CN105871549A - Digital signal encryption processing method - Google Patents

Digital signal encryption processing method Download PDF

Info

Publication number
CN105871549A
CN105871549A CN201610423109.5A CN201610423109A CN105871549A CN 105871549 A CN105871549 A CN 105871549A CN 201610423109 A CN201610423109 A CN 201610423109A CN 105871549 A CN105871549 A CN 105871549A
Authority
CN
China
Prior art keywords
digital signal
random
ciphertext
segmentation
personal key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610423109.5A
Other languages
Chinese (zh)
Other versions
CN105871549B (en
Inventor
李博
白曜华
刘绍飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Te Lunte Science And Technology Co Ltd
Original Assignee
Sichuan Te Lunte Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Te Lunte Science And Technology Co Ltd filed Critical Sichuan Te Lunte Science And Technology Co Ltd
Priority to CN201610423109.5A priority Critical patent/CN105871549B/en
Publication of CN105871549A publication Critical patent/CN105871549A/en
Application granted granted Critical
Publication of CN105871549B publication Critical patent/CN105871549B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a digital signal encryption processing method, which concretely comprises the following steps of S1, collecting user biological features and generating a personnel secret key; S2, segmenting a digital signal, and using the personnel secret key and an encryption algorithm for encrypting the segmented digital signal; S3, packaging the segmented digital signal and transmitting the signal to a digital signal decryption receiving end; S4, performing decryption by the digital signal decryption receiving end to obtain an original segmented digital signal, and combining the original segmented digital signal to obtain an original digital signal. The method can realize high-safety and high-reliability digital signal transmission.

Description

A kind of digital signal encryption processing method
Art
The present invention relates to a kind of digital signal encryption processing method.
Background technology
The people that develop into of information network technique provide a great convenience.But the network crime simultaneously increases the most therewith Many, information security issue becomes focus of concern gradually.At present, along with the long-range pipe of high-end server Reason mode popular, it is more and more universal for using client to carry out remotely administered server, compares general website Login authentication mechanism, requires higher to the login authentication made safe of server.Such as, in client and During server directly transmits data, use clear-text way can reveal some critical data, such as service The username and password of device manager, accordingly, it would be desirable to use cipher mode transmission.
Data encryption, also known as cryptography, refers to be converted into ciphertext in plain text by AES and encryption key, and Deciphering is then reverse by decipherment algorithm and decruption key, ciphertext to be reduced into original text.Data encryption, is one The time-honored technology of door, refers to will be changed into ciphertext in plain text by AES and encryption key, and deciphering is then It is by decipherment algorithm and decruption key, ciphertext to be reverted in plain text.Data encryption is still computer system at present The most reliable way of one that information is protected.It utilizes cryptographic technique to be encrypted information, it is achieved Information hiding, thus play the effect of the safety of protection information.
Along with the evolution of AES, block encryption algorithm carries out block encryption to data, adds data solution Close difficulty, but, take the AES fixed and key to be encrypted, determine AES and key After, forming corresponding relation with password in plain text, can crack to use the violence modes such as the method for exhaustion, degree of safety needs Improve.
Summary of the invention
The present invention provides a kind of digital signal encryption processing method, and the method can realize high security and Gao Ke Digital data transmission by property.
To achieve these goals, the present invention provides a kind of digital signal encryption processing method, and the method is concrete Comprise the steps:
S1. gather user biological feature, generate personal key;
S2. by digital signal segmentation, and utilize personal key and AES that segmentation digital signal is encrypted;
S3., after being packed by segmentation digital signal, digital signal deciphering receiving terminal is sent to;
S4. it is decrypted by digital signal deciphering receiving terminal, obtains former segmentation digital signal, by former segmentation numeral After signal combination, obtain original digital signal.
Preferably, in step sl, it specifically includes following sub-step and includes:
S11: obtain the biological attribute data of user;
Can be especially by the biological attribute data of various types of biological characteristic sensing equipments collection user, wherein, It is arbitrary that biological characteristic can be specially in fingerprint, iris, sound, face, palmmprint, vein.
S12: according to described biological attribute data, generates characteristic vector;
S13: according to described pre-defined algorithm, described characteristic vector is carried out serializing process, after being serialized Characteristic vector;
According to the demand of pre-defined algorithm, the feature value vector of different length is converted into the sequence of designated length;
S14: according to described pre-defined algorithm from the characteristic vector after described serializing, extracts to meet and uniformly divides The sequence data of cloth is as the personal key corresponding with described user;
Generating unique sequence from fixed-length sequence as personal key, personal key length can be according to not Select with demand, concrete, first according to presetting stochastic generation method by the feature after described serializing Vector is decomposed into residual sequence and random sequence;Judge whether described random sequence meets to be uniformly distributed;If institute State random sequence to meet and be uniformly distributed, then using described random sequence as the personal key corresponding with described user, And described residual sequence is carried out reversible encryption process, obtain a public-key cryptography;If described random sequence is not inconsistent Conjunction is uniformly distributed, and the most again enters the characteristic vector after described serializing according to described default stochastic generation method Row resolution process, until obtaining meeting the random sequence dividing equally distribution, and by uniform for the symbol that again decomposites The random sequence of distribution is as the personal key corresponding with described user.
Further, above-mentioned judge whether described random sequence meets to be uniformly distributed and may particularly include:
Described random sequence is extracted and multiple is uniformly distributed subsequence at random;
Judge whether multiple described distance value being uniformly distributed at random between subsequence is in preset range;
If the distance value between multiple described random subsequences is in described preset range, then judge described Random sequence meets and is uniformly distributed, and otherwise, does not meets and is uniformly distributed.
Preferably, in described S2, specifically include following sub-step:
S21: carry out bit arithmetic according to segmentation digital signal, personal key and the first random digital signal, obtain First ciphertext digital signal;
Segmentation digital signal first can obtain the 3rd ciphertext, then with the first random digital signal carries out bit arithmetic Allow the 3rd ciphertext and personal key carry out bit arithmetic again and obtain the first ciphertext digital signal.Certainly segmentation numeral letter Number first can also obtain the 3rd ciphertext with personal key carries out bit arithmetic, allow the most again the 3rd ciphertext with first with Machine digital signal carries out bit arithmetic and obtains the first ciphertext digital signal, the most specifically obtains the first ciphertext numeral letter Number can be realized by following C language, c [i]=p [i] ^r [(i+a) %rl] ^k [(i+b) %kl], wherein c represents One ciphertext digital signal, i represents byte ordinal number, and p represents segmentation digital signal, and r represents the first random digit letter Number, rl represents the first random digital signal length, and k represents that personal key, kl represent personal key length, a Being less than the positive integer of the first stochastic signal length, b is less than the positive integer of personal key length;
S22: carry out bit arithmetic according to personal key and the first random digital signal, obtains the second random digit letter Number;
Personal key and the first random digital signal are carried out bit arithmetic, obtains the second random digital signal, and The length of this second random digital signal is as the length of the first random digital signal.However, to ensure that number Not being very serious according to expanding, this length value is unsuitable excessive;
Can also by each byte of the first random digital signal is carried out with a byte below respectively by Position XOR obtains the second random digital signal;
S23: be inserted into by the second random digital signal in the first ciphertext digital signal, obtains the second ciphertext numeral Signal;
S24: the second ciphertext digital signal is carried out inverted bit bit manipulation, the segments after finally being encrypted Word signal.
Preferably, in S3, can by add before segmentation digital signal after encryption frame head, described point The length of piece of digital signal and the length of the segmentation numeral of described encryption, at the segmentation digital signal of described encryption The mode of rear interpolation postamble is packed, the segmentation numeral block after being encrypted.
Preferably, in the decrypting process of step S4, specifically include following sub-step:
S41: digital signal deciphering receiving terminal receives the segmentation digital signal after final encryption, and it is close to obtain individual Key;
S42: the segmentation digital signal after final encryption is carried out bit reverse turn operation, obtains the 4th ciphertext number Word signal;
S43: extract the second random digital signal from the 4th ciphertext digital signal, obtains the 5th ciphertext numeral Signal;
S44: carry out bit arithmetic according to the second random digital signal and key, obtain the first random digital signal;
S45: carry out bit arithmetic according to the 5th ciphertext digital signal, the first random digital signal and personal key, Obtain former segmentation digital signal.
Preferably, in S41, digital signal deciphering receiving terminal obtains individual by single physical storage medium People's key.
Segmentation preferably, before performing step S41, after also comprising the steps: according to final encryption Second length value of digital signal, the verification of personal key and and the 4th length value of personal key, determine Go out second random digital signal on position in the 4th ciphertext digital signal;
Can pass through formula pos_1=((cl+crc) × kl) %cl, calculate on position, wherein pos_1 represents slotting Entering position, cl represents the second length value of the segmentation digital signal after final encryption, and crc represents the verification of key With, kl represents the 4th length value of key.
Preferably, in S42, specifically include: first according on position and the 4th length value, determine The starting position of bit reverse turn operation is carried out in final ciphertext digital signal;Invert final ciphertext the most again The bit being positioned in digital signal in each byte behind starting position, obtains the 4th ciphertext numeral letter Number, the most each byte needs in the bit stream that the bit sequence of reversion is made up of the byte before this byte At least three bit determines.
Preferably, in S43, according on position and at least one bit, from the 4th ciphertext numeral letter Extract the second random digital signal in number, obtain the 5th ciphertext digital signal.
The present invention has the following advantages and beneficial effect: this system can generate close according to the personal information of user Key so that key has uniqueness and complexity;In digital signal encryption decrypting process, by plaintext number Word signal carries out bit arithmetic with personal key and the first random digital signal, obtains the first ciphertext digital signal, Personal key and the first random digital signal are carried out bit arithmetic simultaneously, obtain the second random digital signal, and The second random digital signal obtained and the first ciphertext digital signal are carried out bit arithmetic, obtains the second ciphertext number Word signal, carries out inverted bit bit manipulation to the second ciphertext digital signal the most again, obtains former plaintext numeral letter Number, solve the confidentiality of digital signal and the problem of poor stability, be significantly increased and crack difficulty.
Accompanying drawing explanation
Fig. 1 shows the block diagram of a kind of system realizing digital signal encryption transmission of the present invention.
Fig. 2 shows the flow chart of a kind of digital signal encryption processing method of the present invention.
Detailed description of the invention
Fig. 1 shows a kind of system realizing digital signal encryption transmission of the present invention.System includes numeral Signal encryption transmitting terminal 1 and numeral decrypted signal receiving terminal 2.
Wherein, digital signal encryption transmitting terminal 1 includes: data packet units 11, by digital signal to be encrypted Carry out segmentation, produce segmentation digital signal;Key generating unit 12, is used for generating personal key;Key is deposited Storage unit 13, is used for storing personal key;DEU data encryption unit 14, utilizes AES and described individual close Described segmentation digital signal is encrypted by key, the segmentation digital signal after being encrypted;Segmentation digital signal Packaged unit 15, packs the segmentation digital signal after described encryption, the segmentation numeral after being encrypted Block;Data transmission blocks 16, for being sent to described number by the segmentation numeral block after described encryption Word decrypted signal end.
Described digital signal deciphering receiving terminal 2 includes:
Data receipt unit 21, the segmentation numeral block after receiving described encryption;
Personal key acquiring unit 22, is used for obtaining described personal key;
Decryption unit 23, according to described decruption key and the decipherment algorithm pair corresponding with described deciphering AES Segmentation numeral block block after described encryption is decrypted, and obtains former segmentation digital signal;
Assembled unit 24, is used for combining described segmentation digital signal, obtains former data.
Described Key generating unit includes:
First obtains subelement, for obtaining the biological attribute data of user;
First generates subelement, for according to described biological attribute data, generates characteristic vector;
Second generates subelement, for processing described characteristic vector according to pre-defined algorithm, generates and institute State the personal key that user is corresponding.
Preferably, described DEU data encryption unit, according to described personal key and AES to described segments Word signal is encrypted, the segmentation digital signal after being encrypted.
Preferably, wherein, described second generation subelement includes:
Obtain submodule, for described characteristic vector being carried out serializing process according to described pre-defined algorithm, Characteristic vector after serializing;
Extract submodule, be used for, according to described pre-defined algorithm from the characteristic vector after described serializing, extracting Go out to meet equally distributed sequence data as the personal key corresponding with described user.
Here, the biological attribute data of user can be gathered especially by various types of biological characteristic sensing equipments, Wherein, biological characteristic can be specially fingerprint, iris, sound, face, palmmprint, vein etc..
Personal key length can carry out selecting according to different demands (such as: 128,192,256 etc.). Concrete, first basis presets stochastic generation method is residual error sequence by the eigendecomposition after described serializing Row and random sequence;Judge whether described random sequence meets to be uniformly distributed;If described random sequence meets all Even distribution, then using described random sequence as the personal key corresponding with described user, and to described residual error sequence Row carry out reversible encryption process, obtain a public-key cryptography;If described random sequence does not meets it is uniformly distributed, then Again the characteristic vector after described serializing is carried out resolution process, directly according to described default stochastic generation method The random sequence of distribution, and the equally distributed random sequence of symbol that will again decomposite is divided equally to obtaining meeting As the personal key corresponding with described user.
Described DEU data encryption unit 14 includes:
First operator unit, for random according to segmentation numeral signal, described personal key and first Digital signal carries out bit arithmetic, obtains the first ciphertext digital signal;
Second operator unit, for carrying out bit arithmetic according to described personal key and the first random digital signal, Obtain the second random digital signal;
Intron unit, for being inserted in the first ciphertext digital signal by the second random digital signal, obtains Second ciphertext digital signal;
First operator unit, for the second ciphertext digital signal is carried out inverted bit bit manipulation, obtains Segmentation digital signal after encryption eventually.
Described decryption unit 23 includes:
Second operator unit, for the segmentation digital signal after final encryption is carried out bit reverse turn operation, Obtain the 4th ciphertext digital signal;
Extract subelement, for extracting the second random digital signal from the 4th ciphertext digital signal, obtain 5th ciphertext digital signal;
3rd operator unit, for carrying out bit arithmetic according to the second random digital signal and personal key, To the first random digital signal;
4th operator unit, for according to the 5th ciphertext digital signal, the first random digital signal and individual Key carries out bit arithmetic, obtains former segmentation digital signal.
Described decryption unit 23 may also include deciphering judgment sub-unit, every time after deciphering to obtain data frame head, Trailer sections detects, if meeting the form of the frame head of segmentation digital signal ciphertext, postamble, the most again enters Row deciphering.
Preferably, described personal key acquiring unit 22, can read individual by single physical storage medium People's key.
Fig. 2 shows the flow chart of a kind of digital signal encryption processing method of the present invention.The method is specifically wrapped Include following steps:
S1. gather user biological feature, generate personal key;
S2. by digital signal segmentation, and utilize personal key and AES that segmentation digital signal is encrypted;
S3., after being packed by segmentation digital signal, digital signal deciphering receiving terminal is sent to;
S4. it is decrypted by digital signal deciphering receiving terminal, obtains former segmentation digital signal, by former segmentation numeral After signal combination, obtain original digital signal.
Preferably, in step sl, it specifically includes following sub-step and includes:
S11: obtain the biological attribute data of user.
Here, the biological attribute data of user can be gathered especially by various types of biological characteristic sensing equipments, Wherein, biological characteristic can be specially fingerprint, iris, sound, face, palmmprint, vein etc..
S12: according to described biological attribute data, generates characteristic vector.
S13: according to described pre-defined algorithm, described characteristic vector is carried out serializing process, after being serialized Characteristic vector.
In a particular embodiment of the present invention, according to the demand of pre-defined algorithm, by the eigenvalue of different length to Amount (or the information to be protected of different-format and data) is converted into the sequence of designated length.
S14: according to described pre-defined algorithm from the characteristic vector after described serializing, extracts to meet and uniformly divides The sequence data of cloth is as the personal key corresponding with described user.
The present invention generates unique sequence as personal key from fixed-length sequence, and personal key length can Carry out selecting (such as: 128,192,256 etc.) according to different demands.Concrete, first according to pre- If the eigendecomposition after described serializing is residual sequence and random sequence by stochastic generation method;Judge Whether described random sequence meets is uniformly distributed;If described random sequence meets be uniformly distributed, then by described with Machine sequence is as the personal key corresponding with described user, and described residual sequence is carried out reversible encryption process, Obtain a public-key cryptography;If described random sequence does not meets it is uniformly distributed, the most again presets at random according to described Generation method carries out resolution process to the characteristic vector after described serializing, divides equally distribution until obtaining meeting Random sequence, and using the equally distributed random sequence of symbol that again decomposites as corresponding with described user Personal key.
Further, above-mentioned judge whether described random sequence meets to be uniformly distributed and may particularly include:
Described random sequence is extracted and multiple is uniformly distributed subsequence at random;
Judge whether multiple described distance value being uniformly distributed at random between subsequence is in preset range;
If the distance value between multiple described random subsequences is in described preset range, then judge described Random sequence meets and is uniformly distributed, and otherwise, does not meets and is uniformly distributed.
Preferably, in described S2, specifically include following sub-step:
S21: carry out bit arithmetic according to segmentation digital signal, personal key and the first random digital signal, obtain First ciphertext digital signal.
In being embodied as, digital signal to be encrypted can be divided into multistage, it is also possible to by numeral letter to be encrypted Number as one section.
Segmentation digital signal can first obtain with the first random digital signal carries out bit arithmetic (such as XOR) 3rd ciphertext, allowing the 3rd ciphertext and personal key carry out bit arithmetic (such as XOR) the most again, to obtain first close Literary composition digital signal.Certainly segmentation digital signal first can also carry out bit arithmetic (such as XOR) with personal key Obtain the 3rd ciphertext, allow the 3rd ciphertext and the first random digital signal carry out bit arithmetic (such as XOR fortune the most again Calculate) obtain the first ciphertext digital signal.The most specifically obtain the first ciphertext digital signal and can pass through following C language Speech realizes, and c [i]=p [i] ^r [(i+a) %rl] ^k [(i+b) %kl], wherein c represents the first ciphertext digital signal, i Represent byte ordinal number, p represents segmentation digital signal, and r represents the first random digital signal, rl represent first with Machine digital signal length, k represents that personal key, kl represent personal key length, and a is less than first to be believed at random The positive integer of number length, b is less than the positive integer of personal key length.
S22: carry out bit arithmetic according to personal key and the first random digital signal, obtains the second random digit letter Number;
Personal key and the first random digital signal can be carried out bit arithmetic (such as XOR), obtain second Random digital signal, and the length of this second random digital signal is as the length of the first random digital signal. However, to ensure that data expansion is not very serious, this length value is unsuitable excessive.
Can also by by each byte (except last byte) of the first random digital signal respectively with rear One byte in face carries out step-by-step XOR and obtains the second random digital signal.
S23: be inserted into by the second random digital signal in the first ciphertext digital signal, obtains the second ciphertext numeral Signal.
S24: the second ciphertext digital signal is carried out inverted bit bit manipulation, the segments after finally being encrypted Word signal.
Preferably, in S3, can by add before segmentation digital signal after encryption frame head, described point The length of piece of digital signal and the length of the segmentation numeral of described encryption, at the segmentation digital signal of described encryption The mode of rear interpolation postamble is packed, the segmentation numeral block after being encrypted.
Preferably, in the decrypting process of step S4, specifically include following sub-step:
S41: digital signal deciphering receiving terminal receives the segmentation digital signal after final encryption, and it is close to obtain individual Key;
S42: the segmentation digital signal after final encryption is carried out bit reverse turn operation, obtains the 4th ciphertext number Word signal;
S43: extract the second random digital signal from the 4th ciphertext digital signal, obtains the 5th ciphertext numeral Signal;
S44: carry out bit arithmetic according to the second random digital signal and key, obtain the first random digital signal;
S45: carry out bit arithmetic according to the 5th ciphertext digital signal, the first random digital signal and personal key, Obtain former segmentation digital signal.
Preferably, in S41, digital signal deciphering receiving terminal obtains individual by single physical storage medium People's key.
Segmentation preferably, before performing step S41, after also comprising the steps: according to final encryption Second length value of digital signal, the verification of personal key and and the 4th length value of personal key, determine Go out second random digital signal on position in the 4th ciphertext digital signal.
Can pass through formula pos_1=((cl+crc) × kl) %cl, calculate on position, wherein pos_1 represents slotting Entering position, cl represents the second length value of the segmentation digital signal after final encryption, and crc represents the verification of key With, kl represents the 4th length value of key.
Preferably, in S42, specifically include: first according on position and the 4th length value, determine The starting position of bit reverse turn operation is carried out in final ciphertext digital signal;Invert final ciphertext the most again The bit being positioned in digital signal in each byte behind starting position, obtains the 4th ciphertext numeral letter Number, the most each byte needs in the bit stream that the bit sequence of reversion is made up of the byte before this byte At least three bit determines.
Preferably, in S43, according on position and at least one bit, from the 4th ciphertext numeral letter Extract the second random digital signal in number, obtain the 5th ciphertext digital signal.
As mentioned above, although the embodiment and the accompanying drawing that are limited according to embodiment are illustrated, but to this skill Art field can carry out various amendment and deformation for having the technical staff of general knowledge from above-mentioned record. Such as, carry out according to the order that the method illustrated from the technology of explanation is mutually different, and/or according to say The form that the method illustrated by element such as bright system, structure, device, circuit is mutually different is combined Or combination, or it is replaced according to other elements or equipollent or replaces and also can reach suitable effect. For general technical staff of the technical field of the invention, without departing from the inventive concept of the premise, Make some equivalents to substitute or obvious modification, and performance or purposes are identical, all should be considered as belonging to the present invention Protection domain.

Claims (10)

1. a digital signal encryption processing method, the method specifically includes following steps:
S1. gather user biological feature, generate personal key;
S2. by digital signal segmentation, and utilize personal key and AES that segmentation digital signal is encrypted;
S3., after being packed by segmentation digital signal, digital signal deciphering receiving terminal is sent to;
S4. it is decrypted by digital signal deciphering receiving terminal, obtains former segmentation digital signal, by former segmentation numeral After signal combination, obtain original digital signal.
2. the method for claim 1, it is characterised in that in step sl, it specifically includes as follows Sub-step includes:
S11: obtain the biological attribute data of user;
Can be especially by the biological attribute data of various types of biological characteristic sensing equipments collection user, wherein, It is arbitrary that biological characteristic can be specially in fingerprint, iris, sound, face, palmmprint, vein;
S12: according to described biological attribute data, generates characteristic vector;
S13: according to described pre-defined algorithm, described characteristic vector is carried out serializing process, after being serialized Characteristic vector;
According to the demand of pre-defined algorithm, the feature value vector of different length is converted into the sequence of designated length;
S14: according to described pre-defined algorithm from the characteristic vector after described serializing, extracts to meet and uniformly divides The sequence data of cloth is as the personal key corresponding with described user;
Generating unique sequence from fixed-length sequence as personal key, personal key length can be according to not Select with demand, concrete, first according to presetting stochastic generation method by the feature after described serializing Vector is decomposed into residual sequence and random sequence;Judge whether described random sequence meets to be uniformly distributed;If institute State random sequence to meet and be uniformly distributed, then using described random sequence as the personal key corresponding with described user, And described residual sequence is carried out reversible encryption process, obtain a public-key cryptography;If described random sequence is not inconsistent Conjunction is uniformly distributed, and the most again enters the characteristic vector after described serializing according to described default stochastic generation method Row resolution process, until obtaining meeting the random sequence dividing equally distribution, and by uniform for the symbol that again decomposites The random sequence of distribution is as the personal key corresponding with described user.
3. method as claimed in claim 2, it is characterised in that above-mentioned judge whether described random sequence meets It is uniformly distributed and may particularly include:
Described random sequence is extracted and multiple is uniformly distributed subsequence at random;
Judge whether multiple described distance value being uniformly distributed at random between subsequence is in preset range;
If the distance value between multiple described random subsequences is in described preset range, then judge described Random sequence meets and is uniformly distributed, and otherwise, does not meets and is uniformly distributed.
4. method as claimed in claim 3, it is characterised in that in described S2, specifically include following son Step:
S21: carry out bit arithmetic according to segmentation digital signal, personal key and the first random digital signal, obtain First ciphertext digital signal;
Segmentation digital signal first can obtain the 3rd ciphertext, then with the first random digital signal carries out bit arithmetic Allow the 3rd ciphertext and personal key carry out bit arithmetic again and obtain the first ciphertext digital signal.Certainly segmentation numeral letter Number first can also obtain the 3rd ciphertext with personal key carries out bit arithmetic, allow the most again the 3rd ciphertext with first with Machine digital signal carries out bit arithmetic and obtains the first ciphertext digital signal, the most specifically obtains the first ciphertext numeral letter Number can be realized by following C language, c [i]=p [i] ^r [(i+a) %rl] ^k [(i+b) %kl], wherein c represents One ciphertext digital signal, i represents byte ordinal number, and p represents segmentation digital signal, and r represents the first random digit letter Number, rl represents the first random digital signal length, and k represents that personal key, kl represent personal key length, a Being less than the positive integer of the first stochastic signal length, b is less than the positive integer of personal key length;
S22: carry out bit arithmetic according to personal key and the first random digital signal, obtains the second random digit letter Number;
Personal key and the first random digital signal are carried out bit arithmetic, obtains the second random digital signal, and The length of this second random digital signal is as the length of the first random digital signal.However, to ensure that number Not being very serious according to expanding, this length value is unsuitable excessive;
Can also by each byte of the first random digital signal is carried out with a byte below respectively by Position XOR obtains the second random digital signal;
S23: be inserted into by the second random digital signal in the first ciphertext digital signal, obtains the second ciphertext numeral Signal;
S24: the second ciphertext digital signal is carried out inverted bit bit manipulation, the segments after finally being encrypted Word signal.
5. method as claimed in claim 4, it is characterised in that in S3, can pass through after encryption The segmentation numeral of frame head, the length of described segmentation digital signal and described encryption is added before segmentation digital signal Length, the mode adding postamble after the segmentation digital signal of described encryption is packed, after being encrypted Segmentation numeral block.
6. method as claimed in claim 5, it is characterised in that in the decrypting process of step S4, specifically Including following sub-step:
S41: digital signal deciphering receiving terminal receives the segmentation digital signal after final encryption, and it is close to obtain individual Key;
S42: the segmentation digital signal after final encryption is carried out bit reverse turn operation, obtains the 4th ciphertext number Word signal;
S43: extract the second random digital signal from the 4th ciphertext digital signal, obtains the 5th ciphertext numeral Signal;
S44: carry out bit arithmetic according to the second random digital signal and key, obtain the first random digital signal;
S45: carry out bit arithmetic according to the 5th ciphertext digital signal, the first random digital signal and personal key, Obtain former segmentation digital signal.
7. method as claimed in claim 6, it is characterised in that in S41, digital signal deciphering receiving terminal Personal key is obtained by single physical storage medium.
8. method as claimed in claim 7, it is characterised in that before performing step S41, also include as Lower step: according to the second length value of segmentation digital signal after final encryption, the verification of personal key and with And the 4th length value of personal key, determine that the second random digital signal is in the 4th ciphertext digital signal On position;
Can pass through formula pos_1=((cl+crc) × kl) %cl, calculate on position, wherein pos_1 represents slotting Entering position, cl represents the second length value of the segmentation digital signal after final encryption, and crc represents the verification of key With, kl represents the 4th length value of key.
9. method as claimed in claim 8, it is characterised in that in S42, specifically include: first basis On position and the 4th length value, determine and carry out bit reverse turn operation in final ciphertext digital signal Starting position;Invert in each byte after being positioned at starting position in final ciphertext digital signal the most again Individual bit, obtains the 4th ciphertext digital signal, and the most each byte needs the bit sequence of reversion by this word At least three bit in the bit stream of joint byte composition above determines.
10. method as claimed in claim 9, it is characterised in that in S43, according on position and extremely A few bit, extracts the second random digital signal from the 4th ciphertext digital signal, obtains the 5th close Literary composition digital signal.
CN201610423109.5A 2016-06-13 2016-06-13 A kind of digital signal encryption processing method Active CN105871549B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610423109.5A CN105871549B (en) 2016-06-13 2016-06-13 A kind of digital signal encryption processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610423109.5A CN105871549B (en) 2016-06-13 2016-06-13 A kind of digital signal encryption processing method

Publications (2)

Publication Number Publication Date
CN105871549A true CN105871549A (en) 2016-08-17
CN105871549B CN105871549B (en) 2018-12-25

Family

ID=56650651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610423109.5A Active CN105871549B (en) 2016-06-13 2016-06-13 A kind of digital signal encryption processing method

Country Status (1)

Country Link
CN (1) CN105871549B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533507A (en) * 2016-12-06 2017-03-22 广州市科恩电脑有限公司 Method for communicating with power line
CN106656262A (en) * 2016-12-06 2017-05-10 广州市科恩电脑有限公司 Power line carrier communication system
CN106686586A (en) * 2016-12-29 2017-05-17 广州凯耀资产管理有限公司 Wireless transmission system and encryption and decryption method thereof
CN106789971A (en) * 2016-12-06 2017-05-31 广州市科恩电脑有限公司 A kind of encrypted transmission method of power carrier data
CN106909340A (en) * 2017-04-26 2017-06-30 江西师范大学 A kind of random sequence generation device and method based on electromyographic signal
CN107332659A (en) * 2017-05-24 2017-11-07 舒翔 A kind of identity identifying method based on biological characteristic, storage medium and system
CN108023724A (en) * 2016-11-04 2018-05-11 北京展讯高科通信技术有限公司 Data transmission method and device
CN110650150A (en) * 2019-10-10 2020-01-03 上海久誉软件***有限公司 Computer wireless propagation neural network method based on 5G network
CN113408729A (en) * 2021-07-06 2021-09-17 安徽理工大学 Data processing method for DNA calculation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060122979A1 (en) * 2004-12-06 2006-06-08 Shyam Kapur Search processing with automatic categorization of queries
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area
CN103581900A (en) * 2012-08-01 2014-02-12 ***通信集团公司 Communication safety control method and device, first mobile terminal and mobile health device
CN104462918A (en) * 2014-12-02 2015-03-25 黑龙江大学 Face biologic key generation method based on self-adaptive nonuniform quantization

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060122979A1 (en) * 2004-12-06 2006-06-08 Shyam Kapur Search processing with automatic categorization of queries
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area
CN103581900A (en) * 2012-08-01 2014-02-12 ***通信集团公司 Communication safety control method and device, first mobile terminal and mobile health device
CN104462918A (en) * 2014-12-02 2015-03-25 黑龙江大学 Face biologic key generation method based on self-adaptive nonuniform quantization

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙飞龙: "基于指纹的强前向安全数字签名方法应用研究", 《中国学位论文全文数据库》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108023724A (en) * 2016-11-04 2018-05-11 北京展讯高科通信技术有限公司 Data transmission method and device
CN108023724B (en) * 2016-11-04 2020-10-20 北京紫光展锐通信技术有限公司 Data transmission method and device
CN106533507A (en) * 2016-12-06 2017-03-22 广州市科恩电脑有限公司 Method for communicating with power line
CN106656262A (en) * 2016-12-06 2017-05-10 广州市科恩电脑有限公司 Power line carrier communication system
CN106789971A (en) * 2016-12-06 2017-05-31 广州市科恩电脑有限公司 A kind of encrypted transmission method of power carrier data
CN106686586A (en) * 2016-12-29 2017-05-17 广州凯耀资产管理有限公司 Wireless transmission system and encryption and decryption method thereof
CN106686586B (en) * 2016-12-29 2020-08-11 北京泛安信息技术有限公司 Wireless transmission system and encryption and decryption method thereof
CN106909340A (en) * 2017-04-26 2017-06-30 江西师范大学 A kind of random sequence generation device and method based on electromyographic signal
CN107332659A (en) * 2017-05-24 2017-11-07 舒翔 A kind of identity identifying method based on biological characteristic, storage medium and system
CN107332659B (en) * 2017-05-24 2020-01-07 武汉真元生物数据有限公司 Identity authentication method, storage medium and system based on biological characteristics
CN110650150A (en) * 2019-10-10 2020-01-03 上海久誉软件***有限公司 Computer wireless propagation neural network method based on 5G network
CN113408729A (en) * 2021-07-06 2021-09-17 安徽理工大学 Data processing method for DNA calculation

Also Published As

Publication number Publication date
CN105871549B (en) 2018-12-25

Similar Documents

Publication Publication Date Title
CN105871550B (en) A kind of system for realizing digital signal encryption transmission
CN105871549A (en) Digital signal encryption processing method
US7715553B2 (en) Encrypting a plaintext message with authentication
AU702766B2 (en) A non-deterministic public key encryption system
CN101447870B (en) Safe storage method of private key based on technology of distributed password
US20120134495A1 (en) Cloud Storage Data Access Method, Apparatus and System Based on OTP
WO2001030020A1 (en) Variable length key encrypting system
JP2004534333A (en) Integrated protection method and system for distributed data processing in computer networks
CN112804205A (en) Data encryption method and device and data decryption method and device
JP2015158665A (en) Variable-length block encrypting device and method for form storage encryption
US6640303B1 (en) System and method for encryption using transparent keys
KR20150142623A (en) Cryptographic method for securely exchanging messages and device and system for implementing this method
CN108768617A (en) A kind of holding format encryption method based on legacy packets password
CN111404953A (en) Message encryption method, message decryption method, related devices and related systems
JP2011512562A (en) Random encryption and decryption method for access and communication data
JP2000511755A (en) How to encrypt binary code information
CN105959106B (en) A kind of low-complexity digital encryption method
WO2019225735A1 (en) Data processing device, method, and computer program
CN106789971A (en) A kind of encrypted transmission method of power carrier data
Nissar et al. Implementation of security enhancement in AES by inducting dynamicity in AES s-box
JP2541113B2 (en) Pre-encryption processing device and post-decryption processing device in cipher chain
Almuhammadi et al. Double-hashing operation mode for encryption
KR100494560B1 (en) Real time block data encryption/decryption processor using Rijndael block cipher and method therefor
JP2015082077A (en) Encryption device, control method, and program
JP4611642B2 (en) Authentication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant