Encrypted communication method, encrypted/decrypted communication device, encryption device and decryption device

A technology for encrypting communication and communication devices, which is applied to encryption devices with shift registers/memory, public keys for secure communications, user identity/authority verification, etc., and can solve problems such as leaking encryption algorithms and security cannot be guaranteed

Inactive Publication Date: 2011-03-30
BEIJING DUOSI TECH DEV
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the person or organization that designs the encryption algorithm knows the encryption algorithm, and the person or organization that manages or produces products related to the encryption algorithm can also know the encryption algorithm, so there is still the possibility that the person or organization that knows the encryption algorithm leaks the encryption algorithm
Therefore, under the current cryptosystem, security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted communication method, encrypted/decrypted communication device, encryption device and decryption device
  • Encrypted communication method, encrypted/decrypted communication device, encryption device and decryption device
  • Encrypted communication method, encrypted/decrypted communication device, encryption device and decryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0107] Taking the encrypted communication process in which terminal A sends data to terminal B and terminal B receives data from terminal A as an example, the method of using reconfigurable logic circuits to realize encrypted communication is described below.

[0108] In the first embodiment, a reconfigurable logic circuit A is set in the terminal A, and a reconfigurable logic circuit B is set in the terminal B, and the reconfigurable logic circuit A and the reconfigurable logic circuit B have the same configuration. In the first embodiment, the process of implementing encrypted communication between terminal A and terminal B is as follows: Figure 5 shown, including the following steps.

[0109] Step ST501: A key is determined between terminal A and terminal B, and the determined key includes an encryption key and a decryption key.

[0110] In the actual encrypted communication process, as keys, fixed encryption keys and decryption keys can be used. In order to improve the ...

Embodiment 2

[0134] In the second embodiment, a reconfigurable logic circuit A is set in the terminal A, and a reconfigurable logic circuit B is set in the terminal B, the reconfigurable logic circuit A and the reconfigurable logic circuit B have the same configuration, and in Terminal A is provided with a configuration file storage unit A for storing configuration files, and terminal B is provided with a configuration file storage unit B for storing configuration files.

[0135] There may be multiple ways to store configuration files in the configuration file storage unit, examples are as follows.

[0136] Storage method 1: Since the encryption algorithm and the decryption algorithm are in one-to-one correspondence in the cryptographic algorithm, the encryption configuration file and the decryption configuration file are also in one-to-one correspondence. Therefore, a different identifier is set for each cryptographic algorithm, and the cryptographic algorithm identifier, the encrypted co...

Embodiment 3

[0172] In the third embodiment, the difference from the second embodiment lies in step ST702.

[0173] In the third embodiment, if it is necessary to determine the cryptographic algorithm identifier used to represent the cryptographic algorithm between the terminal A and the terminal B in the above step ST702, then by Figure 10 The steps shown are determined: terminal A generates the first parameter Ra, sends the first parameter Ra to terminal B, and receives the second parameter Rb from terminal B; terminal B generates the second parameter Rb, and sends the second parameter to terminal A Rb, receiving the first parameter Ra from terminal A; terminal A determines the cryptographic algorithm identifier according to the first parameter Ra and the second parameter Rb in a prescribed manner; terminal B also determines the encryption algorithm identifier according to the first parameter Ra and the set The second parameter Rb determines the cryptographic algorithm identifier in a p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encrypted communication method, an encrypted/decrypted communication device, an encryption device and a decryption device which can enhance the security of encrypted communication. In the encrypted communication method, a first device is provided with a first reconfigurable logic circuit, a second device is provided with a second reconfigurable logic circuit, the first reconfigurable logic circuit and the second reconfigurable logic circuit have the same structure, and an encryption configuration file and a decryption configuration file for realizing a cryptographic algorithm are determined between the first device and the second device; the first device controls the first reconfigurable logic circuit according to the encryption configuration file to constitute an encryption logic circuit, encrypts data by utilizing the encryption key and the encryption logic circuit, and transmits the encrypted data to the second device; and the second device receives the encrypted data from the first device, controls the second reconfigurable logic circuit according to the decryption configuration file to constitute the decryption logic circuit, and decrypts the decryption data by using a decryption key and the decryption logic circuit.

Description

technical field [0001] The invention relates to an encryption communication method capable of dynamically changing an encryption algorithm, an encryption and decryption communication device, an encryption device and a decryption device. Background technique [0002] A cryptographic algorithm is a series of formulas, rules or programs that convert plaintext (ciphertext) into ciphertext (plaintext). From a mathematical point of view, a cryptographic algorithm is a transformation from plaintext (ciphertext) to ciphertext (plaintext). And this transformation is reversible. The key can be regarded as a variable parameter in the cryptographic algorithm, changing the key also changes the functional relationship between the plaintext and the ciphertext. [0003] In cryptographic algorithms, the basic process of data encryption and decryption is as follows: figure 1 shown. The encryption process is: the plaintext P obtains the ciphertext C through the transformation E containing t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/30H04L9/32
Inventor 刘大力曹春春
Owner BEIJING DUOSI TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products