CN105871549B - A kind of digital signal encryption processing method - Google Patents

A kind of digital signal encryption processing method Download PDF

Info

Publication number
CN105871549B
CN105871549B CN201610423109.5A CN201610423109A CN105871549B CN 105871549 B CN105871549 B CN 105871549B CN 201610423109 A CN201610423109 A CN 201610423109A CN 105871549 B CN105871549 B CN 105871549B
Authority
CN
China
Prior art keywords
digital signal
random
ciphertext
obtains
personal key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610423109.5A
Other languages
Chinese (zh)
Other versions
CN105871549A (en
Inventor
李博
白曜华
刘绍飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Te Lunte Science And Technology Co Ltd
Original Assignee
Sichuan Te Lunte Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Te Lunte Science And Technology Co Ltd filed Critical Sichuan Te Lunte Science And Technology Co Ltd
Priority to CN201610423109.5A priority Critical patent/CN105871549B/en
Publication of CN105871549A publication Critical patent/CN105871549A/en
Application granted granted Critical
Publication of CN105871549B publication Critical patent/CN105871549B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of digital signal encryption processing method, this method specifically comprises the following steps: that S1. acquires user biological feature, generates personal key;S2. digital signal is segmented, and segmentation digital signal is encrypted using personal key and Encryption Algorithm;S3. after digital signal packing being segmented, digital signal decryption receiving end is sent to;S4. it is decrypted by digital signal decryption receiving end, obtains former segmentation digital signal, after original segmentation digital signal combination, obtain original digital signal.The digital data transmission of high security and high reliability may be implemented in this method.

Description

A kind of digital signal encryption processing method
Technical field
The present invention relates to a kind of digital signal encryption processing methods.
Background technique
The development of information network technique provides a great convenience for people.But the network crime simultaneously also increases therewith, letter Breath safety problem becomes focus concerned by people gradually.Currently, the prevalence of the long-range way to manage with high-end server, uses Client come remotely administered server be it is more and more common, compare general website log authentication mechanism, the login to server Authentication mechanism security requirement is higher.For example, during client and server directly transmits data, using clear-text way Some critical datas, such as the username and password of server administrators can be revealed, therefore, it is necessary to transmit using cipher mode.
Data encryption is also known as cryptography, and ciphertext will be converted by Encryption Algorithm and encryption key in plain text by referring to, and be decrypted then It is reversed ciphertext to be reduced by original text by decipherment algorithm and decruption key.Data encryption is a time-honored technology, Ciphertext will be changed by Encryption Algorithm and encryption key in plain text by referring to, and decrypt be then will be close by decipherment algorithm and decruption key Text reverts in plain text.Data encryption is still a kind of most reliable method that computer system protects information at present.Its benefit Information is encrypted with cryptographic technique, realizes information hiding, to play the effect of the safety of protection information.
With the evolution of Encryption Algorithm, block encryption algorithm is grouped encryption to data, increases data deciphering difficulty, However, fixed Encryption Algorithm and key is taken to be encrypted, after determining Encryption Algorithm and key, formed in plain text with password pair It should be related to, can be cracked using violences modes such as the methods of exhaustion, degree of safety is to be improved.
Summary of the invention
The present invention provides a kind of digital signal encryption processing method, and high security and high reliability may be implemented in this method Digital data transmission.
To achieve the goals above, the present invention provides a kind of digital signal encryption processing method, this method specifically include as Lower step:
S1. user biological feature is acquired, personal key is generated;
S2. digital signal is segmented, and segmentation digital signal is encrypted using personal key and Encryption Algorithm;
S3. after digital signal packing being segmented, digital signal decryption receiving end is sent to;
S4. it is decrypted by digital signal decryption receiving end, obtains former segmentation digital signal, original is segmented data signal groups After conjunction, original digital signal is obtained.
Preferably, in step sl, specifically including following sub-step includes:
S11: the biological attribute data of user is obtained;
The biological attribute data of user can be acquired especially by various types of biological characteristic sensing equipments, wherein biology Feature can be specially fingerprint, iris, sound, face, palmmprint, any in vein.
S12: according to the biological attribute data, feature vector is generated;
S13: carrying out serializing processing to described eigenvector according to the pre-defined algorithm, the feature after being serialized to Amount;
According to the demand of pre-defined algorithm, it converts the feature value vector of different length to the sequence of designated length;
S14: it according to the pre-defined algorithm from the feature vector after the serializing, extracts and meets equally distributed sequence Column data is as personal key corresponding with the user;
Unique sequence is generated from fixed-length sequence as personal key, personal key length can be according to different demands It is selected, specifically, being first residual error sequence according to random generation method is preset by the eigendecomposition after the serializing Column and random sequence;Judge whether the random sequence meets to be uniformly distributed;It is uniformly distributed if the random sequence meets, it will The random sequence carries out reversible encryption processing as personal key corresponding with the user, and to the residual sequence, obtains To a public-key cryptography;It is uniformly distributed if the random sequence is not met, presets random generation method to institute according to described again Feature vector after stating serializing carries out resolution process, until obtaining meeting the random sequence being respectively distributed, and will decompose again The equally distributed random sequence of symbol out is as personal key corresponding with the user.
Further, above-mentioned to judge whether the random sequence meets to be uniformly distributed and may particularly include:
It is extracted in the random sequence and multiple is uniformly distributed subsequence at random;
Judge multiple the distance between subsequence values that are uniformly distributed at random whether in preset range;
If the distance between multiple described random subsequences value judges the stochastic ordering in the preset range Column, which meet, to be uniformly distributed, and otherwise, is not met and is uniformly distributed.
Preferably, in the S2, following sub-step is specifically included:
S21: bit arithmetic is carried out according to segmentation digital signal, personal key and the first random digital signal, it is close to obtain first Literary digital signal;
Segmentation digital signal first can carry out bit arithmetic with the first random digital signal and obtain third ciphertext, then allow the again Three ciphertexts and personal key carry out bit arithmetic and obtain the first ciphertext digital signal.Certainly segmentation digital signal can also be first with individual Key carries out bit arithmetic and obtains third ciphertext, then allows third ciphertext and the first random digital signal to carry out bit arithmetic again and obtains the One ciphertext digital signal, wherein specifically obtaining the first ciphertext digital signal can be realized by following C language, c [i]=p [i] ^r [(i+a) %rl] ^k [(i+b) %kl], wherein c indicates the first ciphertext digital signal, and i indicates that byte ordinal number, p indicate segments Word signal, r indicate that the first random digital signal, rl indicate the first random digital signal length, and k indicates that personal key, kl indicate Personal key length, a are less than the positive integer of the first random signal length, and b is less than the positive integer of personal key length;
S22: bit arithmetic is carried out according to personal key and the first random digital signal, obtains the second random digital signal;
Personal key and the first random digital signal are subjected to bit arithmetic, obtain the second random digital signal, and this second The length of random digital signal is as the length of the first random digital signal.However, to ensure that data expansion is not very tight Weight, this length value should not be too large;
It can also be by different with the progress step-by-step of a subsequent byte respectively by each byte of the first random digital signal Or operation obtains the second random digital signal;
S23: the second random digital signal is inserted into the first ciphertext digital signal, obtains the second ciphertext digital signal;
S24: carrying out inverted bit bit manipulation to the second ciphertext digital signal, obtains final encrypted segmentation number letter Number.
It preferably, can be by adding frame head, segmentation number letter before segmentation digital signal after encryption in S3 Number length and the encryption segmentation number length, after the segmentation digital signal of the encryption addition postamble mode into Row is packaged, and obtains the digital block of encrypted segmentation.
Preferably, in the decrypting process of step S4, following sub-step is specifically included:
S41: digital signal decrypts receiving end and receives final encrypted segmentation digital signal, and obtains personal key;
S42: bit reverse turn operation is carried out to final encrypted segmentation digital signal, obtains the 4th ciphertext number letter Number;
S43: extracting the second random digital signal from the 4th ciphertext digital signal, obtains the 5th ciphertext digital signal;
S44: bit arithmetic is carried out according to the second random digital signal and key, obtains the first random digital signal;
S45: bit arithmetic is carried out according to the 5th ciphertext digital signal, the first random digital signal and personal key, obtains original It is segmented digital signal.
Preferably, in S41, digital signal decrypts receiving end and obtains personal key by individual physical storage medium.
It preferably, further include following steps before executing step S41: according to final encrypted segmentation digital signal The second length value, personal key verification and and personal key the 4th length value, determine the second random digital signal Insertion position in the 4th ciphertext digital signal;
Insertion position can be calculated by formula pos_1=((cl+crc) × kl) %cl, wherein pos_1 indicates insertion Position, cl indicate the second length value of final encrypted segmentation digital signal, crc indicate key verification and, kl indicates close 4th length value of key.
Preferably, it in S42, specifically includes: first according to insertion position and the 4th length value, determining in final ciphertext The starting position of bit reverse turn operation is carried out in digital signal;Then it inverts again and is located at start bit in final ciphertext digital signal A bit in each byte postponed, obtains the 4th ciphertext digital signal, wherein each byte needs the bit inverted At least three bits in bit stream that serial number is made of the byte before the byte determine.
Preferably, it in S43, according to insertion position and at least one bit, is extracted from the 4th ciphertext digital signal Second random digital signal out obtains the 5th ciphertext digital signal.
The present invention has the following advantages and beneficial effects: that the system can generate key according to the personal information of user, makes Obtaining key has uniqueness and complexity;In digital signal encryption decrypting process, pass through plaintext digital signal and personal key Bit arithmetic is carried out with the first random digital signal, obtains the first ciphertext digital signal, while by personal key and the first random number Word signal carries out bit arithmetic, obtains the second random digital signal, and by the second obtained random digital signal and the first ciphertext number Word signal carries out bit arithmetic, obtains the second ciphertext digital signal, finally carries out inverted bit position to the second ciphertext digital signal again Operation, obtains former plaintext digital signal, solves the problems, such as that the confidentiality of digital signal and safety are poor, be significantly increased and crack difficulty Degree.
Detailed description of the invention
Fig. 1 shows a kind of block diagram of system for realizing digital signal encryption transmission of the invention.
Fig. 2 shows a kind of flow charts of digital signal encryption processing method of the invention.
Specific embodiment
Fig. 1 is to show a kind of system for realizing digital signal encryption transmission of the invention.System includes that digital signal adds Close transmitting terminal 1 and digital decrypted signal receiving end 2.
Wherein, digital signal encryption transmitting terminal 1 includes: data packet units 11, and digital signal to be encrypted is segmented, Generate segmentation digital signal;Key generating unit 12, for generating personal key;Key storing unit 13, for storing individual Key;DEU data encryption unit 14 encrypts the segmentation digital signal using Encryption Algorithm and the personal key, obtains Encrypted segmentation digital signal;It is segmented digital signal packaged unit 15, the encrypted segmentation digital signal is beaten Packet obtains the digital block of encrypted segmentation;Data transmission blocks 16 are used for the digital block of the encrypted segmentation It is sent to the digital signal decrypting end.
Digital signal decryption receiving end 2 includes:
Data receipt unit 21, for receiving the digital block of the encrypted segmentation;
Personal key acquiring unit 22, for obtaining the personal key;
Decryption unit 23 adds according to the decruption key and decipherment algorithm corresponding with the decryption Encryption Algorithm to described Segmentation number block block after close is decrypted, and obtains former segmentation digital signal;
Assembled unit 24 obtains former data for combining the segmentation digital signal.
The Key generating unit includes:
First obtains subelement, for obtaining the biological attribute data of user;
First generates subelement, for generating feature vector according to the biological attribute data;
Second generates subelement, for being handled according to pre-defined algorithm described eigenvector, generates and the user Corresponding personal key.
Preferably, the DEU data encryption unit, according to the personal key and Encryption Algorithm to the segmentation digital signal It is encrypted, obtains encrypted segmentation digital signal.
Preferably, wherein described second, which generates subelement, includes:
Acquisition submodule obtains sequence for carrying out serializing processing to described eigenvector according to the pre-defined algorithm Feature vector after change;
Extracting sub-module, for from the feature vector after the serializing, extracting and meeting according to the pre-defined algorithm Equally distributed sequence data is as personal key corresponding with the user.
Here, the biological attribute data of user can be acquired especially by various types of biological characteristic sensing equipments, wherein Biological characteristic can be specially fingerprint, iris, sound, face, palmmprint, vein etc..
Personal key length can be selected (such as: 128,192,256 etc.) according to different demands.Specifically, It is first residual sequence and random sequence according to random generation method is preset by the eigendecomposition after the serializing;Judgement Whether the random sequence, which meets, is uniformly distributed;Be uniformly distributed if the random sequence meets, using the random sequence as Personal key corresponding with the user, and reversible encryption processing is carried out to the residual sequence, obtain a public-key cryptography;If institute State random sequence and do not meet and be uniformly distributed, then again according to it is described preset random generation method to the feature after the serializing to Amount carries out resolution process, until obtaining meeting the random sequence being respectively distributed, and the symbol decomposited again is equally distributed Random sequence is as personal key corresponding with the user.
The DEU data encryption unit 14 includes:
First operation subelement, for being believed according to the digital signal of segmentation, the personal key and the first random digit Number carry out bit arithmetic, obtain the first ciphertext digital signal;
Second operation subelement is obtained for carrying out bit arithmetic according to the personal key and the first random digital signal Second random digital signal;
It is inserted into subelement and it is close to obtain second for the second random digital signal to be inserted into the first ciphertext digital signal Literary digital signal;
First operation subelement is finally encrypted for carrying out inverted bit bit manipulation to the second ciphertext digital signal Segmentation digital signal afterwards.
The decryption unit 23 includes:
Second operation subelement is obtained for carrying out bit reverse turn operation to final encrypted segmentation digital signal 4th ciphertext digital signal;
It extracts subelement and it is close to obtain the 5th for extracting the second random digital signal from the 4th ciphertext digital signal Literary digital signal;
Third operation subelement obtains first for carrying out bit arithmetic according to the second random digital signal and personal key Random digital signal;
4th operation subelement, for according to the 5th ciphertext digital signal, the first random digital signal and personal key into Line position operation obtains former segmentation digital signal.
The decryption unit 23 may also include decryption judgment sub-unit, every time to obtaining data frame head, tail after decryption Divide and detected, if meeting the format of the frame head of segmentation digital signal ciphertext, postamble, is decrypted again.
Preferably, the personal key acquiring unit 22 can read personal key by individual physical storage medium.
Fig. 2 shows a kind of flow charts of digital signal encryption processing method of the invention.This method specifically includes as follows Step:
S1. user biological feature is acquired, personal key is generated;
S2. digital signal is segmented, and segmentation digital signal is encrypted using personal key and Encryption Algorithm;
S3. after digital signal packing being segmented, digital signal decryption receiving end is sent to;
S4. it is decrypted by digital signal decryption receiving end, obtains former segmentation digital signal, original is segmented data signal groups After conjunction, original digital signal is obtained.
Preferably, in step sl, specifically including following sub-step includes:
S11: the biological attribute data of user is obtained.
Here, the biological attribute data of user can be acquired especially by various types of biological characteristic sensing equipments, wherein Biological characteristic can be specially fingerprint, iris, sound, face, palmmprint, vein etc..
S12: according to the biological attribute data, feature vector is generated.
S13: carrying out serializing processing to described eigenvector according to the pre-defined algorithm, the feature after being serialized to Amount.
In a specific embodiment of the present invention, according to the demand of pre-defined algorithm, (or not by the feature value vector of different length With the information and data to be protected of format) it is converted into the sequence of designated length.
S14: it according to the pre-defined algorithm from the feature vector after the serializing, extracts and meets equally distributed sequence Column data is as personal key corresponding with the user.
The present invention generates unique sequence as personal key from fixed-length sequence, and personal key length can be according to not Selected with demand (such as: 128,192,256 etc.).Specifically, basis presets random generation method for institute first Eigendecomposition after stating serializing is residual sequence and random sequence;Judge whether the random sequence meets uniformly to divide Cloth;It is uniformly distributed if the random sequence meets, using the random sequence as personal key corresponding with the user, and Reversible encryption processing is carried out to the residual sequence, obtains a public-key cryptography;It is uniformly distributed if the random sequence is not met, Again random generation method is preset to the feature vector progress resolution process after the serializing, until being met according to described The random sequence being respectively distributed, and using the equally distributed random sequence of the symbol decomposited again as corresponding with the user Personal key.
Further, above-mentioned to judge whether the random sequence meets to be uniformly distributed and may particularly include:
It is extracted in the random sequence and multiple is uniformly distributed subsequence at random;
Judge multiple the distance between subsequence values that are uniformly distributed at random whether in preset range;
If the distance between multiple described random subsequences value judges the stochastic ordering in the preset range Column, which meet, to be uniformly distributed, and otherwise, is not met and is uniformly distributed.
Preferably, in the S2, following sub-step is specifically included:
S21: bit arithmetic is carried out according to segmentation digital signal, personal key and the first random digital signal, it is close to obtain first Literary digital signal.
In specific implementation, digital signal to be encrypted can be divided into multistage, can also using digital signal to be encrypted as One section.
Segmentation digital signal first can carry out bit arithmetic (such as XOR operation) with the first random digital signal and obtain third Then ciphertext allows third ciphertext and personal key to carry out bit arithmetic (such as XOR operation) again and obtains the first ciphertext digital signal. Certainly segmentation digital signal first can also carry out bit arithmetic (such as XOR operation) with personal key and obtain third ciphertext, then again It allows third ciphertext and the first random digital signal to carry out bit arithmetic (such as XOR operation) and obtains the first ciphertext digital signal.Wherein Specifically obtaining the first ciphertext digital signal can be realized by following C language, c [i]=p [i] ^r [(i+a) %rl] ^k [(i+ B) %kl], wherein c indicate the first ciphertext digital signal, i indicate byte ordinal number, p indicate segmentation digital signal, r indicate first with Machine digital signal, rl indicate the first random digital signal length, and k indicates that personal key, kl indicate personal key length, and a is small In the positive integer of the first random signal length, b is less than the positive integer of personal key length.
S22: bit arithmetic is carried out according to personal key and the first random digital signal, obtains the second random digital signal;
Personal key and the first random digital signal can be subjected to bit arithmetic (such as XOR operation), it is random to obtain second Digital signal, and the length of second random digital signal is as the length of the first random digital signal.However, to ensure that Data expansion is not very seriously that this length value should not be too large.
Can also by by each byte (in addition to the last byte) of the first random digital signal respectively with it is subsequent One byte carries out step-by-step XOR operation and obtains the second random digital signal.
S23: the second random digital signal is inserted into the first ciphertext digital signal, obtains the second ciphertext digital signal.
S24: carrying out inverted bit bit manipulation to the second ciphertext digital signal, obtains final encrypted segmentation number letter Number.
It preferably, can be by adding frame head, segmentation number letter before segmentation digital signal after encryption in S3 Number length and the encryption segmentation number length, after the segmentation digital signal of the encryption addition postamble mode into Row is packaged, and obtains the digital block of encrypted segmentation.
Preferably, in the decrypting process of step S4, following sub-step is specifically included:
S41: digital signal decrypts receiving end and receives final encrypted segmentation digital signal, and obtains personal key;
S42: bit reverse turn operation is carried out to final encrypted segmentation digital signal, obtains the 4th ciphertext number letter Number;
S43: extracting the second random digital signal from the 4th ciphertext digital signal, obtains the 5th ciphertext digital signal;
S44: bit arithmetic is carried out according to the second random digital signal and key, obtains the first random digital signal;
S45: bit arithmetic is carried out according to the 5th ciphertext digital signal, the first random digital signal and personal key, obtains original It is segmented digital signal.
Preferably, in S41, digital signal decrypts receiving end and obtains personal key by individual physical storage medium.
It preferably, further include following steps before executing step S41: according to final encrypted segmentation digital signal The second length value, personal key verification and and personal key the 4th length value, determine the second random digital signal Insertion position in the 4th ciphertext digital signal.
Insertion position can be calculated by formula pos_1=((cl+crc) × kl) %cl, wherein pos_1 indicates insertion Position, cl indicate the second length value of final encrypted segmentation digital signal, crc indicate key verification and, kl indicates close 4th length value of key.
Preferably, it in S42, specifically includes: first according to insertion position and the 4th length value, determining in final ciphertext The starting position of bit reverse turn operation is carried out in digital signal;Then it inverts again and is located at start bit in final ciphertext digital signal A bit in each byte postponed, obtains the 4th ciphertext digital signal, wherein each byte needs the bit inverted At least three bits in bit stream that serial number is made of the byte before the byte determine.
Preferably, it in S43, according to insertion position and at least one bit, is extracted from the 4th ciphertext digital signal Second random digital signal out obtains the 5th ciphertext digital signal.
As described above, although the embodiment and attached drawing according to defined by embodiment are illustrated, to the art It can carry out various modifications and deform from above-mentioned record for technical staff with general knowledge.For example, according to explanation Technology illustrated in method mutually different sequence carry out, and/or according to system, structure, device, the circuit etc. with explanation The mutually different form of method illustrated by constituent element is combined or combines, or is carried out according to other constituent elements or equipollent Replacement or displacement also may achieve effect appropriate.For those of ordinary skill in the art to which the present invention belongs, it is not taking off Under the premise of from present inventive concept, several equivalent substitute or obvious modifications is made, and performance or use is identical, all should be considered as It belongs to the scope of protection of the present invention.

Claims (9)

1. a kind of digital signal encryption processing method, this method specifically comprise the following steps:
S1. user biological feature is acquired, personal key is generated;
S2. digital signal is segmented, and segmentation digital signal is encrypted using personal key and Encryption Algorithm;
S3. after digital signal packing being segmented, digital signal decryption receiving end is sent to;
S4. it is decrypted by digital signal decryption receiving end, obtains former segmentation digital signal, by original segmentation digital signal combination Afterwards, original digital signal is obtained;
In step sl, following sub-step is specifically included:
S11: the biological attribute data of user is obtained;
The biological attribute data of user can be acquired especially by various types of biological characteristic sensing equipments, wherein biological characteristic It can be specially fingerprint, iris, sound, face, palmmprint, any in vein;
S12: according to the biological attribute data, feature vector is generated;
S13: serializing processing is carried out to described eigenvector according to pre-defined algorithm, the feature vector after being serialized;
According to the demand of pre-defined algorithm, it converts the feature value vector of different length to the sequence of designated length;
S14: it according to the pre-defined algorithm from the feature vector after the serializing, extracts and meets equally distributed sequence number According to as personal key corresponding with the user;
Unique sequence is generated from fixed-length sequence as personal key, personal key length can be carried out according to different demands Selection, specifically, first according to preset random generation method by the eigendecomposition after the serializing be residual sequence and Random sequence;Judge whether the random sequence meets to be uniformly distributed;It is uniformly distributed if the random sequence meets, it will be described Random sequence carries out reversible encryption processing as personal key corresponding with the user, and to the residual sequence, obtains one Public-key cryptography;It is uniformly distributed if the random sequence is not met, presets random generation method to the sequence according to described again Feature vector after columnization carries out resolution process, until obtain meeting the random sequence being respectively distributed, and will decomposite again The equally distributed random sequence of symbol is as personal key corresponding with the user.
2. the method as described in claim 1, which is characterized in that above-mentioned to judge whether the random sequence meets that be uniformly distributed It specifically includes:
It is extracted in the random sequence and multiple is uniformly distributed subsequence at random;
Judge multiple the distance between subsequence values that are uniformly distributed at random whether in preset range;
If the distance between multiple described random subsequences value in the preset range, judges the random sequence symbol Conjunction is uniformly distributed, and otherwise, is not met and is uniformly distributed.
3. method according to claim 2, which is characterized in that in the S2, specifically include following sub-step:
S21: bit arithmetic is carried out according to segmentation digital signal, personal key and the first random digital signal, obtains the first ciphertext number Word signal;
Segmentation digital signal first can carry out bit arithmetic with the first random digital signal and obtain third ciphertext, then allow third close again Text carries out bit arithmetic with personal key and obtains the first ciphertext digital signal, and being segmented digital signal certainly can also be first with personal close Key carries out bit arithmetic and obtains third ciphertext, then allows third ciphertext and the first random digital signal to carry out bit arithmetic again and obtains first Ciphertext digital signal, wherein specifically obtaining the first ciphertext digital signal can be realized by following C language, c [i]=p [i] ^r [(i+a) %rl] ^k [(i+b) %kl], wherein c indicates the first ciphertext digital signal, and i indicates that byte ordinal number, p indicate segments Word signal, r indicate that the first random digital signal, rl indicate the first random digital signal length, and k indicates that personal key, kl indicate Personal key length, a are less than the positive integer of the first random signal length, and b is less than the positive integer of personal key length;
S22: bit arithmetic is carried out according to personal key and the first random digital signal, obtains the second random digital signal;
Personal key and the first random digital signal are subjected to bit arithmetic, obtain the second random digital signal, and this is second random The length of digital signal is as the length of the first random digital signal;
It can also be by the way that each byte of the first random digital signal be carried out step-by-step exclusive or fortune with a subsequent byte respectively Calculation obtains the second random digital signal;
S23: the second random digital signal is inserted into the first ciphertext digital signal, obtains the second ciphertext digital signal;
S24: carrying out inverted bit bit manipulation to the second ciphertext digital signal, obtains final encrypted segmentation digital signal.
4. method as claimed in claim 3, which is characterized in that in S3, segmentation digital signal after encryption can be passed through The length of the segmentation number of preceding addition frame head, the length of the segmentation digital signal and the encryption, in the segmentation of the encryption The mode that postamble is added after digital signal is packaged, and the digital block of encrypted segmentation is obtained.
5. method as claimed in claim 4, which is characterized in that in the decrypting process of step S4, specifically include following sub-step It is rapid:
S41: digital signal decrypts receiving end and receives final encrypted segmentation digital signal, and obtains personal key;
S42: bit reverse turn operation is carried out to final encrypted segmentation digital signal, obtains the 4th ciphertext digital signal;
S43: extracting the second random digital signal from the 4th ciphertext digital signal, obtains the 5th ciphertext digital signal;
S44: bit arithmetic is carried out according to the second random digital signal and personal key, obtains the first random digital signal;
S45: bit arithmetic is carried out according to the 5th ciphertext digital signal, the first random digital signal and personal key, obtains former segmentation Digital signal.
6. method as claimed in claim 5, which is characterized in that in S41, digital signal decrypts receiving end and passes through individual object It manages storage medium and obtains personal key.
7. method as claimed in claim 6, which is characterized in that further include following steps before executing step S41: according to The verification of the second length value, personal key of final encrypted segmentation digital signal and and personal key the 4th length Value, determines insertion position of second random digital signal in the 4th ciphertext digital signal;
Insertion position can be calculated by formula pos_1=((cl+crc) × kl) %cl, wherein pos_1 indicates insertion position, Cl indicates the second length value of final encrypted segmentation digital signal, crc indicate key verification and, kl indicates the of key Four length values.
8. the method for claim 7, which is characterized in that in S42, specifically include: first according to insertion position and the Four length values determine the starting position that bit reverse turn operation is carried out in final ciphertext digital signal;Then it inverts again most A bit in each byte after being located at starting position in whole ciphertext digital signal, obtains the 4th ciphertext digital signal, At least three bits in bit stream that wherein each byte needs the bit sequence inverted to be made of the byte before the byte Position determines.
9. method according to claim 8, which is characterized in that in S43, according to insertion position and at least one bit, The second random digital signal is extracted from the 4th ciphertext digital signal, obtains the 5th ciphertext digital signal.
CN201610423109.5A 2016-06-13 2016-06-13 A kind of digital signal encryption processing method Active CN105871549B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610423109.5A CN105871549B (en) 2016-06-13 2016-06-13 A kind of digital signal encryption processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610423109.5A CN105871549B (en) 2016-06-13 2016-06-13 A kind of digital signal encryption processing method

Publications (2)

Publication Number Publication Date
CN105871549A CN105871549A (en) 2016-08-17
CN105871549B true CN105871549B (en) 2018-12-25

Family

ID=56650651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610423109.5A Active CN105871549B (en) 2016-06-13 2016-06-13 A kind of digital signal encryption processing method

Country Status (1)

Country Link
CN (1) CN105871549B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111756523B (en) * 2016-11-04 2022-08-12 北京紫光展锐通信技术有限公司 Data transmission method and device
CN106656262A (en) * 2016-12-06 2017-05-10 广州市科恩电脑有限公司 Power line carrier communication system
CN106533507A (en) * 2016-12-06 2017-03-22 广州市科恩电脑有限公司 Method for communicating with power line
CN106789971A (en) * 2016-12-06 2017-05-31 广州市科恩电脑有限公司 A kind of encrypted transmission method of power carrier data
CN106686586B (en) * 2016-12-29 2020-08-11 北京泛安信息技术有限公司 Wireless transmission system and encryption and decryption method thereof
CN106909340A (en) * 2017-04-26 2017-06-30 江西师范大学 A kind of random sequence generation device and method based on electromyographic signal
CN107332659B (en) * 2017-05-24 2020-01-07 武汉真元生物数据有限公司 Identity authentication method, storage medium and system based on biological characteristics
CN110650150A (en) * 2019-10-10 2020-01-03 上海久誉软件***有限公司 Computer wireless propagation neural network method based on 5G network
CN113408729A (en) * 2021-07-06 2021-09-17 安徽理工大学 Data processing method for DNA calculation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area
CN103581900A (en) * 2012-08-01 2014-02-12 ***通信集团公司 Communication safety control method and device, first mobile terminal and mobile health device
CN104462918A (en) * 2014-12-02 2015-03-25 黑龙江大学 Face biologic key generation method based on self-adaptive nonuniform quantization

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7620628B2 (en) * 2004-12-06 2009-11-17 Yahoo! Inc. Search processing with automatic categorization of queries

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area
CN103581900A (en) * 2012-08-01 2014-02-12 ***通信集团公司 Communication safety control method and device, first mobile terminal and mobile health device
CN104462918A (en) * 2014-12-02 2015-03-25 黑龙江大学 Face biologic key generation method based on self-adaptive nonuniform quantization

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于指纹的强前向安全数字签名方法应用研究;孙飞龙;《中国学位论文全文数据库》;20160129;全文 *

Also Published As

Publication number Publication date
CN105871549A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
CN105871550B (en) A kind of system for realizing digital signal encryption transmission
CN105871549B (en) A kind of digital signal encryption processing method
TWI489847B (en) Data encryption method, data verification method and electronic apparatus
CN101447870B (en) Safe storage method of private key based on technology of distributed password
CN107733656A (en) A kind of cipher authentication method and device
WO2001030020A1 (en) Variable length key encrypting system
WO2007006689A1 (en) Generating a secret key from an asymmetric private key
CN106878013A (en) A kind of encryption and decryption method and device of file
US10873448B2 (en) Technique to generate symmetric encryption algorithms
JP2011512562A (en) Random encryption and decryption method for access and communication data
CN105959106B (en) A kind of low-complexity digital encryption method
CN111404953A (en) Message encryption method, message decryption method, related devices and related systems
CN112383397A (en) Heterogeneous signcryption communication method based on biological characteristics
CN103501220B (en) encryption method and device
JP2016075765A (en) Authentication encryption device, authentication decryption device, and program therefor
CN109787747A (en) Anti- quantum calculation multi-enciphering cloud storage method and system based on multiple unsymmetrical key ponds
WO2015166701A1 (en) Encryption method, program, and system
CN107846422A (en) A kind of configuration file ciphered compressed of gateway and the method for decryption decompression
CN105049176B (en) Decryption method for view data safe transmission
JP2002077135A (en) Encrypting method, decrypting method and their equipment
JP4194481B2 (en) Secret information storage processing method, secret information storage device, secret information restoration processing method, and secret information restoration device
KR101428665B1 (en) Security system and method for using aes-otp
WO2002089397A1 (en) Data transmission method
JP4802388B2 (en) ENCRYPTION DEVICE, DECRYPTION DEVICE, AND COMMUNICATION SYSTEM
JP2005167794A5 (en)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant