WO2020101325A1 - 순열그룹 기반의 암호화 기술을 적용한 암호화시스템 및 방법 - Google Patents
순열그룹 기반의 암호화 기술을 적용한 암호화시스템 및 방법 Download PDFInfo
- Publication number
- WO2020101325A1 WO2020101325A1 PCT/KR2019/015346 KR2019015346W WO2020101325A1 WO 2020101325 A1 WO2020101325 A1 WO 2020101325A1 KR 2019015346 W KR2019015346 W KR 2019015346W WO 2020101325 A1 WO2020101325 A1 WO 2020101325A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- permutation
- encryption
- signature
- message
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Definitions
- the present invention relates to an encryption method and system using cryptographic technologies based on permutation group, and more specifically, a password generating object (hereinafter referred to as a “sender”) and a decryption object (hereinafter referred to as a “receiver”) send a message, It is different from the message space that composes the original message, and the secret permutations group that changes to a new space through movement or expansion, etc.
- a password generating object hereinafter referred to as a “sender”
- a decryption object hereinafter referred to as a “receiver”
- Quantum-based algorithms include the Shor and Grover algorithms mentioned above. According to Grover's algorithm that affects symmetric key encryption, most symmetric key encryption methods double the encryption key to achieve the same level of security as before, but when a quantum computer with a Shor algorithm is developed, the public key currently used Encryption is no longer available.
- Table 2 below compares and shows how the security level changes in the quantum computing environment with respect to the cryptography currently used.
- the present invention proposes a post-quantum encryption technique and system that operates efficiently in a current computing environment and securely protects data even in a quantum computing environment.
- the proposed quantum resistance (post quantum) encryption method should be improved over the existing public key method in terms of performance, security, and usability as it has to replace the public key encryption method that is no longer secure due to the quantum computing environment. In addition, it should be suitable for the current computing environment.
- the operation of composing a symmetric key and an asymmetric key, respectively, in the form of permutations at the same time based on permutation groups Using the method and multi-dimensional expansion with the key array transformation method, the key space is extended without using complex mathematical operations, and complexity is increased and processing is performed in the substitution-permutation-network (SPN) of the symmetric key encryption technique without performing complex mathematical operations. It is possible to perform a fast encryption process by performing calculations such as substitution and conversion of values.
- SPN substitution-permutation-network
- the conventional method uses a method of performing a mathematical operation of a fixed key function using a key value generated once as shown in FIG. 1, but in the present invention, a multi-dimensional space selected by a receiver as shown in FIG. 3 whenever the sender transmits a message
- a multi-dimensional space selected by a receiver as shown in FIG. 3 whenever the sender transmits a message
- the present invention includes an encryption performance object for encrypting a message and a decryption performance object for decrypting the encrypted message, and the encryption performance object and decryption performance object are disclosed among symmetric keys and asymmetric keys that are permutations based on permutation groups. Encrypting the message by synthesizing the keys at the same time, and when decrypting it again, the permutation group based encryption technology is applied, which is characterized by decrypting the original text using the private key of the permutation type symmetric key and asymmetric key based on the permutation group. Disclosed is an encryption system.
- the object to be encrypted and the object to be decrypted are an encrypter (ENC) that encrypts a message using an encryption key (K e ), and a message is decrypted using a decryption key (K d ). It includes a decoder (DEC) and an encryption key generator (MKG).
- EEC encrypter
- DEC decoder
- MKG encryption key generator
- the encrypter is an input queue for processing message input, a GA operator for generating a cipher text through permutation using a disposable public key, and an output queue for processing the output of the generated cipher text. It includes.
- the GA operator receives the symmetric key (Q AB ) and the public key (G B ) of the decrypted object from the cryptographic key generator (MKG) and generates cryptographic text through permutation.
- Q AB is the symmetric key of the encryption and decryption objects
- G B is decryption.
- the public key of the execution object, M is a message space, and C is a ciphertext space.
- the decryptor processes an input queue processing an input of a ciphertext, a GA operator for restoring an original message through permutation using a disposable private key, and an output of the restored original message Contains output queue.
- the GA operator receives the symmetric key (Q AB ) and the private key (H B ) of the decrypted object from the encryption key generator (MKG) and restores the original message through permutation. .
- Q AB is a symmetric key between an encryption object and a decryption object
- H B is a decryption object.
- the private key of, M is a message space
- C is a ciphertext space.
- the cryptographic key generator is a random number generator (PRNG) that generates a disposable pseudo-random number through a key derivation function (KDF) using a plurality of parameters, and the key derivation function (KDF) ) To generate a disposable pseudorandom number sequence (PRP) and provide it to the key generation module.
- PRNG random number generator
- KDF key derivation function
- KDF key derivation function
- PRP disposable pseudorandom number sequence
- the key generation module is a master key vector (MSK_) which is a vector function representing a secret permutation group of an object to be decrypted.
- MSK_ master key vector
- MSK_ master kiss color module
- MPK symmetric key module
- PK public key module
- SK key module
- the master key vector (MSK_ ) Module, master kiss color module (MSK_ ) And the symmetric key module (MPK) use a plurality of unique personal identification information as parameters to generate different key values according to the same value or mutually agreed method through the key induction function (KDF).
- KDF key induction function
- the present invention comprises the steps of generating a master key using an identification factor by an encryption key generator, and generating a symmetric key, a private key, and a public key pair required for encryption and decryption in the encryption key generator, and an object to perform encryption.
- Disclosed is an encryption and decryption method.
- the identification factor includes at least one of a user identification factor including personal information of the user, a terminal device identification factor including user terminal information, and a secret function generation factor.
- the ciphertext is generated by operating the GA operator using the generated symmetric key and the public key of the decrypted object.
- the ciphertext (C) is generated as shown in the following formula by permutation (M ⁇ K ⁇ C) by substituting the encryption key (K e ) in the encryption function (E).
- the restoration of the ciphertext is characterized in that it is generated as follows by permutation (C ⁇ K ⁇ M) by substituting the decryption key (K d ) in the decryption function (D). ,
- the present invention includes a signature performing object that generates a signature when creating a cipher text, and a verification performing object that is configured to verify the signature to decrypt the cipher text into an original message, and is symmetrical in the form of permutation based on a permutation group. It provides a signature verification system using permutation group based encryption technology characterized by generating and verifying a signature using a key and an asymmetric key.
- the signature performing object and the verification performing object include a signer that generates a signature through permutation, a verifier that verifies the signature through permutation, and a cryptographic key generator (MKG). Includes.
- the signer is an input queue for processing message input, a GA operator for generating a signature statement through permutation using a one-time private key, and an output for processing the output of the generated signature statement Includes cues.
- the GA operator of the signer receives the symmetric key (Q AB ) and the private key (H A ) of the object to be signed from the cryptographic key generator (MKG) and signs the signature through permutation.
- the verifier receives an input queue for processing a signature, and a GA operator for generating an accepted original message by verifying the signature through permutation using a single-use public key, It contains an output queue that processes the output of the accepted original message.
- the GA operator of the verifier receives the symmetric key (Q AB ) and the public key (G A ) of the signature performing object from the cryptographic key generator (MKG) and receives the signature through permutation. Verify and confirm acceptance or rejection.
- the cryptographic key generator is a random number generator (PRNG) that generates a disposable pseudo-random number through a key derivation function (KDF) using a plurality of parameters, and the key derivation function (KDF) ) To generate a disposable pseudorandom number sequence (PRP) and provide it to the key generation module.
- PRNG random number generator
- KDF key derivation function
- KDF key derivation function
- PRP disposable pseudorandom number sequence
- the key generation module is a master key vector (MSK_) which is a vector function representing a secret permutation group of an object to be signed. ) Module, and a master kiss color module (MSK_) that determines a secret permutation to be used when decrypting ),
- the symmetric key module (MPK) that generates a symmetric key shared between the signature execution object and the validation execution object, and the public and private keys, which are a pair of asymmetric keys of the decryption execution object used when encrypting and decrypting messages. It includes a generated public key module (PK) and a private key module (SK).
- the master key vector (MSK_ ) Module master kiss color module (MSK_ )
- the symmetric key module (MPK) generate key values through a key derivation function (KDF) using one or more identification information that can distinguish objects from each other as parameters.
- KDF key derivation function
- the present invention comprises the steps of generating a master key using an identification factor by an encryption key generator, and generating a symmetric key, a private key, and a public key pair required for encryption and decryption in the encryption key generator, and an object to be signed.
- Generating a signature by receiving the generated symmetric key and the signature key and the private key of the object to be verified; and the object to be verified receives the symmetric key and the verification key, the disposable public key of the object to be signed to perform the signature.
- a method for signing and verifying a cipher text including verifying the generated signature text and accepting or rejecting the original text message according to the verification result.
- the identification factor includes at least one of a user identification factor including personal information of the user, a terminal device identification factor including user terminal information, and a secret function generation factor.
- the signature statement (M S ) is generated as shown in the following formula by permutation (M ⁇ K ⁇ S) by substituting the signature key (K S ) in the signature function (S).
- the verification of the signature is characterized in that it is generated as follows by the permutation operation (S ⁇ K ⁇ S) by substituting the verification key (K V ) in the verification function (V). ,
- GQQ is the left multiplication of the permutation functions G and Q
- message M (m 1 m n )
- key K (k 1 k n )
- the method proposed in the present invention makes it possible to replace the mathematical-based public key cryptographic system that can no longer be used as an insecure problem under a quantum computing environment to prevent confusion caused by data security problems in the coming quantum computing era. .
- the recipient's private key and symmetric key are disposable keys that are generated only once when there is a transmission / reception connection, even if an unauthorized participant steals related information, the same key cannot be generated, and thus the decrypted ciphertext is decrypted. It is impossible to get angry, and it is safe for hacking attacks such as man-in-the-middle attacks.
- the signature algorithm it is possible to determine whether or not a malicious attacker has taken and manipulated the generated ciphertext, and also provides a non-repudiation function that does not deny the message sent by the attacker. .
- 1 is a conceptual diagram showing an example cipher (K, E, C) space of the RSA cryptosystem.
- FIG. 2 is a conceptual diagram showing an example of a group action.
- FIG. 3 is a conceptual diagram showing an example cipher (K, E, C) space of the invention system.
- FIG. 4 is a conceptual diagram of a cryptographic communication system.
- 5 is a structural diagram of a system for encryption / decryption.
- FIG. 6 is a structural diagram of an encryptor.
- FIG. 7 is a structural diagram of a decoder.
- 8 is a conceptual diagram of an encryption key generator.
- 9 is a conceptual diagram showing an example of a cryptographic operation.
- 10 is a flow chart of encryption / decryption procedures.
- 11 is a conceptual diagram showing an example of setting the encryption / decryption step 1;
- FIG. 12 is a conceptual diagram showing an example of encryption / decryption step 2 key generation.
- 13 is a conceptual diagram showing encryption step 3 cryptogram generation.
- 14 is a conceptual diagram showing decryption step 3 message generation.
- 15 is a structural diagram of a system for signature / verification.
- 16 is a structural diagram of a signer.
- 17 is a structural diagram of a verifier.
- 19 is a conceptual diagram showing an example of a signature / verification step 1 setting.
- 20 is a conceptual diagram showing key generation for signature / verification step 2;
- 21 is a conceptual diagram showing signature step 4 signature generation.
- 22 is a conceptual view showing acceptance / rejection of a verification step 4 verification message.
- 23 is a structural diagram of a cryptographic system of a signed message.
- 24 is a structural diagram of a decrypter system for a signed message.
- 25 is a conceptual diagram showing encryption of a signed message.
- 26 is a flowchart of a procedure for encrypting and decrypting a signed message.
- 27 is a conceptual diagram showing decryption of a signed ciphertext.
- Implementation objects may have a physically distinct structure, or may be functionally separated.
- the control unit may include an API that performs a specific function in a distributed application environment such as a single system or a cloud service, a module that performs a specific function, hardware such as a component, a chip, a terminal, or software such as an application or program. Can be.
- Information to send through a computer or communication system has various forms such as numbers, letters, pictures, videos, software, etc., but is handled in binary, that is, byte units composed of bits. This is converted into a code form such as ASCII, UNICODE, and is recognized by an application program in the system, and through this, people are sent back in the form of information such as numbers, letters, and pictures.
- a message refers to information that people want to deliver to a counterpart through a computer or communication system, which is treated as a message unit in the system, such as bytes, as mentioned above in the system, and all information in the system. Is converted to a column of message units in one processable system.
- a message set M is a list of cases in which a message to be delivered can be expressed by a message unit and can be expressed by a message unit.
- M ⁇ 0,1 ⁇
- the message can be expressed as a column of message unit, such as 00110101.
- M ⁇ 0,1,... 255 ⁇ (expressed in decimal representation) and the message can be expressed as 64 68 72 82.
- the element of M is m i , 1 ⁇ i ⁇ n
- the number of elements of the set M can be expressed as
- n.
- the index set of the message is expressed as I M : I ⁇ M, and it is said that there is a morphism from the index set I to the message set M.
- the shear function F X ⁇ Y from domain X to codomain Y represents the correspondence between X and Y, and in the meaning of the set, the order of the arrangement of the elements of any set Indicates.
- the permutation of any set of n elements can also be said to be a permutation of n numbers or characters, and the same applies to the aforementioned message set M.
- a permutaion group is a set consisting of elements in all cases of premutation in any set.
- Permutation group G ⁇
- the permutation group of all permutations of n ⁇ becomes symmetric group Sym (M) (all shear functions are symmetric groups)
- M ⁇ 1,2,... , n ⁇ , Sym (M) for n characters is represented by S n .
- permutation group G permutation group
- Group Action refers to how each element (P: permutation) of the permutation group G arranges the elements of the set (S) and acts as a kind of function.
- P permutation
- Group Action when applying the permutation group (Group Action) of the permutation P to the elements of the set S, it means that the elements of the set S are rearranged by the permutation P.
- the operation to change the order of the element array of the set S is called a group action.
- G Permutation Group
- M non-empty set
- the group action of permutation group G for set M is a function f: G ⁇ M ⁇ M that satisfies the following three properties.
- the degree of G is the number of elements of the set M constituting G
- PRNG Physical Random Number Generator
- PRF Physical Random Function
- This is a function derived based on PRNG, and receives a random input value and always generates a pseudorandom sequence. (Similar random number function) This is the following function F: K ⁇ X ⁇ Y over (k, X, Y).
- PRP Physical Random Permutaion: Generates a pseudorandom sequence in a similar manner to PRF, but there is always a one-to-one mapping acting in the same domain and an efficient inverse function D (k, X). If the sequence generated from PRP cannot be distinguished from random numbers generated from PRNG, it is called secure PRP. In addition, a secure PRP defined in sufficiently large X is a secure PRF. (Similar random number permutation)
- TDF Trapdoor Function
- the trapdoor function is a type of one-way function. In general, it is difficult to find the inverse of a function like a one-way function, but it is a function that can easily find the inverse if there is special information called trapdoor.
- the trapdoor function is defined mathematically as follows. Since there is some secret value y, it is difficult to find f (x) when there is no y for a certain value of x, but if you can easily find the value of x in f (x) given y, the function f is a trapdoor function.
- the cipher consists of three algorithms (functions): G, E, and D. Each represents the following abbreviation.
- MKG Magnetic Key Generator
- MKG Magnetic Key Generator
- MKG Magnetic Key Generator
- MKG is a cryptographic key generator that refers to a key management device that handles user identification and registration, key generation, distribution, etc., required for encryption / decryption. It may be installed in a system such as an encryptor or a decoder, or may be installed and interlocked with another third system. Access to MKG ensures a secure information channel through user authentication so that only allowed participants can access it.
- the secret function group SPG (Secret Permutation Group) refers to a subset of all permutation groups G on the message set M, and each permutation forming this subset is called secret function candidate SPC (Secret Permutation Candidates). At this time, one candidate specifically designated among secret function candidates is called secret function SP (Secret Permutation). 3 shows an example of SPG and SP.
- FIG. 4 is a conceptual diagram showing an embodiment of the invention system.
- This system includes a communication channel that transmits an encrypted text and two terminals connected to it, and each terminal has an encryption key K e and a decryption key K d related to encryption and decryption.
- the communication channel includes an ordinary transmission cable and a transmission device, and FIG. 4 shows an example of one-way communication, but it is also possible to operate in the opposite direction in the same way to enable two-way communication.
- Each terminal of the transmission and reception of FIG. 4 is composed of an encoder (ENC), a decoder (DEC), and an encryption key generator (MKG) as shown in FIG. 5.
- ENC encoder
- DEC decoder
- MKG encryption key generator
- the encryptor is a GA operator that generates a cipher text through a group action using an input queue for processing message input and a disposable public key through an algorithm according to an embodiment of the present invention, as shown in FIG. And there is an output queue that processes the output of the generated ciphertext.
- the GA operator receives a symmetric key (Q AB ) of the transmitting / receiving terminal and the public key (G B ) of the receiving terminal from the encryption key generator (MKG) as a message input, and generates a cipher text through permutation (GA operation).
- the diffusion function F (x) is preprocessed and encrypted through the XOR operator.
- the group's message queue can receive pre-processed messages and generate cryptograms.
- the decoder is a GA operator that restores the original message through group action using an input queue that processes ciphertext input and an algorithm according to an embodiment of the present invention, using a disposable private key. And, there is an output queue that processes the output of the restored original text message.
- the GA operator receives the symmetric key (Q AB ) of the transmitting / receiving terminal and the private key (H B ) of the receiving terminal from the encryption key generator (MKG) as an input of the cipher text to restore the original message through permutation (GA operation).
- the message restored by the decoder is post-processed through the XOR operator with the same diffusion function F (x) applied to the transmitting terminal. You can restore the message.
- the cryptographic key generator is a random number generator (PRNG), a permutation generator, and a plurality of key generation modules (MSK_ , MSK_ , MPK, SK, PK), and a GA operator.
- the random number generator is a key driven function KDF (key driven function) using multiple parameters such as the unique personal identifier (ID), device ID, event, and time of a participant that can be known only by the pre-registered send and receive participants. ) To generate a disposable pseudorandom number.
- the generated random numbers are provided by a permutation generator and a key generation module, respectively.
- the permutation generator generates a disposable pseudorandom number sequence (PRP) through a random number generator and a unique key induction function (KDF).
- PRP pseudorandom number sequence
- KDF unique key induction function
- the key generation modules are the master key vector (MSK_), which is a vector function representing the recipient's Secret Permutation Group. Module, master kiss color module (MSK_) that determines the secret function to receive ), A symmetric key module (MPK) that generates a symmetric key shared only by a sender and a receiver, a public key module (PK) and a private key module (SK), which are generated in pairs for each transmission / reception event.
- the master key module and the symmetric key modules generate different key values each time through a random number generator or permutation generator through a key induction function (KDF) using multiple unique personal identification information as parameters.
- KDF key induction function
- the key is stored in the key storage of and the key values generated by the private key module and public key module are distributed to generate the private key and public key. It is also distributed to the encryptor and decryptor of the corresponding terminal requesting the key.
- the private key module generates a private key.
- the private key is generated by arranging random values generated from the master key scalar module at a position specified by the master key vector module, and arranging the random number sequences provided by the permutation generator at the remaining positions.
- the GA operator in the cryptographic key generator plays a role in generating the public key through the symmetric key and the private key, unlike the cryptographic or decryptor permutation operator that performs the operations required to generate the ciphertext and the original message, respectively.
- the key generated from the private key module SK is called H
- the key generated from the symmetric key module MPK is called Q
- the public key generated by the permutation operator is G
- the public key G calculated as a result of calculation is output to the public key module PK, stored, and distributed to the corresponding encryption or decryptor.
- the message set M consists of a number from 0 to 9, that is,
- 10
- 9 shows that the ciphertext 5301689742 is generated through the encryptor of the user A terminal.
- permutation group-based message encryption transmission method may be implemented according to the method and procedure shown in FIG. 10.
- a transmitting / receiving participant In order to transmit a message using the system according to the embodiment, a transmitting / receiving participant must register personal identification information or the like in the system in advance and be approved as an allowed participant.
- the first step of the transmission method is a setup step, and a user identification factor (phone number, user id, email address etc.), a terminal device to identify a participating object in an encryption key generator (MKG) Personal identification information such as identification factors (device id, MAC address, ip address, faceid, fingerprint etc.), secret permutation generator, etc. are registered, and the cryptographic key generator (MKG) registers the object Create identification numbers, master keys, etc.
- a user identification factor phone number, user id, email address etc.
- MKG encryption key generator
- the master key is a vector function that can identify secret function candidates (SPCs) from the entire permutation group of messages, and this key vector function T is a pair of (tp, tv) vectors and T ⁇ I M ⁇ M.
- the tp of the master key T is created or registered at the time of setting, and the function value tv of the master key T is determined at the time of encryption execution to designate a specific secret function (SP) among the secret function candidates (SPC) and related participants.
- SP secret function
- the second step is a key generation step for encryption in the encryption key generator, and generates symmetric and private key and public key pairs necessary for encryption and decryption.
- a symmetric key that only the transmitting and receiving parties can know is generated.
- a secret function SP is designated by assigning a one-time function value to the master key (function) generated in the setting step, and a private key is generated based on the personal identification information previously registered in the setting step.
- the public key is generated by permutation (GA) of the generated symmetric key and private key.
- the sender requests and obtains the public key of the receiver, which is the encryption key, through the encryption key generator to generate the encrypted text.
- the symmetric key is already possessed by each transmitting and receiving terminal in two steps. At this time, the keys of the participating objects are already generated in the second key generation step, and thus can be easily obtained.
- a cryptographic text is generated by calculating the public key of the receiver and the symmetric key already possessed through the permutation operator. The process is expressed mathematically as follows.
- D d 1 d 2 ... d k :
- Message sequence D is when d i is a continuous message string composed of elements of message set M.
- the receiver obtains the recipient's private key which is the encryption key through the encryption key generator.
- the symmetric key is already possessed by each transmitting and receiving terminal in two steps. At this time, the keys of the participating objects are already generated in the second key generation step, and thus can be easily obtained.
- the original message is restored by calculating the recipient's private key and the symmetric key already possessed through the permutation operator.
- the process is expressed mathematically as follows.
- 11 to 14 show specific examples of the step-by-step implementation of the message encryption transmission method according to an embodiment of the present invention.
- the process of restoring the original text message by receiving and receiving the numeric string “4581290367” consisting of 10 numbers from the message set using the numbers from 0 to 9 as an element from the terminal A to the terminal B is generated as a message and receiving it. Step by step, specifically shown in Figure 11 through 14.
- the ID of the transmitting terminal A and the receiving terminal B is registered in the encryption key generator for transmission and reception in the setting step 1 and the master private key vector functions ⁇ (2, v 1 ), (4, v 2 ), (6) , v 3 ), (8, v 4 ) ⁇ are generated, and the master public key generation function is set.
- Fig. 12 shows the vector key allocation of the master key vector function as a two-step key generation step and how the private key is generated. It also shows how function values are assigned to symmetric key generation functions through permutation generators and public keys are generated through private and permutation operators.
- FIG. 13 a specific example of how the operation is performed and the ciphertext is generated through the permutation operation in the GA operator through the encryption keys MPK, SK, and PK generated through the first and second steps in the third step ciphertext generation step. Shows through.
- the encryption step generated in the first and second stages is the encryption step MPK, SK, and PK in the fourth step ciphertext decryption step, and how the operation is performed through the permutation operation in the GA operator and how the received ciphertext is converted to the original message. Decryption and restoration are shown through specific examples.
- Each transmitting / receiving terminal of the electronic signature system is functionally the same in the same structure as the encryptor or decoder described in the previous embodiment, but differs in that it operates using different keys and different inputs.
- Each terminal of the transmission / reception of the signature / verification system includes a signer (SIGN), a verifier (VERIFY), and an encryption key generator (MKG) as shown in FIG. 15.
- the signer (SIGN) generates a signature through a permutation (Group Action) using a disposable private key through an input queue that processes message input as shown in FIG. 16 and an algorithm according to an embodiment of the present invention.
- the group's message queue can receive a pre-processed message and generate a signature.
- the verifier verifies a signature statement through a group action by using a disposable public key through an input queue for receiving and processing a signature and an algorithm according to an embodiment of the present invention.
- a GA operator that generates the original text message that has been verified and accepted, and an output queue that processes the output of the verified / accepted original message.
- the GA operator receives the symmetric key (Q AB ) of the transmitting / receiving terminal and the public key (G A ) of the transmitting terminal from the cryptographic key generator (MKG) as the input of the signature, and verifies the signature through permutation (GA operation). Check the acceptance / rejection and verify the original message.
- the message verified by the verifier is post-processed through the XOR operator with the same diffusion function F (x) applied to the transmitting terminal. Can be restored.
- the cryptographic key generator (MKG) shown in the signature / verification system of FIG. 15 includes a random number generator (PRNG), a permutation generator, and a plurality of key generation modules (MSK_) as shown in FIG. , MSK_ , MPK, SK, PK) and permutation operators (GA Operators) that provide the same structure and function as in an encryptor or decoder, and work the same.
- PRNG random number generator
- MSK_ key generation modules
- MPK MPK
- SK SK
- PK permutation operators
- G Operators permutation operators
- a signature / verification method may be performed using a permutation group-based message encryption / decryption algorithm according to the method and procedure shown in FIG. 18.
- the method of signing and verifying a message according to an embodiment of FIG. 18 may be performed by a procedure of 4 steps, and a method of registering and setting a 1st step sending / receiving participating object and a 2nd step key generation method and procedure are as described above. It performs the same method and procedure described in one embodiment of the encryption / decryption method.
- the sender requests and obtains the private key of the sender, which is the signature key, through the encryption key generator to generate the signature.
- the symmetric key is already possessed by each transmitting and receiving terminal in two steps. At this time, the keys of the participating objects are already generated in the second key generation step, and thus can be easily obtained.
- the sender's private key and the already symmetric key are computed through the permutation operator to generate a signature. The process is expressed mathematically as follows.
- the recipient obtains the disposable public key of the sender, which is the verification key through the encryption key generator.
- the symmetric key is already possessed by each transmitting and receiving terminal in two steps. At this time, the keys of the participating objects are already generated in the second key generation step, and thus can be easily obtained.
- the public key of the sender and the symmetric key already possessed are calculated through the permutation operator to verify the signature and accept or reject the verified original message. The process is expressed mathematically as follows.
- x x 1 x 2 ... x k
- 19 to 22 show a specific example of a step-by-step implementation of a method for transmitting a message signature as an embodiment of the present invention.
- An example is a process of verifying an original message by receiving a message from a set of messages with numbers from 0 to 9 as an element from terminal A to terminal B and generating a signature by sending a number string of “4581290367” as a message. It is shown through Fig. 19 to Fig. 22 specifically for each step.
- the ID registration of the transmitting terminal A and the receiving terminal B to the encryption key generator for transmission and reception in the first stage setting step and the master key vector functions ⁇ (1, v 1 ), (3, v 2 ), (5, v 3 ), (7, v 4 ) ⁇ are generated, and the symmetric key generation function is set.
- FIG. 20 a vector value allocation of a master key vector function as a two-step key generation step, and shows how a single-use private key is generated through this. It also shows how function values are assigned to symmetric key generation functions through permutation generators and public keys are generated through private and permutation operators.
- the three-step signature statement generation step is an encryption key generated through the first and second steps MPK, SK, and PK, and how the operation is performed through the permutation operation in the GA operator and the signature statement is generated. Show through specific examples.
- the operation is performed and the received signature statement is received through the permutation operation in the GA operator through the encryption keys MPK, SK, and PK generated through the 1st and 2nd steps as the acceptance / rejection step of the 4-step verification message. It shows how to be verified and accepted / rejected by the original message through specific examples.
- Encryption / decryption system including message signing / verification
- Each transmission / reception terminal in the encryption system that provides electronic signature and verification has the same structure as the encryptor (ENC), the decoder (DEC), and the encryption key generator (MKG), as shown in FIG. 5, but the encryption (ENC) and decryption
- the DEC may be changed to include a signer and a verifier as shown in FIGS. 23 and 24, respectively.
- the encryptor ENC has two structures, such as an input queue for processing message input and a GA operator for generating a cipher text and a GA operator for generating a signature, with a structure in which the signer of FIG. 25 is combined with the encryptor of FIG. Another GA operator is included, and the GA operator for generating a cipher text receives a message from an input queue and receives a signature from the GA operator for generating a signature text, and performs permutation on (Message + Signature) as in the example of FIG. To create a ciphertext.
- the decoder DEC combines the decrypter of FIG. 6 with the verifier of FIG. 27 to input queues for processing cipher text input and GA operators for message recovery (for decryption) and GA operators for signature verification. Two other GA operators are included, and for message restoration (for decryption), the GA operator receives and decrypts the encrypted text from the input queue to restore (message + signature), where the signature is delivered to the verified GA operator for verification. For the GA operator, a verified message is generated as illustrated in FIG. 27. The message output from two different GA operators determines whether to accept or reject the message through the AND operation.
- an encryption transmission method for a message signed using a permutation group-based public key may be implemented as shown in FIG. 26.
- the method for encrypting and transmitting an encrypted message to a signed message may be performed by a six-step procedure, and the first and second registration and setup methods and the second and second key generation methods and procedures are described above.
- the method and procedure described in one embodiment of the encryption / decryption method of FIG. 10 are performed.
- the method and procedure for generating the signature in the third step are the same as in the message signing / verifying method in FIG. 18.
- the message to be transmitted is combined with the signature generated in the third step to encrypt (message + signature) with the recipient's public key.
- Q AB (M + M s ) C' (K e is the public key of recipient B (G B ))
- the fifth step restores M + M s by decrypting the received cipher text M 'as illustrated in FIG. 27.
- V (M s , Kv) Q AB -1 G A
- Q AB (M s ) M ”(K v is the public key of the sender A (G A ))
- the signature uses the private key that is generated only once by the signed participant, so no one can create it except the signed participant. Therefore, a sender cannot deny transmission of a message for a message transmitted through a signed message transmission method according to an embodiment.
- the encryption key used for encryption utilizes elements that make up the message space, such as digits, characters, and images. For example, it is possible to implement a 256 byte encryption system by extending the extended ASCII code with an encryption key space to encrypt characters.
- the system of the present invention can be implemented in a two-tier structure (2 tier) or a three-tier structure (3 tier).
- the two-tier structure (2 Tier), it can be applied to a structure that communicates without going through an intermediate medium of encrypted communication between a sender transmitting an encrypted message and a receiver receiving and decrypting the encrypted message.
- the one-way communication method in which the role between the sender and the receiver that transmits and receives the encrypted message is one-sided, fixed and unchanged, and the two-way (two way) when mutually transmitting / receiving the encrypted message ) All communication can be implemented.
- both the sender and the receiver can perform both encryption and decryption objects.
- An example of implementation of such a system may be applied to one-to-one communication, peer-to-peer communication, and one-to-many communication.
- relaying with other systems such as performing encryption / decryption functions or converting to other communication protocols, or the like, between a sender transmitting an encrypted message and a receiver receiving an encrypted message or plain text, or It can also be applied to a structure that communicates through a gateway that performs interworking functions.
- the gateway when the gateway sends a message to a receiver designated by the sender, it decrypts itself and transmits the plaintext itself, or converts it into another encryption method or other communication protocol format that the receiver wants. It is possible to send a message in a changed format through a task, or to send an encrypted message sent by the sender to the receiver.
- IoT network methods such as Sensor-Gateway-Server, Sensor-Gateway-Sensor, and traditional 3-tier or N-tier structures ( It can be applied to a multi-object participation communication system called N-Tier) method.
- a transmitting terminal or a receiving terminal refers to a terminal connected to enable communication through at least one network, for example, a mobile phone, a smart phone, a laptop computer, and digital broadcasting.
- Mobile terminals such as terminals, personal digital assistants (PDAs), portable multimedia players (PMPs), slate PCs, tablet PCs, ultrabooks, and fixed terminals such as digital TVs and desktop computers It may be, but is not particularly limited.
- an asymmetric cryptographic communication system using a permutation group based disposable public key that is safe and applicable to various environments.
- a disposable public key that uses a public permutation generated for one time and a private key that uses a private permutation generated by the receiving terminal only for one-time use to decrypt the cipher text generated through it. It is possible to implement a cryptographic communication system using asymmetric keys only possible through.
- both the disposable public key and the disposable private key can be generated only through the master private key of the receiving terminal capable of decrypting the ciphertext, and through a secure method, the disposable public key can implement a system shared with the transmitting terminal. It is implemented with the Trap Door function of cryptography that is difficult to restore or estimate the original text with the disposable public key related information held by the transmitting terminal or the encrypted text generated through it.
- the public key and private key can be changed automatically or manually during the encrypted communication process at random or after communication for the purpose of improving security, etc., and the creation / change operation is performed only by the user / system / who has the master private key with decryption authority. It is performed by the device. Through these functions, it is possible to implement characteristics that are difficult to estimate through exposure of public and private keys used in cryptographic communication systems, collection of cryptographic texts, and reverse engineering.
- the permutation key which is an encryption-related key required for the encryption communication system.
- the public key / private key required in the encryption and decryption process is generated by the receiving terminal, and when generated and changed, the generating terminal (time, space, etc.) and the changing condition have been previously agreed upon by the transmitting terminal and the receiving terminal.
- Each has its own permutation operator and implements it so that the transmitting terminal can generate the same virtual public key by itself, without performing the step of directly transmitting / receiving the encryption-related key information essential in the encryption communication process.
- a system such as key cryptography can be constructed.
- the plaintext with information about it is derived. It is possible to implement an encrypted communication system that is difficult to decrypt or estimate.
- the public key and the private key are randomly changed every time according to the security policy or system requirements, even after the relevant information has been exposed, the password generated by the malicious user who possessed the previous information can be arbitrarily or unauthorizedly decrypted. Implementation is possible.
- the present invention uses an asymmetric method on a permutation basis, and can be implemented in various ways depending on the message type because encryption processing can be performed in byte units or message processing units of a desired size.
- the calculation is performed directly in the application message processing unit, and the message can be encrypted in block units, and thus the processing speed can be significantly increased compared to the conventional technology that must be reconstructed into a form that can be used in the application.
- the present invention can be implemented in a low-performance CPU device.
- the present invention can implement both symmetric and asymmetric key methods in a single cryptosystem, can handle all various message types in an application, and can implement flexible functions under 2-Tier and 3-Teir communication structures. It can be applied to both existing systems based on password / PIN, human to machine, or systems that adopt new machine to machine.
- the system of the present invention can be applied as a single system even under a new iot environment operating under various communication structures based on lightweight / low-capacity devices, and it is also possible to interwork with an existing encryption technology-based system.
- the method for transmitting a message using a permutation group-based disposable public key may be implemented in the form of program instructions that can be executed through various computer components and recorded in a computer-readable recording medium.
- the computer-readable recording medium may include program instructions, data files, data structures, or the like alone or in combination.
- the program instructions recorded on the computer-readable recording medium may be specially designed and configured for the present invention or may be known and available to those skilled in the computer software field.
- Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tapes, optical recording media such as CD-ROMs, DVDs, and magneto-optical media such as floptical disks.
- optical media such as ROM, RAM, flash memory, and the like.
- program instructions include not only machine language codes produced by a compiler, but also high-level language codes executable by a computer using an interpreter or the like.
- the hardware device may be configured to operate as one or more software modules to perform processing according to the present invention, and vice versa.
- the space probability of the present invention system is always the same probability, whereas the space probability decreases for each brute-force attack. Provided, even if the random function that derives the key provides even probability distribution, brute-force attack is probabilistically difficult.
- the encryption result is obtained because the key space and the crypto space are expanded into a multi-dimensional space using the variable functions included in the permutation group as mentioned above.
- quantum computers it is difficult to decipher even if cryptography is performed through a computer with improved computing power, so it has quantum resistance.
- the existing asymmetric key method is vulnerable to a man-in-the-middle, and in order to solve this problem, a certificate of identity is provided to all participants participating in cryptographic communication through a third-party certificate authority. Certificate) and it is necessary to establish an infrastructure to enable cryptographic communication according to the authenticity of this warranty. Therefore, it is necessary to construct an inexpensive infrastructure for cryptographic communication using an asymmetric key method that is safe for man-in-the-middle attacks, and there is a problem in that the encryption process is complicated and the processing time is long due to this infrastructure.
- the system of the present invention performs encryption / decryption by generating a different key each time, an intermediate attack is impossible, and thus it is possible to safely perform cryptographic communication without the need for a trusted authority (CA) or an identity certificate introduced to solve this problem.
- CA trusted authority
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
암호알고리즘 | 형태 | 목적 | 양자 컴퓨터의 영향 |
AES-256 | Symmetric key | Encryption | Secure |
SHA-256, SHA-3 | - | Hash functions | Secure |
RSA | Public key | 전자서명, 키설정 | No longer secure |
ECDSA, ECDH(타원암호) | Public key | 전자서명, 키교환 | No longer secure |
DSA(finite field Cryptography) | Public key | 전자서명, 키교환 | No longer secure |
암호기법 | 키사이즈 | 효과적인 키강도/보안수준(bits) | |
기존 컴퓨팅 | 퀀텀 컴퓨팅 | ||
RSA-1024 | 1024 | 80 | 0 |
RSA-2048 | 2048 | 112 | 0 |
ECC-256 | 256 | 128 | 0 |
ECC-384 | 384 | 256 | 0 |
AES-128 | 128 | 128 | 64 |
AES-256 | 256 | 256 | 128 |
키사이즈(bits) | 효과적인키강도/보안수준(bits) | |
기존 컴퓨팅 | 양자 컴퓨팅 | |
256(|M|=32) | 128(AES) | 64 |
512(|M|=64) | 256(AES) | 128 |
1024(|M|=128) | 768(AES) | 384 |
2048(|M|=256) | 1536(AES) | 768 |
Claims (31)
- 메시지를 암호화하는 암호화 수행객체; 및상기 암호문을 원문 메시지로 복호화 하는 복호화 수행객체를 포함하며,상기 암호화 수행객체 및 복호화 수행객체는 순열 그룹에 기반하여 순열 형태인 대칭키와 비대칭키를 동시에 합성하여 메시지를 암복호화하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제1항에 있어서,상기 암호화 수행객체 및 복호화 수행객체는,암호화키(K e)를 이용하여 메시지를 암호문으로 암호화 하는 암호화기(ENC)와, 암호화된 암호문을 복호화키(K d)를 이용하여 복호화 하는 복호화기(DEC)와, 암호키생성기(MKG)를 포함하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제2항에 있어서,상기 암호화기(ENC)는,메시지 입력을 처리하는 입력큐;대칭키와 복호화 수행객체의 비대칭키를 이용하여 순열연산을 통해 암호문을 생성하는 GA 연산기; 및상기 생성된 암호문의 출력을 처리하는 출력큐를 포함하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제3항에 있어서,상기 GA 연산기는,상기 암호키생성기(MKG)로부터 대칭키(Q AB)와 복호화 수행객체의 비대칭키 쌍 중 공개키(G B)를 제공받아 순열연산을 통해 암호문을 생성하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제4항에 있어서,상기 순열연산은 Q AB -1G BQ AB(M) = C 수식에 의하여 이루어지며, Q AB는 암호화 수행객체와 복호화 수행객체의 대칭키, G B 는 복호화 수행객체의 공개키, M은 메시지 공간, C는 암호문 공간인 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제2항에 있어서,상기 복호화기(DEC)는,암호문 입력을 처리하는 입력큐;대칭키와 복호화 수행객체의 비대칭키를 이용하여 순열연산을 통해 원문메시지를 복원하는 GA 연산기; 및상기 복원된 원문메시지의 출력을 처리하는 출력큐를 포함하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제6항에 있어서,상기 GA 연산기는,상기 암호키생성기(MKG)로부터 대칭키(Q AB)와 복호화 수행객체의 비대칭키 쌍 중 개인키(H B)를 제공받아 순열연산을 통해 원문 메시지를 복원하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제7항에 있어서,상기 순열연산은 H BQ ABQ AB(C) = M 수식에 의하여 이루어지며, Q AB는 암호화 수행객체와 복호화 수행객체의 대칭키, H B 는 복호화 수행객체의 비대칭키 쌍 중의 개인키, M은 메시지 공간, C는 암호문 공간인 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제2항에 있어서,상기 암호키생성기는,복수의 매개변수를 사용한 키유도함수 KDF(key derivation function)를 통해 일회용 유사난수를 생성하는 난수생성기(PRNG); 및상기 키유도함수(KDF)를 통해 일회용 유사난수순열(PRP)를 생성하여 키생성모듈에 제공하는 순열생성기를 포함하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제9항에 있어서,상기 키생성모듈은,암호화 수행객체와 복호화 수행객체 간 공유하는 대칭키를 생성하는 대칭키모듈(MPK); 및메시지 암호화와 복호화 시 사용되는 복호화 수행객체의 한 쌍의 비대칭키인 공개키와 개인키를 함께 생성되는 공개키모듈(PK)과 개인키모듈(SK)을 포함하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 암호키생성기가 식별인자를 이용하여 마스터키를 생성하는 단계;암호키생성기에서 암호화와 복호화에 필요한 대칭키, 개인키 및 공개키 쌍을 생성하는 단계;암호화 수행객체가 암호화키인 대칭키와 복호화 수행객체가 생성한 공개키를 수신하여 암호문을 생성하는 단계; 및복호화 수행객체가 암호키생성기를 통해 생성된 대칭키와 비대칭키 중 자신의 개인키를 통해 암호화 수행객체를 통해 생성된 암호문을 복원하는 단계를 포함하는 것을 특징으로 하는 암호화 및 복호화 방법.
- 제12항에 있어서,상기 식별인자는,사용자의 개인정보를 포함하는 사용자 식별인자, 사용자 단말 정보를 포함하는 단말장치 식별인자 및 비밀함수 생성인자 중 적어도 하나를 포함하는 것을 특징으로 하는 암호화 및 복호화 방법.
- 제13항에 있어서,상기 암호문은 상기 생성된 대칭키 및 복호화 수행객체의 공개키를 이용하여 GA 연산기에 연산시켜 생성하는 것을 특징으로 하는 암호화 및 복호화 방법.
- 제14항에 있어서,상기 암호문(C)은 암호화 함수(E)에 암호화키(K e)를 대입하여 순열연산(M × K → C)에 의해 아래 수식과 같이 생성되는 것을 특징으로 하고,E (M, K e) = Q -1GQ(M) = C여기서 Q -1GQ 는 순열함수 G, Q의 순열연산(left multiplication)이고,
- 암호문 작성시 서명문을 생성하는 서명 수행객체; 및상기 암호문을 원문 메시지로 복호화 하기 위하여 상기 서명문을 검증하도록 형성되는 검증 수행객체를 포함하며,순열 그룹에 기반하여 순열 형태인 대칭키와 비대칭키를 이용하여 서명문을 생성하고 검증하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 서명 검증 시스템.
- 제17항에 있어서,상기 서명 수행객체 및 검증 수행객체는,순열연산을 통해 서명문을 생성하는 서명기와, 순열연산을 통해 상기 서명문을 검증하는 검증기와, 암호키생성기(MKG)를 포함하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 서명 검증 시스템.
- 제18항에 있어서,상기 서명기는,메시지 입력을 처리하는 입력큐;일회용개인키를 이용하여 순열연산을 통해 서명문을 생성하는 GA 연산기; 및상기 생성된 서명문의 출력을 처리하는 출력큐를 포함하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제19항에 있어서,상기 서명기의 GA연산기는,상기 암호키생성기(MKG)로부터 대칭키(Q AB)와 서명 수행객체의 개인키(H A)를 제공받아 순열연산을 통해 서명문을 생성하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제21항에 있어서,상기 검증기는,서명문을 입력받아 처리하는 입력큐;일회용공개키를 이용하여 순열연산을 통해 서명문을 검증하여 수락된 원문메시지를 생성하는 GA 연산기; 및상기 수락된 원문메시지의 출력을 처리하는 출력큐를 포함하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제22항에 있어서,상기 검증기의 GA연산기는,상기 암호키생성기(MKG)로부터 대칭키(Q AB)와 서명 수행객체의 공개키(G A)를 제공받아 순열연산을 통해 서명문을 검증하고 수락 또는 거절 여부를 확인하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제18항에 있어서,상기 암호키생성기는,복수의 매개변수를 사용한 키유도함수 KDF(key derivation function)를 통해 일회용 유사난수를 생성하는 난수생성기(PRNG); 및상기 키유도함수(KDF)를 통해 일회용 유사난수순열(PRP)를 생성하여 키생성모듈에 제공하는 순열생성기를 포함하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 제25항에 있어서,상기 키생성모듈은,서명 수행객체와 검증 수행객체 간 공유하는 대칭키를 생성하는 대칭키모듈(MPK); 및메시지 암호화와 복호화 시 사용되는 복호화 수행객체의 한 쌍의 비대칭키인 공개키와 개인키를 함께 생성되는 공개키모듈(PK)과 개인키모듈(SK)을 포함하는 것을 특징으로 하는 순열그룹 기반의 암호화 기술을 적용한 암호화시스템.
- 암호키생성기가 식별인자를 이용하여 마스터키를 생성하는 단계;암호키생성기에서 암호화와 복호화에 필요한 대칭키, 개인키 및 공개키 쌍을 생성하는 단계;서명 수행객체가 상기 생성된 대칭키와 서명키인 검증 수행객체의 개인키를 수신하여 서명문을 생성하는 단계; 및검증 수행객체가 상기 대칭키와 검증키인 서명 수행객체의 일회용공개키를 수신하여 서명 수행객체를 통해 생성된 서명문을 검증하고 상기 검증 결과에 따라 원문메시지를 수락하거나 거절하는 단계를 포함하는 것을 특징으로 하는 암호문 서명 및 검증 방법.
- 제28항에 있어서,상기 식별인자는,사용자의 개인정보를 포함하는 사용자 식별인자, 사용자 단말 정보를 포함하는 단말장치 식별인자 및 비밀함수 생성인자 중 적어도 하나를 포함하는 것을 특징으로 하는 암호문 서명 및 검증 방법.
- 제28항에 있어서,상기 서명문(M S)은 서명 함수(S)에 서명키(K S)를 대입하여 순열연산(M×K →S)에 의해 아래 수식과 같이 생성되는 것을 특징으로 하고,S(M, K S) = Q -1HQ(M) = M s여기서 Q -1HQ는 순열함수 H, Q의 순열연산(left multiplication)이고,
- 제28항에 있어서,상기 서명문의 검증은 검증 함수(V)에 검증키(K V)를 대입하여 순열연산(S ×K → S)에 의해 아래 수식과 같이 생성되는 것을 특징으로 하고,V(S, K v) = GQQ(M s) = M여기서 GQQ는 순열함수 G, Q의 순열연산(left multiplication)이고,메시지 M = (m 1 m n), 키 K = (k 1 k n), 서명문 M s = (s 1 s n) 는 각각 메시지집합 M={m 1 m n} 상에서의 순열그룹 G의 원소인 것(M,K,S ∈G)을 특징으로 하는 암호문 서명 및 검증 방법.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201980088769.4A CN113330712A (zh) | 2018-11-13 | 2019-11-12 | 采用基于排列群的加密技术的加密系统及方法 |
US17/293,613 US20220069984A1 (en) | 2018-11-13 | 2019-11-12 | Encryption system and method employing permutation group-based cryptographic technology |
EP19884666.9A EP3883178A4 (en) | 2018-11-13 | 2019-11-12 | ENCRYPTION SYSTEM AND METHOD USING PERMUTATION GROUP BASED ENCRYPTION TECHNOLOGY |
AU2019381522A AU2019381522A1 (en) | 2018-11-13 | 2019-11-12 | Encryption system and method employing permutation group-based encryption technology |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2018-0138716 | 2018-11-13 | ||
KR20180138716 | 2018-11-13 | ||
KR10-2019-0144235 | 2019-11-12 | ||
KR1020190144235A KR102304831B1 (ko) | 2018-11-13 | 2019-11-12 | 순열그룹 기반의 암호화 기술을 적용한 암호화시스템 및 방법 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020101325A1 true WO2020101325A1 (ko) | 2020-05-22 |
Family
ID=70731641
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2019/015346 WO2020101325A1 (ko) | 2018-11-13 | 2019-11-12 | 순열그룹 기반의 암호화 기술을 적용한 암호화시스템 및 방법 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2020101325A1 (ko) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111884805A (zh) * | 2020-06-24 | 2020-11-03 | 易联众信息技术股份有限公司 | 基于区块链及分布式身份的数据托管方法及系统 |
CN112291057A (zh) * | 2020-11-20 | 2021-01-29 | 天津市城市规划设计研究总院有限公司 | 城市规划领域提高智能物联网安全性的方法系统可读介质 |
CN112910630A (zh) * | 2021-02-02 | 2021-06-04 | 浙江大华技术股份有限公司 | 扩展密钥的置换方法及装置 |
CN113098860A (zh) * | 2021-03-30 | 2021-07-09 | 三一汽车起重机械有限公司 | 一种can总线加密方法、装置、工程机械和存储介质 |
CN114021173A (zh) * | 2021-11-15 | 2022-02-08 | 日晷科技(上海)有限公司 | 基于sm9密钥交换的量子密钥扩展方法、系统、介质及终端 |
CN114615392A (zh) * | 2022-03-18 | 2022-06-10 | 东北大学 | 一种基于比特联动的图像加密方法 |
CN114697122A (zh) * | 2022-04-08 | 2022-07-01 | 中国电信股份有限公司 | 数据传输方法、装置、电子设备及存储介质 |
CN117411728A (zh) * | 2023-12-14 | 2024-01-16 | 成都极数链科技有限公司 | 一种人员简历私有化管理方法、计算机设备及存储介质 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6212279B1 (en) | 1998-06-26 | 2001-04-03 | The United States Of America As Represented By The United States National Security Agency | Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form |
US6243467B1 (en) | 1998-07-23 | 2001-06-05 | The United States Of America As Represented By The National Security Agency | Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form |
KR100406139B1 (ko) * | 2001-11-28 | 2003-11-14 | 한국전자통신연구원 | 대칭 및 비대칭키 암호 연산 처리 시스템 및 그 처리 방법 |
US6782100B1 (en) | 1997-01-29 | 2004-08-24 | Certicom Corp. | Accelerated finite field operations on an elliptic curve |
JP2009128792A (ja) * | 2007-11-27 | 2009-06-11 | Nippon Telegr & Teleph Corp <Ntt> | 公開鍵暗号システム、公開鍵暗号方法、暗号化装置、復号化装置、暗号化プログラム及び復号化プログラム |
US7822200B2 (en) * | 2005-03-07 | 2010-10-26 | Microsoft Corporation | Method and system for asymmetric key security |
US20170118024A1 (en) * | 2014-01-31 | 2017-04-27 | Cryptometry Limited | System and method for performing secure communications |
KR20180060588A (ko) * | 2016-11-29 | 2018-06-07 | 서울대학교산학협력단 | 데이터 보안이 강화된 전자 서명 장치 및 방법 |
-
2019
- 2019-11-12 WO PCT/KR2019/015346 patent/WO2020101325A1/ko unknown
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6782100B1 (en) | 1997-01-29 | 2004-08-24 | Certicom Corp. | Accelerated finite field operations on an elliptic curve |
US6212279B1 (en) | 1998-06-26 | 2001-04-03 | The United States Of America As Represented By The United States National Security Agency | Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form |
US6243467B1 (en) | 1998-07-23 | 2001-06-05 | The United States Of America As Represented By The National Security Agency | Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form |
KR100406139B1 (ko) * | 2001-11-28 | 2003-11-14 | 한국전자통신연구원 | 대칭 및 비대칭키 암호 연산 처리 시스템 및 그 처리 방법 |
US7822200B2 (en) * | 2005-03-07 | 2010-10-26 | Microsoft Corporation | Method and system for asymmetric key security |
JP2009128792A (ja) * | 2007-11-27 | 2009-06-11 | Nippon Telegr & Teleph Corp <Ntt> | 公開鍵暗号システム、公開鍵暗号方法、暗号化装置、復号化装置、暗号化プログラム及び復号化プログラム |
US20170118024A1 (en) * | 2014-01-31 | 2017-04-27 | Cryptometry Limited | System and method for performing secure communications |
KR20180060588A (ko) * | 2016-11-29 | 2018-06-07 | 서울대학교산학협력단 | 데이터 보안이 강화된 전자 서명 장치 및 방법 |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111884805A (zh) * | 2020-06-24 | 2020-11-03 | 易联众信息技术股份有限公司 | 基于区块链及分布式身份的数据托管方法及系统 |
CN111884805B (zh) * | 2020-06-24 | 2023-08-01 | 易联众信息技术股份有限公司 | 基于区块链及分布式身份的数据托管方法及系统 |
CN112291057A (zh) * | 2020-11-20 | 2021-01-29 | 天津市城市规划设计研究总院有限公司 | 城市规划领域提高智能物联网安全性的方法系统可读介质 |
CN112910630B (zh) * | 2021-02-02 | 2022-12-06 | 浙江大华技术股份有限公司 | 扩展密钥的置换方法及装置 |
CN112910630A (zh) * | 2021-02-02 | 2021-06-04 | 浙江大华技术股份有限公司 | 扩展密钥的置换方法及装置 |
CN113098860A (zh) * | 2021-03-30 | 2021-07-09 | 三一汽车起重机械有限公司 | 一种can总线加密方法、装置、工程机械和存储介质 |
CN113098860B (zh) * | 2021-03-30 | 2023-04-07 | 三一汽车起重机械有限公司 | 一种can总线加密方法、装置、工程机械和存储介质 |
CN114021173A (zh) * | 2021-11-15 | 2022-02-08 | 日晷科技(上海)有限公司 | 基于sm9密钥交换的量子密钥扩展方法、系统、介质及终端 |
CN114615392A (zh) * | 2022-03-18 | 2022-06-10 | 东北大学 | 一种基于比特联动的图像加密方法 |
CN114697122A (zh) * | 2022-04-08 | 2022-07-01 | 中国电信股份有限公司 | 数据传输方法、装置、电子设备及存储介质 |
CN114697122B (zh) * | 2022-04-08 | 2023-11-07 | 中国电信股份有限公司 | 数据传输方法、装置、电子设备及存储介质 |
CN117411728A (zh) * | 2023-12-14 | 2024-01-16 | 成都极数链科技有限公司 | 一种人员简历私有化管理方法、计算机设备及存储介质 |
CN117411728B (zh) * | 2023-12-14 | 2024-02-13 | 成都极数链科技有限公司 | 一种人员简历私有化管理方法、计算机设备及存储介质 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020101325A1 (ko) | 순열그룹 기반의 암호화 기술을 적용한 암호화시스템 및 방법 | |
WO2020235782A1 (ko) | 분산 환경에서의 신원 인증 방법 | |
JP2693348B2 (ja) | 暗号化システム | |
WO2014139344A1 (zh) | 密钥下载方法、管理方法、下载管理方法及装置和系统 | |
WO2019223583A1 (zh) | 数据加密传输方法、终端设备及超晶格混沌器件的使用方法 | |
WO2014069783A1 (ko) | 패스워드 기반 인증 방법 및 이를 수행하기 위한 장치 | |
WO2014139342A1 (zh) | 密钥下载方法、管理方法、下载管理方法及装置和系统 | |
US20240143796A1 (en) | Protecting data from brute force attack | |
CN110932851B (zh) | 一种基于pki的多方协同运算的密钥保护方法 | |
WO2021075867A1 (ko) | 블록체인 기반 시스템을 위한 키의 저장 및 복구 방법과 그 장치 | |
EP3167569B1 (en) | Method and system for providing a secure update of code on a memory-constrained device | |
WO2015158038A1 (zh) | 可抵御差分功耗分析攻击的加密处理装置及方法 | |
US11438316B2 (en) | Sharing encrypted items with participants verification | |
WO2019223624A1 (zh) | 密钥分发方法及终端设备 | |
Garg et al. | Comparison of asymmetric algorithms in cryptography | |
WO2015030553A1 (ko) | 래티스 기반 인증서 비사용 서명 시스템 및 방법 | |
Patgiri et al. | Stealth: A highly secured end-to-end symmetric communication protocol | |
WO2020218708A1 (ko) | 홈 재활 서비스를 제공하기 위한 처방 정보를 암호화 및 복호화하는 방법 및 의사 단말 | |
WO2023054857A1 (ko) | 네트워크 내의 장치 | |
KR102304831B1 (ko) | 순열그룹 기반의 암호화 기술을 적용한 암호화시스템 및 방법 | |
US6233337B1 (en) | Methods and apparatus for enhanced security expansion of a secret key into a lookup table for improved security for wireless telephone messages | |
WO2021133074A2 (ko) | 경량 기기 전용 개체 또는 메시지 인증 방법 및 이를 수행하는 장치들 | |
CN116248316A (zh) | 文件加密方法、文件解密方法、装置及存储介质 | |
WO2021054619A1 (ko) | 확장함수를 이용한 복수의 묵시적 인증서 발급 시스템 및 그 발급 방법 | |
Balogun et al. | Multiple Caesar cypher encryption algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19884666 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019884666 Country of ref document: EP Effective date: 20210614 |
|
ENP | Entry into the national phase |
Ref document number: 2019381522 Country of ref document: AU Date of ref document: 20191112 Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: JP |