WO2002001791A1 - The conversion method of unlimited uncycling key stream of clear text, encrypted message extracting mechanism - Google Patents
The conversion method of unlimited uncycling key stream of clear text, encrypted message extracting mechanism Download PDFInfo
- Publication number
- WO2002001791A1 WO2002001791A1 PCT/CN2001/000876 CN0100876W WO0201791A1 WO 2002001791 A1 WO2002001791 A1 WO 2002001791A1 CN 0100876 W CN0100876 W CN 0100876W WO 0201791 A1 WO0201791 A1 WO 0201791A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- encrypted message
- clear text
- uncycling
- unlimited
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
Definitions
- the invention discloses a method and a mechanism for random dynamic transformation of a secret key sequence at a time.
- the second secret is recognized to have the highest encryption strength.
- the effective transmission of the key stream and the key stream generator algorithm's breakthrough in the limited cycle have not been resolved.
- the purpose of the present invention is to provide a method and a mechanism for dynamically transforming a key sequence, so that the key stream is randomly transformed before the cycle is completed. In this way, no key transmission is required, and the limited circulation of the key stream is achieved, which is completed or close to Word by word encryption.
- the method and mechanism for random dynamic change of the key sequence of the present invention is implemented by using the following scheme, which extracts VI from plaintext or ciphertext counts, compares and selects V2, candidate buffer and initial transformation V3, real selected data buffer and secret Key sequence transformation V4, key sequence buffer V5, candidate function sequence / k in V6, and characteristic modulation data ⁇ in V7.
- Extracting data from A or B is optional.
- the counting starts at the end of the previous extraction in VI.
- the counting unit is determined by the data M1, the starting point of the sequential extraction is determined by the data N1, and the extracted data is sent to V2.
- the extracted data is compared with the candidate data that already exists in V3. If they are the same, they are discarded, and if they are not the same, they are sequentially stored in V3 as new candidate data. If the number of candidate data stored in V3 reaches N2, then the data of N2 is transformed by the function / kl and sent to V4.
- the selected transformation data is buffered in V4.
- the key sequence in the buffer V5 will be transformed with the characteristic modulation data ⁇ — via the function / k2.
- the characteristic modulation data ⁇ is some characteristic data, including encryption time, user attributes, address, authorization level, etc., and users can set and choose according to their needs.
- V6 is a sequence of numbered functions. After K1 and K2 in the key sequence buffer V5 are selected, the function transformation is completed as / kl and / k2.
- the present invention uses the local randomness of the plaintext stream, plus the randomness of the encryption time, etc., before a sufficiently long key sequence does not complete the cycle, it is randomly transformed, and so on to achieve The purpose of forming an infinite acyclic key stream.
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU89503/01A AU8950301A (en) | 2000-06-19 | 2001-05-28 | The conversion method of unlimited uncycling key stream of clear text, encryptedmessage extracting mechanism |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN00109250.2 | 2000-06-19 | ||
CN 00109250 CN1330352A (en) | 2000-06-19 | 2000-06-19 | Infinite non-cycle key stream conversion method with normal and encrypted texts extracting mechanism |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002001791A1 true WO2002001791A1 (en) | 2002-01-03 |
Family
ID=4579530
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2001/000876 WO2002001791A1 (en) | 2000-06-19 | 2001-05-28 | The conversion method of unlimited uncycling key stream of clear text, encrypted message extracting mechanism |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN1330352A (en) |
AU (1) | AU8950301A (en) |
WO (1) | WO2002001791A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1117227A (en) * | 1994-02-14 | 1996-02-21 | 艾利门垂克斯技术有限公司 | Protected communication method and system |
US6095410A (en) * | 1994-02-23 | 2000-08-01 | Dataflight Europe A/S | Vending system |
-
2000
- 2000-06-19 CN CN 00109250 patent/CN1330352A/en active Pending
-
2001
- 2001-05-28 WO PCT/CN2001/000876 patent/WO2002001791A1/en active Application Filing
- 2001-05-28 AU AU89503/01A patent/AU8950301A/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1117227A (en) * | 1994-02-14 | 1996-02-21 | 艾利门垂克斯技术有限公司 | Protected communication method and system |
US6095410A (en) * | 1994-02-23 | 2000-08-01 | Dataflight Europe A/S | Vending system |
Also Published As
Publication number | Publication date |
---|---|
CN1330352A (en) | 2002-01-09 |
AU8950301A (en) | 2002-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mennink et al. | Security of full-state keyed sponge and duplex: Applications to authenticated encryption | |
Black et al. | CBC MACs for arbitrary-length messages: The three-key constructions | |
US5892829A (en) | Method and apparatus for generating secure hash functions | |
Krause | BDD-based cryptanalysis of keystream generators | |
Bellare et al. | Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible | |
US7221756B2 (en) | Constructions of variable input length cryptographic primitives for high efficiency and high security | |
WO2012071728A1 (en) | Data encryption method, apparatus and system for cloud storage | |
US20120134490A1 (en) | Selective Data Encryption and Decryption Method and Apparatus | |
CN107196760B (en) | Sequence encryption method of adjoint random reconstruction key with adjustability | |
Daemen et al. | The first 10 years of advanced encryption | |
WO1998007251A1 (en) | Improved cryptographically secure pseudo-random bit generator for fast and secure encryption | |
US20090092251A1 (en) | Symmetric key cryptographic method and apparatus for information encryption and decryption | |
JP2002185443A (en) | Secret key managing system | |
Bellare et al. | On-line ciphers and the hash-CBC constructions | |
Ojha et al. | Twis–a lightweight block cipher | |
Dodis et al. | Message authentication codes from unpredictable block ciphers | |
Patel et al. | Efficient constructions of variable-input-length block ciphers | |
Dachman-Soled et al. | Upper and lower bounds for continuous non-malleable codes | |
ES2047731T3 (en) | PROCEDURE FOR THE GENERATION OF A RANDOM NUMBER FOR THE CODED TRANSMISSION OF DATA. | |
WO2002001791A1 (en) | The conversion method of unlimited uncycling key stream of clear text, encrypted message extracting mechanism | |
Nurdin et al. | Securing audio chat with cryptool-based twofish algorithm | |
CN105959106A (en) | Low-complexity digital encryption method | |
WO2018229666A1 (en) | Symmetric key stream cipher cryptographic method and device | |
CN109274659A (en) | A kind of on-line/off-line searchable cryptograph method of no certificate | |
Vojvoda | Cryptanalysis of one hash function based on quasigroup |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |