Strategic Study of CAE >> 2000, Volume 2, Issue 2
The Generating Lock P<G,X,X'>and Its Central Encrypting System
1. Department of Automation Engineering , Shandong University of Technology, Shandong Jinan 250061, China
2. Department of Computer Science and Information Engineering, Dayeh University,Chang hua Taiwan 51505, China
Next Previous
Abstract
The conception of the generating lock P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XA≠XB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.
Keywords
the generating lock
;
the central encrypting system
;
multi-tooth encrypting-decrypting algorithm
;
P
References
[ 1 ] Diffie W, Hellman M E. New directions in crypto¬graphy, IEEE transactions on information theory, 1976, IT-22 (6): 644~654
[ 2 ] Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key CryptoSys-tem ,communication of the associaation for computing machinery, 1978, 21 (2): 120~126
[ 3 ] Deng J L. Control problems of gray system, systems and control letters, 1982, 1 (5) : 285 ~ 294
[ 4 ] Deng J L. Introduction to gray system theory, the journal of gray system, 1989, 1 (1) : 1 ~ 19
[ 5 ] 史开泉.灰色信息关系理论[M].中国台北:全华 科技图书出版公司,1994.12~54
[ 6 ] Cai W. Introduction of extension sets, BUSEFAL, 1984, (19): 49~57