CN105871550A - System for realizing digital signal encryption transmission - Google Patents
System for realizing digital signal encryption transmission Download PDFInfo
- Publication number
- CN105871550A CN105871550A CN201610423744.3A CN201610423744A CN105871550A CN 105871550 A CN105871550 A CN 105871550A CN 201610423744 A CN201610423744 A CN 201610423744A CN 105871550 A CN105871550 A CN 105871550A
- Authority
- CN
- China
- Prior art keywords
- digital signal
- segmentation
- encryption
- ciphertext
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a system for realizing digital signal encryption transmission. The system can generate a secret key according to personnel information of a user, so that the secret key has the uniqueness and the complexity; in the digital signal encryption and decryption processes, the bit operation is performed with the personnel secret key and a first random digital signal through a plaintext digital signal to obtain a first ciphertext digital signal; meanwhile, the personnel secret key and the first random digital signal are subjected to bit operation to obtain a second random digital signal; the obtained second random digital signal and the first ciphertext digital signal are subjected to bit operation to obtain a second ciphertext digital signal; finally, the second ciphertext digital signal is subjected to inverting bit operation to obtain an original plaintext digital signal. The problems of poor confidentiality and low security of the digital signals are solved; the cracking difficulty is greatly enhanced.
Description
Art
The present invention relates to a kind of system realizing digital signal encryption transmission.
Background technology
The people that develop into of information network technique provide a great convenience.But the network crime simultaneously increases the most therewith
Many, information security issue becomes focus of concern gradually.At present, along with the long-range pipe of high-end server
Reason mode popular, it is more and more universal for using client to carry out remotely administered server, compares general website
Login authentication mechanism, requires higher to the login authentication made safe of server.Such as, in client and
During server directly transmits data, use clear-text way can reveal some critical data, such as service
The username and password of device manager, accordingly, it would be desirable to use cipher mode transmission.
Data encryption, also known as cryptography, refers to be converted into ciphertext in plain text by AES and encryption key, and
Deciphering is then reverse by decipherment algorithm and decruption key, ciphertext to be reduced into original text.Data encryption, is one
The time-honored technology of door, refers to will be changed into ciphertext in plain text by AES and encryption key, and deciphering is then
It is by decipherment algorithm and decruption key, ciphertext to be reverted in plain text.Data encryption is still computer system at present
The most reliable way of one that information is protected.It utilizes cryptographic technique to be encrypted information, it is achieved
Information hiding, thus play the effect of the safety of protection information.
Along with the evolution of AES, block encryption algorithm carries out block encryption to data, adds data solution
Close difficulty, but, take the AES fixed and key to be encrypted, determine AES and key
After, forming corresponding relation with password in plain text, can crack to use the violence modes such as the method for exhaustion, degree of safety needs
Improve.
Summary of the invention
The present invention provides a kind of system realizing digital signal encryption transmission, and this system can realize high security
Transmit with the data of high reliability.
To achieve these goals, the present invention provides a kind of system realizing digital signal encryption transmission, and this is
System includes digital signal encryption transmitting terminal and numeral decrypted signal receiving terminal;
Wherein, digital signal encryption transmitting terminal includes:
Data packet units, carries out segmentation by digital signal to be encrypted, produces segmentation digital signal;
Key generating unit, is used for generating personal key;
Storage memory element, is used for storing personal key;
DEU data encryption unit, utilizes AES and described personal key to add described segmentation digital signal
Close, after being encrypted segmentation digital signal;
Segmentation digital signal packaged unit, packs the segmentation digital signal after described encryption, is added
Segmentation numeral block after close;
Data transmission blocks, for being sent to described digital signal by the segmentation numeral block after described encryption
Decrypting end;
Described digital signal deciphering receiving terminal includes:
Data receipt unit, the segmentation numeral block after receiving described encryption;
Personal key acquiring unit, is used for obtaining described personal key;
Decryption unit, according to described decruption key and the decipherment algorithm corresponding with described deciphering AES to institute
State the segmentation numeral block block after encryption to be decrypted, obtain former segmentation digital signal;
Assembled unit, is used for combining described segmentation digital signal, obtains original digital signal.
Preferably, described Key generating unit includes the first acquisition subelement, for obtaining the biological special of user
Levy data;
First generates subelement, for according to described biological attribute data, generates characteristic vector;
Second generates subelement, for processing described characteristic vector according to pre-defined algorithm, generates and institute
State the personal key that user is corresponding.
Preferably, described DEU data encryption unit, according to described personal key and AES to described segments
Word signal is encrypted, the segmentation digital signal after being encrypted.
Preferably, wherein, described second generation subelement includes:
Obtain submodule, for described characteristic vector being carried out serializing process according to described pre-defined algorithm,
Characteristic vector after serializing;
Extract submodule, be used for, according to described pre-defined algorithm from the characteristic vector after described serializing, extracting
Go out to meet equally distributed sequence data as the personal key corresponding with described user.
Preferably, described DEU data encryption unit includes:
First operator unit, for random according to segmentation numeral signal, described personal key and first
Digital signal carries out bit arithmetic, obtains the first ciphertext digital signal;
Second operator unit, for carrying out bit arithmetic according to described personal key and the first random digital signal,
Obtain the second random digital signal;
Intron unit, for being inserted in the first ciphertext digital signal by the second random digital signal, obtains
Second ciphertext digital signal;
First operator unit, for the second ciphertext digital signal is carried out inverted bit bit manipulation, obtains
Segmentation digital signal after encryption eventually.
Preferably, described decryption unit includes:
Second operator unit, for the segmentation digital signal after final encryption is carried out bit reverse turn operation,
Obtain the 4th ciphertext digital signal;
Extract subelement, for extracting the second random digital signal from the 4th ciphertext digital signal, obtain
5th ciphertext digital signal;
3rd operator unit, for carrying out bit arithmetic according to the second random digital signal and personal key,
To the first random digital signal;
4th operator unit, for according to the 5th ciphertext digital signal, the first random digital signal and individual
Key carries out bit arithmetic, obtains former segmentation digital signal.
Preferably, described decryption unit may also include deciphering judgment sub-unit, every time to obtaining data after deciphering
Frame head, trailer sections detect, if meeting the form of the frame head of segmentation digital signal ciphertext, postamble, then
Again it is decrypted.
Preferably, described personal key acquiring unit, can read individual by single physical storage medium
Key.
The present invention has the following advantages and beneficial effect: this system can generate close according to the personal information of user
Key so that key has uniqueness and complexity;In digital signal encryption decrypting process, by plaintext number
Word signal carries out bit arithmetic with personal key and the first random digital signal, obtains the first ciphertext digital signal,
Personal key and the first random digital signal are carried out bit arithmetic simultaneously, obtain the second random digital signal, and
The second random digital signal obtained and the first ciphertext digital signal are carried out bit arithmetic, obtains the second ciphertext number
Word signal, carries out inverted bit bit manipulation to the second ciphertext digital signal the most again, obtains former plaintext numeral letter
Number, solve the confidentiality of digital signal and the problem of poor stability, be significantly increased and crack difficulty.
Accompanying drawing explanation
Fig. 1 shows the block diagram of a kind of system realizing digital signal encryption transmission of the present invention.
Fig. 2 shows the flow chart of a kind of digital signal encryption processing method of the present invention.
Detailed description of the invention
Fig. 1 shows a kind of system realizing digital signal encryption transmission of the present invention.System includes numeral
Signal encryption transmitting terminal 1 and numeral decrypted signal receiving terminal 2.
Wherein, digital signal encryption transmitting terminal 1 includes: data packet units 11, by digital signal to be encrypted
Carry out segmentation, produce segmentation digital signal;Key generating unit 12, is used for generating personal key;Key is deposited
Storage unit 13, is used for storing personal key;DEU data encryption unit 14, utilizes AES and described individual close
Described segmentation digital signal is encrypted by key, the segmentation digital signal after being encrypted;Segmentation digital signal
Packaged unit 15, packs the segmentation digital signal after described encryption, the segmentation numeral after being encrypted
Block;Data transmission blocks 16, for being sent to described number by the segmentation numeral block after described encryption
Word decrypted signal end.
Described digital signal deciphering receiving terminal 2 includes:
Data receipt unit 21, the segmentation numeral block after receiving described encryption;
Personal key acquiring unit 22, is used for obtaining described personal key;
Decryption unit 23, according to described decruption key and the decipherment algorithm pair corresponding with described deciphering AES
Segmentation numeral block block after described encryption is decrypted, and obtains former segmentation digital signal;
Assembled unit 24, is used for combining described segmentation digital signal, obtains original digital signal.
Described Key generating unit includes:
First obtains subelement, for obtaining the biological attribute data of user;
First generates subelement, for according to described biological attribute data, generates characteristic vector;
Second generates subelement, for processing described characteristic vector according to pre-defined algorithm, generates and institute
State the personal key that user is corresponding.
Preferably, described DEU data encryption unit, according to described personal key and AES to described segments
Word signal is encrypted, the segmentation digital signal after being encrypted.
Preferably, wherein, described second generation subelement includes:
Obtain submodule, for described characteristic vector being carried out serializing process according to described pre-defined algorithm,
Characteristic vector after serializing;
Extract submodule, be used for, according to described pre-defined algorithm from the characteristic vector after described serializing, extracting
Go out to meet equally distributed sequence data as the personal key corresponding with described user.
Here, the biological attribute data of user can be gathered especially by various types of biological characteristic sensing equipments,
Wherein, biological characteristic can be specially fingerprint, iris, sound, face, palmmprint, vein etc..
Personal key length can carry out selecting according to different demands (such as: 128,192,256 etc.).
Concrete, first basis presets stochastic generation method is residual error sequence by the eigendecomposition after described serializing
Row and random sequence;Judge whether described random sequence meets to be uniformly distributed;If described random sequence meets all
Even distribution, then using described random sequence as the personal key corresponding with described user, and to described residual error sequence
Row carry out reversible encryption process, obtain a public-key cryptography;If described random sequence does not meets it is uniformly distributed, then
Again the characteristic vector after described serializing is carried out resolution process, directly according to described default stochastic generation method
The random sequence of distribution, and the equally distributed random sequence of symbol that will again decomposite is divided equally to obtaining meeting
As the personal key corresponding with described user.
Described DEU data encryption unit 14 includes:
First operator unit, for random according to segmentation numeral signal, described personal key and first
Digital signal carries out bit arithmetic, obtains the first ciphertext digital signal;
Second operator unit, for carrying out bit arithmetic according to described personal key and the first random digital signal,
Obtain the second random digital signal;
Intron unit, for being inserted in the first ciphertext digital signal by the second random digital signal, obtains
Second ciphertext digital signal;
First operator unit, for the second ciphertext digital signal is carried out inverted bit bit manipulation, obtains
Segmentation digital signal after encryption eventually.
Described decryption unit 23 includes:
Second operator unit, for the segmentation digital signal after final encryption is carried out bit reverse turn operation,
Obtain the 4th ciphertext digital signal;
Extract subelement, for extracting the second random digital signal from the 4th ciphertext digital signal, obtain
5th ciphertext digital signal;
3rd operator unit, for carrying out bit arithmetic according to the second random digital signal and personal key,
To the first random digital signal;
4th operator unit, for according to the 5th ciphertext digital signal, the first random digital signal and individual
Key carries out bit arithmetic, obtains former segmentation digital signal.
Described decryption unit 23 may also include deciphering judgment sub-unit, every time after deciphering to obtain data frame head,
Trailer sections detects, if meeting the form of the frame head of segmentation digital signal ciphertext, postamble, the most again enters
Row deciphering.
Preferably, described personal key acquiring unit 22, can read individual by single physical storage medium
People's key.
Fig. 2 shows the flow chart of a kind of digital signal encryption processing method of the present invention.The method is specifically wrapped
Include following steps:
S1. gather user biological feature, generate personal key;
S2. by digital signal segmentation, and utilize personal key and AES that segmentation digital signal is encrypted;
S3., after being packed by segmentation digital signal, digital signal deciphering receiving terminal is sent to;
S4. it is decrypted by digital signal deciphering receiving terminal, obtains former segmentation digital signal, by former segmentation numeral
After signal combination, obtain original digital signal.
Preferably, in step sl, it specifically includes following sub-step and includes:
S11: obtain the biological attribute data of user.
Here, the biological attribute data of user can be gathered especially by various types of biological characteristic sensing equipments,
Wherein, biological characteristic can be specially fingerprint, iris, sound, face, palmmprint, vein etc..
S12: according to described biological attribute data, generates characteristic vector.
S13: according to described pre-defined algorithm, described characteristic vector is carried out serializing process, after being serialized
Characteristic vector.
In a particular embodiment of the present invention, according to the demand of pre-defined algorithm, by the eigenvalue of different length to
Amount (or the information to be protected of different-format and data) is converted into the sequence of designated length.
S14: according to described pre-defined algorithm from the characteristic vector after described serializing, extracts to meet and uniformly divides
The sequence data of cloth is as the personal key corresponding with described user.
The present invention generates unique sequence as personal key from fixed-length sequence, and personal key length can
Carry out selecting (such as: 128,192,256 etc.) according to different demands.Concrete, first according to pre-
If the eigendecomposition after described serializing is residual sequence and random sequence by stochastic generation method;Judge
Whether described random sequence meets is uniformly distributed;If described random sequence meets be uniformly distributed, then by described with
Machine sequence is as the personal key corresponding with described user, and described residual sequence is carried out reversible encryption process,
Obtain a public-key cryptography;If described random sequence does not meets it is uniformly distributed, the most again presets at random according to described
Generation method carries out resolution process to the characteristic vector after described serializing, divides equally distribution until obtaining meeting
Random sequence, and using the equally distributed random sequence of symbol that again decomposites as corresponding with described user
Personal key.
Further, above-mentioned judge whether described random sequence meets to be uniformly distributed and may particularly include:
Described random sequence is extracted and multiple is uniformly distributed subsequence at random;
Judge whether multiple described distance value being uniformly distributed at random between subsequence is in preset range;
If the distance value between multiple described random subsequences is in described preset range, then judge described
Random sequence meets and is uniformly distributed, and otherwise, does not meets and is uniformly distributed.
Preferably, in described S2, specifically include following sub-step:
S21: carry out bit arithmetic according to segmentation digital signal, personal key and the first random digital signal, obtain
First ciphertext digital signal.
In being embodied as, digital signal to be encrypted can be divided into multistage, it is also possible to by numeral letter to be encrypted
Number as one section.
Segmentation digital signal can first obtain with the first random digital signal carries out bit arithmetic (such as XOR)
3rd ciphertext, allowing the 3rd ciphertext and personal key carry out bit arithmetic (such as XOR) the most again, to obtain first close
Literary composition digital signal.Certainly segmentation digital signal first can also carry out bit arithmetic (such as XOR) with personal key
Obtain the 3rd ciphertext, allow the 3rd ciphertext and the first random digital signal carry out bit arithmetic (such as XOR fortune the most again
Calculate) obtain the first ciphertext digital signal.The most specifically obtain the first ciphertext digital signal and can pass through following C language
Speech realizes, and c [i]=p [i] ^r [(i+a) %rl] ^k [(i+b) %kl], wherein c represents the first ciphertext digital signal, i
Represent byte ordinal number, p represents segmentation digital signal, and r represents the first random digital signal, rl represent first with
Machine digital signal length, k represents that personal key, kl represent personal key length, and a is less than first to be believed at random
The positive integer of number length, b is less than the positive integer of personal key length.
S22: carry out bit arithmetic according to personal key and the first random digital signal, obtains the second random digit letter
Number;
Personal key and the first random digital signal can be carried out bit arithmetic (such as XOR), obtain second
Random digital signal, and the length of this second random digital signal is as the length of the first random digital signal.
However, to ensure that data expansion is not very serious, this length value is unsuitable excessive.
Can also by by each byte (except last byte) of the first random digital signal respectively with rear
One byte in face carries out step-by-step XOR and obtains the second random digital signal.
S23: be inserted into by the second random digital signal in the first ciphertext digital signal, obtains the second ciphertext numeral
Signal.
S24: the second ciphertext digital signal is carried out inverted bit bit manipulation, the segments after finally being encrypted
Word signal.
Preferably, in S3, can by add before segmentation digital signal after encryption frame head, described point
The length of piece of digital signal and the length of the segmentation numeral of described encryption, at the segmentation digital signal of described encryption
The mode of rear interpolation postamble is packed, the segmentation numeral block after being encrypted.
Preferably, in the decrypting process of step S4, specifically include following sub-step:
S41: digital signal deciphering receiving terminal receives the segmentation digital signal after final encryption, and it is close to obtain individual
Key;
S42: the segmentation digital signal after final encryption is carried out bit reverse turn operation, obtains the 4th ciphertext number
Word signal;
S43: extract the second random digital signal from the 4th ciphertext digital signal, obtains the 5th ciphertext numeral
Signal;
S44: carry out bit arithmetic according to the second random digital signal and key, obtain the first random digital signal;
S45: carry out bit arithmetic according to the 5th ciphertext digital signal, the first random digital signal and personal key,
Obtain former segmentation digital signal.
Preferably, in S41, digital signal deciphering receiving terminal obtains individual by single physical storage medium
People's key.
Segmentation preferably, before performing step S41, after also comprising the steps: according to final encryption
Second length value of digital signal, the verification of personal key and and the 4th length value of personal key, determine
Go out second random digital signal on position in the 4th ciphertext digital signal.
Can pass through formula pos_1=((cl+crc) × kl) %cl, calculate on position, wherein pos_1 represents slotting
Entering position, cl represents the second length value of the segmentation digital signal after final encryption, and crc represents the verification of key
With, kl represents the 4th length value of key.
Preferably, in S42, specifically include: first according on position and the 4th length value, determine
The starting position of bit reverse turn operation is carried out in final ciphertext digital signal;Invert final ciphertext the most again
The bit being positioned in digital signal in each byte behind starting position, obtains the 4th ciphertext numeral letter
Number, the most each byte needs in the bit stream that the bit sequence of reversion is made up of the byte before this byte
At least three bit determines.
Preferably, in S43, according on position and at least one bit, from the 4th ciphertext numeral letter
Extract the second random digital signal in number, obtain the 5th ciphertext digital signal.
As mentioned above, although the embodiment and the accompanying drawing that are limited according to embodiment are illustrated, but to this skill
Art field can carry out various amendment and deformation for having the technical staff of general knowledge from above-mentioned record.
Such as, carry out according to the order that the method illustrated from the technology of explanation is mutually different, and/or according to say
The form that the method illustrated by element such as bright system, structure, device, circuit is mutually different is combined
Or combination, or it is replaced according to other elements or equipollent or replaces and also can reach suitable effect.
For general technical staff of the technical field of the invention, without departing from the inventive concept of the premise,
Make some equivalents to substitute or obvious modification, and performance or purposes are identical, all should be considered as belonging to the present invention
Protection domain.
Claims (8)
1. realize digital signal encryption transmission a system, this system include digital signal encryption transmitting terminal and
Digital signal deciphering receiving terminal;
Wherein, digital signal encryption transmitting terminal includes:
Data packet units, carries out segmentation by digital signal to be encrypted, produces segmentation digital signal;
Key generating unit, is used for generating personal key;
Storage memory element, is used for storing personal key;
DEU data encryption unit, utilizes AES and described personal key to add described segmentation digital signal
Close, after being encrypted segmentation digital signal;
Segmentation digital signal packaged unit, packs the segmentation digital signal after described encryption, is added
Segmentation numeral block after close;
Data transmission blocks, for being sent to described digital signal by the segmentation numeral block after described encryption
Decrypting end;
Described digital signal deciphering receiving terminal includes:
Data receipt unit, the segmentation numeral block after receiving described encryption;
Personal key acquiring unit, is used for obtaining described personal key;
Decryption unit, according to described decruption key and the decipherment algorithm corresponding with described deciphering AES to institute
State the segmentation numeral block block after encryption to be decrypted, obtain former segmentation digital signal;
Assembled unit, is used for combining described segmentation digital signal, obtains original digital signal.
2. the system as claimed in claim 1, it is characterised in that described Key generating unit includes that first obtains
Take subelement, for obtaining the biological attribute data of user;
First generates subelement, for according to described biological attribute data, generates characteristic vector;
Second generates subelement, for processing described characteristic vector according to pre-defined algorithm, generates and institute
State the personal key that user is corresponding.
3. as claimed in claim 2 system, it is characterised in that described DEU data encryption unit, according to described
Described segmentation digital signal is encrypted by personal key and AES, the segmentation numeral letter after being encrypted
Number.
4. system as claimed in claim 3, it is characterised in that wherein, described second generates subelement bag
Include:
Obtain submodule, for described characteristic vector being carried out serializing process according to described pre-defined algorithm,
Characteristic vector after serializing;
Extract submodule, be used for, according to described pre-defined algorithm from the characteristic vector after described serializing, extracting
Go out to meet equally distributed sequence data as the personal key corresponding with described user.
5. as claimed in claim 4 system, it is characterised in that described DEU data encryption unit includes:
First operator unit, for random according to segmentation numeral signal, described personal key and first
Digital signal carries out bit arithmetic, obtains the first ciphertext digital signal;
Second operator unit, for carrying out bit arithmetic according to described personal key and the first random digital signal,
Obtain the second random digital signal;
Intron unit, for being inserted in the first ciphertext digital signal by the second random digital signal, obtains
Second ciphertext digital signal;
First operator unit, for the second ciphertext digital signal is carried out inverted bit bit manipulation, obtains
Segmentation digital signal after encryption eventually.
6. as claimed in claim 5 system, it is characterised in that described decryption unit includes:
Second operator unit, for the segmentation digital signal after final encryption is carried out bit reverse turn operation,
Obtain the 4th ciphertext digital signal;
Extract subelement, for extracting the second random digital signal from the 4th ciphertext digital signal, obtain
5th ciphertext digital signal;
3rd operator unit, for carrying out bit arithmetic according to the second random digital signal and personal key,
To the first random digital signal;
4th operator unit, for according to the 5th ciphertext digital signal, the first random digital signal and individual
Key carries out bit arithmetic, obtains former segmentation digital signal.
7. as claimed in claim 6 system, it is characterised in that described decryption unit may also include deciphering and sentences
Disconnected subelement, every time after deciphering to obtaining data frame head, trailer sections detects, if meeting segmentation numeral
The frame head of signal ciphertext, the form of postamble, be decrypted the most again.
8. as claimed in claim 7 system, it is characterised in that described personal key acquiring unit is permissible
Personal key is read by single physical storage medium.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610423744.3A CN105871550B (en) | 2016-06-13 | 2016-06-13 | A kind of system for realizing digital signal encryption transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610423744.3A CN105871550B (en) | 2016-06-13 | 2016-06-13 | A kind of system for realizing digital signal encryption transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105871550A true CN105871550A (en) | 2016-08-17 |
CN105871550B CN105871550B (en) | 2019-04-09 |
Family
ID=56650514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610423744.3A Active CN105871550B (en) | 2016-06-13 | 2016-06-13 | A kind of system for realizing digital signal encryption transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105871550B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106533507A (en) * | 2016-12-06 | 2017-03-22 | 广州市科恩电脑有限公司 | Method for communicating with power line |
CN106656262A (en) * | 2016-12-06 | 2017-05-10 | 广州市科恩电脑有限公司 | Power line carrier communication system |
CN106789971A (en) * | 2016-12-06 | 2017-05-31 | 广州市科恩电脑有限公司 | A kind of encrypted transmission method of power carrier data |
CN106953665A (en) * | 2017-05-16 | 2017-07-14 | 成都环磊科技有限公司 | A kind of method that Internet of Things is built based on power line communication |
CN107040285A (en) * | 2017-05-16 | 2017-08-11 | 成都环磊科技有限公司 | The transmission method of power carrier data in a kind of Internet of Things |
WO2018082008A1 (en) * | 2016-11-04 | 2018-05-11 | Nokia Technologies Oy | Secure distributed data processing |
CN111199047A (en) * | 2019-12-31 | 2020-05-26 | 中移(杭州)信息技术有限公司 | Data encryption method, data decryption method, data encryption device, data decryption device, data encryption equipment and data encryption storage medium |
CN113254966A (en) * | 2021-06-04 | 2021-08-13 | 王兆河 | Dynamic encryption method and ciphertext structure of medical digital image information |
CN113408729A (en) * | 2021-07-06 | 2021-09-17 | 安徽理工大学 | Data processing method for DNA calculation |
CN115276989A (en) * | 2022-09-28 | 2022-11-01 | 南通德辰智能科技有限公司 | Serialized data encryption method based on direction scrambling |
CN117527409A (en) * | 2023-12-04 | 2024-02-06 | 北京弗莱特智能软件开发有限公司 | Data encryption method, personal gateway equipment and data encryption system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1831834A (en) * | 2006-04-20 | 2006-09-13 | 成都昊芯科技有限公司 | Dynamic enciphering method and circuit for information |
US7165050B2 (en) * | 2004-09-20 | 2007-01-16 | Aaron Marking | Media on demand via peering |
CN101984574A (en) * | 2010-11-29 | 2011-03-09 | 北京卓微天成科技咨询有限公司 | Data encryption and decryption method and device |
CN102075322A (en) * | 2010-12-06 | 2011-05-25 | 中兴通讯股份有限公司 | Storage method and terminal equipment of key parameters |
CN102402670A (en) * | 2011-08-03 | 2012-04-04 | 广东欧珀移动通信有限公司 | File encryption and decryption method |
CN103581900A (en) * | 2012-08-01 | 2014-02-12 | ***通信集团公司 | Communication safety control method and device, first mobile terminal and mobile health device |
CN104125059A (en) * | 2013-04-28 | 2014-10-29 | 陈麟华 | Compound time varying password and time varying type data encryption method |
-
2016
- 2016-06-13 CN CN201610423744.3A patent/CN105871550B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7165050B2 (en) * | 2004-09-20 | 2007-01-16 | Aaron Marking | Media on demand via peering |
CN1831834A (en) * | 2006-04-20 | 2006-09-13 | 成都昊芯科技有限公司 | Dynamic enciphering method and circuit for information |
CN101984574A (en) * | 2010-11-29 | 2011-03-09 | 北京卓微天成科技咨询有限公司 | Data encryption and decryption method and device |
CN102075322A (en) * | 2010-12-06 | 2011-05-25 | 中兴通讯股份有限公司 | Storage method and terminal equipment of key parameters |
CN102402670A (en) * | 2011-08-03 | 2012-04-04 | 广东欧珀移动通信有限公司 | File encryption and decryption method |
CN103581900A (en) * | 2012-08-01 | 2014-02-12 | ***通信集团公司 | Communication safety control method and device, first mobile terminal and mobile health device |
CN104125059A (en) * | 2013-04-28 | 2014-10-29 | 陈麟华 | Compound time varying password and time varying type data encryption method |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018082008A1 (en) * | 2016-11-04 | 2018-05-11 | Nokia Technologies Oy | Secure distributed data processing |
CN110089071A (en) * | 2016-11-04 | 2019-08-02 | 诺基亚技术有限公司 | The distributed data processing of safety |
CN106656262A (en) * | 2016-12-06 | 2017-05-10 | 广州市科恩电脑有限公司 | Power line carrier communication system |
CN106789971A (en) * | 2016-12-06 | 2017-05-31 | 广州市科恩电脑有限公司 | A kind of encrypted transmission method of power carrier data |
CN106533507A (en) * | 2016-12-06 | 2017-03-22 | 广州市科恩电脑有限公司 | Method for communicating with power line |
CN106953665A (en) * | 2017-05-16 | 2017-07-14 | 成都环磊科技有限公司 | A kind of method that Internet of Things is built based on power line communication |
CN107040285A (en) * | 2017-05-16 | 2017-08-11 | 成都环磊科技有限公司 | The transmission method of power carrier data in a kind of Internet of Things |
CN111199047A (en) * | 2019-12-31 | 2020-05-26 | 中移(杭州)信息技术有限公司 | Data encryption method, data decryption method, data encryption device, data decryption device, data encryption equipment and data encryption storage medium |
CN111199047B (en) * | 2019-12-31 | 2022-08-05 | 中移(杭州)信息技术有限公司 | Data encryption method, data decryption method, device, equipment and storage medium |
CN113254966A (en) * | 2021-06-04 | 2021-08-13 | 王兆河 | Dynamic encryption method and ciphertext structure of medical digital image information |
CN113408729A (en) * | 2021-07-06 | 2021-09-17 | 安徽理工大学 | Data processing method for DNA calculation |
CN115276989A (en) * | 2022-09-28 | 2022-11-01 | 南通德辰智能科技有限公司 | Serialized data encryption method based on direction scrambling |
CN115276989B (en) * | 2022-09-28 | 2022-12-27 | 南通德辰智能科技有限公司 | Serialized data encryption method based on directional scrambling |
CN117527409A (en) * | 2023-12-04 | 2024-02-06 | 北京弗莱特智能软件开发有限公司 | Data encryption method, personal gateway equipment and data encryption system |
Also Published As
Publication number | Publication date |
---|---|
CN105871550B (en) | 2019-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105871550A (en) | System for realizing digital signal encryption transmission | |
CN105871549B (en) | A kind of digital signal encryption processing method | |
Simmons | Symmetric and asymmetric encryption | |
US7715553B2 (en) | Encrypting a plaintext message with authentication | |
KR101324825B1 (en) | Message authentication code pre-computation with applications to secure memory | |
TWI489847B (en) | Data encryption method, data verification method and electronic apparatus | |
CN101447870B (en) | Safe storage method of private key based on technology of distributed password | |
US9648026B2 (en) | Cryptographic method for securely exchanging messages and device and system for implementing this method | |
WO2001030020A1 (en) | Variable length key encrypting system | |
JP2020525863A (en) | Data security device with analog components | |
JP2011512562A (en) | Random encryption and decryption method for access and communication data | |
JPH09312643A (en) | Key sharing method and ciphering communication method | |
CN105959106B (en) | A kind of low-complexity digital encryption method | |
CN106789971A (en) | A kind of encrypted transmission method of power carrier data | |
Nissar et al. | Implementation of security enhancement in AES by inducting dynamicity in AES s-box | |
JP2541113B2 (en) | Pre-encryption processing device and post-decryption processing device in cipher chain | |
KR101428665B1 (en) | Security system and method for using aes-otp | |
TW202105222A (en) | Smart lock, security platform and authentication method therefor | |
Kumar et al. | Invo-substitute: Three layer encryption for enhanced e-commerce website security using substitution cipher and involution function | |
KR100494560B1 (en) | Real time block data encryption/decryption processor using Rijndael block cipher and method therefor | |
Simmons | Symmetric and asymmetric encryption | |
US20040174994A1 (en) | Time based encryption algorithm | |
JP2015082077A (en) | Encryption device, control method, and program | |
JP4611642B2 (en) | Authentication system | |
CN109409143B (en) | Safety keyboard system and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |