterative computation;
3) evolution and output plaintext,
Wherein 2) the decryption rounds iterative computation comprises:
A, digital extended computing;
The hybrid operation of b, key and variable;
C, nonlinear transformation computing;
D, information are covered computing;
E, assignment operation again;
F, a ring shift left computing of key,
Input ciphertext C is one group of 10 system numeral C 1, C 2..., C i..., C m, 0≤i≤m, and digital C iCan only take off a kind of codomain of row a, b,
a、0≤C i≤9
b、0≤C i≤99
Key K is one group of 10 system numeral K 1, K 2..., K i..., K m, 0≤i≤m, and digital K iGet P iCodomain, each function in the algorithm is a basic processing unit with 10 system numerals, wherein the modular arithmetic in the hybrid operation of b, key and variable is that mould 10 adds computing or mould 100 adds computing, the modular arithmetic that d, information are covered in the computing is that mould 10 subtracts computing or mould 100 subtracts computing, generates the 10 systems plaintext of one group of deciphering.
Beneficial effect: adopt this method in field of information security technology, 10 system numbers to be encrypted back ciphertext Serial No. length with expressly the same long, when use is carried out the ciphertext checking as means such as phones, reduce ciphertext and confirmed the time and the operational ton of input, and adopted corresponding decipherment algorithm to be decrypted.
Description of drawings
Fig. 1 is enciphering and deciphering algorithm schematic diagram of the present invention;
Fig. 2 is cryptographic algorithm Mathematical Modeling schematic diagram of the present invention;
Fig. 3 is decipherment algorithm Mathematical Modeling schematic diagram of the present invention.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention, and cryptographic algorithm of the present invention comprises cryptographic algorithm and decipherment algorithm.The structure of cryptographic algorithm and decipherment algorithm is basic identical.
It all is earlier 10 system number conversions to be become 2 system numbers that the bill Serial No. (expressly) that in the prior art 10 system digital displays is shown is encrypted, after encrypting algorithm for encryption with binary system afterwards, encrypted result is transformed into the Serial No. (ciphertext) of 10 systems again, the 10 system ciphertext Serial No. length of this moment are than expressly long, if when ciphertext being imported into authentication center and verifies by dialing, elongated time and the operational ton called of making of ciphertext length increases, as shown in Figure 1, and each function in the algorithm of the present invention is a basic processing unit with 10 system numerals, modular arithmetic directly adopts mould 10 to add or mould 100 adds the cryptographic algorithm of computing, can solve 10 system ciphertext Serial No. length than expressly long problem, the modular arithmetic of corresponding steps adopts mould 10 to subtract or mould 100 subtracts computing during deciphering.
Embodiment 1
In field of information security technology, the bill Serial No. (expressly) that 10 system digital displays show is made as P here, to the concrete operation process of this block encryption algorithm expressly as shown in Figure 2, comprise the computing of dividing into groups to plaintext P, the encryption cycle iterative computation, evolution and output ciphertext etc., the encryption cycle iterative computation comprises 6 sub-calculating processes, it is respectively the digital extended computing, the hybrid operation of key and variable, the nonlinear transformation computing, information is covered computing, a ring shift right computing of assignment operation and key again, above calculating process all is a prior art, and different is that plaintext P is one group of 10 system numeral P in the present embodiment 1, P 2..., P i..., P m, 0≤i≤m, and digital Pi take off row a, b a kind of codomain,
a、0≤P i≤9
b、0≤P i≤99
Key K is one group of 10 system numeral K 1, K 2..., K i..., K m, 0≤i≤m, and digital K iGet P iCodomain, each function in the algorithm is a basic processing unit with 10 system numerals, modular arithmetic in the hybrid operation of sub-computing key and variable is that mould 10 adds computing or mould 100 adds computing, and the modular arithmetic that sub-computing information is covered in the computing is that mould 10 adds computing or mould 100 adds computing.
The mathematical description of this cryptographic algorithm is specially:
1) to the plaintext P computing of dividing into groups
The part that plaintext P is divided into two equal in length: first half and latter half, first half are P 1, P 2..., P i..., P s, latter half is P S+1, P S+2..., P j, P m, m equals 2S; If m is not an even number, then in plaintext, increase a P iOr increase a P j, make m become even number, 2 multiples of S.
2) encryption cycle iterative computation
This encryption cycle iterative computation comprises one group of calculating process, and the loop iteration number of times can be set, and in loop iteration, its input is the result of cycle calculations last time, and the input of establishing the e time cycle calculations is X e, key is K e, output is Z e, their component is respectively X 1 e, X 2 e..., X m e, K 1 e, K 2 e..., K m e, Z 1 e, Z 2 e..., Z s e, 0≤e≤n, the input X of cycle calculations first 1Be plaintext P, X 1 1, X 2 1..., X m 1Equal P respectively 1, P 2..., P m, cryptographic algorithm is the key K of cycle calculations first 1Be key K, K 1 1, K 2 1..., K i 1..., K m 1Equal K respectively 1, K 2..., K m
The calculating process that the encryption cycle iterative computation comprises:
A, digital extended computing: with X S+1 e, X S+2 e... X m eS variable expands to S to variable altogether, and operation rule is: establish total S to X u e, X w eVariable, u and w difference value S+1, S+2 ..., m each 1 time, and require in one group of variable, X u e ≠ X w e ;
The hybrid operation of b, key and variable: key and X u eAnd X w eThe modular arithmetic of being undertaken by following (1), (2) formula is that mould 10 adds (or mould 100 adds) computing,
G u e = X u e ⊕ K h e - - - ( 1 )
Q u e = X w e ⊕ K w e - - - ( 2 )
Wherein if 0≤P i≤ 9, then "  " concrete expression is added row operation by mould 10; 0≤P i≤ 99, then "  " concrete expression adds computing by mould 100, h value 1,2 ..., S each 1 time, u, w value S+1, S+2 ..., m each 1 time;
Below the same P of codomain of each variable i, the value of subscript h, u, w requires, the computational methods of "  " are with this subprocess,
C, nonlinear transformation computing: establish and have function f h, this sub-computing is carried out computing by following (3) formula,
Y u e = f h ( G u e , Q u e ) , - - - ( 3 )
D, information are covered computing: the modular arithmetic of being undertaken by following (4) formula is that mould 10 adds (or mould 100 adds) computing,
Z h e = X h e ⊕ Y u e - - - ( 4 )
E, assignment operation again: undertaken by following (5), (6) formula;
X h e + 1 = X u e , - - - ( 5 )
X u e + 1 = Z h e - - - ( 6 )
F, a ring shift right computing of key: undertaken by following (7), (8) formula;
K i + 1 e + 1 = K i e , i = 1 , , · · · · · · , m - 1 - - - ( 7 )
K 1 e + 1 = K m e - - - ( 8 )
3) evolution and output ciphertext: after loop iteration calculated and finishes, after front and back two parts place-exchange of its result, assignment was given ciphertext C, and computations finishes, that is: after loop iteration calculating is finished n time, obtain m X i N+1, with this m X i N+1The exchange of front and back two parts, carry out (9), (10) formula computing.
C h = X u e + 1 , - - - ( 9 )
C u = X h e + 1 - - - ( 10 )
Adopt this method 10 system numbers being encrypted back ciphertext Serial No. length with expressly the same long, as plaintext Serial No. length is 9, adopting the ciphertext Serial No. length after this method is encrypted also is 9, when the consumer calls security code and is the true and false of cryptogram search commodity, only need dial 9 10 system numerals gets final product, employing prior art then ciphertext Serial No. length is 11, adopts this method to reduce consumer's time and operational ton.
Embodiment 2
Present embodiment is that the ciphertext of output among the corresponding embodiment 1 is decrypted computing, the concrete operation process of decipherment algorithm as shown in Figure 3, comprise ciphertext C is divided into groups computing, decryption rounds iterative computation, evolution and output expressly etc., the decryption rounds iterative computation comprises 6 sub-calculating processes, the hybrid operation, nonlinear transformation computing, the information that are digital extended computing, key and variable are respectively covered computing, an assignment and a ring shift left computing of key again, and above calculating process all is
Prior art.
Corresponding with embodiment 1 cryptographic algorithm, the input ciphertext C of decipherment algorithm is one group of 10 system numeral C 1, C 2..., C i..., C m, 0≤i≤m, and digital C iCan only take off a kind of codomain of row a, b,
a、0≤C i≤9
b、0≤C i≤99
The key K of decipherment algorithm is one group of 10 system numeral K 1, K 2..., K i..., K m, 0≤i≤m, and digital K iGet P iCodomain, each function in the algorithm is a basic processing unit with 10 system numerals, modular arithmetic in the hybrid operation that sub-computing b, key and variable carry out is that mould 10 adds computing or mould 100 adds computing, sub-computing d, uses information to cover that modular arithmetic in the computing subtracts computing as mould 10 or mould 100 subtracts computing.
The mathematical description of this decipherment algorithm is specially:
1) to the ciphertext C computing of dividing into groups: the part that ciphertext C is divided into two equal in length: first half and latter half, first half are C 1, C 2..., C i..., C s, latter half is C S+1, C S+2..., C i..., C m, m equals 2S;
2) decryption rounds iterative computation:
This decryption rounds iterative computation comprises one group of calculating process, and the loop iteration number of times can be set, and in loop iteration, its input is the result of cycle calculations last time, and the input of establishing the e time cycle calculations is X e, key is K e, output is Z e, their component is respectively X 1 e, X 2 e..., X m e, K 1 e, K 2 e..., K m e, Z 1 e, Z 2 e..., Z s e, 0≤e≤n, the input X of cycle calculations first 1Be ciphertext C, X 1 1, X 2 1..., X m 1Equal C respectively 1, C 2..., C m, the key K of cycle calculations first 1Be n ring shift right of key K, i.e. K 1K for cryptographic algorithm n
The calculating process that the decryption rounds iterative computation comprises:
A, digital extended computing: with X S+1 e, X S+2 e... X m eS variable expands to S to variable altogether, and operation rule is: establish total S to X u e, X w eVariable, u and w difference value S+1, S+2 ..., m each 1 time, and require in one group of variable, X u e ≠ X w e ;
The hybrid operation of b, key and variable: key and X u eAnd X w eThe modular arithmetic of being undertaken by following (11), (12) formula is that mould 10 adds (or mould 100 adds) computing;
G u e = X u e ⊕ K h e - - - ( 11 )
Q u e = X w e ⊕ K w e - - - ( 12 )
C, nonlinear transformation computing: the function f of using cryptographic algorithm h, this sub-computing is carried out computing by following (13) formula;
Y u e = f h ( G u e , Q u e ) , - - - ( 13 )
D, information are covered computing: the modular arithmetic of this sub-computing is that mould 10 subtracts or mould 100 subtracts computing, carries out computing by following (14) formula,
Wherein if 0≤C i≤ 9, then "  " specifically represents to subtract by mould 10 and carries out computing; 0≤C i≤ 99, and then " ,, specifically represent to subtract and carry out computing by mould 100;
E, assignment operation again: this sub-computing is undertaken by following (15), (16) formula;
X h e + 1 = X u e , - - - ( 15 )
X u e + 1 = Z h e - - - ( 16 )
F, a ring shift left computing of key: this sub-computing is carried out ring shift left by following (17), (18) formula;
K i e + 1 = K i + 1 e , i = 1 , , · · · · · · , m - 1 - - - ( 17 )
K m e + 1 = K 1 e - - - ( 18 )
3) evolution and output are expressly: after loop iteration calculated and finishes, after front and back two parts place-exchange of its result, assignment was to plaintext P, and deciphering is calculated and finished, that is: after loop iteration calculating is finished n time, obtain m X i N+1, with this m X i N+1The exchange of front and back two parts, carry out (19), (20) computing.
P h = X u e + 1 , - - - ( 19 )
P u = X h e + 1 - - - ( 20 )
It is that ciphertext is decrypted to the security code of consumer's input among the embodiment 1 that the computer of authentication center adopts this method.
Be the source code of whole encrypting and decrypting algorithm below:
The constant (beginning) of // generation or checking security code
Const bcs=289342928; The base sign indicating number of // security code conversion
bs1:array[0..7]of?byte=(101,21,93,235,86,206,125,85);
const?la0:array[0..9,0..9]of?byte
=((9,3,8,0,5,4,7,2,1,6),
(2,6,1,3,8,7,0,5,4,9),
(4,8,3,5,0,9,2,7,6,1),
(5,9,4,6,1,0,3,8,7,2),
(8,2,7,9,4,3,6,1,0,5),
(6,0,5,7,2,1,4,9,8,3),
(3,7,2,4,9,8,1,6,5,0),
(1,5,0,2,7,6,9,4,3,8),
(0,4,9,1,6,5,8,3,2,7),
(7,1,6,8,3,2,5,0,9,4));
la1:array[0..9,0..9]of?byte
=((2,5,4,3,7,1,8,9,0,6),
(3,6,5,4,8,2,9,0,1,7),
(4,7,6,5,9,3,0,1,2,8),
(9,2,1,0,4,8,5,6,7,3),
(1,4,3,2,6,0,7,8,9,5),
(8,1,0,9,3,7,4,5,6,2),
(5,8,7,6,0,4,1,2,3,9),
(0,3,2,1,5,9,6,7,8,4),
(6,9,8,7,1,5,2,3,4,0),
(7,0,9,8,2,6,3,4,5,1));
la2:array[0..9,0..9]of?byte
=((8,0,9,4,7,6,3,5,1,2),
(1,3,2,7,0,9,6,8,4,5),
(5,7,6,1,4,3,0,2,8,9),
(3,5,4,9,2,1,8,0,6,7),
(9,1,0,5,8,7,4,6,2,3),
(4,6,5,0,3,2,9,1,7,8),
(7,9,8,3,6,5,2,4,0,1),
(2,4,3,8,1,0,7,9,5,6),
(6,8,7,2,5,4,1,3,9,0),
(0,2,1,6,9,8,5,7,3,4));
la3:array[0..9,0..9]of?byte
=((5,8,2,6,3,4,9,1,0,7),
(0,3,7,1,8,9,4,6,5,2),
(9,2,6,0,7,8,3,5,4,1),
(1,4,8,2,9,0,5,7,6,3),
(4,7,1,5,2,3,8,0,9,6),
(8,1,5,9,6,7,2,4,3,0),
(7,0,4,8,5,6,1,3,2,9),
(2,5,9,3,0,1,6,8,7,4),
(3,6,0,4,1,2,7,9,8,5),
(6,9,3,7,4,5,0,2,1,8));
la4:array[0..9,0..9]of?byte
=((6,2,8,9,5,1,0,3,7,4),
(3,9,5,6,2,8,7,0,4,1),
(7,3,9,0,6,2,1,4,8,5),
(0,6,2,3,9,5,4,7,1,8),
(5,1,7,8,4,0,9,2,6,3),
(9,5,1,2,8,4,3,6,0,7),
(4,0,6,7,3,9,8,1,5,2),
(1,7,3,4,0,6,5,8,2,9),
(2,8,4,5,1,7,6,9,3,0),
(8,4,0,1,7,3,2,5,9,6));
Cv1=4; Half of // block length is since 0 note
Cv21=2*cv1+1; // block length is since 0 note
ks:array[0..9]of?byte=(0,1,2,3,4,5,6,7,8,9);
cv:array[0..4,0..1]of?byte=((7,9),(5,8),(9,5),(6,7),(8,6));
lps=6;
//
var
zs,zt,k,kkt,C,P:array[0..9]of?byte;
sss:integer;
procedure?encrypt;
var
i,lp,t1,t2,Xu,Xw,Gu,Qu:integer;
X,Yu,Zh;array[0..9]of?byte;
begin
// encrypt and the all-key conversion
For i:=0 to cv21 do X[i] :=zs[i]; //zs preserves 10 system enciphered datas
for?lp:=0?to?lps?do
begin
5 Latin tables are got in for i:=0 to cv1 do//circulation
begin
// get dominant vector, look into the Latin table
t1:=cv[i,0];
t2:=cv[i,1];
Xu:=X[t1];
Xw:=X[t2];
// key mixes with variable
Gu:=(Xu+k[i]) mod 10; // mould 10 adds
Qu:=(Xw+k[i+cv1+1])mod?10;
case?i?of
0:Yu[i]:=la0[Gu,Qu];
1:Yu[i]:=la1[Gu,Qu];
2:Yu[i]:=la2[Gu,Qu];
3:Yu[i]:=la3[Gu,Qu];
4:Yu[i]:=la4[Gu,Qu];
end;
Zh[i] :=(Yu[i]+X[i]) mod 10; // mould 10 adds
end;
for?i:=0?to?cv1?do?X[i]:=X[i+cv1+1];
for?i:=0?to?cv1?do?X[i+cv1+1]:=Zh[i];
// key moves to left
for?i:=0?to(cv21-1)do?kkt[i+1]:=k[i];
kkt[0]:=k[cv21];
for?i:=0?to(cv21)do?k[i]:=kkt[i];
end;
// exchange
for?i:=0?to?cv1?do?C[i]:=X[cv1+1+i];
for?i:=0?to?cv1?do?C[cv1+1+i]:=X[i];end;procedure?dencrypt;var
i,lp,t1,t2,Xu,Xw,Gu,Qu:integer;
X,Yu,Zh:array[0..9]of?byte;begin
// deciphering
For i:=0 to cv21 do X[i] :=C[i]; //C preserves 10 system ciphertexts
for?lp:=0?to?lps?do
begin
// key moves to right
for?i:=1?to(cv21)do?kkt[i-1]:=k[i];
kkt[cv21]:=k[0];
for?i:=0?to(cv21)do?k[i]:=kkt[i];
for?i:=0?to?cv1?do
begin
// get dominant vector, look into the Latin table
t1:=cv[i,0];
t2:=cv[i,1];
Xu:=X[t1];
Xw:=X[t2];
Gu:=(Xu+k[i]) mod 10; // mould 10 adds
Qu:=(Xw+k[i+cv1+1])mod?10;
case?i?of
0:Yu[i]:=la0[Gu,Qu];
1:Yu[i]:=la1[Gu,Qu];
2:Yu[i]:=la2[Gu,Qu];
3:Yu[i]:=la3[Gu,Qu];
4:Yu[i]:=la4[Gu,Qu];
end;
if?X[i]>=Yu[i]then?Zh[i]:=X[i]-Yu[i]
Else Zh[i] :=10+X[i]-Yu[i]; // mould 10 subtracts
end;
for?i:=0?to?cv1?do?X[i]:=X[i+cv1+1];
for?i:=0?to?cv1?do?X[i+cv1+1]:=Zh[i];
end;
for?i:=0?to?cv1?do?P[i]:=X[cv1+1+i];
For i:=0 to cv1 do P[cv1+1+i] :=X[i]; //P preserves 10 system decrypted results
end;
Above, with reference to each accompanying drawing, several typical embodiment of the present invention are described in detail, so that make the present invention become clearer, and should not think that the present invention only only limits to the above embodiments.Those skilled in the art by the inspiration of the various embodiments described above, is not difficult the present invention is made various improvement, change or replacement, thereby these improvement, change or replacement, should not think to have broken away from design of the present invention, or claims institute restricted portion.

Claims (2)

1, a kind of block encryption algorithm to expressly encrypting, generates encrypted ciphertext, and described block encryption algorithm comprises that step is as follows:
1) to the plaintext P computing of dividing into groups;
2) encryption cycle iterative computation;
3) evolution and output ciphertext;
Described step 2) the encryption cycle iterative computation comprises:
A, digital extended computing;
The hybrid operation of b, key and variable;
C, nonlinear transformation computing;
D, information are covered computing;
E, assignment operation again;
F, a ring shift right computing of key;
It is characterized in that described plaintext P is one group of 10 system numeral P 1, P 2..., P i..., P m, 0≤i≤m, and digital Pi take off row a, b a kind of codomain,
a、0≤P i≤9
b、0≤P i≤99
Key K is one group of 10 system numeral K 1, K 2..., K i..., K m, 0≤i≤m, and digital K iGet P iCodomain, each function in the algorithm is a basic processing unit with 10 system numerals; Modular arithmetic in the hybrid operation of described key and variable is that mould 10 adds computing or mould 100 adds computing, and the modular arithmetic that described information is covered in the computing is that mould 10 adds computing or mould 100 adds computing, generates 10 system ciphertexts of a group encryption.
2, a kind of packet deciphering algorithm is decrypted ciphertext, generates the plaintext of deciphering, and described packet deciphering algorithm comprises that step is as follows:
1) to the ciphertext C computing of dividing into groups;
2) decryption rounds iterative computation;
3) evolution and output plaintext;
Described step 2) the decryption rounds iterative computation comprises:
A, digital extended computing;
The hybrid operation of b, key and variable;
C, nonlinear transformation computing;
D, information are covered computing;
E, assignment operation again;
F, a ring shift left computing of key;
It is characterized in that described input ciphertext C is one group of 10 system numeral C 1, C 2..., C i..., C m, 0≤i≤m, and digital C iCan only take off a kind of codomain of row a, b,
a、0≤C i≤9
b、0≤C i≤99
Key K is one group of 10 system numeral K 1, K 2..., K i..., K m, 0≤i≤m, and digital K iGet P iCodomain, each function in the algorithm is a basic processing unit with 10 system numerals, modular arithmetic in the hybrid operation of described key and variable is that mould 10 adds computing or mould 100 adds computing, the modular arithmetic that described information is covered in the computing is that mould 10 subtracts computing or mould 100 subtracts computing, generates the 10 systems plaintext of one group of deciphering.
CN 200610090232 2006-07-07 2006-07-07 Grouping encryption and decryption algorithm Pending CN1878059A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200610090232 CN1878059A (en) 2006-07-07 2006-07-07 Grouping encryption and decryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200610090232 CN1878059A (en) 2006-07-07 2006-07-07 Grouping encryption and decryption algorithm

Publications (1)

Publication Number Publication Date
CN1878059A true CN1878059A (en) 2006-12-13

Family

ID=37510372

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200610090232 Pending CN1878059A (en) 2006-07-07 2006-07-07 Grouping encryption and decryption algorithm

Country Status (1)

Country Link
CN (1) CN1878059A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102064936A (en) * 2010-11-29 2011-05-18 北京卓微天成科技咨询有限公司 Data encryption and decryption methods and devices
CN103488915A (en) * 2013-09-24 2014-01-01 无锡德思普科技有限公司 Double-secret-key-encryption resource encryption and decryption method with combination of software and hardware
CN103563289A (en) * 2011-05-31 2014-02-05 国际商业机器公司 Protecting control vector in cryptographic system
WO2014044137A1 (en) * 2012-09-24 2014-03-27 腾讯科技(深圳)有限公司 Communication encryption and decryption method, device and system
CN106157961A (en) * 2015-04-09 2016-11-23 展讯通信(上海)有限公司 Audio signal processing method and device
CN108476132A (en) * 2015-11-06 2018-08-31 纳格拉维森公司 Key for an encrypting operation sequence generates

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102064936A (en) * 2010-11-29 2011-05-18 北京卓微天成科技咨询有限公司 Data encryption and decryption methods and devices
CN102064936B (en) * 2010-11-29 2012-08-22 北京卓微天成科技咨询有限公司 Data encryption and decryption methods and devices
CN103563289A (en) * 2011-05-31 2014-02-05 国际商业机器公司 Protecting control vector in cryptographic system
US9178703B2 (en) 2011-05-31 2015-11-03 International Business Machines Corporation Method of protecting a control vector in an optional block of a standard key block
CN103563289B (en) * 2011-05-31 2016-08-17 国际商业机器公司 The method and system of the dominant vector in protection encryption system
WO2014044137A1 (en) * 2012-09-24 2014-03-27 腾讯科技(深圳)有限公司 Communication encryption and decryption method, device and system
CN103488915A (en) * 2013-09-24 2014-01-01 无锡德思普科技有限公司 Double-secret-key-encryption resource encryption and decryption method with combination of software and hardware
CN103488915B (en) * 2013-09-24 2015-12-23 无锡德思普科技有限公司 The resource encryption decryption method of the double secret key encryption that a kind of software and hardware combines
CN106157961A (en) * 2015-04-09 2016-11-23 展讯通信(上海)有限公司 Audio signal processing method and device
CN108476132A (en) * 2015-11-06 2018-08-31 纳格拉维森公司 Key for an encrypting operation sequence generates

Similar Documents

Publication Publication Date Title
CN1203431C (en) Encipher decipher devices and device for producing expanded key, method and recording medium therefor
CN1282324C (en) Device and method for data encipher
CN1921382A (en) Encrypting-decrypting method based on AES algorithm and encrypting-decrypting device
CN1734526A (en) Block encryption device using auxiliary conversion
CN1124545C (en) High-speed cryptographic processing apparatus, cryptographic processing method, and storage medium
CN1879138A (en) Encryption device, encryption method, and computer program
CN1227908C (en) Encryption transmission system
CN1345495A (en) Countermeasure procedures in electronic component implementing elliptical curve type public key encryption algorithm
CN1136692C (en) Data conversion apparatus and data conversion method
CN1285191C (en) Public-key signature methods and systems
CN1312630A (en) Encryption apparatus based on block encryption type, its method and decoding device and method thereof
CN1878059A (en) Grouping encryption and decryption algorithm
CN1656733A (en) S-BOX encryption in block cipher implementations
CN1286457A (en) Encrypting method and device, and decrypting method and device
CN1277506A (en) Digital data recording apparatus, storage apparatus and using device
CN1909449A (en) Method, apparatus, and program for processing information
CN1235446A (en) Elliptical curve converting device and device and system for use thereof
CN1338166A (en) Public and private key cryptographic method
CN1867094A (en) Short message encryption protection realizing method and system
CN1845213A (en) Method for realizing encryption/decryption processing in SMS4 cipher algorithm
CN1905438A (en) Combined key managing method and system based on ID
CN1788450A (en) Small hardware implementation of the mixcolumn functions
CN1266616C (en) Computer encryption unit and encryption method
CN1574736A (en) Data transceiver and data transceiver system
CN1921381A (en) Key-updating method, encryption processing method, key-insulated cryptosystem and terminal device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication