CN111756523B - Data transmission method and device - Google Patents
Data transmission method and device Download PDFInfo
- Publication number
- CN111756523B CN111756523B CN202010644032.0A CN202010644032A CN111756523B CN 111756523 B CN111756523 B CN 111756523B CN 202010644032 A CN202010644032 A CN 202010644032A CN 111756523 B CN111756523 B CN 111756523B
- Authority
- CN
- China
- Prior art keywords
- data
- transmitted
- random number
- authentication code
- message authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 67
- 230000005540 biological transmission Effects 0.000 title claims abstract description 38
- 238000004364 calculation method Methods 0.000 claims description 9
- 239000006185 dispersion Substances 0.000 description 12
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 3
- 238000005336 cracking Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
A data transmission method and device. The method comprises the following steps: when data to be transmitted is received, scrambling the data to be transmitted through XOR, shift and replacement operation to obtain scrambled data; calculating a message authentication code of the scrambled data; calculating to obtain an encryption key according to the message authentication code, and encrypting the disturbed data to obtain encrypted data; obtaining the head information of the encrypted data according to a preset format; and transmitting the head information of the encrypted data and the encrypted data. By applying the scheme, the safety of data transmission can be improved.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data transmission method and apparatus.
Background
The development of internet technology brings the change of covering the ground for the life of people, and shortens the distance between people in space and time. However, data transmission in a network is not secure and may be intercepted and tampered with at any time, especially sensitive data or financial data.
Currently, to improve the security of data transmission, data is usually encrypted before being transmitted over a network.
Nevertheless, the possibility of data interception and tampering is still high, and the security of data is difficult to meet the requirements of users.
Disclosure of Invention
The invention aims to solve the problem of improving the safety of data transmission.
In order to solve the above problem, an embodiment of the present invention provides a data transmission method, where the method includes: when data to be transmitted is received, scrambling the data to be transmitted through XOR, shift and replacement operation to obtain scrambled data; calculating a message authentication code of the scrambled data; calculating to obtain an encryption key according to the message authentication code, and encrypting the disturbed data to obtain encrypted data; obtaining the header information of the encrypted data according to a preset format, wherein the header information of the encrypted data comprises: indicating information of each algorithm, the message authentication code and the random number information, which are utilized in the process of scrambling and encrypting the data to be transmitted; and transmitting the head information of the encrypted data and the encrypted data.
Optionally, the scrambling performed on the data to be transmitted through xor, shift, and permutation operations includes: acquiring a first random number; respectively executing exclusive-or operation on each data block of the data to be transmitted by utilizing the first random number to obtain exclusive-or result data corresponding to each data block one to one; and performing shifting and permutation operation on each exclusive-or result data by using the data of the first byte of the first random number, and taking the result after the permutation operation as the scrambled data of the corresponding data block.
Optionally, the performing, by using the first random number, an exclusive or operation on each data block of the data to be transmitted respectively includes: performing byte dispersion on the first random number by using a preset key dispersion algorithm, and acquiring the first 16 bytes of a byte dispersion result as first data; when the data length of the data to be transmitted is less than or equal to 16 bytes, performing exclusive OR operation on the whole data to be transmitted as a data block and the first data; and when the data length of the data to be transmitted is greater than 16 bytes, calculating the XOR result data corresponding to each data block of the data to be transmitted based on the XOR result data of the first data and the first data block in the data to be transmitted.
Optionally, the calculating, based on the xor result data of the first data and the first data block of the data to be transmitted, the xor result data corresponding to each data block of the data to be transmitted includes: performing hash operation on the first random number and the first data by using a preset first hash algorithm to obtain second data; and taking the XOR result data of the first data and the first data block of the data to be transmitted as initial XOR result data, and executing XOR operation on the XOR result data corresponding to the previous data block and the second data to obtain the XOR result data corresponding to the current data block.
Optionally, the performing, by using the first byte of data of the first random number, shift and permutation operations on each xor result data includes: when the data of the first byte of the first random number is an even number, the third data is used as an identifier, and the scrambled data of the 2 i-th data block is determined in a preset permutation array; and determining the scrambled data of the 2i +1 th data block in the permutation array by taking the fourth data as an identifier; the third data is the result of taking the modulus of the length of the permutation array after the sum of the data of the first byte of the first random number and the XOR result data of the 2i +1 th data block; the fourth data is the result of taking the modulus of the length of the permutation array after the sum of the data of the first byte of the first random number and the XOR result data of the 2 i-th data block, wherein i is a natural number; when the data of the first byte of the first random number is an odd number, the fourth data is used as an identifier, and the scrambled data of the 2i-1 th data block is determined in the permutation array; and determining scrambled data of the 2 i-th data block in the permutation array by taking the fifth data as an identifier; and the fifth data is the result of taking the modulus of the length of the permutation array after the sum of the data of the first byte of the first random number and the XOR result data of the 2i-1 th data block.
Optionally, the calculating a message authentication code of the scrambled data includes: filling the scrambled data; performing hash operation on the filled data by using a preset second hash algorithm, and determining sixth data according to a hash operation result; and performing hash operation on the sixth data and the 1 st data block of the data to be transmitted by using a preset third hash algorithm to obtain the message authentication code of the disturbed data.
Optionally, the calculating an encryption key according to the message authentication code includes: performing hash operation on the data of the first random number part bytes and the message authentication code of the disturbed data by using a preset fourth hash algorithm to obtain seventh data; and performing corresponding operation on the seventh data and a preset root key according to a preset encryption algorithm to obtain the encryption key.
The embodiment of the invention also provides a data transmission method, which comprises the following steps: when receiving the head information of the encrypted data and the encrypted data, determining a decryption key according to the head information of the encrypted data, decrypting the encrypted data, and obtaining the decrypted data, wherein the head information of the encrypted data comprises: the method comprises the steps that indication information and random number information of each algorithm utilized in the process of scrambling and encrypting data to be transmitted and a message authentication code corresponding to the encrypted data are obtained; obtaining a message authentication code corresponding to the decrypted data according to the decrypted data; and when the message authentication code corresponding to the decrypted data is the same as the message authentication code corresponding to the encrypted data, descrambling the decrypted data to obtain the data to be transmitted.
An embodiment of the present invention provides a data transmission apparatus, where the apparatus includes: the scrambling unit is suitable for scrambling the data to be transmitted through XOR, shift and replacement operations when the data to be transmitted is received, so that scrambled data are obtained; a first calculation unit adapted to calculate a message authentication code of the scrambled data; the encryption unit is suitable for calculating an encryption key according to the message authentication code and encrypting the scrambled data to obtain encrypted data; a header information generating unit, adapted to obtain header information of the encrypted data according to a preset format, where the header information of the encrypted data includes: indicating information of each algorithm, the message authentication code and the random number information, which are utilized in the process of scrambling and encrypting the data to be transmitted; and the transmission unit is suitable for transmitting the head information of the encrypted data and the encrypted data.
Optionally, the scrambling unit comprises: an obtaining subunit adapted to obtain a first random number; the first operation subunit is suitable for performing exclusive-or operation on each data block of the data to be transmitted respectively by using the first random number to obtain exclusive-or result data corresponding to each data block one by one; and the second operation subunit is suitable for performing shifting and permutation operation on each exclusive-or result data by using the data of the first byte of the first random number, and taking the result after the permutation operation as the scrambled data of the corresponding data block.
Optionally, the first operation subunit includes: the byte dispersion module is suitable for performing byte dispersion on the first random number by using a preset key dispersion algorithm and acquiring the first 16 bytes of a byte dispersion result as first data; the first exclusive-or module is suitable for performing exclusive-or operation on the data to be transmitted as a whole as a data block and the first data when the data length of the data to be transmitted is less than or equal to 16 bytes; and the second exclusive-or module is suitable for calculating exclusive-or result data corresponding to each data block of the data to be transmitted based on the exclusive-or result data of the first data and the first data block of the data to be transmitted when the data length of the data to be transmitted is greater than 16 bytes.
Optionally, the second xor module is adapted to perform a hash operation on the first random number and the first data by using a preset first hash algorithm to obtain second data; and taking the XOR result data of the first data and the first data block of the data to be transmitted as initial XOR result data, and executing XOR operation on the XOR result data corresponding to the previous data block and the second data to obtain the XOR result data corresponding to the current data block.
Optionally, the second operation subunit includes: the first operation module is suitable for determining scrambled data of the 2 i-th data block in a preset permutation array by taking third data as an identifier when the data of the first byte of the first random number is an even number; and determining the scrambled data of the 2i +1 th data block in the permutation array by taking the fourth data as an identifier; the third data is the result of taking the modulus of the length of the permutation array after the sum of the data of the first byte of the first random number and the XOR result data of the 2i +1 th data block; the fourth data is the result of taking the modulus of the length of the permutation array after the sum of the data of the first byte of the first random number and the XOR result data of the 2 i-th data block, wherein i is a natural number; the second operation module is suitable for taking the fourth data as an identifier when the data of the first byte of the first random number is an odd number, and determining the scrambled data of the 2i-1 data block in the permutation array; and determining scrambled data of the 2 i-th data block in the permutation array by taking the fifth data as an identifier; and the fifth data is the result of taking the modulus of the length of the permutation array after the sum of the data of the first byte of the first random number and the XOR result data of the 2i-1 th data block.
Optionally, the first computing unit includes: a padding subunit adapted to pad the scrambled data; the first calculating subunit is suitable for performing hash operation on the filled data by using a preset second hash algorithm, and determining sixth data according to a hash operation result; and the second calculating subunit is adapted to perform hash operation on the sixth data and the 1 st data block of the data to be transmitted by using a preset third hash algorithm to obtain the message authentication code of the scrambled data.
Optionally, the encryption unit is adapted to perform hash operation on the data of the first random number part bytes and the message authentication code of the scrambled data by using a preset fourth hash algorithm, so as to obtain seventh data; and performing corresponding operation on the seventh data and a preset root key according to a preset encryption algorithm to obtain the encryption key.
The embodiment of the invention also provides another data transmission device, which comprises: a decryption unit, adapted to determine a decryption key according to the header information of the encrypted data when receiving the header information of the encrypted data and the encrypted data, and decrypt the encrypted data to obtain decrypted data, where the header information of the encrypted data includes: the method comprises the steps that indication information and random number information of each algorithm utilized in the process of scrambling and encrypting data to be transmitted and a message authentication code corresponding to the encrypted data are obtained; the second computing unit is suitable for obtaining a message authentication code corresponding to the decrypted data according to the decrypted data; and the descrambling unit is suitable for descrambling the decrypted data to obtain the data to be transmitted when the message authentication code corresponding to the decrypted data is the same as the message authentication code corresponding to the encrypted data.
Compared with the prior art, the technical scheme of the embodiment of the invention has the following advantages:
by adopting the scheme, when the data to be transmitted is received, the data to be transmitted is scrambled through the operations of exclusive or, shift and replacement, the scrambled data is encrypted and then transmitted, and the data to be transmitted is not encrypted and transmitted, so that the security of data transmission can be improved.
Drawings
Fig. 1 is a flow chart of a data transmission method according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method for scrambling data according to an embodiment of the present invention;
FIG. 3 is a flow chart of a method for calculating a message authentication code according to an embodiment of the present invention;
FIG. 4 is a flow chart of another data transmission method according to an embodiment of the present invention;
FIG. 5 is a flow chart of a method for transmitting data according to another embodiment of the present invention;
FIG. 6 is a flow chart of a method for transmitting data according to another embodiment of the present invention;
FIG. 7 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of another data transmission device according to an embodiment of the present invention.
Detailed Description
At present, before data is transmitted through a network, although data to be transmitted is encrypted, the data security is still poor, and the data is easy to intercept and even tamper.
In view of the above problems, embodiments of the present invention provide a data transmission method, where when receiving data to be transmitted, the method performs scrambling on the data to be transmitted through xor, shift, and permutation operations, encrypts the scrambled data and then transmits the encrypted data, instead of transmitting the encrypted data only, so that security of data transmission can be improved.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Referring to fig. 1, an embodiment of the present invention provides a data transmission method, where the method may include the following steps:
and step 11, when the data to be transmitted is received, scrambling the data to be transmitted through XOR, shift and replacement operations to obtain scrambled data.
In specific implementation, the sending end scrambles the data to be transmitted and then sends the data to the receiving end, and the receiving end can obtain the data to be transmitted only after descrambling the received data, so that the data security can be further improved.
In the embodiment of the present invention, scrambling is performed on data to be transmitted, which is mainly performed by exclusive-or, shift, and permutation operations, and of course, other operations may be included in the scrambling process, and the details are not limited. And the execution order of the xor, shift and permutation operations may be various, for example, the xor, shift and permutation operations may be executed in sequence, or the shift and permutation operations may be executed first, and the xor operations may be executed.
In an embodiment of the present invention, the method shown in fig. 2 may be used to scramble the data to be transmitted. Specifically, the scrambling method may include the steps of:
In specific implementation, in order to enhance the scrambling property, a random number generator may first generate a random number rnd [1,4] with a length of 4 bytes, and then select corresponding data rnd [0] from a preset permutation array by using a first byte rnd [1] of the random number rnd [1,4] as an identifier. The permutation array may be an S-box SboxTable, where the data rnd [0] ═ SboxTable [ rnd [1] ]. Finally, the data rnd [0] and the random numbers rnd [1,4] can be merged to obtain a first random number rnd [0, 4] with the length of 5 bytes, and the data rnd [0] is the data of the first byte of the first random number rnd [0, 4 ].
And step 22, performing exclusive or operation on each data block of the data to be transmitted respectively by using the first random number to obtain exclusive or result data corresponding to each data block one to one.
In an embodiment of the present invention, a predetermined key distribution algorithm may be utilized to perform byte distribution on the first random number rnd [0, 4], and obtain the first 16 bytes of a byte distribution result as the first data v 1. The key distribution Algorithm may be selected according to actual needs, for example, the key distribution Algorithm may be a Secure Hash Algorithm (SM3), a Secure Hash Algorithm (SHA 1), or a Message Digest Algorithm (Message Digest Algorithm, MD 5).
After the first data v1 is obtained, the exclusive or operation may be performed on the data to be transmitted according to the length of the data to be transmitted. For example, when the data length of the data to be transmitted is less than or equal to 16 bytes, performing an exclusive or operation on the whole data to be transmitted as a data block and the first data v1 to obtain exclusive or result data e 0. The length of the xor result data e0 is the length of the data to be transmitted.
When the data length of the data to be transmitted is greater than 16 bytes, calculating the exclusive-or result data corresponding to each data block of the data to be transmitted based on the exclusive-or result data of the first data v1 and the first data block of the data to be transmitted.
Specifically, a preset first hash algorithm may be used to perform a hash operation on the first random number rnd [0, 4] and the first data v1, so as to obtain second data v 2.
Then, the data to be transmitted is divided into N data blocks (d0, d1, … …, dN, … …, dN) by taking 16 bytes as the data block length, and the xor operation is performed on the first data v1 and the first data block d0 in the data to be transmitted, so as to obtain the xor result data e0, that is, e0 ═ v1^ d 0.
Then, taking the xor result data e0 as initial xor result data, performing xor operation on the xor result data corresponding to the previous data block and the second data to obtain xor result data corresponding to the current data block, that is, calculating the xor result data eN corresponding to each data block dN of the data to be transmitted by using the following formula based on the xor result data e0 until obtaining the xor result data eN of the last data block dN:
en=dn^e(n-1)0^v2(1)
the first hash algorithm may be an SM3 algorithm, an SHA1 algorithm, or other algorithms, which is not limited specifically.
And step 23, performing shifting and permutation operations on each exclusive-or result data by using the data of the first byte of the first random number, and taking the result after the permutation operation as the scrambled data of the corresponding data block.
In a specific implementation, with the data rnd [0] of the first byte of the first random number rnd [0, 4], the shift and permutation operation may be performed on each of the xor result data e0 to eN in various ways, which is not limited in particular. By performing shift and permutation operations on each of the exclusive or result data e0 to eN by rnd [0], the disorder of data can be increased.
In an embodiment of the present invention, when the data rnd [0] of the first byte of the first random number rnd [0, 4] is an even number, the third data v3 is used as an identifier, and the scrambled data f [2 × i ] of the 2 i-th data block is determined in a preset permutation array, that is:
taking the replacement data as an S-box SboxTable as an example, wherein the third data v3 is the sum of the data rnd [0] of the first byte of the first random number rnd [0, 4] and the xor result data e [2 × i + k ] of the 2i + k-th data block, and then modulo the length Sbox _ len of the replacement array SboxTable, that is, v3 ═ e [2 × i + k ] + rnd [0 ])% Sbox _ len. The fourth data v4 is the sum of the xor result data e [2 × i + m ] of the data rnd [0] of the first byte of the first random number rnd [0, 4] and the 2i + m data block, and the result of modulo the length Sbox _ len of the permutation array SboxTable, that is, v4 ═ (e [2 × i + m ] + rnd [0 ])% Sbox _ len. i ∈ (0, 1, …, length of data to be transmitted/2), and m and k are integers.
This makes it possible to obtain:
f[2*i]=SboxTable[(e[2*i+k]+rnd[0])%Sbox_len];
f[2*i+1]=SboxTable[(e[2*i+m]+rnd[0])%Sbox_len]。
for example, when m is 0 and k is 1, v3 is (e [2 × i +1] + rnd [0 ])% Sbox _ len, f [2 × i ] ═ SboxTable [ (e [2 × i +1] + rnd [0 ])% Sbox _ len ], that is, data after scrambling for the 2 i-th data block is determined based on the exclusive or result data e [2 × i +1] of the 2 i-th data block. When m is 0 and k is 1, v4 ═ e [2 × i ] + rnd [0 ])% Sbox _ len, f [2 × i +1] ═ Sbox table [ (e [2 × i ] + rnd [0 ])% Sbox _ len ], that is, scrambled data for the 2i +1 th block is determined based on exclusive-or result data e [2 | ] of the 2i th block.
When the data rnd [0] of the first byte of the first random number rnd [0, 4] is an odd number, determining data f [2 x i-1] scrambled by the 2i-1 data block in the permutation array SbOxTable by using the fourth data v4 as an identifier; taking fifth data v5 as an identifier, and determining scrambled data of the 2 i-th data block in the permutation array SbOxTable; the fifth data v5 is the sum of the xor result data e [2 × i-p ] of the first byte of the first random number rnd [0, 4] and the data rnd [0] of the 2i-p data block, and the result of modulo the length Sbox _ len of the permutation array SboxTable, that is, v5 ═(e [2 × i-p ] + rnd [0 ])% Sbox _ len, where p and q are integers.
This makes it possible to obtain:
f[2*i-1]=SboxTable[(e[2*i+m]+rnd[0])%Sbox_len];
f[2*i]=SboxTable[(e[2*i-p]+rnd[0])%Sbox_len]。
for example, when m is 0 and p is 1, v4 is (e [2 × i ] + rnd [0 ])% Sbox _ len, f [2 × i-1] ═ SboxTable [ (e [2 × i ] + rnd [0 ])% Sbox _ len, that is, data after scrambling for the 2i-1 th data block is determined based on the exclusive or result data e [2 × i +1] of the 2 i-th data block. When m is 0 and p is 1, v5 ═ e [2 × i-1] + rnd [0 ])% Sbox _ len, f [2 × i ] ═ Sbox table [ (e [2 × i-1] + rnd [0 ])% Sbox _ len ], that is, scrambled data for the 2 i-th data block is determined based on exclusive-or result data e [2 × i-1] of the 2 i-1-th data block.
And step 12, calculating the message authentication code of the scrambled data.
In an embodiment of the present invention, the message authentication code of the scrambled data may be calculated using the method shown in fig. 3. The calculation method may specifically include the steps of:
and step 31, filling the disturbed data.
In a specific implementation, the scrambled data may include: f0, f1, … …, f (N-1), fN. In an embodiment of the present invention, when the length of the last data block fN of the scrambled data is an integer multiple of 16 bytes, "+" and 15 "-" may be used as the last data block f (N +1) of the scrambled data. When the length of the last data block fN of the scrambled data is an integer multiple other than 16 bytes, fN may be supplemented with 1 "×" and a plurality of "-" until the length of fN is an integer multiple of 16 bytes.
And step 32, performing hash operation on the filled data by using a preset second hash algorithm, and determining sixth data according to a hash operation result.
In a specific implementation, the second hash algorithm may be selected according to an actual situation, and is not limited specifically, for example, the second hash algorithm may be an SHA1 algorithm, and may also be an MD5 algorithm, and the like. The padded data is subjected to a hash operation, and the first 4 bytes of the hash operation result are taken as sixth data v 6.
And step 33, performing hash operation on the sixth data and the 1 st data block of the data to be transmitted by using a preset third hash algorithm to obtain the message authentication code of the disturbed data.
In a specific implementation, the third hash algorithm may be selected according to an actual situation, and is not limited specifically, for example, the third hash algorithm may be an SHA1 algorithm, and may also be an MD5 algorithm, and the like. The first hash algorithm, the second hash algorithm, and the third hash algorithm may be the same or different.
And carrying out hash operation on the sixth data v6 and the 1 st data block d0 of the data to be transmitted, and taking the first 4 bytes of a hash operation result as a message authentication code MAC of the scrambled data.
Because the message authentication code MAC of the disturbed data is formed by two parts of calculation, sixth data v6 needs to be calculated firstly, and then the message authentication code MAC is formed by utilizing the sixth data v6 and the 1 st data block of the data to be transmitted, thereby not only verifying the integrity of the data through the message authentication code MAC, but also preventing the attack of a cracker.
And step 13, calculating to obtain an encryption key according to the message authentication code, and encrypting the scrambled data to obtain encrypted data.
In an embodiment of the present invention, a preset fourth hash algorithm may be first used to perform a hash operation on the data of the partial bytes of the first random number rnd [0, 4] and the message authentication code MAC of the scrambled data, so as to obtain seventh data v 7; and then, according to a preset encryption algorithm, performing corresponding operation on the seventh data v7 and a preset root key rootkey to obtain the encryption key.
The data of the partial bytes of the first random number rnd [0, 4] may be any partial bytes, for example, the data of the partial bytes of the first random number rnd [0, 4] may be rnd [1,4], that is, the last 4 bytes of the data of the first random number rnd [0, 4 ]. And (5) calculating the rnd [1,4] and the message authentication code MAC to obtain an encryption key. For example, the encryption key v7 rootkey. And encrypting the scrambled data (f0, f1, … …, f (N-1), fN) to obtain encrypted data (h0, h1, … …, h (N + 1)).
In specific implementation, the root key rootkey is private, and even if the encryption algorithm is cracked, the data to be transmitted is difficult to obtain. And, because rnd [1,4] is generated randomly, the difficulty of cracking the encryption key is further increased.
It should be noted that, in a specific implementation, the encryption algorithm used for encrypting the scrambled data may be a symmetric encryption algorithm, such as a national crypto block symmetric encryption algorithm SM4 or an international standard symmetric AES algorithm, and is not particularly limited.
And step 14, obtaining the head information of the encrypted data according to a preset format.
Wherein the header information of the encrypted data includes: and indication information of each algorithm, the message authentication code and the random number information, which are utilized in the process of scrambling and encrypting the data to be transmitted. Each algorithm utilized in the process of scrambling and encrypting the data to be transmitted may include: the first hash algorithm, the second hash algorithm, the third hash algorithm, the fourth hash algorithm, the algorithm and the encryption algorithm of hash operation, the key dispersion algorithm and the like. The random number information may include random numbers rnd [1,4] generated by a random number generator, and the like.
In particular implementations, the header information may be formatted in a variety of ways. For example, the high nibble of the first byte of the header information may be set to indicate an encryption algorithm, and the low nibble of the first byte may be set to indicate a key distribution algorithm. Setting a third byte of the header information to sequentially indicate a first hash algorithm, a second hash algorithm, a third hash algorithm and a fourth hash algorithm. The other bytes in which the header information is set indicate a random number rnd [1,4], a message authentication code MAC, and the like.
It should be noted that, although the random number rnd [1,4] may be indicated by header information of the encrypted data, since rnd [0] is unknown, in order to obtain the second data v2, it is necessary to correctly calculate the value of the first database d0 of the data to be transmitted, so that the difficulty in cracking the data may be increased.
And step 15, transmitting the head information of the encrypted data and the encrypted data.
In a specific implementation, the header information of the encrypted data and the encrypted data may be transmitted in a wireless manner, or the header information of the encrypted data and the encrypted data may be transmitted in a wired manner, which is not limited specifically.
Fig. 4 is a flowchart of a specific data transmission method according to an embodiment of the present invention. Referring to fig. 4, the method may include the steps of:
step 401 generates a random number rnd [1,4] of 4 bytes in length.
In step 403, the first data v1 is calculated.
When the length of the data to be transmitted is greater than 16 bytes, step 405 is executed, otherwise step 408 is executed.
In step 405, second data v2 is calculated.
And step 408, performing exclusive or on the whole data to be transmitted as a data block and the first data v1 to obtain e 0.
And step 409, filling the scrambled data.
In step 410, seventh data v7 is calculated.
At step 412, an encryption key is calculated.
In step 413, the scrambled data is encrypted by using the encryption key, so as to obtain encrypted data D1.
In a specific implementation, steps 401 to 415 can be implemented with reference to the above description of steps 11 and 15, which is not described herein again.
As can be seen from the above, by applying the data transmission method in the embodiment of the present invention, when data to be transmitted is received, the data to be transmitted is scrambled through xor, shift, and permutation operations, and the scrambled data is encrypted and then transmitted, instead of transmitting only the data to be transmitted after being encrypted, so that the security of data transmission can be improved. Moreover, the integrity of the received data can be verified through the message authentication code of the scrambled data, so that the receiving efficiency is improved.
Referring to fig. 5, an embodiment of the present invention further provides another data transmission method, where the method may include:
Wherein the header information of the encrypted data includes: the method comprises the steps of carrying out scrambling on data to be transmitted, indicating information and random number information of each algorithm utilized in the process of encrypting the data to be transmitted, and obtaining a message authentication code corresponding to the encrypted data.
In a specific implementation, according to the header information of the encrypted data, the algorithm information, the random number information and the message authentication code used in the scrambling and encryption process of the data to be transmitted can be used.
And step 52, obtaining a message authentication code corresponding to the decrypted data according to the decrypted data.
And 53, when the message authentication code corresponding to the decrypted data is the same as the message authentication code corresponding to the encrypted data, descrambling the decrypted data to obtain the data to be transmitted.
Fig. 6 is a detailed flowchart of the data transmission method shown in fig. 5. Referring to fig. 6, the method may include the steps of:
Wherein, under the condition that the decryption operation is correct, the random number rnd' 1,4 is the same as the random number rnd 1,4 in the scrambling process.
Wherein, under the condition that the selection operation is correct, rnd' 0 is the same as data rnd 0 in the scrambling process.
Wherein, under the condition that the merging operation is correct, rnd' 0, 4 is the same as the first random number rnd 0, 4 in the scrambling process.
When the hash operation is correct, v 7' is the same as the seventh data v7 in the scrambling process.
And under the condition that the corresponding operation is carried out on the v7 'and the root key rootkey correctly, the decryption key' is the same as the encryption key in the scrambling process.
Wherein, in the case that the decryption operation is correct, f0 ', … …, fn + 1' are respectively the same as the scrambled data f0, … …, fn +1 in the scrambling process.
When the hash operation is correct, v 6' is the same as the sixth data v6 in the scrambling process.
Wherein, in the case that the byte dispersion operation is correct, v 1' is the same as the first data v1 in the scrambling process.
In step 609, f0 'is shifted and replaced to obtain e 0'.
When the shift permutation is correct, e 0' is the same as the exclusive-or result data e0 of the first data block d0 of the data to be transmitted in the scrambling process.
In step 610, XOR operation is performed on e0 ' and v1 ' to obtain d0 '.
When the exclusive-or operation is correct, d 0' is the same as the first data block d0 of the data to be transmitted in the scrambling process. Step 611, performing hash operation on v6 ' and d0 ' by using a third hash algorithm to obtain the MAC '.
And under the condition that the Hash operation is correct, the MAC' is the same as the message authentication code MAC in the scrambling process.
When the MAC' is equal to the MAC and the encrypted data is complete, step 613 is continuously performed, otherwise, the whole data transmission process is ended.
When the length of the data to be transmitted is greater than 16 bytes, execute step 615, otherwise execute step 618.
Wherein, under the condition that the shifting permutation and the depopulation operations are both correct, e0 ', … … and eN' are respectively the same as the exclusive-or result data e0, … … and eN corresponding to the corresponding data block of the data to be transmitted in the scrambling process.
In step 616, a first hash algorithm is used to perform a hash operation on d0 ' and rnd ' 0, 4 to obtain v2 '.
When the hash operation is correct, v 2' is the same as the second data v2 in the scrambling process.
Under the condition of correct calculation operation, d0 ', d1 ', … … and dN ' are the same as corresponding data blocks d0, d1, … … and dN of the data to be transmitted shown in the scrambling process.
The steps 601 to 618 are a process of receiving data by the receiving end, that is, a process of decrypting and descrambling the received data, and may be specifically implemented with reference to the steps 401 to 415.
In order to make the present invention more understood and realized by those skilled in the art, the following detailed description describes a corresponding apparatus for the above data transmission method.
Referring to fig. 7, an embodiment of the present invention provides a data transmission apparatus 70, where the apparatus 70 may include: a scrambling unit 71, a first calculating unit 72, an encrypting unit 73, a header information generating unit 74, and a transmitting unit 75. Wherein:
the scrambling unit 71 is adapted to scramble the data to be transmitted through xor, shift and permutation operations when the data to be transmitted is received, so as to obtain scrambled data;
the first calculating unit 72 is adapted to calculate a message authentication code of the scrambled data;
the encryption unit 73 is adapted to calculate an encryption key according to the message authentication code, and encrypt the scrambled data to obtain encrypted data;
the header information generating unit 74 is adapted to obtain header information of the encrypted data according to a preset format, where the header information of the encrypted data includes: indicating information of each algorithm, the message authentication code and the random number information, which are utilized in the process of scrambling and encrypting the data to be transmitted;
the transmission unit 75 is adapted to transmit the header information of the encrypted data and the encrypted data.
In a specific implementation, the scrambling unit 71 may include: an acquisition subunit 711, a first operation subunit 712, and a second operation subunit 713. Wherein:
the obtaining subunit 711, adapted to obtain a first random number;
the first operation subunit 712 is adapted to perform an exclusive or operation on each data block of the data to be transmitted respectively by using the first random number, so as to obtain an exclusive or result data corresponding to each data block one to one;
the second operation subunit 713 is adapted to perform shift and permutation operations on each xor result data by using the data of the first byte of the first random number, and use the result after the permutation operation as the scrambled data of the corresponding data block.
In a specific implementation, the first operation subunit 712 includes: a byte scatter module 7121, a first xor module 7122, and a second xor module 7123. Wherein:
the byte dispersing module 7121 is adapted to perform byte dispersion on the first random number by using a preset key dispersion algorithm, and obtain the first 16 bytes of a byte dispersion result as first data;
the first exclusive-or module 7122 is adapted to perform exclusive-or operation on the whole to-be-transmitted data as a data block with the first data when the data length of the to-be-transmitted data is less than or equal to 16 bytes;
the second xor module 7123 is adapted to, when the data length of the data to be transmitted is greater than 16 bytes, calculate xor result data corresponding to each data block of the data to be transmitted based on the xor result data of the first data and the first data block of the data to be transmitted.
In an embodiment of the present invention, the second xor module 7123 is adapted to perform a hash operation on the first random number and the first data by using a preset first hash algorithm to obtain second data; and taking the XOR result data of the first data and the first data block of the data to be transmitted as initial XOR result data, and executing XOR operation on the XOR result data corresponding to the previous data block and the second data to obtain the XOR result data corresponding to the current data block.
In a specific implementation, the second operation subunit 713 may include: a first computing module 7131 and a second computing module 7132. Wherein:
the first arithmetic module 7131 is adapted to, when the data of the first byte of the first random number is an even number, determine, using third data as an identifier, data scrambled by the 2 i-th data block in a preset permutation array; and determining the scrambled data of the 2i +1 th data block in the permutation array by taking the fourth data as an identifier; the third data is the result of taking the modulus of the length of the permutation array after the sum of the data of the first byte of the first random number and the XOR result data of the 2i +1 th data block; the fourth data is the result of taking the modulus of the length of the permutation array after the sum of the data of the first byte of the first random number and the XOR result data of the 2 i-th data block, wherein i is a natural number;
the second operation module 7132 is adapted to, when the data of the first byte of the first random number is an odd number, determine, using the fourth data as an identifier, the scrambled data of the 2i-1 th data block in the permutation array; and determining scrambled data of the 2 i-th data block in the permutation array by taking the fifth data as an identifier; and the fifth data is the result of taking the modulus of the length of the permutation array after the sum of the data of the first byte of the first random number and the XOR result data of the 2i-1 th data block.
In a specific implementation, the first calculating unit 72 may include: a padding subunit 721, a first calculation subunit 722, and a second calculation subunit 723. Wherein:
the padding subunit 721 is adapted to pad the scrambled data;
the first calculating subunit 722 is adapted to perform hash operation on the filled data by using a preset second hash algorithm, and determine sixth data according to a hash operation result;
the second calculating subunit 723 is adapted to perform hash operation on the sixth data and the 1 st data block of the data to be transmitted by using a preset third hash algorithm, so as to obtain a message authentication code of the scrambled data.
The encryption unit 73 is adapted to perform hash operation on the data of the first random number partial byte and the message authentication code of the scrambled data by using a preset fourth hash algorithm to obtain seventh data; and performing corresponding operation on the seventh data and a preset root key according to a preset encryption algorithm to obtain the encryption key.
Referring to fig. 8, an embodiment of the present invention further provides a data transmission apparatus 80, where the apparatus 80 may include: a decryption unit 81, a second calculation unit 82 and a descrambling unit 83. Wherein:
the decryption unit 81 is adapted to, when receiving the header information of the encrypted data and the encrypted data, determine a decryption key according to the header information of the encrypted data, and decrypt the encrypted data to obtain decrypted data, where the header information of the encrypted data includes: the method comprises the steps that indication information and random number information of each algorithm utilized in the process of scrambling and encrypting data to be transmitted and a message authentication code corresponding to the encrypted data are obtained;
the second calculating unit 82 is adapted to obtain a message authentication code corresponding to the decrypted data according to the decrypted data;
the descrambling unit 83 is adapted to descramble the decrypted data to obtain the data to be transmitted when the message authentication code corresponding to the decrypted data is the same as the message authentication code corresponding to the encrypted data.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: ROM, RAM, magnetic or optical disks, and the like.
Although the present invention is disclosed above, the present invention is not limited thereto. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (6)
1. A method of data transmission, comprising:
when data to be transmitted is received, scrambling the data to be transmitted through XOR, shift and replacement operations to obtain scrambled data;
calculating a message authentication code of the scrambled data;
calculating to obtain an encryption key according to the message authentication code, and encrypting the disturbed data to obtain encrypted data;
obtaining the header information of the encrypted data according to a preset format, wherein the header information of the encrypted data comprises: indicating information of each algorithm, the message authentication code and the random number information, which are utilized in the process of scrambling and encrypting the data to be transmitted;
transmitting the head information of the encrypted data and the encrypted data;
the calculating the message authentication code of the scrambled data comprises: filling the scrambled data; performing hash operation on the filled data by using a preset second hash algorithm, and determining sixth data according to a hash operation result; and performing hash operation on the sixth data and the 1 st data block of the data to be transmitted by using a preset third hash algorithm to obtain the message authentication code of the disturbed data.
2. The data transmission method of claim 1, wherein the scrambling performed on the data to be transmitted by exclusive-or, shift, and permute operations comprises:
acquiring a first random number; respectively executing exclusive-or operation on each data block of the data to be transmitted by using the first random number to obtain exclusive-or result data corresponding to each data block one to one;
and performing shifting and permutation operation on each exclusive-or result data by using the data of the first byte of the first random number, and taking the result after the permutation operation as the scrambled data of the corresponding data block.
3. The data transmission method according to claim 2, wherein the calculating an encryption key according to the message authentication code includes:
performing hash operation on the data of the first random number part bytes and the message authentication code of the disturbed data by using a preset fourth hash algorithm to obtain seventh data;
and performing corresponding operation on the seventh data and a preset root key according to a preset encryption algorithm to obtain the encryption key.
4. A data transmission apparatus, comprising:
the scrambling unit is suitable for scrambling the data to be transmitted through XOR, shift and replacement operations when the data to be transmitted is received, so that scrambled data are obtained;
a first calculation unit adapted to calculate a message authentication code of the scrambled data;
the encryption unit is suitable for calculating an encryption key according to the message authentication code and encrypting the scrambled data to obtain encrypted data;
a header information generating unit, adapted to obtain header information of the encrypted data according to a preset format, where the header information of the encrypted data includes: indicating information of each algorithm, the message authentication code and the random number information, which are utilized in the process of scrambling and encrypting the data to be transmitted;
a transmission unit adapted to transmit header information of the encrypted data and the encrypted data;
the first calculation unit includes:
a padding subunit adapted to pad the scrambled data;
the first calculating subunit is suitable for performing hash operation on the filled data by using a preset second hash algorithm, and determining sixth data according to a hash operation result;
and the second calculating subunit is adapted to perform hash operation on the sixth data and the 1 st data block of the data to be transmitted by using a preset third hash algorithm to obtain the message authentication code of the scrambled data.
5. The data transmission apparatus of claim 4, wherein the scrambling unit comprises: an obtaining subunit adapted to obtain a first random number; the first operation subunit is suitable for performing exclusive-or operation on each data block of the data to be transmitted respectively by using the first random number to obtain exclusive-or result data corresponding to each data block one by one; and the second operation subunit is suitable for performing shifting and permutation operation on each exclusive-or result data by using the data of the first byte of the first random number, and taking the result after the permutation operation as the scrambled data of the corresponding data block.
6. The data transmission device according to claim 5, wherein the encryption unit is adapted to perform a hash operation on the data of the first random number part byte and the message authentication code of the scrambled data by using a preset fourth hash algorithm to obtain seventh data; and performing corresponding operation on the seventh data and a preset root key according to a preset encryption algorithm to obtain the encryption key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010644032.0A CN111756523B (en) | 2016-11-04 | 2016-11-04 | Data transmission method and device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010644032.0A CN111756523B (en) | 2016-11-04 | 2016-11-04 | Data transmission method and device |
CN201610974638.4A CN108023724B (en) | 2016-11-04 | 2016-11-04 | Data transmission method and device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610974638.4A Division CN108023724B (en) | 2016-11-04 | 2016-11-04 | Data transmission method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111756523A CN111756523A (en) | 2020-10-09 |
CN111756523B true CN111756523B (en) | 2022-08-12 |
Family
ID=62084678
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010644032.0A Active CN111756523B (en) | 2016-11-04 | 2016-11-04 | Data transmission method and device |
CN201610974638.4A Active CN108023724B (en) | 2016-11-04 | 2016-11-04 | Data transmission method and device |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610974638.4A Active CN108023724B (en) | 2016-11-04 | 2016-11-04 | Data transmission method and device |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN111756523B (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110535816A (en) * | 2018-05-24 | 2019-12-03 | 广东技术师范学院 | A kind of safe data information transmission method |
CN112912847B (en) * | 2018-11-09 | 2022-10-04 | 华为技术有限公司 | Method and related device for over-the-air upgrading |
CN109787764B (en) * | 2019-03-25 | 2021-07-06 | 四川九洲空管科技有限责任公司 | Encryption method of secret key |
CN110378083B (en) * | 2019-06-12 | 2021-03-12 | 北京奇艺世纪科技有限公司 | Boolean value confusion method and device and computer readable storage medium |
CN111756767A (en) * | 2020-07-06 | 2020-10-09 | 成都卫士通信息产业股份有限公司 | Streaming media data transmission method and device, electronic equipment and computer storage medium |
CN112180826A (en) * | 2020-09-30 | 2021-01-05 | 苏州艾隆科技股份有限公司 | Operation and maintenance monitoring method and device and storage medium |
CN112260840A (en) * | 2020-10-21 | 2021-01-22 | 上海创能国瑞数据系统有限公司 | Disturbance encryption method based on sm4 encryption algorithm |
CN113204774B (en) * | 2021-04-29 | 2021-11-26 | 北京连山科技股份有限公司 | Rapid data security protection method based on multi-cloud environment |
CN113645183B (en) * | 2021-06-21 | 2023-08-15 | 苏州工业园区服务外包职业学院 | Data encryption transmission method, system, computer equipment and storage medium |
CN114124443A (en) * | 2021-09-30 | 2022-03-01 | 郑州师范学院 | Credible system suitable for industry internet of things perception computing layer |
CN114268449B (en) * | 2021-11-02 | 2023-08-29 | 浙江零跑科技股份有限公司 | Important CAN encryption method |
CN113872753B (en) * | 2021-12-01 | 2022-05-06 | 北京华云安信息技术有限公司 | Encryption transmission method and device based on SHA256 sequence form data |
CN115550868B (en) * | 2022-09-26 | 2025-04-18 | 深圳市晨汇节能环保科技有限公司 | Hydrogen energy power control system and method thereof |
CN116455560B (en) * | 2023-06-16 | 2023-08-29 | 北京智芯微电子科技有限公司 | Data encryption method, data decryption method, device, equipment and medium |
CN117098120B (en) * | 2023-10-19 | 2024-01-02 | 国网山西省电力公司晋城供电公司 | A Beidou short message data encryption and decryption method, equipment and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532706A (en) * | 2012-07-03 | 2014-01-22 | 展讯通信(上海)有限公司 | Data encryption and decryption method and device, and mobile terminal |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7774593B2 (en) * | 2003-04-24 | 2010-08-10 | Panasonic Corporation | Encrypted packet, processing device, method, program, and program recording medium |
JP4810289B2 (en) * | 2006-04-17 | 2011-11-09 | ルネサスエレクトロニクス株式会社 | Message authenticator generation device, message authenticator verification device, and message authentication system |
CN101471769B (en) * | 2007-12-28 | 2011-12-28 | 北京大唐高鸿数据网络技术有限公司 | Enciphering/deciphering method for VoIP medium transmission |
CA2710868A1 (en) * | 2008-01-07 | 2009-07-16 | Security First Corp. | Systems and methods for securing data using multi-factor or keyed dispersal |
US8577024B2 (en) * | 2009-07-28 | 2013-11-05 | Vixs Systems, Inc | Concealing plain text in scrambled blocks |
CN101931955B (en) * | 2010-09-03 | 2015-01-28 | 中兴通讯股份有限公司 | Authentication method, device and system |
CN102437910A (en) * | 2011-10-18 | 2012-05-02 | 国家超级计算深圳中心(深圳云计算中心) | Data encryption/decryption checking method and system |
CN105577364B (en) * | 2011-10-27 | 2019-11-05 | 华为技术有限公司 | A kind of encryption method, decryption method and relevant apparatus |
KR101440328B1 (en) * | 2013-05-20 | 2014-09-17 | 주식회사 실리콘웍스 | Method for producing a message authenticating code and authenticating device using the message authenticating code |
CN104639312B (en) * | 2013-11-08 | 2017-12-29 | 国家电网公司 | A kind of method and device of the anti-Attacks of DES algorithms |
CN105871549B (en) * | 2016-06-13 | 2018-12-25 | 四川特伦特科技股份有限公司 | A kind of digital signal encryption processing method |
-
2016
- 2016-11-04 CN CN202010644032.0A patent/CN111756523B/en active Active
- 2016-11-04 CN CN201610974638.4A patent/CN108023724B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532706A (en) * | 2012-07-03 | 2014-01-22 | 展讯通信(上海)有限公司 | Data encryption and decryption method and device, and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN111756523A (en) | 2020-10-09 |
CN108023724A (en) | 2018-05-11 |
CN108023724B (en) | 2020-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111756523B (en) | Data transmission method and device | |
US8942371B2 (en) | Method and system for a symmetric block cipher using a plurality of symmetric algorithms | |
CN108566500B (en) | Adaptive Image Encryption Domain Reversible Hiding Method Based on Hybrid Encryption Mechanism | |
US7260215B2 (en) | Method for encryption in an un-trusted environment | |
JP6019453B2 (en) | ENCRYPTION DEVICE, DECRYPTION DEVICE, AND PROGRAM | |
RU2006147370A (en) | METHOD FOR DECRAMBLING A SCRUMBED CONTENT INFORMATION OBJECT | |
CN112152805B (en) | Authentication encryption method, authentication decryption method and communication method | |
CN102664740B (en) | Remote-authorization-based bidding document encryption and decryption method | |
WO2014075469A1 (en) | Method and device for information hiding | |
Asaad et al. | Partial image encryption using RC4 stream cipher approach and embedded in an image | |
KR20140143210A (en) | Encryption device, decryption device, encryption method, decryption method, and program | |
CN114499857A (en) | Method for realizing data correctness and consistency in big data quantum encryption and decryption | |
CN105897748A (en) | Symmetric secrete key transmission method and device | |
CN103117850B (en) | A kind of method for building up of the cryptographic system based on random sequence database | |
CN101394398A (en) | A content protection method and system for terminal digital interface | |
EP3131230B1 (en) | Encryption method, program, and system | |
CN116208326A (en) | Data transmission method, device, system, storage medium and electronic equipment | |
CN112866288B (en) | A Symmetric Data Encryption Method for Double Plaintext Transmission | |
CN115378614A (en) | A data transmission method, device and electronic equipment | |
CN112532384B (en) | Method for quickly encrypting and decrypting transmission key based on packet key mode | |
CN103634113B (en) | Encryption and decryption method and device with user/equipment identity authentication | |
KR100551992B1 (en) | Application data encryption and decryption method | |
CN112668042B (en) | File encryption method | |
CN114826700A (en) | Zero-key information verification session method of one-time cryptographic algorithm | |
JP2000004223A (en) | Encryption/authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |