[go: up one dir, main page]

CN113852462B - A method and system for creating a symmetric key that does not require distribution or management - Google Patents

A method and system for creating a symmetric key that does not require distribution or management Download PDF

Info

Publication number
CN113852462B
CN113852462B CN202111132710.6A CN202111132710A CN113852462B CN 113852462 B CN113852462 B CN 113852462B CN 202111132710 A CN202111132710 A CN 202111132710A CN 113852462 B CN113852462 B CN 113852462B
Authority
CN
China
Prior art keywords
key
receiver
sender
time
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111132710.6A
Other languages
Chinese (zh)
Other versions
CN113852462A (en
Inventor
王健庭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202111132710.6A priority Critical patent/CN113852462B/en
Publication of CN113852462A publication Critical patent/CN113852462A/en
Application granted granted Critical
Publication of CN113852462B publication Critical patent/CN113852462B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the field of passwords and provides a method and a system for creating a symmetric key which does not need to be distributed or managed. The creation method comprises the following steps: a programming tool is selected to develop a 'space-time key real-time generator', which is arranged in a memory of a sender device to provide each receiver with a generation scheme for entering a setting module thereof by a login password to set an encryption key by itself, and the setting right of a symmetric key generation scheme is given to each receiver. The key real-time generator includes n time independent variable functions, n geographical position independent variable functions, various functional expressions and rules thereof, and can automatically generate new keys corresponding to the cipher algorithm in the sender key system at any time and any place to provide real-time calling when encrypting plaintext, and besides, the key real-time generator cannot be used, especially, the key value is strictly forbidden to be checked and transmitted, and the called keys and the encrypted plaintext must be in one-to-one correspondence with the person receiving the ciphertext, thus strictly forbidden to misplacement operation. The decryption key of the receiver is calculated by the receiver according to the key generation scheme set in the real-time key generator setting module of the sender, so that the sender does not need to re-distribute the key to the receiver, as long as the receiver remembers the key generation scheme set by the receiver at the sender.

Description

一种无需分发也不需要管理的对称密钥的创建方法及系统A method and system for creating a symmetric key that does not require distribution or management

技术领域Technical Field

本发明涉及密码学技术领域,具体而言,涉及对称密码体制中关于对称密钥生成和使用的新方法和新方式,是一种无需分发也不需要管理的对称密钥的创建方法及系统。The present invention relates to the technical field of cryptography, and in particular to a new method and new manner for generating and using symmetric keys in a symmetric cryptographic system, which is a method and system for creating symmetric keys that do not require distribution or management.

背景技术Background Art

现行对称密码体制中密码算法的密钥是由加密方或密钥管理中心的密钥生成系统生成的(为便于叙述,本文中的加密方和密钥管理中心统称为发送方,解密方即接收方),生成的密钥不管来自何方,接收方都是不知道的,发送方都必须要通过某种信息渠道传输给接收方,也就是说发送方每一次发送密文给接收方时,都必须要再另外发送一次此密文的对应密钥给接收方,否则接收方无法对收到的密文进行解密。现行对称密码体制中加密和解密及传输流程见图1。In the current symmetric cryptographic system, the key of the cryptographic algorithm is generated by the key generation system of the encryptor or the key management center (for the sake of ease of description, the encryptor and the key management center in this article are collectively referred to as the sender, and the decryptor is the receiver). No matter where the generated key comes from, the receiver does not know it. The sender must transmit it to the receiver through some information channel. That is to say, every time the sender sends a ciphertext to the receiver, it must send the corresponding key of the ciphertext to the receiver again, otherwise the receiver cannot decrypt the received ciphertext. The encryption, decryption and transmission process in the current symmetric cryptographic system is shown in Figure 1.

现实情况下,对称密钥比非对称密钥计算量小很多很多,故加密速度和效率高远超非对称密钥,非常适合加密数据量大的信息。In reality, symmetric keys require much less computation than asymmetric keys, so their encryption speed and efficiency are far superior to asymmetric keys, making them very suitable for encrypting large amounts of information.

但是现行对称密钥存在二个非常严重的缺陷:However, the current symmetric key has two very serious flaws:

第一,密钥的传输问题:对称密钥是单钥密码系统,加密和解密使用同一个密钥,所以发送方必须要把加密的密钥传输给接收方,否则接收方无法对收到的密文进行解密;对称密钥又称为秘密密钥,是因为它的的安全性不仅取决于加密算法本身的强度,更依赖于密钥的安全程度,每一次密钥传输都会存在被窃取篡改泄露的安全隐患,所以密钥是否能被安全传输至接收方,是现行对称密钥面临的首要问题;First, the key transmission problem: the symmetric key is a single-key cryptographic system, and the same key is used for encryption and decryption. Therefore, the sender must transmit the encrypted key to the receiver, otherwise the receiver cannot decrypt the received ciphertext. The symmetric key is also called a secret key because its security depends not only on the strength of the encryption algorithm itself, but also on the security of the key. Every key transmission will have the security risk of being stolen, tampered with or leaked. Therefore, whether the key can be safely transmitted to the receiver is the primary problem facing the current symmetric key.

第二,密钥的管理问题:我们在加密用户的信息时,决不允许将所有用户的信息都用同一个密钥进行加密,否则,密钥一旦泄漏,就相当于泄露了所有用户的信息,所以必须为每一个用户单独生成一个密钥,并且每一对用户的每一次都必须重新分发新的密钥,如此就会产生巨大的密钥数量,所以现行的对称密钥必须要进行管理,并且要管理好,否则,不断生成的对称密钥就会出问题,密钥间不仅不能一一对应,更会混乱,所以目前在现行对称密钥的管理上需要花费巨大代价的管理资源是必然的。Second, the key management issue: When we encrypt user information, we are never allowed to encrypt all users' information with the same key. Otherwise, once the key is leaked, it is equivalent to leaking the information of all users. Therefore, a key must be generated for each user separately, and new keys must be redistributed to each pair of users each time. This will generate a huge number of keys, so the current symmetric keys must be managed and managed well. Otherwise, the continuously generated symmetric keys will have problems. Not only will the keys not correspond one to one, but they will also be chaotic. Therefore, it is inevitable that huge management resources are required to manage the current symmetric keys.

密钥是密码体制中保证密文安全的关键元素,每一次加密之所以必须要采用新的密钥,是因为在密码体制中密码算法是有限的,重复使用是不可避免的,同时密码算法的商业化必然要求其公开化,因而密文的保密性必然要依赖于密钥的保密性,密钥就成了密文安全保证的必要之珠。The key is the key element to ensure the security of ciphertext in the cryptographic system. The reason why a new key must be used for each encryption is that the cryptographic algorithms in the cryptographic system are limited and reuse is inevitable. At the same time, the commercialization of cryptographic algorithms inevitably requires them to be made public. Therefore, the confidentiality of ciphertext must rely on the confidentiality of the key. The key has become an essential element to ensure the security of ciphertext.

发明内容Summary of the invention

为解决现行对称密钥存在的二大问题,本发明提供了一种无需分发也不需要管理的对称密钥的创建方法及系统,其目的在于弥补现行对称密钥存在的二个严重缺陷,通过改变现行对称密钥的生成来源、生成方案及生成的方式方法,我们就不但能彻底取消对称密钥的传输,还可以免除对密钥的管理。In order to solve the two major problems existing in the current symmetric keys, the present invention provides a method and system for creating symmetric keys that do not require distribution or management. Its purpose is to make up for the two serious defects of the current symmetric keys. By changing the generation source, generation scheme and generation method of the current symmetric keys, we can not only completely cancel the transmission of symmetric keys, but also exempt the management of keys.

选择一种编程工具开发一个“时空密钥实时生成器”,安置于发送方装置的存储器中,以提供给每一个接收方凭登录口令进入其设置模块自行设置加密密钥的生成方案,将对称密钥生成方案的设置权交给每一个接收方。密钥实时生成器的主要设置项目包含n个时间自变量函数和n个地理位置自变量函数在内的各种函数表达式及其规则,它在发送方密钥系统中能随时随地自动生成与所用密码算法相对应的新密钥,以提供加密明文时实时调用。发送方对每一个明文进行加密所使用的密钥都是由各个接收方按各自设置的时空密钥生成器自动实时生成的;接收方解密密文所使用的密钥都是由自己按照在发送方密钥实时生成器设置模块中所设置的密钥生成方案计算出来的;实时生成的加密密钥和计算出来的解密密钥是一一对应的,因此发送方和接收方之间不需要传输密钥,也不需要管理生成的密钥,只要接收方记住自己在发送方所设置的密钥生成方案即可。从图2的逻辑关系中,我们也可以明显看出,本发明的“时空密钥生成器设置模块”尽管安置于发送方,但密钥的生成方案是由发送方提供给接收方设置的,因此接收方可以按照自己所设置的方案算出解密的密钥。Select a programming tool to develop a "time-space key real-time generator" and place it in the memory of the sender's device to provide each receiver with a login password to enter its setting module to set the encryption key generation plan by themselves, and give each receiver the right to set the symmetric key generation plan. The main setting items of the real-time key generator include various function expressions and rules including n time independent variable functions and n geographical location independent variable functions. It can automatically generate new keys corresponding to the cryptographic algorithm used at any time and anywhere in the sender's key system to provide real-time calls when encrypting plaintext. The keys used by the sender to encrypt each plaintext are automatically generated in real time by each receiver according to the time-space key generator set by each receiver; the keys used by the receiver to decrypt the ciphertext are calculated by themselves according to the key generation plan set in the sender's real-time key generator setting module; the encryption key generated in real time and the calculated decryption key are one-to-one corresponding, so there is no need to transmit keys between the sender and the receiver, nor is there any need to manage the generated keys, as long as the receiver remembers the key generation plan set by himself on the sender. From the logical relationship of Figure 2, we can also clearly see that although the "space-time key generator setting module" of the present invention is placed on the sender, the key generation scheme is provided by the sender to the receiver, so the receiver can calculate the decryption key according to the scheme set by itself.

为区别于现行对称密钥生成器,本发明的“密钥实时生成器”生成的密钥与时间和空间有关,故在此文中暂时称谓“时空密钥生成器”。To distinguish it from the existing symmetric key generator, the key generated by the "real-time key generator" of the present invention is related to time and space, so it is temporarily called "space-time key generator" in this article.

进一步,发送方对每一个明文进行加密所使用的密钥都是由各个接收方各自提供的数据产生的,包括来自接收方的各种字符串;接收方解密密文所使用的密钥都是自己可以得到的,发送方和接收方之间不需要传输密钥。Furthermore, the keys used by the sender to encrypt each plaintext are generated from the data provided by each receiver, including various character strings from the receiver; the keys used by the receiver to decrypt the ciphertext are all available to him or her, and there is no need to transmit keys between the sender and receiver.

建立在本发明创建方法的基础上所创建的系统能够运行一种无需分发也不需要管理的对称密钥的创建方法,实现一种无需分发也不需要管理的对称密钥的系统。The system created based on the creation method of the present invention can run a creation method of a symmetric key that does not require distribution or management, thereby realizing a symmetric key system that does not require distribution or management.

本发明通过如下技术方案实现:The present invention is achieved through the following technical solutions:

在方法方面,本申请提供一种无需分发也不需要管理的对称密钥的创建方法,其步骤包括:In terms of method, the present application provides a method for creating a symmetric key that does not require distribution or management, and the steps include:

步骤1、选择一种编程工具开发一个“时空密钥实时生成器”,如图3,安置于发送方装置的存储器中,以随时提供发送方装置的处理器调用;并对接收方凭登录口令开放时空密钥实时生成器的设置模块,见图2。Step 1, select a programming tool to develop a "real-time space-time key generator", as shown in Figure 3, and place it in the memory of the sender's device to provide the processor of the sender's device with a call at any time; and open the setting module of the real-time space-time key generator to the recipient with a login password, as shown in Figure 2.

其设置项目包括①密钥表达式、②取位规则、③密钥字符串转换规则。密钥表达式提供给接收方设置包含时间和地理位置自变量函数在内的各种函数公式,在其中可以设置n个时间自变量函数、n个地理位置自变量函数和n个各种函数,它们组合在一起就可以随时随地自动生成密钥字符串的初始值,这个初始值有可能是个无理数,这显然不能用作密钥,接下来就得交给取位规则制定具体方案来完成;取位规则就是制定密钥字符串长度标准的规则,它由n种对策方案将密钥表达式所生成的密钥字符串初始值转变成接收方既定的密钥字符串;密钥字符串转换规则是将经过取位规则后的密钥字符串转换成与所用密码算法相对应的密钥的规则。The setting items include ① key expression, ② position selection rule, and ③ key string conversion rule. The key expression provides the receiver with various function formulas including time and geographic location independent variable functions, in which n time independent variable functions, n geographic location independent variable functions and n various functions can be set. When combined together, they can automatically generate the initial value of the key string at any time and anywhere. This initial value may be an irrational number, which obviously cannot be used as a key. Next, the position selection rule must be handed over to formulate a specific plan to complete it; the position selection rule is the rule for formulating the standard length of the key string. It uses n countermeasures to convert the initial value of the key string generated by the key expression into the key string determined by the receiver; the key string conversion rule is the rule for converting the key string after the position selection rule into the key corresponding to the cryptographic algorithm used.

其中所述“密钥表达式”和“取位规则”这二个项目其下的子项目及其具体的设置方式方法和案例可详细参见专利CN201510991027.6说明书。The sub-items under the two items "key expression" and "position selection rule" and their specific setting methods and cases can be found in detail in the patent specification CN201510991027.6.

由“密钥表达式”和“取位规则”协同执行所设方案而生成的密钥字符串是文本字符型的,而密码函数的加密函数EK(M)=C和解密函数DK(C)=M的密钥K是数字型的,并且各个密码算法相对应的密钥还有长度和进制的区别,所以由“密钥表达式”和“取位规则”协同生成的密钥字符串还不能直接提供给密码算法使用,它们之间必须经过相应格式转换才能提供给密码算法进行加密和解密,实现其所要达到的功能。“密钥字符串转换规则”的作用是将由“密钥表达式”和“取位规则”协同生成的密钥字符串转换成与所用密码算法相对应的密钥。The key string generated by the "key expression" and "bit selection rule" in the scheme is in text character type, while the key K of the encryption function EK(M)=C and the decryption function DK(C)=M of the cryptographic function is in digital type, and the keys corresponding to each cryptographic algorithm also have differences in length and base. Therefore, the key string generated by the "key expression" and "bit selection rule" cannot be directly provided to the cryptographic algorithm for use. They must be converted to the corresponding format before they can be provided to the cryptographic algorithm for encryption and decryption to achieve their desired functions. The role of the "key string conversion rule" is to convert the key string generated by the "key expression" and "bit selection rule" into the key corresponding to the cryptographic algorithm used.

“密钥字符串转换规则”的设置项目包括:The setting items of "Key string conversion rule" include:

①密钥长度(字节数),包括:32位(4字节)、64位(8字节)、128位(16字节)、192位(24字节)、256位(32字节)......① Key length (bytes), including: 32 bits (4 bytes), 64 bits (8 bytes), 128 bits (16 bytes), 192 bits (24 bytes), 256 bits (32 bytes)......

②进制,包括:2进制、4进制、8进制、10进制、16进制、32进制......② Base, including: binary, quaternary, octal, decimal, hexadecimal, 32-base...

③编码(字符集),包括:UTF-8(unicode)、GB2312、GBK、、GB18030、UTF-16_LE......③ Encoding (character set), including: UTF-8 (unicode), GB2312, GBK, GB18030, UTF-16_LE......

首先讨论编码的问题,“密钥表达式”和“取位规则”协同生成的密钥字符串是文本字符型的,其中会有各种文字和符号,肯定不能直接转成数字型进行运算,所以只有通过字符编码将生成的密钥字符串转换成计算机可以执行的字节序列才能实现数学运算,只有使生成的密钥字符串具备计算能力才有资格提供给密码算法使用。字符编码在这里的作用就是将没有计算能力的密钥字符串转变成有计算能力的字节序列,使其够格成为密码算法的密钥。需要注意的是字符编码有很多,采用不同的编码转换成的密钥长度和数值完全不一样,所以用什么样的编码转换成加密密钥的,就必须用什么样的编码转换过来解密,不能错乱,否则无法解密。First, let's discuss the issue of encoding. The key string generated by the "key expression" and the "bit selection rule" is a text character type, which contains various words and symbols. It certainly cannot be directly converted into a digital type for calculation. Therefore, only by converting the generated key string into a byte sequence that can be executed by a computer through character encoding can mathematical operations be realized. Only when the generated key string has computing power can it be qualified to be provided to the cryptographic algorithm. The role of character encoding here is to convert the key string without computing power into a byte sequence with computing power, so that it is qualified to become the key of the cryptographic algorithm. It should be noted that there are many character encodings, and the key lengths and values converted by different encodings are completely different. Therefore, what kind of encoding is used to convert the encryption key must be converted to the same encoding for decryption. It cannot be confused, otherwise it cannot be decrypted.

接着讨论密钥长度和进制问题,密钥长度和进制是密码算法所要求的,不同的密码算法其相对应的密钥长度和进制是不同的,密钥字符串在转换时必须要准确对应上所用密码算法的密钥长度和进制,无论是转换成各种基本的易位、代替、字典、加减或混合密码算法的密钥还是各类分组、序列密码算法的密钥,都必须要准确对应上其密钥的长度和进制。Next, we discuss the key length and base. The key length and base are required by the cryptographic algorithm. Different cryptographic algorithms have different corresponding key lengths and bases. When converting the key string, it must accurately correspond to the key length and base of the cryptographic algorithm used. Whether it is converted into the keys of various basic transposition, substitution, dictionary, addition and subtraction or mixed cryptographic algorithms or the keys of various group and sequence cryptographic algorithms, they must accurately correspond to the key length and base.

完成格式转换的密钥就可以协同加密算法对明文进行加密,并且反过来对密文进行解密。The key that has completed the format conversion can cooperate with the encryption algorithm to encrypt the plaintext and decrypt the ciphertext conversely.

另外,本发明希望严禁转发密文或无条件立即销毁转发的密文,而对发送方直接发送给接收方的密文和同意接收方自己下载的密文,则可以在这个设置模块中事先设置好自动定时销毁或加哈希的时间,把这个设置权交给接收方,可以充分让接收方根据自己的具体情况处理自己的密文,因为当发送方主动发送密文给接收方或同意接收方自己下载密文时,就意味着此密文的所有权已经归属于接收方,所以应该允许接收方对此密文有完全的处理权。有了这个权限,接收方就可以最大限度地积极主动地防范自己的密文被他人窃取和窃取后破解,而接收方自己则可以随时随地重新下载所需要的密文。In addition, the present invention hopes to strictly prohibit the forwarding of ciphertext or unconditionally destroy the forwarded ciphertext immediately, while for the ciphertext directly sent by the sender to the receiver and the ciphertext agreed to be downloaded by the receiver, the time for automatic timing destruction or hashing can be set in advance in this setting module, and this setting right is given to the receiver, so that the receiver can fully handle his own ciphertext according to his own specific situation, because when the sender actively sends the ciphertext to the receiver or agrees that the receiver downloads the ciphertext himself, it means that the ownership of this ciphertext has been attributed to the receiver, so the receiver should be allowed to have full processing rights for this ciphertext. With this authority, the receiver can actively prevent his own ciphertext from being stolen and cracked by others to the greatest extent, and the receiver can re-download the required ciphertext anytime and anywhere.

步骤2、每一个接收方凭登录口令进入发送方的时空密钥生成器设置模块,对加密密钥的生成方案进行设置。Step 2: Each receiver enters the sender's space-time key generator setting module with the login password and sets the encryption key generation scheme.

步骤3、各个接收方分别在自己的设置项目中完成自己的密钥生成方案;为了提高“时空密钥实时生成器”的安全性,对接收方在发送方密钥生成器设置模块中自行设置完成的密钥生成方案应尽可能在技术允许的情况下采取高级别的加密方案保存,否则难以控制包括发送方在内的用户偷窥数据库而外传内部数据的风险。Step 3. Each receiver completes its own key generation scheme in its own setting project. In order to improve the security of the "Real-time Space-Time Key Generator", the key generation scheme that the receiver has set up in the sender's key generator setting module should be saved with a high-level encryption scheme as far as technically possible. Otherwise, it will be difficult to control the risk of users, including the sender, snooping into the database and transmitting internal data.

对于生成密钥不会变的说明:接收方在设置密钥生成方案时,如只使用了常数和文本字符,未将时间自变量函数和地理位置自变量函数设置进去,或使用现有的固定字符串,如登录口令、别名、手机号、身份证号和其它信息标识字符串等作为密钥,这些有意无意的操作都会出现不会变的密钥,但在加密和解密过程中具有包括:发送方或接收方对每一个明文进行加密所使用的密钥都是来自接收方的数据,或接收方解密密文所使用的密钥都是接收方能够自己得到的,或发送方和接收方之间不需要传输密钥的特征。Explanation on the unchanged generated key: When the recipient sets up the key generation scheme, if only constants and text characters are used, and the time and geographic location independent variable functions are not set, or existing fixed strings are used, such as login passwords, aliases, mobile phone numbers, ID numbers, and other information identification strings as keys, these intentional or unintentional operations will result in unchanged keys, but the encryption and decryption process has the following characteristics: the keys used by the sender or receiver to encrypt each plaintext are all from the receiver's data, or the keys used by the receiver to decrypt the ciphertext are all available to the receiver himself, or there is no need to transmit keys between the sender and receiver.

步骤4、接收方所设置的“密钥表达式”和“取位规则”协同运行,在发送方随时随地自动实时生成最新的密钥字符串。Step 4: The "key expression" and "bit selection rule" set by the receiver work together to automatically generate the latest key string in real time at the sender anytime and anywhere.

步骤5、生成最新的密钥字符串通过接收方所设置的“密钥字符串转换规则”直接自动转换成所用加密算法相对应的密钥,如发送方用AES加密算法,则最新实时生成的密钥字符串就自动转换成AES密码算法相对应的密钥(密钥长度支持128位、192位、256位,16进制),如果发送方是用SM4密码算法,就自动转换成SM4密码算法相对应的密钥(密钥长度128位,16进制),至此最新的可提供所用加密算法加密的密钥在发送方自动实时生成,随时等待被发送方或接收方加密明文时实时调用。Step 5. Generate the latest key string and automatically convert it into the key corresponding to the encryption algorithm used through the "key string conversion rule" set by the receiver. For example, if the sender uses the AES encryption algorithm, the latest key string generated in real time will be automatically converted into the key corresponding to the AES encryption algorithm (the key length supports 128 bits, 192 bits, 256 bits, hexadecimal). If the sender uses the SM4 encryption algorithm, it will be automatically converted into the key corresponding to the SM4 encryption algorithm (key length 128 bits, hexadecimal). At this point, the latest key that can be used to encrypt the encryption algorithm is automatically generated in real time by the sender, waiting to be called in real time when the sender or receiver encrypts the plaintext.

步骤6、发送方或接收方随时随地调用实时生成的密钥,必须强调这个密钥只可在加密明文时被实时调用,除此之外不可它用,尤其严禁查看和传输其密钥数值,且所调用的密钥和加密的明文与接收密文的人必须一一对应,严禁错位操作。Step 6. The sender or receiver can call the real-time generated key anytime and anywhere. It must be emphasized that this key can only be called in real time when encrypting plaintext, and cannot be used for other purposes. In particular, it is strictly forbidden to view and transmit the key value. The called key and the encrypted plaintext and the person receiving the ciphertext must correspond one to one, and misplaced operations are strictly prohibited.

步骤7、发送方或接收方把实时调用的密钥提供给所用密码算法,将明文加密成密文。Step 7: The sender or receiver provides the real-time called key to the cryptographic algorithm used to encrypt the plaintext into ciphertext.

步骤8、发送方将加密成功的密文发送至接收方,或接收方将加密成功的密文下载至接收方。Step 8: The sender sends the successfully encrypted ciphertext to the receiver, or the receiver downloads the successfully encrypted ciphertext to the receiver.

至此,本发明在发送方模块上执行的步骤完成,以下步骤是本发明在接收方模块上执行的步骤。So far, the steps of the present invention executed on the sending module are completed, and the following steps are the steps of the present invention executed on the receiving module.

步骤9、接收方收到密文后,根据时间和地点按照自己在发送方所设置的方案计算出密钥字符串。Step 9: After receiving the ciphertext, the receiver calculates the key string according to the time and location according to the scheme set by the sender.

步骤10、接收方在自己装置的“字符串-进制-编码”互转小工具或加密解密小程序中输入计算出的密钥字符串,并选择所用密码算法密钥的进制和编码选项即可。Step 10. The recipient enters the calculated key string into the "string-base-code" conversion tool or encryption/decryption applet on his/her device, and selects the base and code options of the cryptographic algorithm key used.

在大多数加密解密小程序中自带有“字符串-进制-编码”互转功能。Most encryption and decryption programs have a built-in "string-base-code" conversion function.

步骤11、接收方装置的加密解密小程序或“字符串-进制-编码”互转小工具自动将计算出的密钥字符串转换成所用密码算法相对应的密钥。Step 11: The encryption and decryption applet or the "string-binary-code" conversion tool of the receiving device automatically converts the calculated key string into the key corresponding to the cryptographic algorithm used.

步骤12、在接收方装置,将接收方收到的密文输入到加密解密小程序的密文文本输入处,用步骤11转换成功的密钥将所收到的密文解密成明文。Step 12: On the receiving device, input the ciphertext received by the receiving party into the ciphertext text input of the encryption and decryption applet, and use the key successfully converted in step 11 to decrypt the received ciphertext into plaintext.

至此,本发明从步骤1在发送方开发一个“时空密钥实时生成器”起到步骤2接收方在发送方设置加密密钥的生成方案到步骤5最新的可提供所用加密算法加密的密钥在发送方自动实时生成,随时等待被发送方或接收方加密明文时实时调用,然后再到步骤7加密、步骤8传输、步骤12解密,整个过程圆满执行成功。So far, the present invention develops a "real-time space-time key generator" at the sender from step 1 to step 2 that the receiver sets the encryption key generation plan at the sender, to step 5 that the latest key encrypted by the encryption algorithm used is automatically generated in real time at the sender, ready to be called in real time when the sender or receiver encrypts the plaintext, and then goes to step 7 to encrypt, step 8 to transmit, and step 12 to decrypt, and the whole process is successfully executed.

在系统方面,本申请提供一种无需分发也不需要管理的对称密钥的创建系统,其包括:发送方模块和接收方模块见图2In terms of the system, the present application provides a system for creating a symmetric key that does not require distribution or management, which includes: a sender module and a receiver module as shown in FIG2

上述方法方面的步骤1-8是在发送方模块上执行完成的步骤,步骤9-12是在接收方模块上执行的完成的步骤,其中,步骤4和步骤5是都是按接收方在发送方的模块中执行完成的,步骤4的结果是按接收方在发送方所设置的密钥表达式和取位规则的方案来自动实现的,步骤5的结果是按接收方在发送方所设置的密钥字符串转换规则的方案来自动实现的。Steps 1-8 of the above method are steps executed on the sender module, and steps 9-12 are steps executed on the receiver module, wherein steps 4 and 5 are both executed by the receiver in the sender's module, the result of step 4 is automatically achieved according to the key expression and bit selection rules set by the receiver on the sender, and the result of step 5 is automatically achieved according to the key string conversion rules set by the receiver on the sender.

发送方模块中用于加密明文的密钥是由各个接收方按各自设置的时空密钥生成器自动实时生成的,时空密钥实时生成器安置在发送方装置的存储器中,以提供给每一个接收方凭登录口令进入其设置模块自行设置加密密钥的生成方案,本创建系统将对称密钥生成方案的设置权交给每一个接收方;接收方模块中用于解密密文的密钥是由接收方按照自己在发送方所设置的密钥生成方案计算出来的,与发送方实时生成的加密密钥是一一对应的,发送方和接收方之间不再需要传输密钥,也不再需要管理生成的密钥,只要接收方记住自己在发送方所设置的密钥生成方案即可。The key used to encrypt plaintext in the sender module is automatically generated in real time by each receiver according to the space-time key generator set by each receiver. The space-time key real-time generator is placed in the memory of the sender's device to provide each receiver with a login password to enter its setting module and set the encryption key generation scheme by themselves. This creation system gives each receiver the right to set the symmetric key generation scheme; the key used to decrypt the ciphertext in the receiver module is calculated by the receiver according to the key generation scheme set by the receiver at the sender, and corresponds one to one to the encryption key generated by the sender in real time. There is no need to transmit keys or manage the generated keys between the sender and the receiver. The receiver only needs to remember the key generation scheme set by himself at the sender.

在本发明的创建系统中,执行创建方法的步骤包括:用于存储装置指令的至少一个存储器;与上述存储器通讯的至少一个处理器,其中当上述至少一个处理器执行上述装置指令时,上述至少一个处理器使上述系统执行:发送方模块及接收方模块。In the creation system of the present invention, the steps of executing the creation method include: at least one memory for storing device instructions; at least one processor communicating with the above-mentioned memory, wherein when the above-mentioned at least one processor executes the above-mentioned device instructions, the above-mentioned at least one processor causes the above-mentioned system to execute: a sender module and a receiver module.

在本发明的创建系统中,还提供一种装置可读存储介质,其上存储有装置程序,该装置程序被处理器执行时实现如一种无需分发也不需要管理的对称密钥的创建方法中任一项的方法。In the creation system of the present invention, a device-readable storage medium is also provided, on which a device program is stored. When the device program is executed by a processor, a method such as any one of the methods for creating a symmetric key that does not require distribution or management is implemented.

相对于现有技术,本发明至少具备如下有益效果:Compared with the prior art, the present invention has at least the following beneficial effects:

1、弥补了现行对称密钥存在的二个严重缺陷,第一可以彻底取消对称密钥的传输,第二可以免除对对称密钥的管理,如此既省下了密钥的传输成本又节约出了密钥的管理成本。1. It makes up for two serious defects of the current symmetric keys. First, it can completely eliminate the transmission of symmetric keys, and second, it can exempt the management of symmetric keys, thus saving both the transmission cost of the keys and the management cost of the keys.

2、取消了密钥传输,就大大地降低了由密钥传输引发的安全隐患,免除了密钥管理,也就大大地降低了由于管理疏忽和管理漏洞而造成的人为事故。2. Canceling key transmission greatly reduces the security risks caused by key transmission, and eliminating key management greatly reduces man-made accidents caused by management negligence and management loopholes.

3、限制了发送方对加密密钥的权限,严禁了加密时可实时调用之外的任何权限,尤其是取消了对密钥的分发权和管理权,因而降低了密钥从内部外泄的风险,大大提高了安全性。3. It limits the sender's authority over the encryption key, and strictly prohibits any authority other than real-time calls during encryption. In particular, it cancels the right to distribute and manage the key, thereby reducing the risk of key leakage from the inside and greatly improving security.

4、为密文传输添加了一种新的方式方法,即发送方不直接发密文给接收方,而将文件的加密链接发送给接收方,由接收方自己凭登录口令调用实时生成的新密钥加密文件下载,系统严禁下载未加密的文件。这种方式的最大优点就是下载的密文更安全更灵活更方便,首先这种方式实时生成的新密钥变化更多,因为各个接收方登录的时间和地点各不相同,即使某些人密钥生成的方案凑巧设置的完全一样,不同时间不同地点生成的密钥必定五花八门;其次这种方式接收方没有必要保存解密后的明文,因为随时随地可以再次加密下载。4. A new method has been added for ciphertext transmission, that is, the sender does not send the ciphertext directly to the receiver, but sends the encrypted link of the file to the receiver, and the receiver uses the login password to call the new key generated in real time to encrypt the file download. The system strictly prohibits downloading unencrypted files. The biggest advantage of this method is that the downloaded ciphertext is safer, more flexible and more convenient. First of all, the new key generated in real time in this way varies more, because the time and place of login of each receiver are different. Even if some people's key generation schemes happen to be exactly the same, the keys generated at different times and places must be varied; secondly, in this way, the receiver does not need to save the decrypted plaintext, because it can be encrypted and downloaded again anytime and anywhere.

5、由于添加了接收方对密文自动定时销毁或加哈希的时间设置权,以及严禁密文转发或无条件立即销毁转发的密文的功能,所以接收方可以主动积极地最大限度地防范密文被他人窃取和窃取后破解。而接收方自己可以随时随地重新下载所需要的密文,所以本发明不需要接收方保存密文和解密后的明文,这样既可以防窃,又可以免于管理。5. Since the receiver has the right to set the time for automatic scheduled destruction or hashing of the ciphertext, and the function of strictly prohibiting the forwarding of the ciphertext or unconditionally destroying the forwarded ciphertext immediately, the receiver can actively prevent the ciphertext from being stolen and cracked by others. The receiver can re-download the required ciphertext anytime and anywhere, so the present invention does not require the receiver to save the ciphertext and the decrypted plaintext, which can prevent theft and avoid management.

6、本发明的无需分发也不需要管理的对称密钥可以提供给任何对称密码算法加密明文和解密密文,无论是基本的易位、代替、字典、加减和混合密码算法还是按各类明文处理方式的分组密码算法和序列密码算法;无论是现在已经有的还是未来会有的对称密码算法都可以与本发明的时空对称密钥携手为数据信息加密和解密服务。6. The symmetric key of the present invention, which does not need to be distributed or managed, can be provided to any symmetric encryption algorithm to encrypt plaintext and decrypt ciphertext, whether it is the basic transposition, substitution, dictionary, addition and subtraction and hybrid encryption algorithm or the block encryption algorithm and sequence encryption algorithm according to various plaintext processing methods; whether it is an existing or future symmetric encryption algorithm, it can work with the space-time symmetric key of the present invention to encrypt and decrypt data information.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1为现行对称密码体制的加密和解密及传输流程示意图;FIG1 is a schematic diagram of the encryption, decryption and transmission process of the current symmetric cryptographic system;

图2为本发明的时空密钥生成器安置在发送方提供给接收方设置和接收方算出密钥的原理及本发明创建系统的发送方模块和接收方模块的加密和解密及传输流程示意图;FIG2 is a schematic diagram of the encryption and decryption and transmission flow of the sender module and the receiver module of the system for creating the encryption and decryption ...

图3为本发明的时空密钥生成器自动实时生成密钥的流程及所设项目和设置方法步骤示意图;3 is a schematic diagram of the process of automatically generating keys in real time by the spatiotemporal key generator of the present invention and the items and steps of the setting method;

图4为本发明的生成密钥用在高级加密AES密码算法上加密和解密的测试案例示意图;FIG4 is a schematic diagram of a test case of encryption and decryption using a key generated by the present invention on an advanced encryption AES cryptographic algorithm;

图5为本发明的生成密钥用在流密码算法RC4上加密和解密的测试案例示意图;FIG5 is a schematic diagram of a test case of the invention for generating a key for encryption and decryption on the stream cipher algorithm RC4;

图6为本发明的生成密钥用在中国国家密码算法SM4上的加密和解密的测试案例示意图。FIG6 is a schematic diagram of a test case of encryption and decryption using the encryption key generated by the present invention on the Chinese national cryptographic algorithm SM4.

具体实施方式DETAILED DESCRIPTION

为了使本发明的技术手段、创作特征、达成目的与功效易于明白了解,下面结合附图具体实施案例对本发明做进一步阐述。In order to make the technical means, creative features, objectives and effects of the present invention easy to understand, the present invention is further explained below with reference to specific implementation cases in conjunction with the accompanying drawings.

由于密钥表达式和取位规则的详细部分参见于专利CN201510991027.6的说明书,因此为便于阐述,实施案例中生成方案的运算和取位都使用最简单明了的方法。Since the details of the key expression and the position selection rules can be found in the specification of patent CN201510991027.6, for the convenience of explanation, the calculation and position selection of the generation scheme in the implementation case use the simplest and clearest methods.

实施时间:2021年9月18日13时06分Implementation time: 13:06, September 18, 2021

实施地点:上海某地位置:经度,纬度,海拔为“121.388182, 31.259358, 19.6”Implementation location: Somewhere in Shanghai Location: longitude, latitude, altitude are "121.388182, 31.259358, 19.6"

加密和解密所采用的密码算法为最常见的高级加密标准AES(AdvancedEncryption Standard)对称密码算法,分组长度128位(16字节),密钥长度支持128位(16字节)、192位(24字节)、256位(32字节),16进制,本案例选择常见的密钥长度128位(16字节)。The encryption and decryption algorithm used is the most common Advanced Encryption Standard AES (Advanced Encryption Standard) symmetric encryption algorithm, with a block length of 128 bits (16 bytes) and key lengths of 128 bits (16 bytes), 192 bits (24 bytes), and 256 bits (32 bytes) in hexadecimal. In this case, the common key length of 128 bits (16 bytes) is selected.

实施步骤:Implementation steps:

步骤1、 在发送方装置中开发一个“时空密钥实时生成器”,提供接收方自行设置密钥生成方案。Step 1: Develop a "real-time space-time key generator" in the sender's device to provide the receiver with a key generation scheme that can be set up by the receiver.

步骤2、 接收方凭登录口令进入发送方,对加密密钥的生成方案进行设置,其中密钥字符串生成方案策略为:Step 2: The receiver enters the sender with the login password and sets the encryption key generation scheme, where the key string generation scheme strategy is:

方案策略1:取年份后二位+月份+日期+小时+分钟,根据实施时间即为:21年+9月+18日+13时+06分,计算得到:21+9+18+13+06=67;Solution strategy 1: Take the last two digits of the year + month + date + hour + minute. According to the implementation time, it is: 21 years + September + 18 days + 13 hours + 06 minutes. The calculation result is: 21 + 9 + 18 + 13 + 06 = 67;

方案策略2:将运算得到的“67”在左边加上“中文字串+ab”,合并得到:“中文字串+ab67”。Solution Strategy 2: Add "Chinese character string + ab" to the left of the calculated "67" to get: "Chinese character string + ab67".

步骤3、 接收方完成步骤2的设置后,加密保存所设置的方案。Step 3: After the receiver completes the settings in step 2, it encrypts and saves the set plan.

步骤4、 接收方所设置的“密钥表达式”和“取位规则”协同运行,在发送方生成的密钥字符串为:“中文字串+ab67”。Step 4: The "key expression" and "bit selection rule" set by the receiver work together to generate the key string "Chinese character string + ab67" on the sender.

步骤5、 通过接收方所设置的“密钥字符串转换规则”,将步骤4生成的密钥字符串自动转换成AES密码算法相对应的密钥格式。Step 5: The key string generated in step 4 is automatically converted into the key format corresponding to the AES encryption algorithm through the "key string conversion rule" set by the receiver.

本实施案例编码选择通用的万国码Utf8编码,密钥长度选择常见的128位(16字节),当转换长度不足时,以0x00自动填充,超出部分忽略,进制选择16进制,那么,由生成的密钥字符串“中文字串+ab67”即可自动转换成可供可供AES密码算法加密的密钥“e4 b8 ade6 96 87 e5 ad 97 e4 b8 b2 2b 61 62 36 37 ”,此密钥随时等待被发送方或接收方加密明文时实时调用。The encoding of this implementation case selects the universal Unicode Utf8 encoding, and the key length selects the common 128 bits (16 bytes). When the conversion length is insufficient, it is automatically filled with 0x00, and the excess part is ignored. The hexadecimal system is selected. Then, the generated key string "Chinese character string + ab67" can be automatically converted into the key "e4 b8 ade6 96 87 e5 ad 97 e4 b8 b2 2b 61 62 36 37" that can be used for encryption by the AES encryption algorithm. This key is ready to be called in real time when the sender or receiver encrypts the plaintext.

步骤6、 发送方或接收方调用步骤5实时生成的密钥。Step 6: The sender or receiver calls the key generated in real time in step 5.

步骤7、 发送方或接收方将步骤6调用的密钥“e4 b8 ad e6 96 87 e5 ad 97 e4b8 b2 2b 61 62 36 37 ”提供给AES密码算法对明文进行加密;Step 7: The sender or receiver provides the key "e4 b8 ad e6 96 87 e5 ad 97 e4b8 b2 2b 61 62 36 37" called in step 6 to the AES encryption algorithm to encrypt the plaintext;

假设加密明文为:“★一种无需分发的对称密钥的创建方法和系统★”;Assume that the encrypted plaintext is: "★A method and system for creating a symmetric key without distribution★";

则AES加密成的密文为:“J+MJoRn4+pc7HX8FvVkCJLdUzugRF0rsYbjBwnHkDlD84UQvP74wxcDKfgdoKQYN”。The ciphertext encrypted by AES is: “J+MJoRn4+pc7HX8FvVkCJLdUzugRF0rsYbjBwnHkDlD84UQvP74wxcDKfgdoKQYN”.

步骤8、 发送方将此密文发送给接收方,或接收方将此密文下载至接收方。Step 8: The sender sends the ciphertext to the receiver, or the receiver downloads the ciphertext to the receiver.

步骤9、 接收方收到密文后,根据时间和地点按照自己在发送方所设置的方案计算出密钥字符串“中文字串+ab67”。Step 9: After receiving the ciphertext, the receiver calculates the key string "Chinese character string + ab67" according to the time and place and the scheme set by the sender.

步骤10、 接收方在自己装置上用的AES在线加密解密小程序(http://tool.chacuo.net/cryptaes)中输入步骤9计算出的密钥字符串“中文字串+ab67”,并选择Utf8编码。Step 10. The recipient enters the key string "Chinese character string + ab67" calculated in step 9 into the AES online encryption and decryption applet (http://tool.chacuo.net/cryptaes) used on his device, and selects Utf8 encoding.

步骤11、 AES在线加密解密小程序自动将计算出的密钥字符串“中文字串+ab67”转换成“e4 b8 ad e6 96 87 e5 ad 97 e4 b8 b2 2b 61 62 36 37 ”。Step 11. The AES online encryption and decryption applet automatically converts the calculated key string "Chinese character string + ab67" into "e4 b8 ad e6 96 87 e5 ad 97 e4 b8 b2 2b 61 62 36 37".

步骤12、 在接收方装置,将接收方收到的密文输入到AES在线加密解密小程序的密文文本输入处,用步骤11转换成功的密钥“e4 b8 ad e6 96 87 e5 ad 97 e4 b8 b2 2b61 62 36 37 ”将所收到的密文解密成明文。Step 12. On the receiving device, input the ciphertext received by the receiving party into the ciphertext text input of the AES online encryption and decryption applet, and use the key "e4 b8 ad e6 96 87 e5 ad 97 e4 b8 b2 2b61 62 36 37" successfully converted in step 11 to decrypt the received ciphertext into plaintext.

输入解密密文:“J+MJoRn4+pc7HX8FvVkCJLdUzugRF0rsYbjBwnHkDlD84UQvP74wxcDKfgdoKQYN”Enter the decrypted ciphertext: "J+MJoRn4+pc7HX8FvVkCJLdUzugRF0rsYbjBwnHkDlD84UQvP74wxcDKfgdoKQYN"

解密成的明文:“★一种无需分发的对称密钥的创建方法和系统★”Decrypted plaintext: "★A method and system for creating a symmetric key without distribution★"

见图4See Figure 4

实施时间:2021年9月18日14时09分Implementation time: 14:09, September 18, 2021

实施地点:上海某地位置:经度,纬度,海拔为“121.388182, 31.259358, 19.6”Implementation location: Somewhere in Shanghai Location: longitude, latitude, altitude are "121.388182, 31.259358, 19.6"

加密和解密所采用的密码算法为序列对称密码RC4,密钥长度是可变的,可变范围为8-2048位(1-256字节),16进制,本案例选择常见的密钥长度128位(16字节)。The encryption and decryption algorithm used is the serial symmetric cipher RC4. The key length is variable, ranging from 8 to 2048 bits (1 to 256 bytes) in hexadecimal. In this case, the common key length of 128 bits (16 bytes) is selected.

实施步骤:Implementation steps:

步骤1、 在发送方装置中开发一个“时空密钥实时生成器”,提供接收方自行设置密钥生成方案。Step 1: Develop a "real-time space-time key generator" in the sender's device to provide the receiver with a key generation scheme that can be set up by the receiver.

步骤2、 接收方凭登录口令进入发送方,对加密密钥的生成方案进行设置,其中密钥字符串生成方案策略为:Step 2: The receiver enters the sender with the login password and sets the encryption key generation scheme, where the key string generation scheme strategy is:

方案策略1:取地理位置纬度整数*日期+分钟,根据实施时间和实施地点即为:纬度整数31*18日+9分钟,计算得到:31*18+9=567;Solution strategy 1: Take the latitude integer of the geographic location * date + minute. According to the implementation time and location, it is: latitude integer 31*18 days + 9 minutes, and the calculation result is: 31*18+9=567;

方案策略2:将运算得到的“567”在左边加上“rs”,右边加上“+中文字符加密”,合并得到:“rs567+中文字符加密”。Solution Strategy 2: Add "rs" to the left of the calculated "567" and "+Chinese character encryption" to the right to get: "rs567+Chinese character encryption".

步骤3、 接收方完成步骤2的设置后,加密保存所设置的方案。Step 3: After the receiver completes the settings in step 2, it encrypts and saves the set plan.

步骤4、 接收方所设置的“密钥表达式”和“取位规则”协同运行,在发送方生成的密钥字符串为:“rs567+中文字符加密”。Step 4: The "key expression" and "bit selection rule" set by the receiver work together, and the key string generated by the sender is: "rs567+Chinese character encryption".

步骤5、 通过接收方所设置的“密钥字符串转换规则”,将步骤4生成的密钥字符串自动转换成RC4密码算法相对应的密钥格式。Step 5: The key string generated in step 4 is automatically converted into the key format corresponding to the RC4 encryption algorithm through the "key string conversion rule" set by the receiver.

本实施案例编码选择通用的万国码Utf8编码,密钥长度选择常见的128位(16字节),当转换长度不足时,以0x00自动填充,超出部分忽略,进制选择16进制,那么,由生成的密钥字符串“rs567+中文字符加密”即可自动转换成可供RC4密码算法加密的密钥“72 7335 36 37 2B E4 B8 AD E6 96 87 E5 AD 97 E7 AC A6 E5 8A A0 E5 AF 86 ”,此密钥随时等待被发送方或接收方加密明文时实时调用。In this implementation case, the universal Unicode Utf8 encoding is selected for the encoding, and the common 128 bits (16 bytes) are selected for the key length. When the conversion length is insufficient, it is automatically filled with 0x00, and the excess part is ignored. The hexadecimal system is selected. Then, the generated key string "rs567+Chinese character encryption" can be automatically converted into the key "72 7335 36 37 2B E4 B8 AD E6 96 87 E5 AD 97 E7 AC A6 E5 8A A0 E5 AF 86" that can be encrypted by the RC4 encryption algorithm. This key is ready to be called in real time when the sender or receiver encrypts the plaintext.

步骤6、 发送方或接收方调用步骤5实时生成的密钥。Step 6: The sender or receiver calls the key generated in real time in step 5.

步骤7、 发送方或接收方将步骤6调用的密钥“72 73 35 36 37 2B E4 B8 AD E696 87 E5 AD 97 E7 AC A6 E5 8A A0 E5 AF 86 ”提供给RC4密码算法对明文进行加密;Step 7: The sender or receiver provides the key "72 73 35 36 37 2B E4 B8 AD E696 87 E5 AD 97 E7 AC A6 E5 8A A0 E5 AF 86" called in step 6 to the RC4 encryption algorithm to encrypt the plaintext;

假设加密明文为:“无需分发、无需管理的对称密钥”;Assume that the encrypted plaintext is: "Symmetric key that does not need to be distributed or managed";

则RC4加密成的密文为:“qjVLd7nrGFlk1043XYomqSBCZehZ7z1X0ScAlUd4pmtHuXS3gDiK/ze7”The ciphertext encrypted by RC4 is: "qjVLd7nrGFlk1043XYomqSBCZehZ7z1X0ScAlUd4pmtHuXS3gDiK/ze7"

步骤8、 发送方将此密文发送给接收方,或接收方将此密文下载至接收方。Step 8: The sender sends the ciphertext to the receiver, or the receiver downloads the ciphertext to the receiver.

步骤9、 接收方收到密文后,根据时间和地点按照自己在发送方所设置的方案计算出密钥字符串“rs567+中文字符加密”。Step 9. After receiving the ciphertext, the receiver calculates the key string "rs567+Chinese character encryption" according to the time and place and the scheme set by the sender.

步骤10、 接收方在自己装置上用的RC4在线加密解密小程序(http://tool.chacuo.net/cryptrc4)中输入步骤9计算出的密钥字符串“rs567+中文字符加密”,并选择Utf8编码。Step 10. The recipient enters the key string "rs567+Chinese character encryption" calculated in step 9 into the RC4 online encryption and decryption applet (http://tool.chacuo.net/cryptrc4) used on his device, and selects Utf8 encoding.

步骤11、 RC4在线加密解密小程序自动将计算出的密钥字符串“rs567+中文字符加密”转换成“72 73 35 36 37 2B E4 B8 AD E6 96 87 E5 AD 97 E7 AC A6 E5 8A A0 E5AF 86 ”。Step 11. The RC4 online encryption and decryption applet automatically converts the calculated key string "rs567+Chinese character encryption" into "72 73 35 36 37 2B E4 B8 AD E6 96 87 E5 AD 97 E7 AC A6 E5 8A A0 E5AF 86".

步骤12、 在接收方装置,将接收方收到的密文输入到RC4在线加密解密小程序的密文文本输入处,用步骤11转换成功的密钥“72 73 35 36 37 2B E4 B8 AD E6 96 87 E5AD 97 E7 AC A6 E5 8A A0 E5 AF 86 ”将所收到的密文解密成明文。Step 12. On the receiving device, input the ciphertext received by the receiving party into the ciphertext text input of the RC4 online encryption and decryption applet, and use the key "72 73 35 36 37 2B E4 B8 AD E6 96 87 E5AD 97 E7 AC A6 E5 8A A0 E5 AF 86" successfully converted in step 11 to decrypt the received ciphertext into plaintext.

输入解密密文:“qjVLd7nrGFlk1043XYomqSBCZehZ7z1X0ScAlUd4pmtHuXS3gDiK/ze7”Enter the decrypted ciphertext: "qjVLd7nrGFlk1043XYomqSBCZehZ7z1X0ScAlUd4pmtHuXS3gDiK/ze7"

解密成的明文:“无需分发、无需管理的对称密钥”Decrypted plaintext: "Symmetric keys that do not need to be distributed or managed"

见图5See Figure 5

实施时间:2021年9月18日15时32分Implementation time: 15:32, September 18, 2021

实施地点:上海某地位置:经度,纬度,海拔为“121.388182, 31.259358, 19.6”Implementation location: Somewhere in Shanghai Location: longitude, latitude, altitude are "121.388182, 31.259358, 19.6"

加密和解密所采用的密码算法为中国国家密码算法SM4,分组长度128位(16字节),密钥长度128位(16字节),16进制。The cryptographic algorithm used for encryption and decryption is China's national cryptographic algorithm SM4, with a block length of 128 bits (16 bytes), a key length of 128 bits (16 bytes), and hexadecimal.

实施步骤:Implementation steps:

步骤1、 在发送方装置中开发一个“时空密钥实时生成器”,提供接收方自行设置密钥生成方案。Step 1: Develop a "real-time space-time key generator" in the sender's device to provide the receiver with a key generation scheme that can be set up by the receiver.

步骤2、 接收方凭登录口令进入发送方,对加密密钥的生成方案进行设置,其中密钥字符串生成方案策略为:Step 2: The receiver enters the sender with the login password and sets the encryption key generation scheme, where the key string generation scheme strategy is:

方案策略1:取地理位置经度整数*月份-取地理位置海拔四舍五入取整*小时,根据实施时间和实施地点即为:经度整数121*9月份-海拔四舍五入取整20*15小时,计算得到:121*9-20*15=789;Solution strategy 1: Take the integer of the longitude of the geographical location * month - take the rounded-up altitude of the geographical location * hour. According to the implementation time and location, it is: the integer of the longitude 121 * 9 months - the rounded-up altitude 20 * 15 hours. The calculation result is: 121 * 9 - 20 * 15 = 789;

方案策略2:将运算得到的“789”在左边加上“中文字符+abc-”,右边加上“#%”,合并得到:“中文字符+abc-789#%”。Solution Strategy 2: Add "Chinese characters + abc-" on the left side of the calculated "789" and "#%" on the right side to get: "Chinese characters + abc-789#%".

步骤3、 接收方完成步骤2的设置后,加密保存所设置的方案。Step 3: After the receiver completes the settings in step 2, it encrypts and saves the set plan.

步骤4、 接收方所设置的“密钥表达式”和“取位规则”协同运行,在发送方生成的密钥字符串为:“中文字符+abc-789#%”。Step 4: The "key expression" and "position selection rule" set by the receiver work together to generate a key string of "Chinese characters + abc-789#%" on the sender.

步骤5、 通过接收方所设置的“密钥字符串转换规则”,将步骤4生成的密钥字符串自动转换成SM4密码算法相对应的密钥格式。Step 5: The key string generated in step 4 is automatically converted into the key format corresponding to the SM4 cryptographic algorithm through the "key string conversion rule" set by the receiver.

本实施案例编码选择通用的万国码Utf8编码,密钥长度选择128位(16字节),当转换长度不足时,以0x00自动填充,超出部分忽略,进制选择16进制,那么,由生成的密钥字符串“中文字符+abc-789#%”即可自动转换成可供SM4密码算法加密的密钥“e4 b8 ad e6 9687 e5 ad 97 e7 ac a6 2b 61 62 63 2d 37 38 39 23 25 ”,此密钥随时等待被发送方或接收方加密明文时实时调用。In this implementation case, the universal Unicode Utf8 encoding is selected for the encoding, and the key length is selected as 128 bits (16 bytes). When the conversion length is insufficient, it is automatically filled with 0x00, and the excess part is ignored. The hexadecimal system is selected. Then, the generated key string "Chinese characters + abc-789#%" can be automatically converted into the key "e4 b8 ad e6 9687 e5 ad 97 e7 ac a6 2b 61 62 63 2d 37 38 39 23 25" that can be encrypted by the SM4 cipher algorithm. This key is ready to be called in real time when the sender or receiver encrypts the plaintext.

步骤6、 发送方或接收方调用步骤5实时生成的密钥。Step 6: The sender or receiver calls the key generated in real time in step 5.

步骤7、 发送方或接收方将步骤6调用的密钥“e4 b8 ad e6 96 87 e5 ad 97 e7ac a6 2b 61 62 63 2d 37 3839 23 25 ”提供给SM4密码算法对明文进行加密;Step 7: The sender or receiver provides the key "e4 b8 ad e6 96 87 e5 ad 97 e7ac a6 2b 61 62 63 2d 37 3839 23 25" called in step 6 to the SM4 cryptographic algorithm to encrypt the plaintext;

假设加密明文为:“请把“一种无需分发、无需管理的对称密钥的创建方法”用SM4加密算法进行加密和解密。”;Assume that the encrypted plaintext is: "Please encrypt and decrypt "a method for creating a symmetric key that does not require distribution or management" using the SM4 encryption algorithm.";

则SM4加密成的密文为:“9rj6oHdRWiTMcZ4cv3VtSK1Hqec/KKFhPZ6NOJfW99BObOmo4Yy4XqyvmI9EH/OKbfgvfuzQ/5SBcuZYOmb6T9EPXYZSVUkdizTWq+XTcEJbbuX+9aGyXCVg6U+FGSBAtkjt4Aw/Ez/b6loQMTP7o8eE/yWFYYxfb8Dmgs/xcB4=”;The ciphertext encrypted by SM4 is: “9rj6oHdRWiTMcZ4cv3VtSK1Hqec/KKFhPZ6NOJfW99BObOmo4Yy4XqyvmI9EH/OKbfgvfuzQ/5SBcuZYOmb6T9EPXYZSVUkdizTWq+XTcEJbbuX+9aGyXCVg6U+FGSBAtkjt4Aw/Ez/b6loQMTP7o8eE/yWFYYxfb8Dmgs/xcB4=”;

步骤8、 发送方将此密文发送给接收方,或接收方将此密文下载至接收方。Step 8: The sender sends the ciphertext to the receiver, or the receiver downloads the ciphertext to the receiver.

步骤9、 接收方收到密文后,根据时间和地点按照自己在发送方所设置的方案计算出密钥字符串“中文字符+abc-789#%”。Step 9. After receiving the ciphertext, the receiver calculates the key string "Chinese characters + abc-789#%" according to the time and place and the scheme set by the sender.

步骤10、 接收方在自己装置上用的SM4在线加密解密小程序(https://the-x.cn/cryptography/Sm4.aspx)中输入步骤9计算出的密钥字符串“中文字符+abc-789#%”,并选择Utf8编码。Step 10. The recipient enters the key string "Chinese characters + abc-789#%" calculated in step 9 into the SM4 online encryption and decryption applet (https://the-x.cn/cryptography/Sm4.aspx) used on his device, and selects Utf8 encoding.

步骤11、 SM4在线加密解密小程序自动将计算出的密钥字符串“中文字符+abc-789#%”转换成“e4 b8 ad e6 96 87 e5 ad 97 e7 ac a6 2b 61 62 63 2d 37 38 39 2325 ”。Step 11. The SM4 online encryption and decryption applet automatically converts the calculated key string "Chinese characters + abc-789#%" into "e4 b8 ad e6 96 87 e5 ad 97 e7 ac a6 2b 61 62 63 2d 37 38 39 2325".

步骤12、 在接收方装置,将接收方收到的密文输入到SM4在线加密解密小程序的密文文本输入处,用步骤11转换成功的密钥“e4 b8 ad e6 96 87 e5 ad 97 e7 ac a6 2b61 62 63 2d 37 38 39 23 25 ”将所收到的密文解密成明文。Step 12. On the receiving device, input the ciphertext received by the receiving party into the ciphertext text input of the SM4 online encryption and decryption applet, and use the key "e4 b8 ad e6 96 87 e5 ad 97 e7 ac a6 2b61 62 63 2d 37 38 39 23 25" successfully converted in step 11 to decrypt the received ciphertext into plaintext.

输入解密密文:“9rj6oHdRWiTMcZ4cv3VtSK1Hqec/KKFhPZ6NOJfW99BObOmo4Yy4XqyvmI9EH/OKbfgvfuzQ/5SBcuZYOmb6T9EPXYZSVUkdizTWq+XTcEJbbuX+9aGyXCVg6U+FGSBAtkjt4Aw/Ez/b6loQMTP7o8eE/yWFYYxfb8Dmgs/xcB4=”Enter the decrypted ciphertext: "9rj6oHdRWiTMcZ4cv3VtSK1Hqec/KKFhPZ6NOJfW99BObOmo4Yy4XqyvmI9EH/OKbfgvfuzQ/5SBcuZYOmb6T9EPXYZSVUkdizTWq+XTcEJbbuX+9aGyXCVg6U+FGSBAtkjt4Aw/Ez/b6loQMTP7o8eE/yWFYYxfb8Dmgs/xcB4="

解密成的明文:“请把“一种无需分发、无需管理的对称密钥的创建方法”用SM4加密算法进行加密和解密。”Decrypted plaintext: "Please encrypt and decrypt "A method for creating a symmetric key that does not require distribution or management" using the SM4 encryption algorithm."

见图6See Figure 6

通过上述3个实施案例的步骤10可以看出,在实际解密中,接收方只要计算出密钥字符串即可,不必自己进一步进行格式转换,目前在大多数加密解密小程序中都已经有非常智能的密钥转换功能,接收方只要输入计算出的密钥字符串即可,转换及下面的事情小程序会帮你做得非常漂亮,交给它就好了。It can be seen from step 10 of the above three implementation cases that in actual decryption, the receiver only needs to calculate the key string and does not need to further convert the format by himself. At present, most encryption and decryption applets already have very intelligent key conversion functions. The receiver only needs to input the calculated key string, and the conversion and the following things will be done for you very beautifully. Just leave it to it.

从这3个实施案例中还可以进一步从实际使用中确认和证明,本发明的时空对称密钥在提供给各个不同的密码算法运用时可以不用理会各个密码算法的内在逻辑和算法,只要将实时生成的密钥字符串通过本发明的时空密钥生成器内的“密钥字符串转换规则”转换成所用密码算法相对应的密钥格式就可以提供给任何对称密码算法加密明文和解密密文,无论是基本的易位、代替、字典、加减和混合密码算法还是按各类明文处理方式的分组密码算法和序列密码算法;无论是现在已经有的还是未来会有的对称密码算法都可以与本发明的无需分发也不需要管理的对称密钥携手为数据信息的加密和解密做出贡献。From these three implementation cases, it can be further confirmed and proved in actual use that when the space-time symmetric key of the present invention is provided to various different cryptographic algorithms for use, it is not necessary to pay attention to the internal logic and algorithm of each cryptographic algorithm. As long as the key string generated in real time is converted into the key format corresponding to the cryptographic algorithm used through the "key string conversion rule" in the space-time key generator of the present invention, it can be provided to any symmetric cryptographic algorithm to encrypt plaintext and decrypt ciphertext, whether it is basic transposition, substitution, dictionary, addition and subtraction and hybrid cryptographic algorithms or block cipher algorithms and sequence cipher algorithms according to various plaintext processing methods; whether it is an existing symmetric cryptographic algorithm or a future symmetric cryptographic algorithm, it can work together with the symmetric key of the present invention that does not need to be distributed or managed to contribute to the encryption and decryption of data information.

以上显示和描述了本发明的基本原理和主要特征及优点。本领域的技术人员应该了解,以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是在本发明的精神和原则之上,利用本发明说明书及附图内容所做的等效变换,以任何形式或在任何装置上直接或间接运用在本领域或其他相关的技术领域,均同理包括在本发明的专利保护范围内。The above shows and describes the basic principles, main features and advantages of the present invention. Those skilled in the art should understand that the above is only an embodiment of the present invention, and does not limit the patent scope of the present invention. Any equivalent transformation made by using the contents of the present invention specification and drawings based on the spirit and principle of the present invention, directly or indirectly applied in any form or on any device in this field or other related technical fields, is also included in the patent protection scope of the present invention.

Claims (10)

1. A method of creating a symmetric key that does not require distribution nor management, comprising:
Selecting a programming tool to develop a space-time key real-time generator, installing the programming tool in a memory of a sender device, providing a generation scheme for setting an encryption key for a setting module of the space-time key generator of a sender entering a login password by each receiver, giving a setting right of a symmetric key generation scheme to each receiver, enabling the setting item of the key real-time generator to comprise a function expression comprising n time independent variable functions and n geographic position independent variable functions and rules thereof, and automatically generating a new key corresponding to a used encryption algorithm in a key system of the sender at any time and any place so as to provide real-time calling when encrypting plaintext;
generating the latest key character string in real time at a sender, encrypting the plaintext into ciphertext according to a key and a cipher algorithm which are called in real time by the sender, sending the ciphertext which is successfully encrypted to a receiver by the sender, calculating the key according to a scheme set by the sender according to time and place after the receiver receives the ciphertext, and decrypting the received ciphertext into plaintext according to the key at a receiver device.
2. The method for creating a symmetric key that does not require distribution nor management as claimed in claim 1, further comprising:
The secret key used by the sender for encrypting each plaintext is automatically generated in real time by each receiver according to the encryption key generation scheme set by each receiver in the space-time key generator of the sender; the secret key used by the receiving party for decrypting the ciphertext is calculated by the receiving party according to the secret key generation scheme set in the real-time secret key generator setting module of the sending party; the encryption key generated in real time and the calculated decryption key are in one-to-one correspondence, the transmission key is not needed between the sender and the receiver, and the generated key is not needed to be managed, so long as the receiver remembers the key generation scheme set by the sender.
3. A method of creating a symmetric key that does not require distribution nor management as defined in claim 2, further comprising:
The key used by the sender to encrypt each plaintext is generated from the data provided by the respective receiver, including various strings from the receiver; the secret key used by the receiving party for decrypting the ciphertext is available by the receiving party, and the secret key is not required to be transmitted between the sending party and the receiving party.
4. The method for creating a symmetric key that does not require distribution nor management as claimed in claim 1, further comprising:
The sender does not directly send the ciphertext, the encrypted link of the file is sent to the receiver, the receiver calls the new key generated in real time by the space-time key generator by the login password to encrypt the file for downloading, and the system forbids downloading the unencrypted file.
5. A method of creating a symmetric key that does not require distribution nor management as claimed in any one of claims 2 to 4, further comprising:
the key provided for the sender or the receiver to encrypt the plaintext can only be called in real time, and besides, the key cannot be used, the key value is strictly forbidden to be checked and transmitted, the called key and the encrypted plaintext are in one-to-one correspondence with the person receiving the ciphertext, and the dislocation operation is strictly forbidden.
6. The method for creating a symmetric key that does not require distribution nor management as claimed in claim 1, wherein the spatio-temporal key real-time generator setting items include: key expression, bit-taking rule, key string conversion rule.
7. The method for creating a symmetric key that does not require distribution nor management as claimed in claim 1, further comprising:
The key generation scheme which is automatically set by the receiver in the sender key generator setting module is stored by adopting a high-level encryption scheme.
8. The method for creating a symmetric key that does not require distribution nor management as claimed in claim 1, further comprising:
The ciphertext is strictly forbidden to be forwarded or the forwarded ciphertext is unconditionally destroyed immediately, and the ciphertext directly sent to the receiver by the sender and the ciphertext which is agreed to be downloaded by the receiver are set in advance in the setting module, so that the receiver processes the ciphertext according to specific conditions, and the ciphertext is prevented from being stolen and broken after being stolen by other people.
9. A system for creating a symmetric key that does not require distribution nor management, comprising:
The method comprises the steps that keys for encrypting plaintext in a sender module are automatically generated in real time by each receiver according to a space-time key generator respectively arranged, the space-time key real-time generator is arranged in a memory of a sender device, a generation scheme of the encryption keys is set by a setting module of the space-time key generator, which is provided for each receiver and enters the sender through a login password, the setting right of a symmetric key generation scheme is given to each receiver, and the setting items of the key real-time generator comprise function expressions and rules of n time independent variable functions and n geographic position independent variable functions; generating the latest secret key in real time at a sender, encrypting the plaintext into ciphertext by the sender according to the secret key and the cryptographic algorithm which are called in real time, and transmitting the successfully encrypted ciphertext to a receiver;
The secret key used for decrypting the ciphertext in the receiver module is calculated by the receiver according to a secret key generation scheme set by the receiver at the sender, corresponds to the encryption secret key generated by the sender in real time one by one, and after the receiver receives the ciphertext, the secret key is calculated according to the scheme set by the sender according to time and place, and the received ciphertext is decrypted into plaintext according to the secret key at the receiver device.
10. A readable storage medium having a program stored thereon, characterized in that: the program, when executed by a processor, implements the method of any of claims 1-8.
CN202111132710.6A 2021-09-27 2021-09-27 A method and system for creating a symmetric key that does not require distribution or management Active CN113852462B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111132710.6A CN113852462B (en) 2021-09-27 2021-09-27 A method and system for creating a symmetric key that does not require distribution or management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111132710.6A CN113852462B (en) 2021-09-27 2021-09-27 A method and system for creating a symmetric key that does not require distribution or management

Publications (2)

Publication Number Publication Date
CN113852462A CN113852462A (en) 2021-12-28
CN113852462B true CN113852462B (en) 2024-11-05

Family

ID=78980459

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111132710.6A Active CN113852462B (en) 2021-09-27 2021-09-27 A method and system for creating a symmetric key that does not require distribution or management

Country Status (1)

Country Link
CN (1) CN113852462B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893834A (en) * 2015-12-24 2016-08-24 王健庭 Establishing method and device of non-fixed character password
CN106453426A (en) * 2016-12-13 2017-02-22 四川长虹电器股份有限公司 Symmetric encryption and decryption method and system based on key space-time fragmentation storage

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system
JP2003202931A (en) * 2002-01-09 2003-07-18 Toshiba Corp Software download system, server device, terminal equipment, server control program, terminal control program, server control method and terminal control method
CN1627682A (en) * 2003-12-12 2005-06-15 华为技术有限公司 Method for creating dynamic cipher at time of building connection in network transmission
KR100836942B1 (en) * 2006-04-18 2008-06-12 프레스티지전자 주식회사 Encryption / decryption method of audio signal and apparatus therefor
WO2015143596A1 (en) * 2014-03-24 2015-10-01 华为技术有限公司 File downloading method, apparatus and system
CN108199838B (en) * 2018-01-31 2020-05-05 北京深思数盾科技股份有限公司 Data protection method and device
CN108574567A (en) * 2018-03-19 2018-09-25 西安邮电大学 Privacy file protection and encryption key management system and method, information processing terminal
CN109948322B (en) * 2018-10-25 2023-03-21 贵州财经大学 Personal cloud storage data safe box device and method for localized encryption protection
CN111865891B (en) * 2019-12-31 2023-08-15 北京嘀嘀无限科技发展有限公司 Data transmission method, user terminal, electronic equipment and readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893834A (en) * 2015-12-24 2016-08-24 王健庭 Establishing method and device of non-fixed character password
CN106453426A (en) * 2016-12-13 2017-02-22 四川长虹电器股份有限公司 Symmetric encryption and decryption method and system based on key space-time fragmentation storage

Also Published As

Publication number Publication date
CN113852462A (en) 2021-12-28

Similar Documents

Publication Publication Date Title
CN105323070B (en) A kind of safety E-mail implementation method based on digital envelope
JPH0823330A (en) Safe data communication
KR20120079639A (en) Contents protection, encryption and decryption apparatus using white-box cryptography
CN107181584B (en) Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof
CN113572607B (en) Secure communication method adopting unbalanced SM2 key exchange algorithm
CN105376261A (en) Encryption method and system for instant communication message
CN105721146B (en) A kind of big data sharing method towards cloud storage based on SMC
CN114826587A (en) Data encryption method, data decryption method, data encryption device, data decryption device and data decryption equipment
US20240187477A1 (en) Method and system for secure file sharing based on domestic cryptographic algorithm
CN104486756A (en) Encryption and decryption method and system for secret letter short message
CN113852462B (en) A method and system for creating a symmetric key that does not require distribution or management
CN116094845B (en) Efficient revocation conditional proxy re-encryption method and system
CN114070549A (en) Key generation method, device, equipment and storage medium
CN114389803B (en) SPA key distribution method and device
Whelihan et al. Shamrock: a synthesizable high assurance cryptography and key management coprocessor
CN108768923A (en) A kind of real-time encrypted method of chat of the Encryption Algorithm based on Quantum Reversible Logic circuit
JPH11187008A (en) Delivering method for cryptographic key
CN114363086A (en) Industrial internet data encryption transmission method based on stream cipher
CN111431721A (en) IBE-based Internet of things equipment encryption method in intelligent medical environment
US20200169541A1 (en) Systems and methods for encryption
CN111800384A (en) Financial service application management method and device based on block chain
CN118018204B (en) Elliptic curve-based message processing system and message processing method
CN114760053B (en) Distribution method, device, equipment and medium of symmetric key
Chen et al. A secure color-code key exchange protocol for mobile chat application
JP3230726B2 (en) Encrypted communication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant