[go: up one dir, main page]

CN115567308A - A Data Encryption Transmission Method Based on Key Expansion - Google Patents

A Data Encryption Transmission Method Based on Key Expansion Download PDF

Info

Publication number
CN115567308A
CN115567308A CN202211211831.4A CN202211211831A CN115567308A CN 115567308 A CN115567308 A CN 115567308A CN 202211211831 A CN202211211831 A CN 202211211831A CN 115567308 A CN115567308 A CN 115567308A
Authority
CN
China
Prior art keywords
key
round
word
expansion
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211211831.4A
Other languages
Chinese (zh)
Other versions
CN115567308B (en
Inventor
顾慎凯
詹新颖
杨小健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Tech University
Original Assignee
Nanjing Tech University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Tech University filed Critical Nanjing Tech University
Priority to CN202211211831.4A priority Critical patent/CN115567308B/en
Publication of CN115567308A publication Critical patent/CN115567308A/en
Application granted granted Critical
Publication of CN115567308B publication Critical patent/CN115567308B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The invention relates to a data encryption transmission method based on key expansion, which comprises the steps of firstly executing a key sequence expansion method according to preset various key expansion methods to sequentially obtain keys of each round of rounds; sequentially cutting the plaintext to be transmitted to obtain independent plaintext blocks with the same length as the initial secret key; then, sequentially applying each round key to encrypt the independent plaintext blocks to obtain each independent ciphertext block, encrypting each round key and related preset information to obtain a key encodedKey information, and sending each encrypted data to a receiver by a sender; finally, the receiver decrypts the plaintext to complete the encrypted transmission of the plaintext to be transmitted from the sender to the receiver; the design adopts a key expansion mode, carries out a multi-stage encryption technology on the plaintext to be transmitted, and combines the encryption operation of the key, thereby not only ensuring the security of the key, but also ensuring the security and the encryption efficiency of the plaintext in the application.

Description

一种基于密钥扩展的数据加密传输方法A Data Encryption Transmission Method Based on Key Expansion

技术领域technical field

本发明涉及一种基于密钥扩展的数据加密传输方法,属于数据加密技术领域。The invention relates to a data encryption transmission method based on key extension, belonging to the technical field of data encryption.

背景技术Background technique

密码学应用十分广泛,已经成为人们日常生活不可或缺的安全技术。比如,人们平常使用的社交聊天工具,其中涉及了大量的个人隐私信息,现有技术为了保证用户个人信息和聊天信息的安全,对保存在本地的聊天记录以及网络传输的信息都进行了加密;现有应用中除了对聊天信息和个人隐私的保护,支付也是常常使用密码学的业务之一。除了上述的两个人们熟悉的工具用到密码学技术,银行业务、电子政务、卫星通信、无线传输等等都涉及密码学技术,因此研究密码学技术十分有必要。Cryptography is widely used and has become an indispensable security technology in people's daily life. For example, the social chat tools that people usually use involve a large amount of personal privacy information. In order to ensure the security of users' personal information and chat information, the existing technology encrypts the chat records stored locally and the information transmitted over the network; In addition to the protection of chat information and personal privacy in existing applications, payment is also one of the businesses that often use cryptography. In addition to the above two familiar tools that use cryptography, banking, e-government, satellite communications, wireless transmission, etc. all involve cryptography, so it is necessary to study cryptography.

对称加密(也称为私钥加密)算法,该算法因为在加密和解密过程中使用的是相同的密钥而得名,也就是我们通常所说的传统(分组)加密算法。由于算法加解密过程需要相同的密钥,因此要想使用该算法进行通信,就要求通信双方(发送者和接收者)需要在进行安全通信之前,先进行协商得到一个只有双方知道的共享密钥用于加解密。对称算法的安全性主要取决于密钥的保密性,一旦通信过程中使用的密钥被第三方获取,就意味着第三方可以使用获取的对称密钥对发送和接收的密文消息进行解密,因此密钥的保密性是对称加密通信的关键。Symmetric encryption (also known as private key encryption) algorithm, which is named after the same key is used in the encryption and decryption process, which is what we usually call the traditional (block) encryption algorithm. Since the encryption and decryption process of the algorithm requires the same key, in order to use this algorithm for communication, both parties (sender and receiver) need to negotiate to obtain a shared key that only both parties know before conducting secure communication. Used for encryption and decryption. The security of the symmetric algorithm mainly depends on the confidentiality of the key. Once the key used in the communication process is obtained by a third party, it means that the third party can use the obtained symmetric key to decrypt the sent and received ciphertext messages. Therefore, the secrecy of the key is the key to symmetric encrypted communication.

RSA算法是一种常用的对信息加密的方法,是互联网通信加密的基础,使用RSA算法可以生成公钥和私钥。私钥被服务器所保留,而公钥则是被客户端所保留。同时,私钥可以解密出公钥所加密的内容,私钥加密的信息也只能被公钥解出。因此,只要保证私钥不遭到泄露,双方的通信安全就会得到保证。The RSA algorithm is a commonly used method for encrypting information and is the basis of Internet communication encryption. The public key and private key can be generated using the RSA algorithm. The private key is kept by the server, and the public key is kept by the client. At the same time, the private key can decrypt the content encrypted by the public key, and the information encrypted by the private key can only be decrypted by the public key. Therefore, as long as the private key is not leaked, the communication security between the two parties will be guaranteed.

发明内容Contents of the invention

本发明所要解决的技术问题是提供一种基于密钥扩展的数据加密传输方法,采用全新设计逻辑,应用密钥扩展与多级加密技术,能够有效提高数据传输的安全性。The technical problem to be solved by the present invention is to provide a data encryption transmission method based on key expansion, which adopts a new design logic, applies key expansion and multi-level encryption technology, and can effectively improve the security of data transmission.

本发明为了解决上述技术问题采用以下技术方案:本发明设计了一种基于密钥扩展的数据加密传输方法,用于实现发送者向接收者关于待传输明文的加密传输,包括如下步骤:In order to solve the above-mentioned technical problems, the present invention adopts the following technical solutions: the present invention designs a data encryption transmission method based on key expansion, which is used to realize the encryption transmission of the plaintext to be transmitted from the sender to the receiver, including the following steps:

步骤A.基于预设长度初始密钥所对应预设个数、等长度的各字组成的种子密钥,由种子密钥作为第一轮轮密钥,按照由预设各类密钥扩展方法以预设排序组成预设轮数的密钥顺序扩展方法,依次执行密钥扩展处理,顺序获得各轮与初始密钥长度相同的轮密钥,然后进入步骤B;Step A. Based on the seed key composed of the preset number of words corresponding to the preset length initial key, and each word of equal length, the seed key is used as the first round of round keys, according to the preset various key expansion methods The key sequence expansion method with the preset number of rounds is composed of a preset sort, and the key expansion process is performed sequentially, and the round keys with the same length as the initial key are obtained in sequence, and then enter step B;

步骤B.针对待传输明文依次分割,获得各个与初始密钥长度相等的各个独立明文块,其中若最后一个独立明文块长度不足时,则补0满足长度;然后进入步骤C;Step B. Segment the plaintext to be transmitted sequentially to obtain each independent plaintext block equal to the length of the initial key, wherein if the length of the last independent plaintext block is insufficient, then fill in 0 to satisfy the length; then enter step C;

步骤C.由发送者分别针对各个独立明文块,针对独立明文块,顺序应用各轮轮密钥进行加密处理,获得对应独立密文块,进而获得各个独立密文块,然后进入步骤D;Step C. For each independent plaintext block, the sender sequentially applies each round key to perform encryption processing on each independent plaintext block, obtains corresponding independent ciphertext blocks, and then obtains each independent ciphertext block, and then enters step D;

步骤D.由发送者应用接收者的公钥针对各轮轮密钥、以及步骤A至步骤B中所涉及预设各信息进行加密,获得加密后的密钥encodedKey信息,并由发送者将各个独立密文块、以及密钥encodedKey信息发送至接收者,然后进入步骤E;Step D. The sender uses the recipient's public key to encrypt each round key and the preset information involved in steps A to B to obtain the encrypted key encodedKey information, and the sender encrypts each The independent ciphertext block and the key encodedKey information are sent to the receiver, and then enter step E;

步骤E.接收者应用其私钥针对来自发送者的密钥encodedKey信息进行解密,获得其中各轮轮密钥、以及步骤A至步骤B中所涉及预设各信息,并按步骤B的逆操作,针对来自发送者的各个独立密文块进行解密,获得各个独立明文块,即完成发送者向接收者关于待传输明文的加密传输。Step E. The recipient uses its private key to decrypt the encodedKey information from the sender, obtains the round keys and the preset information involved in steps A to B, and performs the reverse operation of step B , to decrypt each independent ciphertext block from the sender to obtain each independent plaintext block, that is, to complete the encrypted transmission of the plaintext to be transmitted from the sender to the receiver.

作为本发明的一种优选技术方案:所述步骤A中,基于128位初始密钥所对应4个分别为32位的各字组成的种子密钥,由种子密钥作为第一轮密钥,按照由预设各类密钥扩展方法以预设排序组成预设轮数的密钥顺序扩展方法,依次针对除最后一轮以外所获各轮轮密钥中的4个字、按对应轮中密钥扩展方法进行密钥扩展更新,获得下一轮轮密钥中的4个字,构成下一轮轮密钥,顺序获得各轮128位的轮密钥。As a preferred technical solution of the present invention: in the step A, based on the 128-bit initial key corresponding to the 4 seed keys that are respectively 32-bit words, the seed key is used as the first-round key, According to the key sequence expansion method of the preset number of rounds formed by the preset various key expansion methods and the preset sorting, for the 4 characters in the round keys obtained in each round except the last round, according to the corresponding round The key expansion method performs key expansion and update, obtains 4 words in the next round key to form the next round key, and sequentially obtains the 128-bit round key of each round.

作为本发明的一种优选技术方案:所述各类密钥扩展方法包括密钥扩展方法R1与密钥扩展方法R2,其中,密钥扩展方法R1如下:As a preferred technical solution of the present invention: the various key expansion methods include a key expansion method R1 and a key expansion method R2, wherein the key expansion method R1 is as follows:

针对轮密钥中第4个字按预设函数变换T进行处理,并针对该处理结果与轮密钥中第1个字进行异或处理,获得轮密钥中第1个字对应密钥扩展更新后的结果;The fourth word in the round key is processed according to the preset function transformation T, and the processing result is XORed with the first word in the round key to obtain the key extension corresponding to the first word in the round key updated results;

针对轮密钥中第2个字与轮密钥中第1个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第2个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the expanded and updated result of the key corresponding to the second word in the round key and the first word in the round key to obtain the expanded and updated result of the key corresponding to the second word in the round key;

针对轮密钥中第3个字与轮密钥中第2个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第3个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the result after the key expansion and update corresponding to the third word in the round key and the second word in the round key to obtain the result after the key expansion and update corresponding to the third word in the round key;

针对轮密钥中第4个字与轮密钥中第3个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第4个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the expanded and updated result of the key corresponding to the fourth word in the round key and the third word in the round key to obtain the expanded and updated result of the key corresponding to the fourth word in the round key;

进而由轮密钥中第1个字、第2个字、第3个字、第4个字分别对应的密钥扩展更新后结果,构成下一轮轮密钥中的4个字,获得下一轮轮密钥;Then, the four words in the next round key are formed by the key expansion and update results corresponding to the first word, the second word, the third word, and the fourth word in the round key, and the following round key;

密钥扩展方法R2如下:The key expansion method R2 is as follows:

针对轮密钥中第1个字按预设函数变换T进行处理,并针对该处理结果与轮密钥中第4个字进行异或处理,获得轮密钥中第4个字对应密钥扩展更新后的结果;The first word in the round key is processed according to the preset function transformation T, and the processing result is XORed with the fourth word in the round key to obtain the corresponding key extension of the fourth word in the round key updated results;

针对轮密钥中第3个字与轮密钥中第4个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第3个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the result after the key expansion and update corresponding to the third word in the round key and the fourth word in the round key to obtain the result after the key expansion and update corresponding to the third word in the round key;

针对轮密钥中第2个字与轮密钥中第3个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第2个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the expanded and updated result of the key corresponding to the second word in the round key and the third word in the round key to obtain the expanded and updated result of the key corresponding to the second word in the round key;

针对轮密钥中第1个字与轮密钥中第2个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第1个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the expanded and updated result of the key corresponding to the first word in the round key and the second word in the round key to obtain the expanded and updated result of the key corresponding to the first word in the round key;

进而由轮密钥中第1个字、第2个字、第3个字、第4个字分别对应的密钥扩展更新后结果,构成下一轮轮密钥中的4个字,获得下一轮轮密钥。Then, the four words in the next round key are formed by the key expansion and update results corresponding to the first word, the second word, the third word, and the fourth word in the round key, and the following Round key.

作为本发明的一种优选技术方案:所述预设函数变换T依次包括第一行移位、第一字节代换和第一轮常量异或三种操作,其中,第一行移位表示将1个字中的4个字节循环向左或向右的单一方向移动1个字节位置;第一字节代换表示分别针对1个字中的4个字节,以1个字节的高4位作为行值、低4位作为列值,由预设二维矩阵S盒取出对应元素进行输出,进而获得各字节分别对应的输出;第一轮常量异或表示对应第一字节代换处理的结果同轮常量异或。As a preferred technical solution of the present invention: the preset function transformation T sequentially includes three operations of the first row shift, the first byte substitution and the first round of constant XOR, wherein the first row shift represents Move 4 bytes in 1 word circularly to the left or right by 1 byte position; the first byte substitution means that for 4 bytes in 1 word, use 1 byte The upper 4 bits are used as the row value, and the lower 4 bits are used as the column value, and the corresponding elements are taken out from the preset two-dimensional matrix S box for output, and then the output corresponding to each byte is obtained; the first round of constant XOR indicates that it corresponds to the first word The result of section substitution processing is XORed with the round constant.

作为本发明的一种优选技术方案:基于第二轮轮密钥至最后一轮轮密钥分别一一对应预设各轮函数,以及第二轮轮密钥至倒数第二轮轮密钥分别所对应轮函数中包括顺序执行的第二字节代换、第二行移位、列混合、以及应用对应轮密钥执行密钥轮加,最后一轮轮密钥所对应轮函数中包括顺序执行的第二字节代换、第二行移位、以及应用对应轮密钥执行密钥轮加;所述步骤C中,由发送者分别针对各个独立明文块,首先针对独立明文块所对应以字节为单位的状态矩阵,应用第一轮轮密钥进行密钥轮加处理,然后针对该处理结果依次经第二轮轮密钥至最后一轮轮密钥分别所对应轮函数进行处理,获得对应独立密文块;As a preferred technical solution of the present invention: each round function is preset in a one-to-one correspondence based on the second round key to the last round key, and the second round key to the penultimate round key are respectively The corresponding round function includes the second byte substitution performed sequentially, the second row shift, column mixing, and the application of the corresponding round key to perform key round addition. The round function corresponding to the last round key includes the sequence Perform the second byte substitution, the second line shift, and the application of the corresponding round key to perform key round addition; in the step C, the sender targets each independent plaintext block, and firstly targets the corresponding independent plaintext block The state matrix in units of bytes, the first round key is used for key round addition processing, and then the processing results are processed by the corresponding round functions from the second round key to the last round key respectively , to obtain the corresponding independent ciphertext block;

其中,第二字节代换表示分别针对状态矩阵中的各个字节,以字节的高4位作为行值、低4位作为列值,由预设二维矩阵S盒取出对应元素进行输出,进而获得各字节分别对应的输出,更新状态矩阵;第二行移位表示针对状态矩阵中各行分别向左或向右的单一方向移动对应行数字节,更新状态矩阵;列混合表示状态矩阵与预设固定矩阵进行相乘处理,获得混淆后的状态矩阵;应用对应轮密钥执行密钥轮加表示应用对应轮密钥针对状态矩阵执行密钥轮加处理。Among them, the second byte substitution means that for each byte in the state matrix, the upper 4 bits of the byte are used as the row value and the lower 4 bits are used as the column value, and the corresponding elements are extracted from the preset two-dimensional matrix S box for output , and then obtain the output corresponding to each byte, and update the state matrix; the second row shift means that each row in the state matrix is shifted to the left or right in a single direction to move the corresponding row number bytes, and the state matrix is updated; the column mix represents the state matrix Performing multiplication processing with the preset fixed matrix to obtain the obfuscated state matrix; applying the corresponding round key to perform key round addition means applying the corresponding round key to perform key round addition processing on the state matrix.

作为本发明的一种优选技术方案:所述接收者的公钥与私钥按如下操作获得;As a preferred technical solution of the present invention: the recipient's public key and private key are obtained as follows;

接收者首先随意选择两个互不相等的质数p和q,根据N=p*q,获得N;The receiver first randomly selects two prime numbers p and q that are not equal to each other, and obtains N according to N=p*q;

再根据L=lcm(p-1,q-1),计算获得L,其中,lcm(X,Y)表示X与Y的最小公倍数;Then calculate L according to L=lcm(p-1,q-1), where lcm(X,Y) represents the least common multiple of X and Y;

接着根据1<E<L、以及gcd(E,L)=1,计算获得E,gcd(X,Y)来表示X与Y的最大公约数;Then according to 1<E<L, and gcd(E,L)=1, calculate E, gcd(X,Y) to represent the greatest common divisor of X and Y;

然后根据1<D<L、E*DmodL=1,计算获得D,即获得接收者的公钥(N,E)、以及接收者的私钥(N,D)。Then according to 1<D<L, E*DmodL=1, calculate and obtain D, that is, obtain the recipient's public key (N, E) and the recipient's private key (N, D).

本发明所述一种基于密钥扩展的数据加密传输方法,采用以上技术方案与现有技术相比,具有以下技术效果:A data encryption transmission method based on key expansion according to the present invention, compared with the prior art by adopting the above technical scheme, has the following technical effects:

本发明所设计一种基于密钥扩展的数据加密传输方法,首先以种子密钥作为第一轮轮密钥,按预设各类密钥扩展方法执行密钥顺序扩展方法,顺序获得各轮与初始密钥长度相同的轮密钥;接着针对待传输明文依次分割,获得各个与初始密钥长度相等的各个独立明文块;然后分别针对独立明文块,顺序应用各轮轮密钥进行加密处理,获得各个独立密文块,并针对各轮轮密钥、以及所涉及预设各信息进行加密获得密钥encodedKey信息,并由发送者将各加密数据发送至接收者;最后由接收者进行解密,完成发送者向接收者关于待传输明文的加密传输;设计通过密钥扩展方式,针对待传输明文进行多级加密技术,并结合对密钥的加密操作,不仅保证了密钥的安全,同时应用中能够保证明文的安全性和加密的效率。The present invention designs a data encryption transmission method based on key expansion. First, the seed key is used as the first round key, and the key sequence expansion method is executed according to various preset key expansion methods, and each round and key are sequentially obtained. A round key with the same length as the initial key; then divide the plaintext to be transmitted sequentially to obtain each independent plaintext block equal to the length of the initial key; then apply each round key sequentially to the independent plaintext blocks for encryption processing, Obtain each independent ciphertext block, and encrypt each round key and the preset information involved to obtain the key encodedKey information, and send each encrypted data to the receiver by the sender; finally, the receiver decrypts it, Complete the encrypted transmission of the plaintext to be transmitted from the sender to the receiver; design multi-level encryption technology for the plaintext to be transmitted through the key expansion method, combined with the encryption operation of the key, not only to ensure the security of the key, but also to apply It can guarantee the security of plaintext and the efficiency of encryption.

附图说明Description of drawings

图1是本发明设计基于密钥扩展的数据加密传输方法的流程图;Fig. 1 is the flow chart of the present invention's design based on the data encryption transmission method of key expansion;

图2是本发明所涉及密钥扩展方法R1的框架示意图;Fig. 2 is a schematic diagram of the framework of the key expansion method R1 involved in the present invention;

图3是本发明所涉及密钥扩展方法R2的框架示意图;Fig. 3 is a schematic diagram of the framework of the key expansion method R2 involved in the present invention;

图4是本发明所设计步骤C中分别针对各独立明文块的加密处理流程示意图。Fig. 4 is a schematic diagram of the encryption processing flow for each independent plaintext block in step C designed by the present invention.

具体实施方式detailed description

下面结合说明书附图对本发明的具体实施方式作进一步详细的说明。The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

本发明设计了一种基于密钥扩展的数据加密传输方法,用于实现发送者向接收者关于待传输明文的加密传输,实际应用当中,按图1所示,具体执行如下步骤A至步骤E。The present invention designs a data encryption transmission method based on key expansion, which is used to realize the encrypted transmission of the plaintext to be transmitted from the sender to the receiver. In practical applications, as shown in Figure 1, the following steps A to E are specifically performed. .

步骤A.基于预设长度初始密钥所对应预设个数、等长度的各字组成的种子密钥,由种子密钥作为第一轮轮密钥,按照由预设各类密钥扩展方法以预设排序组成预设轮数的密钥顺序扩展方法,依次执行密钥扩展处理,顺序获得各轮与初始密钥长度相同的轮密钥,然后进入步骤B。Step A. Based on the seed key composed of the preset number of words corresponding to the preset length initial key, and each word of equal length, the seed key is used as the first round of round keys, according to the preset various key expansion methods The key sequence expansion method with the preset number of rounds is composed of a preset sequence, and the key expansion process is performed in sequence, and the round keys with the same length as the initial key are sequentially obtained, and then step B is entered.

实际应用当中,上述步骤A中,基于128位初始密钥所对应4个分别为32位的各字组成的种子密钥,由种子密钥作为第一轮密钥,按照由预设各类密钥扩展方法以预设排序组成预设轮数的密钥顺序扩展方法,依次针对除最后一轮以外所获各轮轮密钥中的4个字、按对应轮中密钥扩展方法进行密钥扩展更新,获得下一轮轮密钥中的4个字,构成下一轮轮密钥,顺序获得各轮128位的轮密钥。In practical applications, in the above step A, based on the seed key composed of 4 words of 32 bits corresponding to the 128-bit initial key, the seed key is used as the first round key, according to the preset various encryption keys. The key expansion method uses a preset sorting method to form a key sequence expansion method with a preset number of rounds, and sequentially targets the four characters in each round key obtained except the last round, according to the key expansion method in the corresponding round. Extend the update to obtain 4 words in the next round of round keys to form the next round of round keys, and obtain the 128-bit round keys of each round in sequence.

其中,各类密钥扩展方法包括密钥扩展方法R1与密钥扩展方法R2,即由R1、R2以预设排序组成预设轮数的密钥顺序扩展方法,诸如{R1、R2、R2、R1…R1、R2},其中,如图2所示,密钥扩展方法R1如下:Among them, various key expansion methods include key expansion method R1 and key expansion method R2, that is, a key sequence expansion method with a preset number of rounds composed of R1 and R2 in a preset order, such as {R1, R2, R2, R1...R1, R2}, where, as shown in Figure 2, the key expansion method R1 is as follows:

针对轮密钥中第4个字按预设函数变换T进行处理,并针对该处理结果与轮密钥中第1个字进行异或处理,获得轮密钥中第1个字对应密钥扩展更新后的结果;The fourth word in the round key is processed according to the preset function transformation T, and the processing result is XORed with the first word in the round key to obtain the key extension corresponding to the first word in the round key updated results;

针对轮密钥中第2个字与轮密钥中第1个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第2个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the expanded and updated result of the key corresponding to the second word in the round key and the first word in the round key to obtain the expanded and updated result of the key corresponding to the second word in the round key;

针对轮密钥中第3个字与轮密钥中第2个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第3个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the result after the key expansion and update corresponding to the third word in the round key and the second word in the round key to obtain the result after the key expansion and update corresponding to the third word in the round key;

针对轮密钥中第4个字与轮密钥中第3个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第4个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the expanded and updated result of the key corresponding to the fourth word in the round key and the third word in the round key to obtain the expanded and updated result of the key corresponding to the fourth word in the round key;

进而由轮密钥中第1个字、第2个字、第3个字、第4个字分别对应的密钥扩展更新后结果,构成下一轮轮密钥中的4个字,获得下一轮轮密钥。Then, the four words in the next round key are formed by the key expansion and update results corresponding to the first word, the second word, the third word, and the fourth word in the round key, and the following Round key.

以及如图3所示,密钥扩展方法R2如下:And as shown in Figure 3, the key expansion method R2 is as follows:

针对轮密钥中第1个字按预设函数变换T进行处理,并针对该处理结果与轮密钥中第4个字进行异或处理,获得轮密钥中第4个字对应密钥扩展更新后的结果;The first word in the round key is processed according to the preset function transformation T, and the processing result is XORed with the fourth word in the round key to obtain the corresponding key extension of the fourth word in the round key updated results;

针对轮密钥中第3个字与轮密钥中第4个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第3个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the result after the key expansion and update corresponding to the third word in the round key and the fourth word in the round key to obtain the result after the key expansion and update corresponding to the third word in the round key;

针对轮密钥中第2个字与轮密钥中第3个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第2个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the expanded and updated result of the key corresponding to the second word in the round key and the third word in the round key to obtain the expanded and updated result of the key corresponding to the second word in the round key;

针对轮密钥中第1个字与轮密钥中第2个字所对应密钥扩展更新后结果进行异或处理,获得轮密钥中第1个字对应密钥扩展更新后的结果;Exclusive OR processing is performed on the expanded and updated result of the key corresponding to the first word in the round key and the second word in the round key to obtain the expanded and updated result of the key corresponding to the first word in the round key;

进而由轮密钥中第1个字、第2个字、第3个字、第4个字分别对应的密钥扩展更新后结果,构成下一轮轮密钥中的4个字,获得下一轮轮密钥。Then, the four words in the next round key are formed by the key expansion and update results corresponding to the first word, the second word, the third word, and the fourth word in the round key, and the following Round key.

这里预设函数变换T依次包括第一行移位、第一字节代换和第一轮常量异或三种操作,其中,第一行移位表示将1个字中的4个字节循环向左或向右的单一方向移动1个字节位置;第一字节代换表示分别针对1个字中的4个字节,以1个字节的高4位作为行值、低4位作为列值,由预设二维矩阵S盒取出对应元素进行输出,进而获得各字节分别对应的输出;第一轮常量异或表示对应第一字节代换处理的结果同轮常量异或。Here, the preset function transformation T sequentially includes three operations: the first row shift, the first byte substitution, and the first round of constant XOR, where the first row shift means to cycle 4 bytes in a word Move 1 byte position in a single direction to the left or right; the first byte substitution means that for 4 bytes in 1 word, the high 4 bits of 1 byte are used as the row value, and the low 4 bits As a column value, the corresponding element is taken out from the preset two-dimensional matrix S box for output, and then the output corresponding to each byte is obtained; the first round of constant XOR means that the result of the corresponding first byte substitution processing is the same round of constant XOR .

步骤B.针对待传输明文依次分割,获得各个与初始密钥长度相等的各个独立明文块,其中若最后一个独立明文块长度不足时,则补0满足长度;然后进入步骤C。Step B. Segment the plaintext to be transmitted sequentially to obtain independent plaintext blocks equal to the length of the initial key. If the length of the last independent plaintext block is insufficient, fill in 0s to satisfy the length; then enter step C.

步骤C.由发送者分别针对各个独立明文块,针对独立明文块,顺序应用各轮轮密钥进行加密处理,获得对应独立密文块,进而获得各个独立密文块,然后进入步骤D。Step C. For each independent plaintext block, the sender sequentially applies each round key for encryption processing to obtain the corresponding independent ciphertext block, and then obtains each independent ciphertext block, and then enters step D.

实际应用当中,如图4所示,基于第二轮轮密钥至最后一轮轮密钥分别一一对应预设各轮函数,以及第二轮轮密钥至倒数第二轮轮密钥分别所对应轮函数中包括顺序执行的第二字节代换、第二行移位、列混合、以及应用对应轮密钥执行密钥轮加,最后一轮轮密钥所对应轮函数中包括顺序执行的第二字节代换、第二行移位、以及应用对应轮密钥执行密钥轮加;所述步骤C中,由发送者分别针对各个独立明文块,首先针对独立明文块所对应以字节为单位的状态矩阵,应用第一轮轮密钥进行密钥轮加处理,然后针对该处理结果依次经第二轮轮密钥至最后一轮轮密钥分别所对应轮函数进行处理,获得对应独立密文块。In practical applications, as shown in FIG. 4 , the preset round functions are one-to-one based on the second round key to the last round key, and the second round key to the penultimate round key are respectively The corresponding round function includes the second byte substitution performed sequentially, the second row shift, column mixing, and the application of the corresponding round key to perform key round addition. The round function corresponding to the last round key includes the sequence Perform the second byte substitution, the second line shift, and the application of the corresponding round key to perform key round addition; in the step C, the sender targets each independent plaintext block, and firstly targets the corresponding independent plaintext block The state matrix in units of bytes, the first round key is used for key round addition processing, and then the processing results are processed by the corresponding round functions from the second round key to the last round key respectively , to obtain the corresponding independent ciphertext block.

其中,第二字节代换表示分别针对状态矩阵中的各个字节,以字节的高4位作为行值、低4位作为列值,由预设二维矩阵S盒取出对应元素进行输出,进而获得各字节分别对应的输出,更新状态矩阵;第二行移位表示针对状态矩阵中各行分别向左或向右的单一方向移动对应行数字节,更新状态矩阵;列混合表示状态矩阵与预设固定矩阵进行相乘处理,获得混淆后的状态矩阵;应用对应轮密钥执行密钥轮加表示应用对应轮密钥针对状态矩阵执行密钥轮加处理。Among them, the second byte substitution means that for each byte in the state matrix, the upper 4 bits of the byte are used as the row value and the lower 4 bits are used as the column value, and the corresponding elements are extracted from the preset two-dimensional matrix S box for output , and then obtain the output corresponding to each byte, and update the state matrix; the second row shift means that each row in the state matrix is shifted to the left or right in a single direction to move the corresponding row number bytes, and the state matrix is updated; the column mix represents the state matrix Performing multiplication processing with the preset fixed matrix to obtain the obfuscated state matrix; applying the corresponding round key to perform key round addition means applying the corresponding round key to perform key round addition processing on the state matrix.

应用中,接收者的公钥与私钥按如下操作获得。In the application, the recipient's public key and private key are obtained as follows.

接收者首先随意选择两个互不相等的质数p和q,根据N=p*q,获得N;The receiver first randomly selects two prime numbers p and q that are not equal to each other, and obtains N according to N=p*q;

再根据L=lcm(p-1,q-1),计算获得L,其中,lcm(X,Y)表示X与Y的最小公倍数;Then calculate L according to L=lcm(p-1,q-1), where lcm(X,Y) represents the least common multiple of X and Y;

接着根据1<E<L、以及gcd(E,L)=1,计算获得E,gcd(X,Y)来表示X与Y的最大公约数;Then according to 1<E<L, and gcd(E,L)=1, calculate E, gcd(X,Y) to represent the greatest common divisor of X and Y;

然后根据1<D<L、E*DmodL=1,计算获得D,即获得接收者的公钥(N,E)、以及接收者的私钥(N,D)。Then according to 1<D<L, E*DmodL=1, calculate and obtain D, that is, obtain the recipient's public key (N, E) and the recipient's private key (N, D).

步骤D.由发送者应用接收者的公钥针对各轮轮密钥、以及步骤A至步骤B中所涉及预设各信息进行加密,获得加密后的密钥encodedKey信息,并由发送者将各个独立密文块、以及密钥encodedKey信息发送至接收者,然后进入步骤E。Step D. The sender uses the recipient's public key to encrypt each round key and the preset information involved in steps A to B to obtain the encrypted key encodedKey information, and the sender encrypts each The independent ciphertext block and the key encodedKey information are sent to the receiver, and then step E is entered.

步骤E.接收者应用其私钥针对来自发送者的密钥encodedKey信息进行解密,获得其中各轮轮密钥、以及步骤A至步骤B中所涉及预设各信息,并按步骤B的逆操作,针对来自发送者的各个独立密文块进行解密,获得各个独立明文块,即完成发送者向接收者关于待传输明文的加密传输。Step E. The recipient uses its private key to decrypt the encodedKey information from the sender, obtains the round keys and the preset information involved in steps A to B, and performs the reverse operation of step B , to decrypt each independent ciphertext block from the sender to obtain each independent plaintext block, that is, to complete the encrypted transmission of the plaintext to be transmitted from the sender to the receiver.

上述所设计一种基于密钥扩展的数据加密传输方法,首先以种子密钥作为第一轮轮密钥,按预设各类密钥扩展方法执行密钥顺序扩展方法,顺序获得各轮与初始密钥长度相同的轮密钥;接着针对待传输明文依次分割,获得各个与初始密钥长度相等的各个独立明文块;然后分别针对独立明文块,顺序应用各轮轮密钥进行加密处理,获得各个独立密文块,并针对各轮轮密钥、以及所涉及预设各信息进行加密获得密钥encodedKey信息,并由发送者将各加密数据发送至接收者;最后由接收者进行解密,完成发送者向接收者关于待传输明文的加密传输;设计通过密钥扩展方式,针对待传输明文进行多级加密技术,并结合对密钥的加密操作,不仅保证了密钥的安全,同时应用中能够保证明文的安全性和加密的效率。A data encryption transmission method based on key expansion is designed above. First, the seed key is used as the first round key, and the key sequence expansion method is executed according to various preset key expansion methods, and each round and the initial key are sequentially obtained. The round key with the same key length; then divide the plaintext to be transmitted sequentially to obtain each independent plaintext block with the same length as the initial key; then apply each round key to the independent plaintext block for encryption in order to obtain Each independent ciphertext block is encrypted for each round key and the preset information involved to obtain the key encodedKey information, and the sender sends each encrypted data to the receiver; finally, the receiver decrypts and completes The sender encrypts the plaintext to be transmitted to the receiver; the design adopts the key expansion method to carry out multi-level encryption technology for the plaintext to be transmitted, combined with the encryption operation of the key, not only ensures the security of the key, but also It can guarantee the security of plaintext and the efficiency of encryption.

上面结合附图对本发明的实施方式作了详细说明,但是本发明并不限于上述实施方式,在本领域普通技术人员所具备的知识范围内,还可以在不脱离本发明宗旨的前提下做出各种变化。The embodiments of the present invention have been described in detail above in conjunction with the accompanying drawings, but the present invention is not limited to the above embodiments, and can also be made without departing from the gist of the present invention within the scope of knowledge possessed by those of ordinary skill in the art. Variations.

Claims (6)

1. A data encryption transmission method based on key expansion is used for realizing encryption transmission of plaintext to be transmitted from a sender to a receiver, and is characterized by comprising the following steps:
a, based on a seed key composed of words with the preset number and the same length corresponding to an initial key with the preset length, taking the seed key as a first round key, sequentially executing key expansion processing according to a key sequence expansion method with preset rounds composed of preset sequences by various preset key expansion methods, sequentially obtaining round keys with the same length as the initial key in each round, and then entering the step B;
b, sequentially cutting the plaintext to be transmitted to obtain independent plaintext blocks with the length equal to that of the initial secret key, wherein if the length of the last independent plaintext block is insufficient, 0 is supplemented to meet the length; then entering step C;
step C, the sender applies each round of secret keys to each independent plaintext block and each independent plaintext block in sequence to carry out encryption processing to obtain corresponding independent ciphertext blocks, and then each independent ciphertext block is obtained, and then the step D is carried out;
d, encrypting each round key and preset information in the steps A to B by using a public key of a receiver by a sender to obtain encrypted key encodedKey information, sending each independent ciphertext block and the key encodedKey information to the receiver by the sender, and then entering the step E;
and E, the receiver decrypts the key encodedKey information from the sender by using the private key of the receiver to obtain the round keys and the preset information in the steps A to B, decrypts each independent ciphertext block from the sender according to the inverse operation of the step B to obtain each independent plaintext block, and namely, the sender completes the encrypted transmission of the plaintext to the receiver about to be transmitted.
2. The data encryption transmission method based on the key expansion as claimed in claim 1, characterized in that: in the step a, based on a seed key composed of 4 words of 32 bits respectively corresponding to a 128-bit initial key, the seed key is used as a first round key, and according to a key sequence expansion method of a preset round number composed of preset sequences of preset various key expansion methods, key expansion updating is performed on 4 words of keys of each round except for the last round in sequence according to a key expansion method in a corresponding round, so as to obtain 4 words of keys of a next round, thereby forming a key of the next round, and sequentially obtaining a round key of 128 bits of each round.
3. The data encryption transmission method based on the key expansion as claimed in claim 1 or 2, characterized in that: the various key expansion methods comprise a key expansion method R1 and a key expansion method R2, wherein the key expansion method R1 is as follows: processing the 4 th word in the round key according to a preset function transformation T, and performing exclusive OR processing on the processing result and the 1 st word in the round key to obtain a result of the round key after the key corresponding to the 1 st word is expanded and updated;
performing XOR processing on the result of the expanded and updated key corresponding to the 2 nd word in the round key and the 1 st word in the round key to obtain the result of the expanded and updated key corresponding to the 2 nd word in the round key;
performing XOR processing on the result of the expanded and updated key corresponding to the 3 rd word in the round key and the 2 nd word in the round key to obtain the result of the expanded and updated key corresponding to the 3 rd word in the round key;
performing XOR processing on the result of the key expansion update corresponding to the 4 th word in the round key and the 3 rd word in the round key to obtain the result of the key expansion update corresponding to the 4 th word in the round key;
then expanding and updating results of keys corresponding to the 1 st word, the 2 nd word, the 3 rd word and the 4 th word in the round keys to form 4 words in the next round keys, and obtaining the next round keys;
the key expansion method R2 is as follows:
processing the 1 st word in the round key according to a preset function transformation T, and performing XOR processing on the processing result and the 4 th word in the round key to obtain a result of the round key after the 4 th word corresponds to the key expansion update;
performing XOR processing on the result of the expansion and update of the key corresponding to the 3 rd word in the round key and the 4 th word in the round key to obtain the result of the expansion and update of the key corresponding to the 3 rd word in the round key;
performing XOR processing on the result of the expanded and updated keys corresponding to the 2 nd word and the 3 rd word in the round key to obtain the result of the expanded and updated keys corresponding to the 2 nd word in the round key;
performing XOR processing on the result of the key expansion update corresponding to the 1 st word in the round key and the 2 nd word in the round key to obtain the result of the key expansion update corresponding to the 1 st word in the round key;
and then expanding and updating the corresponding keys of the 1 st word, the 2 nd word, the 3 rd word and the 4 th word in the round key to form 4 words in the next round key, and obtaining the next round key.
4. The data encryption transmission method based on the key expansion as claimed in claim 3, characterized in that: the preset function transformation T sequentially comprises three operations of first line shifting, first byte substitution and first round constant XOR, wherein the first line shifting represents that 4 bytes in 1 word are circularly moved to a single direction of left or right by 1 byte position; the first byte substitution represents that aiming at 4 bytes in 1 word, the high 4 bits of 1 byte are used as row values and the low 4 bits are used as column values, corresponding elements are taken out by a preset two-dimensional matrix S box to be output, and then output corresponding to each byte is obtained; the first round of constant xor indicates that the result of the corresponding first byte substitution process is xor-ed with the round constant.
5. The data encryption transmission method based on the key expansion as claimed in claim 1, characterized in that: the method comprises the steps that round functions are preset on the basis of the first round key, the last round key and the corresponding round keys one by one, the round functions corresponding to the first round key and the last round key respectively comprise sequentially executed first byte substitution, first row displacement, column mixing and corresponding round key application execution key round addition, and the round functions corresponding to the last round key comprise sequentially executed first byte substitution, first row displacement and corresponding round key application execution key round addition; in the step C, the sender applies the first round key to perform key round addition processing on the state matrix which corresponds to each independent plaintext block and takes the byte as a unit, and then sequentially processes the processing result through the second round key to the last round key to obtain the corresponding independent ciphertext block;
the second byte substitution represents that aiming at each byte in the state matrix, the high 4 bits of the byte are used as row values and the low 4 bits of the byte are used as column values, corresponding elements are taken out by a preset two-dimensional matrix S box to be output, and then output corresponding to each byte is obtained, and the state matrix is updated; the second row shifting represents that the corresponding row number bytes are respectively shifted in the single direction of left or right aiming at each row in the state matrix, and the state matrix is updated; multiplying the column mixed representation state matrix by a preset fixed matrix to obtain a confused state matrix; and the key round addition executed by applying the corresponding round key represents that the key round addition processing is executed by applying the corresponding round key aiming at the state matrix.
6. The data encryption transmission method based on the key expansion as claimed in claim 1, characterized in that: the public key and the private key of the receiver are obtained as follows;
the receiver firstly randomly selects two mutually unequal prime numbers p and q, and obtains N according to N = p × q;
obtaining L through calculation according to L = lcm (p-1, q-1), wherein lcm (X, Y) represents the least common multiple of X and Y;
then E, gcd (X, Y) is calculated according to 1 Once E < -L and gcd (E, L) =1 to express the greatest common divisor of X and Y; then, according to 1-D-T and E-Dmod L =1, D is obtained through calculation, namely, the public key (N, E) of the receiver and the private key (N, D) of the receiver are obtained.
CN202211211831.4A 2022-09-30 2022-09-30 A data encryption transmission method based on key expansion Active CN115567308B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211211831.4A CN115567308B (en) 2022-09-30 2022-09-30 A data encryption transmission method based on key expansion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211211831.4A CN115567308B (en) 2022-09-30 2022-09-30 A data encryption transmission method based on key expansion

Publications (2)

Publication Number Publication Date
CN115567308A true CN115567308A (en) 2023-01-03
CN115567308B CN115567308B (en) 2025-07-22

Family

ID=84744314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211211831.4A Active CN115567308B (en) 2022-09-30 2022-09-30 A data encryption transmission method based on key expansion

Country Status (1)

Country Link
CN (1) CN115567308B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116186742A (en) * 2023-04-24 2023-05-30 东方空间技术(山东)有限公司 Method, device and equipment for encrypting and storing arrow-mounted data
CN116361840A (en) * 2023-06-02 2023-06-30 深圳市力博实业有限公司 Bank self-service equipment data security management system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051443A (en) * 2012-12-20 2013-04-17 山东华芯半导体有限公司 AES (Advanced Encryption Standard) key expansion method
CN105490802A (en) * 2015-11-27 2016-04-13 桂林电子科技大学 Improved SM4 Parallel Encryption and Decryption Communication Method Based on GPU
US20160373249A1 (en) * 2014-09-23 2016-12-22 Shenzhen Huiding Technology Co., Ltd. Encryption method and encryption device
CN114257402A (en) * 2021-11-12 2022-03-29 中国南方电网有限责任公司 Encryption algorithm determination method and device, computer equipment and storage medium
CN116684061A (en) * 2023-06-06 2023-09-01 北京工业大学 A private picture encryption method and device based on an improved AES algorithm based on key expansion

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051443A (en) * 2012-12-20 2013-04-17 山东华芯半导体有限公司 AES (Advanced Encryption Standard) key expansion method
US20160373249A1 (en) * 2014-09-23 2016-12-22 Shenzhen Huiding Technology Co., Ltd. Encryption method and encryption device
CN105490802A (en) * 2015-11-27 2016-04-13 桂林电子科技大学 Improved SM4 Parallel Encryption and Decryption Communication Method Based on GPU
CN114257402A (en) * 2021-11-12 2022-03-29 中国南方电网有限责任公司 Encryption algorithm determination method and device, computer equipment and storage medium
CN116684061A (en) * 2023-06-06 2023-09-01 北京工业大学 A private picture encryption method and device based on an improved AES algorithm based on key expansion

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《CSDN》: "AES 加密算法的原理详解", pages 1 - 13, Retrieved from the Internet <URL:https://blog.csdn.net/gulang03/article/details/81175854> *
刘艳萍, 李秋慧: "AES算法的研究与其密钥扩展算法改进", 现代电子技术, vol. 39, no. 10, 15 May 2016 (2016-05-15), pages 1 - 5 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116186742A (en) * 2023-04-24 2023-05-30 东方空间技术(山东)有限公司 Method, device and equipment for encrypting and storing arrow-mounted data
CN116361840A (en) * 2023-06-02 2023-06-30 深圳市力博实业有限公司 Bank self-service equipment data security management system
CN116361840B (en) * 2023-06-02 2023-08-04 深圳市力博实业有限公司 Bank self-service equipment data security management system

Also Published As

Publication number Publication date
CN115567308B (en) 2025-07-22

Similar Documents

Publication Publication Date Title
Mitali et al. A survey on various cryptography techniques
EP1834438B1 (en) Cryptography related to keys
CN109861809B (en) Practical grouping random encryption and decryption method
US20040096056A1 (en) Method of encryption using multi-key process to create a variable-length key
JP2008513811A (en) Calculation conversion method and system
Agrawal et al. Elliptic curve cryptography with hill cipher generation for secure text cryptosystem
KR101187854B1 (en) Permutation Data Transformation to Enhance Security
US12388623B2 (en) Method for processing encrypted data
CN115567308B (en) A data encryption transmission method based on key expansion
Joshy et al. Text to image encryption technique using RGB substitution and AES
Djordjevic Conventional cryptography fundamentals
CN107147626B (en) Encrypted file transmission method combining AES algorithm and ElGamal algorithm
Ochani et al. DNA image encryption using modified symmetric key (MSK)
CN107317669A (en) Noiseless full homomorphism public key encryption method based on binary Representation theorem ring
Habib et al. A hybrid cryptosystem based on latin square and the modified BB84 quantum key distribution
CN106973061B (en) An Outgoing File Encryption Method Based on AES Based on Reversible Logic Circuit
JPH10340048A (en) Hash value generating method, data ciphering method, data deciphering method, hash value generating device data ciphering device, and data deciphering device
US11502818B2 (en) System to secure encoding and mapping on elliptic curve cryptography (ECC)
Kadry et al. An improvement of RC4 cipher using vigenère cipher
CN108768923A (en) A kind of real-time encrypted method of chat of the Encryption Algorithm based on Quantum Reversible Logic circuit
Mani et al. Modified DES using different keystreams based on primitive pythagorean triples
CN114553397A (en) Encryption optimization method and device for SM4 block cipher algorithm
Datta et al. The CRYPSTER: a private key crypto system
JPH09149025A (en) Cipher communication method and cipher communication system
Atan Number theoretical foundations in cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant