CN105871549A - Digital signal encryption processing method - Google Patents
Digital signal encryption processing method Download PDFInfo
- Publication number
- CN105871549A CN105871549A CN201610423109.5A CN201610423109A CN105871549A CN 105871549 A CN105871549 A CN 105871549A CN 201610423109 A CN201610423109 A CN 201610423109A CN 105871549 A CN105871549 A CN 105871549A
- Authority
- CN
- China
- Prior art keywords
- digital signal
- random
- ciphertext
- segmentation
- personal key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a digital signal encryption processing method, which concretely comprises the following steps of S1, collecting user biological features and generating a personnel secret key; S2, segmenting a digital signal, and using the personnel secret key and an encryption algorithm for encrypting the segmented digital signal; S3, packaging the segmented digital signal and transmitting the signal to a digital signal decryption receiving end; S4, performing decryption by the digital signal decryption receiving end to obtain an original segmented digital signal, and combining the original segmented digital signal to obtain an original digital signal. The method can realize high-safety and high-reliability digital signal transmission.
Description
Art
The present invention relates to a kind of digital signal encryption processing method.
Background technology
The people that develop into of information network technique provide a great convenience.But the network crime simultaneously increases the most therewith
Many, information security issue becomes focus of concern gradually.At present, along with the long-range pipe of high-end server
Reason mode popular, it is more and more universal for using client to carry out remotely administered server, compares general website
Login authentication mechanism, requires higher to the login authentication made safe of server.Such as, in client and
During server directly transmits data, use clear-text way can reveal some critical data, such as service
The username and password of device manager, accordingly, it would be desirable to use cipher mode transmission.
Data encryption, also known as cryptography, refers to be converted into ciphertext in plain text by AES and encryption key, and
Deciphering is then reverse by decipherment algorithm and decruption key, ciphertext to be reduced into original text.Data encryption, is one
The time-honored technology of door, refers to will be changed into ciphertext in plain text by AES and encryption key, and deciphering is then
It is by decipherment algorithm and decruption key, ciphertext to be reverted in plain text.Data encryption is still computer system at present
The most reliable way of one that information is protected.It utilizes cryptographic technique to be encrypted information, it is achieved
Information hiding, thus play the effect of the safety of protection information.
Along with the evolution of AES, block encryption algorithm carries out block encryption to data, adds data solution
Close difficulty, but, take the AES fixed and key to be encrypted, determine AES and key
After, forming corresponding relation with password in plain text, can crack to use the violence modes such as the method for exhaustion, degree of safety needs
Improve.
Summary of the invention
The present invention provides a kind of digital signal encryption processing method, and the method can realize high security and Gao Ke
Digital data transmission by property.
To achieve these goals, the present invention provides a kind of digital signal encryption processing method, and the method is concrete
Comprise the steps:
S1. gather user biological feature, generate personal key;
S2. by digital signal segmentation, and utilize personal key and AES that segmentation digital signal is encrypted;
S3., after being packed by segmentation digital signal, digital signal deciphering receiving terminal is sent to;
S4. it is decrypted by digital signal deciphering receiving terminal, obtains former segmentation digital signal, by former segmentation numeral
After signal combination, obtain original digital signal.
Preferably, in step sl, it specifically includes following sub-step and includes:
S11: obtain the biological attribute data of user;
Can be especially by the biological attribute data of various types of biological characteristic sensing equipments collection user, wherein,
It is arbitrary that biological characteristic can be specially in fingerprint, iris, sound, face, palmmprint, vein.
S12: according to described biological attribute data, generates characteristic vector;
S13: according to described pre-defined algorithm, described characteristic vector is carried out serializing process, after being serialized
Characteristic vector;
According to the demand of pre-defined algorithm, the feature value vector of different length is converted into the sequence of designated length;
S14: according to described pre-defined algorithm from the characteristic vector after described serializing, extracts to meet and uniformly divides
The sequence data of cloth is as the personal key corresponding with described user;
Generating unique sequence from fixed-length sequence as personal key, personal key length can be according to not
Select with demand, concrete, first according to presetting stochastic generation method by the feature after described serializing
Vector is decomposed into residual sequence and random sequence;Judge whether described random sequence meets to be uniformly distributed;If institute
State random sequence to meet and be uniformly distributed, then using described random sequence as the personal key corresponding with described user,
And described residual sequence is carried out reversible encryption process, obtain a public-key cryptography;If described random sequence is not inconsistent
Conjunction is uniformly distributed, and the most again enters the characteristic vector after described serializing according to described default stochastic generation method
Row resolution process, until obtaining meeting the random sequence dividing equally distribution, and by uniform for the symbol that again decomposites
The random sequence of distribution is as the personal key corresponding with described user.
Further, above-mentioned judge whether described random sequence meets to be uniformly distributed and may particularly include:
Described random sequence is extracted and multiple is uniformly distributed subsequence at random;
Judge whether multiple described distance value being uniformly distributed at random between subsequence is in preset range;
If the distance value between multiple described random subsequences is in described preset range, then judge described
Random sequence meets and is uniformly distributed, and otherwise, does not meets and is uniformly distributed.
Preferably, in described S2, specifically include following sub-step:
S21: carry out bit arithmetic according to segmentation digital signal, personal key and the first random digital signal, obtain
First ciphertext digital signal;
Segmentation digital signal first can obtain the 3rd ciphertext, then with the first random digital signal carries out bit arithmetic
Allow the 3rd ciphertext and personal key carry out bit arithmetic again and obtain the first ciphertext digital signal.Certainly segmentation numeral letter
Number first can also obtain the 3rd ciphertext with personal key carries out bit arithmetic, allow the most again the 3rd ciphertext with first with
Machine digital signal carries out bit arithmetic and obtains the first ciphertext digital signal, the most specifically obtains the first ciphertext numeral letter
Number can be realized by following C language, c [i]=p [i] ^r [(i+a) %rl] ^k [(i+b) %kl], wherein c represents
One ciphertext digital signal, i represents byte ordinal number, and p represents segmentation digital signal, and r represents the first random digit letter
Number, rl represents the first random digital signal length, and k represents that personal key, kl represent personal key length, a
Being less than the positive integer of the first stochastic signal length, b is less than the positive integer of personal key length;
S22: carry out bit arithmetic according to personal key and the first random digital signal, obtains the second random digit letter
Number;
Personal key and the first random digital signal are carried out bit arithmetic, obtains the second random digital signal, and
The length of this second random digital signal is as the length of the first random digital signal.However, to ensure that number
Not being very serious according to expanding, this length value is unsuitable excessive;
Can also by each byte of the first random digital signal is carried out with a byte below respectively by
Position XOR obtains the second random digital signal;
S23: be inserted into by the second random digital signal in the first ciphertext digital signal, obtains the second ciphertext numeral
Signal;
S24: the second ciphertext digital signal is carried out inverted bit bit manipulation, the segments after finally being encrypted
Word signal.
Preferably, in S3, can by add before segmentation digital signal after encryption frame head, described point
The length of piece of digital signal and the length of the segmentation numeral of described encryption, at the segmentation digital signal of described encryption
The mode of rear interpolation postamble is packed, the segmentation numeral block after being encrypted.
Preferably, in the decrypting process of step S4, specifically include following sub-step:
S41: digital signal deciphering receiving terminal receives the segmentation digital signal after final encryption, and it is close to obtain individual
Key;
S42: the segmentation digital signal after final encryption is carried out bit reverse turn operation, obtains the 4th ciphertext number
Word signal;
S43: extract the second random digital signal from the 4th ciphertext digital signal, obtains the 5th ciphertext numeral
Signal;
S44: carry out bit arithmetic according to the second random digital signal and key, obtain the first random digital signal;
S45: carry out bit arithmetic according to the 5th ciphertext digital signal, the first random digital signal and personal key,
Obtain former segmentation digital signal.
Preferably, in S41, digital signal deciphering receiving terminal obtains individual by single physical storage medium
People's key.
Segmentation preferably, before performing step S41, after also comprising the steps: according to final encryption
Second length value of digital signal, the verification of personal key and and the 4th length value of personal key, determine
Go out second random digital signal on position in the 4th ciphertext digital signal;
Can pass through formula pos_1=((cl+crc) × kl) %cl, calculate on position, wherein pos_1 represents slotting
Entering position, cl represents the second length value of the segmentation digital signal after final encryption, and crc represents the verification of key
With, kl represents the 4th length value of key.
Preferably, in S42, specifically include: first according on position and the 4th length value, determine
The starting position of bit reverse turn operation is carried out in final ciphertext digital signal;Invert final ciphertext the most again
The bit being positioned in digital signal in each byte behind starting position, obtains the 4th ciphertext numeral letter
Number, the most each byte needs in the bit stream that the bit sequence of reversion is made up of the byte before this byte
At least three bit determines.
Preferably, in S43, according on position and at least one bit, from the 4th ciphertext numeral letter
Extract the second random digital signal in number, obtain the 5th ciphertext digital signal.
The present invention has the following advantages and beneficial effect: this system can generate close according to the personal information of user
Key so that key has uniqueness and complexity;In digital signal encryption decrypting process, by plaintext number
Word signal carries out bit arithmetic with personal key and the first random digital signal, obtains the first ciphertext digital signal,
Personal key and the first random digital signal are carried out bit arithmetic simultaneously, obtain the second random digital signal, and
The second random digital signal obtained and the first ciphertext digital signal are carried out bit arithmetic, obtains the second ciphertext number
Word signal, carries out inverted bit bit manipulation to the second ciphertext digital signal the most again, obtains former plaintext numeral letter
Number, solve the confidentiality of digital signal and the problem of poor stability, be significantly increased and crack difficulty.
Accompanying drawing explanation
Fig. 1 shows the block diagram of a kind of system realizing digital signal encryption transmission of the present invention.
Fig. 2 shows the flow chart of a kind of digital signal encryption processing method of the present invention.
Detailed description of the invention
Fig. 1 shows a kind of system realizing digital signal encryption transmission of the present invention.System includes numeral
Signal encryption transmitting terminal 1 and numeral decrypted signal receiving terminal 2.
Wherein, digital signal encryption transmitting terminal 1 includes: data packet units 11, by digital signal to be encrypted
Carry out segmentation, produce segmentation digital signal;Key generating unit 12, is used for generating personal key;Key is deposited
Storage unit 13, is used for storing personal key;DEU data encryption unit 14, utilizes AES and described individual close
Described segmentation digital signal is encrypted by key, the segmentation digital signal after being encrypted;Segmentation digital signal
Packaged unit 15, packs the segmentation digital signal after described encryption, the segmentation numeral after being encrypted
Block;Data transmission blocks 16, for being sent to described number by the segmentation numeral block after described encryption
Word decrypted signal end.
Described digital signal deciphering receiving terminal 2 includes:
Data receipt unit 21, the segmentation numeral block after receiving described encryption;
Personal key acquiring unit 22, is used for obtaining described personal key;
Decryption unit 23, according to described decruption key and the decipherment algorithm pair corresponding with described deciphering AES
Segmentation numeral block block after described encryption is decrypted, and obtains former segmentation digital signal;
Assembled unit 24, is used for combining described segmentation digital signal, obtains former data.
Described Key generating unit includes:
First obtains subelement, for obtaining the biological attribute data of user;
First generates subelement, for according to described biological attribute data, generates characteristic vector;
Second generates subelement, for processing described characteristic vector according to pre-defined algorithm, generates and institute
State the personal key that user is corresponding.
Preferably, described DEU data encryption unit, according to described personal key and AES to described segments
Word signal is encrypted, the segmentation digital signal after being encrypted.
Preferably, wherein, described second generation subelement includes:
Obtain submodule, for described characteristic vector being carried out serializing process according to described pre-defined algorithm,
Characteristic vector after serializing;
Extract submodule, be used for, according to described pre-defined algorithm from the characteristic vector after described serializing, extracting
Go out to meet equally distributed sequence data as the personal key corresponding with described user.
Here, the biological attribute data of user can be gathered especially by various types of biological characteristic sensing equipments,
Wherein, biological characteristic can be specially fingerprint, iris, sound, face, palmmprint, vein etc..
Personal key length can carry out selecting according to different demands (such as: 128,192,256 etc.).
Concrete, first basis presets stochastic generation method is residual error sequence by the eigendecomposition after described serializing
Row and random sequence;Judge whether described random sequence meets to be uniformly distributed;If described random sequence meets all
Even distribution, then using described random sequence as the personal key corresponding with described user, and to described residual error sequence
Row carry out reversible encryption process, obtain a public-key cryptography;If described random sequence does not meets it is uniformly distributed, then
Again the characteristic vector after described serializing is carried out resolution process, directly according to described default stochastic generation method
The random sequence of distribution, and the equally distributed random sequence of symbol that will again decomposite is divided equally to obtaining meeting
As the personal key corresponding with described user.
Described DEU data encryption unit 14 includes:
First operator unit, for random according to segmentation numeral signal, described personal key and first
Digital signal carries out bit arithmetic, obtains the first ciphertext digital signal;
Second operator unit, for carrying out bit arithmetic according to described personal key and the first random digital signal,
Obtain the second random digital signal;
Intron unit, for being inserted in the first ciphertext digital signal by the second random digital signal, obtains
Second ciphertext digital signal;
First operator unit, for the second ciphertext digital signal is carried out inverted bit bit manipulation, obtains
Segmentation digital signal after encryption eventually.
Described decryption unit 23 includes:
Second operator unit, for the segmentation digital signal after final encryption is carried out bit reverse turn operation,
Obtain the 4th ciphertext digital signal;
Extract subelement, for extracting the second random digital signal from the 4th ciphertext digital signal, obtain
5th ciphertext digital signal;
3rd operator unit, for carrying out bit arithmetic according to the second random digital signal and personal key,
To the first random digital signal;
4th operator unit, for according to the 5th ciphertext digital signal, the first random digital signal and individual
Key carries out bit arithmetic, obtains former segmentation digital signal.
Described decryption unit 23 may also include deciphering judgment sub-unit, every time after deciphering to obtain data frame head,
Trailer sections detects, if meeting the form of the frame head of segmentation digital signal ciphertext, postamble, the most again enters
Row deciphering.
Preferably, described personal key acquiring unit 22, can read individual by single physical storage medium
People's key.
Fig. 2 shows the flow chart of a kind of digital signal encryption processing method of the present invention.The method is specifically wrapped
Include following steps:
S1. gather user biological feature, generate personal key;
S2. by digital signal segmentation, and utilize personal key and AES that segmentation digital signal is encrypted;
S3., after being packed by segmentation digital signal, digital signal deciphering receiving terminal is sent to;
S4. it is decrypted by digital signal deciphering receiving terminal, obtains former segmentation digital signal, by former segmentation numeral
After signal combination, obtain original digital signal.
Preferably, in step sl, it specifically includes following sub-step and includes:
S11: obtain the biological attribute data of user.
Here, the biological attribute data of user can be gathered especially by various types of biological characteristic sensing equipments,
Wherein, biological characteristic can be specially fingerprint, iris, sound, face, palmmprint, vein etc..
S12: according to described biological attribute data, generates characteristic vector.
S13: according to described pre-defined algorithm, described characteristic vector is carried out serializing process, after being serialized
Characteristic vector.
In a particular embodiment of the present invention, according to the demand of pre-defined algorithm, by the eigenvalue of different length to
Amount (or the information to be protected of different-format and data) is converted into the sequence of designated length.
S14: according to described pre-defined algorithm from the characteristic vector after described serializing, extracts to meet and uniformly divides
The sequence data of cloth is as the personal key corresponding with described user.
The present invention generates unique sequence as personal key from fixed-length sequence, and personal key length can
Carry out selecting (such as: 128,192,256 etc.) according to different demands.Concrete, first according to pre-
If the eigendecomposition after described serializing is residual sequence and random sequence by stochastic generation method;Judge
Whether described random sequence meets is uniformly distributed;If described random sequence meets be uniformly distributed, then by described with
Machine sequence is as the personal key corresponding with described user, and described residual sequence is carried out reversible encryption process,
Obtain a public-key cryptography;If described random sequence does not meets it is uniformly distributed, the most again presets at random according to described
Generation method carries out resolution process to the characteristic vector after described serializing, divides equally distribution until obtaining meeting
Random sequence, and using the equally distributed random sequence of symbol that again decomposites as corresponding with described user
Personal key.
Further, above-mentioned judge whether described random sequence meets to be uniformly distributed and may particularly include:
Described random sequence is extracted and multiple is uniformly distributed subsequence at random;
Judge whether multiple described distance value being uniformly distributed at random between subsequence is in preset range;
If the distance value between multiple described random subsequences is in described preset range, then judge described
Random sequence meets and is uniformly distributed, and otherwise, does not meets and is uniformly distributed.
Preferably, in described S2, specifically include following sub-step:
S21: carry out bit arithmetic according to segmentation digital signal, personal key and the first random digital signal, obtain
First ciphertext digital signal.
In being embodied as, digital signal to be encrypted can be divided into multistage, it is also possible to by numeral letter to be encrypted
Number as one section.
Segmentation digital signal can first obtain with the first random digital signal carries out bit arithmetic (such as XOR)
3rd ciphertext, allowing the 3rd ciphertext and personal key carry out bit arithmetic (such as XOR) the most again, to obtain first close
Literary composition digital signal.Certainly segmentation digital signal first can also carry out bit arithmetic (such as XOR) with personal key
Obtain the 3rd ciphertext, allow the 3rd ciphertext and the first random digital signal carry out bit arithmetic (such as XOR fortune the most again
Calculate) obtain the first ciphertext digital signal.The most specifically obtain the first ciphertext digital signal and can pass through following C language
Speech realizes, and c [i]=p [i] ^r [(i+a) %rl] ^k [(i+b) %kl], wherein c represents the first ciphertext digital signal, i
Represent byte ordinal number, p represents segmentation digital signal, and r represents the first random digital signal, rl represent first with
Machine digital signal length, k represents that personal key, kl represent personal key length, and a is less than first to be believed at random
The positive integer of number length, b is less than the positive integer of personal key length.
S22: carry out bit arithmetic according to personal key and the first random digital signal, obtains the second random digit letter
Number;
Personal key and the first random digital signal can be carried out bit arithmetic (such as XOR), obtain second
Random digital signal, and the length of this second random digital signal is as the length of the first random digital signal.
However, to ensure that data expansion is not very serious, this length value is unsuitable excessive.
Can also by by each byte (except last byte) of the first random digital signal respectively with rear
One byte in face carries out step-by-step XOR and obtains the second random digital signal.
S23: be inserted into by the second random digital signal in the first ciphertext digital signal, obtains the second ciphertext numeral
Signal.
S24: the second ciphertext digital signal is carried out inverted bit bit manipulation, the segments after finally being encrypted
Word signal.
Preferably, in S3, can by add before segmentation digital signal after encryption frame head, described point
The length of piece of digital signal and the length of the segmentation numeral of described encryption, at the segmentation digital signal of described encryption
The mode of rear interpolation postamble is packed, the segmentation numeral block after being encrypted.
Preferably, in the decrypting process of step S4, specifically include following sub-step:
S41: digital signal deciphering receiving terminal receives the segmentation digital signal after final encryption, and it is close to obtain individual
Key;
S42: the segmentation digital signal after final encryption is carried out bit reverse turn operation, obtains the 4th ciphertext number
Word signal;
S43: extract the second random digital signal from the 4th ciphertext digital signal, obtains the 5th ciphertext numeral
Signal;
S44: carry out bit arithmetic according to the second random digital signal and key, obtain the first random digital signal;
S45: carry out bit arithmetic according to the 5th ciphertext digital signal, the first random digital signal and personal key,
Obtain former segmentation digital signal.
Preferably, in S41, digital signal deciphering receiving terminal obtains individual by single physical storage medium
People's key.
Segmentation preferably, before performing step S41, after also comprising the steps: according to final encryption
Second length value of digital signal, the verification of personal key and and the 4th length value of personal key, determine
Go out second random digital signal on position in the 4th ciphertext digital signal.
Can pass through formula pos_1=((cl+crc) × kl) %cl, calculate on position, wherein pos_1 represents slotting
Entering position, cl represents the second length value of the segmentation digital signal after final encryption, and crc represents the verification of key
With, kl represents the 4th length value of key.
Preferably, in S42, specifically include: first according on position and the 4th length value, determine
The starting position of bit reverse turn operation is carried out in final ciphertext digital signal;Invert final ciphertext the most again
The bit being positioned in digital signal in each byte behind starting position, obtains the 4th ciphertext numeral letter
Number, the most each byte needs in the bit stream that the bit sequence of reversion is made up of the byte before this byte
At least three bit determines.
Preferably, in S43, according on position and at least one bit, from the 4th ciphertext numeral letter
Extract the second random digital signal in number, obtain the 5th ciphertext digital signal.
As mentioned above, although the embodiment and the accompanying drawing that are limited according to embodiment are illustrated, but to this skill
Art field can carry out various amendment and deformation for having the technical staff of general knowledge from above-mentioned record.
Such as, carry out according to the order that the method illustrated from the technology of explanation is mutually different, and/or according to say
The form that the method illustrated by element such as bright system, structure, device, circuit is mutually different is combined
Or combination, or it is replaced according to other elements or equipollent or replaces and also can reach suitable effect.
For general technical staff of the technical field of the invention, without departing from the inventive concept of the premise,
Make some equivalents to substitute or obvious modification, and performance or purposes are identical, all should be considered as belonging to the present invention
Protection domain.
Claims (10)
1. a digital signal encryption processing method, the method specifically includes following steps:
S1. gather user biological feature, generate personal key;
S2. by digital signal segmentation, and utilize personal key and AES that segmentation digital signal is encrypted;
S3., after being packed by segmentation digital signal, digital signal deciphering receiving terminal is sent to;
S4. it is decrypted by digital signal deciphering receiving terminal, obtains former segmentation digital signal, by former segmentation numeral
After signal combination, obtain original digital signal.
2. the method for claim 1, it is characterised in that in step sl, it specifically includes as follows
Sub-step includes:
S11: obtain the biological attribute data of user;
Can be especially by the biological attribute data of various types of biological characteristic sensing equipments collection user, wherein,
It is arbitrary that biological characteristic can be specially in fingerprint, iris, sound, face, palmmprint, vein;
S12: according to described biological attribute data, generates characteristic vector;
S13: according to described pre-defined algorithm, described characteristic vector is carried out serializing process, after being serialized
Characteristic vector;
According to the demand of pre-defined algorithm, the feature value vector of different length is converted into the sequence of designated length;
S14: according to described pre-defined algorithm from the characteristic vector after described serializing, extracts to meet and uniformly divides
The sequence data of cloth is as the personal key corresponding with described user;
Generating unique sequence from fixed-length sequence as personal key, personal key length can be according to not
Select with demand, concrete, first according to presetting stochastic generation method by the feature after described serializing
Vector is decomposed into residual sequence and random sequence;Judge whether described random sequence meets to be uniformly distributed;If institute
State random sequence to meet and be uniformly distributed, then using described random sequence as the personal key corresponding with described user,
And described residual sequence is carried out reversible encryption process, obtain a public-key cryptography;If described random sequence is not inconsistent
Conjunction is uniformly distributed, and the most again enters the characteristic vector after described serializing according to described default stochastic generation method
Row resolution process, until obtaining meeting the random sequence dividing equally distribution, and by uniform for the symbol that again decomposites
The random sequence of distribution is as the personal key corresponding with described user.
3. method as claimed in claim 2, it is characterised in that above-mentioned judge whether described random sequence meets
It is uniformly distributed and may particularly include:
Described random sequence is extracted and multiple is uniformly distributed subsequence at random;
Judge whether multiple described distance value being uniformly distributed at random between subsequence is in preset range;
If the distance value between multiple described random subsequences is in described preset range, then judge described
Random sequence meets and is uniformly distributed, and otherwise, does not meets and is uniformly distributed.
4. method as claimed in claim 3, it is characterised in that in described S2, specifically include following son
Step:
S21: carry out bit arithmetic according to segmentation digital signal, personal key and the first random digital signal, obtain
First ciphertext digital signal;
Segmentation digital signal first can obtain the 3rd ciphertext, then with the first random digital signal carries out bit arithmetic
Allow the 3rd ciphertext and personal key carry out bit arithmetic again and obtain the first ciphertext digital signal.Certainly segmentation numeral letter
Number first can also obtain the 3rd ciphertext with personal key carries out bit arithmetic, allow the most again the 3rd ciphertext with first with
Machine digital signal carries out bit arithmetic and obtains the first ciphertext digital signal, the most specifically obtains the first ciphertext numeral letter
Number can be realized by following C language, c [i]=p [i] ^r [(i+a) %rl] ^k [(i+b) %kl], wherein c represents
One ciphertext digital signal, i represents byte ordinal number, and p represents segmentation digital signal, and r represents the first random digit letter
Number, rl represents the first random digital signal length, and k represents that personal key, kl represent personal key length, a
Being less than the positive integer of the first stochastic signal length, b is less than the positive integer of personal key length;
S22: carry out bit arithmetic according to personal key and the first random digital signal, obtains the second random digit letter
Number;
Personal key and the first random digital signal are carried out bit arithmetic, obtains the second random digital signal, and
The length of this second random digital signal is as the length of the first random digital signal.However, to ensure that number
Not being very serious according to expanding, this length value is unsuitable excessive;
Can also by each byte of the first random digital signal is carried out with a byte below respectively by
Position XOR obtains the second random digital signal;
S23: be inserted into by the second random digital signal in the first ciphertext digital signal, obtains the second ciphertext numeral
Signal;
S24: the second ciphertext digital signal is carried out inverted bit bit manipulation, the segments after finally being encrypted
Word signal.
5. method as claimed in claim 4, it is characterised in that in S3, can pass through after encryption
The segmentation numeral of frame head, the length of described segmentation digital signal and described encryption is added before segmentation digital signal
Length, the mode adding postamble after the segmentation digital signal of described encryption is packed, after being encrypted
Segmentation numeral block.
6. method as claimed in claim 5, it is characterised in that in the decrypting process of step S4, specifically
Including following sub-step:
S41: digital signal deciphering receiving terminal receives the segmentation digital signal after final encryption, and it is close to obtain individual
Key;
S42: the segmentation digital signal after final encryption is carried out bit reverse turn operation, obtains the 4th ciphertext number
Word signal;
S43: extract the second random digital signal from the 4th ciphertext digital signal, obtains the 5th ciphertext numeral
Signal;
S44: carry out bit arithmetic according to the second random digital signal and key, obtain the first random digital signal;
S45: carry out bit arithmetic according to the 5th ciphertext digital signal, the first random digital signal and personal key,
Obtain former segmentation digital signal.
7. method as claimed in claim 6, it is characterised in that in S41, digital signal deciphering receiving terminal
Personal key is obtained by single physical storage medium.
8. method as claimed in claim 7, it is characterised in that before performing step S41, also include as
Lower step: according to the second length value of segmentation digital signal after final encryption, the verification of personal key and with
And the 4th length value of personal key, determine that the second random digital signal is in the 4th ciphertext digital signal
On position;
Can pass through formula pos_1=((cl+crc) × kl) %cl, calculate on position, wherein pos_1 represents slotting
Entering position, cl represents the second length value of the segmentation digital signal after final encryption, and crc represents the verification of key
With, kl represents the 4th length value of key.
9. method as claimed in claim 8, it is characterised in that in S42, specifically include: first basis
On position and the 4th length value, determine and carry out bit reverse turn operation in final ciphertext digital signal
Starting position;Invert in each byte after being positioned at starting position in final ciphertext digital signal the most again
Individual bit, obtains the 4th ciphertext digital signal, and the most each byte needs the bit sequence of reversion by this word
At least three bit in the bit stream of joint byte composition above determines.
10. method as claimed in claim 9, it is characterised in that in S43, according on position and extremely
A few bit, extracts the second random digital signal from the 4th ciphertext digital signal, obtains the 5th close
Literary composition digital signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610423109.5A CN105871549B (en) | 2016-06-13 | 2016-06-13 | A kind of digital signal encryption processing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610423109.5A CN105871549B (en) | 2016-06-13 | 2016-06-13 | A kind of digital signal encryption processing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105871549A true CN105871549A (en) | 2016-08-17 |
CN105871549B CN105871549B (en) | 2018-12-25 |
Family
ID=56650651
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610423109.5A Active CN105871549B (en) | 2016-06-13 | 2016-06-13 | A kind of digital signal encryption processing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105871549B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106533507A (en) * | 2016-12-06 | 2017-03-22 | 广州市科恩电脑有限公司 | Method for communicating with power line |
CN106656262A (en) * | 2016-12-06 | 2017-05-10 | 广州市科恩电脑有限公司 | Power line carrier communication system |
CN106686586A (en) * | 2016-12-29 | 2017-05-17 | 广州凯耀资产管理有限公司 | Wireless transmission system and encryption and decryption method thereof |
CN106789971A (en) * | 2016-12-06 | 2017-05-31 | 广州市科恩电脑有限公司 | A kind of encrypted transmission method of power carrier data |
CN106909340A (en) * | 2017-04-26 | 2017-06-30 | 江西师范大学 | A kind of random sequence generation device and method based on electromyographic signal |
CN107332659A (en) * | 2017-05-24 | 2017-11-07 | 舒翔 | A kind of identity identifying method based on biological characteristic, storage medium and system |
CN108023724A (en) * | 2016-11-04 | 2018-05-11 | 北京展讯高科通信技术有限公司 | Data transmission method and device |
CN110650150A (en) * | 2019-10-10 | 2020-01-03 | 上海久誉软件***有限公司 | Computer wireless propagation neural network method based on 5G network |
CN113408729A (en) * | 2021-07-06 | 2021-09-17 | 安徽理工大学 | Data processing method for DNA calculation |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060122979A1 (en) * | 2004-12-06 | 2006-06-08 | Shyam Kapur | Search processing with automatic categorization of queries |
CN101674299A (en) * | 2009-10-16 | 2010-03-17 | 西安电子科技大学 | Method for generating key based on amalgamation of multiple features in encryption area |
CN103581900A (en) * | 2012-08-01 | 2014-02-12 | ***通信集团公司 | Communication safety control method and device, first mobile terminal and mobile health device |
CN104462918A (en) * | 2014-12-02 | 2015-03-25 | 黑龙江大学 | Face biologic key generation method based on self-adaptive nonuniform quantization |
-
2016
- 2016-06-13 CN CN201610423109.5A patent/CN105871549B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060122979A1 (en) * | 2004-12-06 | 2006-06-08 | Shyam Kapur | Search processing with automatic categorization of queries |
CN101674299A (en) * | 2009-10-16 | 2010-03-17 | 西安电子科技大学 | Method for generating key based on amalgamation of multiple features in encryption area |
CN103581900A (en) * | 2012-08-01 | 2014-02-12 | ***通信集团公司 | Communication safety control method and device, first mobile terminal and mobile health device |
CN104462918A (en) * | 2014-12-02 | 2015-03-25 | 黑龙江大学 | Face biologic key generation method based on self-adaptive nonuniform quantization |
Non-Patent Citations (1)
Title |
---|
孙飞龙: "基于指纹的强前向安全数字签名方法应用研究", 《中国学位论文全文数据库》 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108023724A (en) * | 2016-11-04 | 2018-05-11 | 北京展讯高科通信技术有限公司 | Data transmission method and device |
CN108023724B (en) * | 2016-11-04 | 2020-10-20 | 北京紫光展锐通信技术有限公司 | Data transmission method and device |
CN106533507A (en) * | 2016-12-06 | 2017-03-22 | 广州市科恩电脑有限公司 | Method for communicating with power line |
CN106656262A (en) * | 2016-12-06 | 2017-05-10 | 广州市科恩电脑有限公司 | Power line carrier communication system |
CN106789971A (en) * | 2016-12-06 | 2017-05-31 | 广州市科恩电脑有限公司 | A kind of encrypted transmission method of power carrier data |
CN106686586A (en) * | 2016-12-29 | 2017-05-17 | 广州凯耀资产管理有限公司 | Wireless transmission system and encryption and decryption method thereof |
CN106686586B (en) * | 2016-12-29 | 2020-08-11 | 北京泛安信息技术有限公司 | Wireless transmission system and encryption and decryption method thereof |
CN106909340A (en) * | 2017-04-26 | 2017-06-30 | 江西师范大学 | A kind of random sequence generation device and method based on electromyographic signal |
CN107332659A (en) * | 2017-05-24 | 2017-11-07 | 舒翔 | A kind of identity identifying method based on biological characteristic, storage medium and system |
CN107332659B (en) * | 2017-05-24 | 2020-01-07 | 武汉真元生物数据有限公司 | Identity authentication method, storage medium and system based on biological characteristics |
CN110650150A (en) * | 2019-10-10 | 2020-01-03 | 上海久誉软件***有限公司 | Computer wireless propagation neural network method based on 5G network |
CN113408729A (en) * | 2021-07-06 | 2021-09-17 | 安徽理工大学 | Data processing method for DNA calculation |
Also Published As
Publication number | Publication date |
---|---|
CN105871549B (en) | 2018-12-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105871550B (en) | A kind of system for realizing digital signal encryption transmission | |
CN105871549A (en) | Digital signal encryption processing method | |
US7715553B2 (en) | Encrypting a plaintext message with authentication | |
AU702766B2 (en) | A non-deterministic public key encryption system | |
CN101447870B (en) | Safe storage method of private key based on technology of distributed password | |
US20120134495A1 (en) | Cloud Storage Data Access Method, Apparatus and System Based on OTP | |
WO2001030020A1 (en) | Variable length key encrypting system | |
JP2004534333A (en) | Integrated protection method and system for distributed data processing in computer networks | |
CN112804205A (en) | Data encryption method and device and data decryption method and device | |
JP2015158665A (en) | Variable-length block encrypting device and method for form storage encryption | |
US6640303B1 (en) | System and method for encryption using transparent keys | |
KR20150142623A (en) | Cryptographic method for securely exchanging messages and device and system for implementing this method | |
CN108768617A (en) | A kind of holding format encryption method based on legacy packets password | |
CN111404953A (en) | Message encryption method, message decryption method, related devices and related systems | |
JP2011512562A (en) | Random encryption and decryption method for access and communication data | |
JP2000511755A (en) | How to encrypt binary code information | |
CN105959106B (en) | A kind of low-complexity digital encryption method | |
WO2019225735A1 (en) | Data processing device, method, and computer program | |
CN106789971A (en) | A kind of encrypted transmission method of power carrier data | |
Nissar et al. | Implementation of security enhancement in AES by inducting dynamicity in AES s-box | |
JP2541113B2 (en) | Pre-encryption processing device and post-decryption processing device in cipher chain | |
Almuhammadi et al. | Double-hashing operation mode for encryption | |
KR100494560B1 (en) | Real time block data encryption/decryption processor using Rijndael block cipher and method therefor | |
JP2015082077A (en) | Encryption device, control method, and program | |
JP4611642B2 (en) | Authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |