CN109902498A - Data ciphering method, data decryption method and corresponding device and equipment - Google Patents

Data ciphering method, data decryption method and corresponding device and equipment Download PDF

Info

Publication number
CN109902498A
CN109902498A CN201910146798.3A CN201910146798A CN109902498A CN 109902498 A CN109902498 A CN 109902498A CN 201910146798 A CN201910146798 A CN 201910146798A CN 109902498 A CN109902498 A CN 109902498A
Authority
CN
China
Prior art keywords
data
matrix
key matrix
encryption key
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910146798.3A
Other languages
Chinese (zh)
Other versions
CN109902498B (en
Inventor
查艳芳
殷奕
殷奎喜
张铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN201910146798.3A priority Critical patent/CN109902498B/en
Publication of CN109902498A publication Critical patent/CN109902498A/en
Application granted granted Critical
Publication of CN109902498B publication Critical patent/CN109902498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of data ciphering method, data decryption method and corresponding device and equipment, are related to field of communication technology comprising: encryption key matrix is generated based on multi-dimension quasi-orthogonal pseudo-random matrix;The encryption key matrix is distributed to receiving end;Initial data is encrypted by the encryption key matrix, to obtain encryption data;The encryption data is sent to the receiving end.It can solve to be unable to get in the prior art using the above scheme and there is the technical issues of pseudo-random sequence of good randomness and unpredictability is as encryption key matrix, it realizes and the encryption key matrix with pseudo-random characteristics and orthogonal characteristic is obtained by multi-dimension quasi-orthogonal pseudo-random matrix, ensure that the safety and accuracy of original data transmissions.

Description

Data ciphering method, data decryption method and corresponding device and equipment
Technical field
The present invention relates to field of communication technology more particularly to a kind of data ciphering methods, data decryption method and corresponding Device and equipment.
Background technique
Cryptography is the technological sciences that research works out password and breaks a code.Wherein, the objective law of research password variation, Applied to establishment password to guard the privacy of correspondence, referred to as coding theory;Applied to breaking a code to obtain communication intelligence, referred to as It decodes and learns, the two is collectively referred to as cryptography.The basic thought of cryptography is exactly that data are carried out with one group of reversible data transformation, is made not Authorized person cannot understand its real meaning.
In general, the process for carrying out data transformation to data is known as ciphering process, authorized person obtains from encryption data The process of data is known as decrypting process.No matter for ciphering process or decrypting process, encryption key is all vital one Ring.In order to guarantee the precise synchronization of communicating pair and accurate, the safe transmission of data, encryption key is generally required well Randomness and unpredictability.However, the prior art can not obtain the encryption key for meeting the demand.
Summary of the invention
In view of this, the embodiment of the present invention provide a kind of data ciphering method, data decryption method and corresponding device and It is close as encrypting to be unable to get the pseudo-random sequence with good randomness and unpredictability using solution in the prior art for equipment The technical issues of key matrix.
In a first aspect, the embodiment of the invention provides a kind of data ciphering methods, comprising:
Encryption key matrix is generated based on multi-dimension quasi-orthogonal pseudo-random matrix;
The encryption key matrix is distributed to receiving end;
Initial data is encrypted by the encryption key matrix, to obtain encryption data;
The encryption data is sent to the receiving end.
Second aspect, the embodiment of the invention also provides a kind of data decryption methods, comprising:
Confirm the encryption key matrix of transmitting terminal distribution, the encryption key matrix is according to multi-dimension quasi-orthogonal pseudo-random matrix It determines;
Receive the encryption data that transmitting terminal is sent;
Decruption key matrix is determined according to the encryption key matrix;
The encryption data is decrypted by the decruption key matrix, to obtain initial data.
The third aspect, the embodiment of the invention also provides a kind of data encryption devices, comprising:
Scrambled matrix determining module, for generating encryption key matrix based on multi-dimension quasi-orthogonal pseudo-random matrix;
Secret key distribution module, for distributing the encryption key matrix to receiving end;
Encrypting module, for being encrypted by the encryption key matrix to initial data, to obtain encryption data;
Data transmission blocks, for the encryption data to be sent to the receiving end.
Fourth aspect, the embodiment of the invention also provides a kind of data decryption apparatus, comprising:
Key confirmation module, for confirming the encryption key matrix of transmitting terminal distribution, the encryption key matrix is according to more Quadrature pseudo-random matrix is tieed up to determine;
Data reception module, for receiving the encryption data of transmitting terminal transmission;
Matrix deciding module is decrypted, for determining decruption key matrix according to the encryption key matrix;
Deciphering module, for the encryption data to be decrypted by the decruption key matrix, to obtain original number According to.
5th aspect, the embodiment of the invention also provides a kind of equipment, the equipment includes:
One or more processors;
Memory, for storing one or more programs;
Communication device, for carrying out data communication;
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes data ciphering method as described in relation to the first aspect.
6th aspect, the embodiment of the invention also provides a kind of equipment, the equipment includes:
One or more processors;
Memory, for storing one or more programs;
Communication device, for carrying out data communication;
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes the data decryption method as described in second aspect.
7th aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer Program realizes data ciphering method as described in relation to the first aspect when the program is executed by processor.
Eighth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer Program realizes the data decryption method as described in second aspect when the program is executed by processor.
Data ciphering method, data decryption method and the corresponding device and equipment of above-mentioned offer, by according to multidimensional class Orthogonal pseudo-random matrix generates encryption key matrix, and informs receiving end encryption key matrix, later, is based on encryption key matrix Initial data is encrypted, and encryption data is sent to the technological means of receiving end, solving can not obtain in the prior art To having the technical issues of pseudo-random sequence of good randomness and unpredictability is as encryption key matrix, realizes and pass through Multi-dimension quasi-orthogonal pseudo-random matrix obtains the encryption key matrix with pseudo-random characteristics and orthogonal characteristic, ensure that initial data The safety and accuracy of transmission.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, of the invention other Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of flow chart for data ciphering method that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of data decryption method provided by Embodiment 2 of the present invention;
Fig. 3 is a kind of flow chart for data interactive method that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural schematic diagram for data encryption device that the embodiment of the present invention four provides;
Fig. 5 is a kind of structural schematic diagram for data decryption apparatus that the embodiment of the present invention five provides;
Fig. 6 is a kind of hardware structural diagram for equipment that the embodiment of the present invention six provides;
Fig. 7 is a kind of hardware structural diagram for equipment that the embodiment of the present invention seven provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just In description, only some but not all contents related to the present invention are shown in the drawings.
Embodiment one
Fig. 1 is a kind of flow chart for data ciphering method that the embodiment of the present invention one provides.Data provided in this embodiment Encryption method can be executed by data encryption device, which is realized by way of software and/or hardware, union At in a device.Wherein, which is the equipment with communication function and data processing function.For example, desktop computer etc..It is real It applies in example, the equipment for being used to execute data ciphering method is denoted as transmitting terminal.Correspondingly, in practical application, exist and transmitting terminal The receiving end communicated, the receiving end are used to receive the data of transmitting terminal transmission.
Specifically, data ciphering method provided in this embodiment specifically includes with reference to Fig. 1:
S110, encryption key matrix is generated based on multi-dimension quasi-orthogonal pseudo-random matrix.
Illustratively, multi-dimension quasi-orthogonal pseudo-random matrix can be understood as the bigger matrix of scale, that is, exist compared with multirow With the matrix compared with multiple row, the sequence sets of the row vector Sequence composition of the matrix and the sequence sets of column vector Sequence composition have respectively There is a good class correlation, cross-correlation coefficient is close to 0.In general, multi-dimension quasi-orthogonal pseudo-random matrix also have it is relatively good Pseudo-randomness.Therefore, in the present embodiment, encryption key matrix is constructed by multi-dimension quasi-orthogonal pseudo-random matrix.Further, It being described by taking stream cipher as an example in embodiment, wherein encryption key matrix can be understood as the key sequence of stream cipher, It can effectively encrypt initial data, and encryption data be only capable of by the receiving end with same cipher key matrix into Row decryption, to guarantee the accurate delivery of data.
Specifically, multi-dimension quasi-orthogonal pseudo-random matrix is determined according to generator polynomial, specifically: as needed to basis Multinomial carries out screening combination and obtains generator polynomial, then generates after group translating and numerical value conversion to generator polynomial more Tie up quadrature pseudo-random matrix.Wherein, primitive polynomial be meet on Unique Factorization Domain all coefficients greatest common factor be 1 Multinomial.Since generator polynomial can be composed of in any order the primitive polynomial of any different rank, because This, row vector or column vector in the corresponding multi-dimension quasi-orthogonal pseudo-random matrix of generator polynomial have unpredictability.Meanwhile Any row vector or column vector are a kind of pseudo-random sequence in multi-dimension quasi-orthogonal pseudo-random matrix, and multi-dimension quasi-orthogonal pseudo-random square Battle array has orthogonality.For example, it is assumed that generator polynomial is f (x)=x8+x4+x2+ x+1 passes through group by the generator polynomial After transformation, class generator matrix G is generated,Wherein, matrix P is taken in G,Further, right P carries out numerical transformation, obtains multi-dimension quasi-orthogonal pseudo-random matrix M.At this point,
Further, it when determining encryption key matrix by multi-dimension quasi-orthogonal pseudo-random matrix, needs to refer to be encrypted Initial data, for example, initial data is the matrix comprising N column, then corresponding encryption key matrix should be a packet The matrix of the row containing N therefore, should be in multi-dimension quasi-orthogonal puppet when determining encryption key matrix by multi-dimension quasi-orthogonal pseudo-random matrix N row is selected to meet the row vector composition encryption key matrix of condition in random matrix.
Specifically, determining that encryption key matrix may include following two classes schemes by multi-dimension quasi-orthogonal pseudo-random matrix:
Multi-dimension quasi-orthogonal pseudo-random matrix is input to Maximum likelihood sequence selector by scheme one, to obtain encryption key Matrix.
Wherein, the target of maximum likelihood method is to find the system that can generate observation data with high probability number occurs.This In embodiment, sets model used in maximum likelihood method and be denoted as Maximum likelihood sequence selector, further, the maximum likelihood The threshold value of sequence selector is 0.By Maximum likelihood sequence selector, can be filtered out in multi-dimension quasi-orthogonal pseudo-random matrix Cross-correlation coefficient is 0 row vector, and then obtains a completely orthogonal orthogonal matrix, and the selection target row in orthogonal matrix Several row vectors forms encryption key matrix.Wherein, target line number is the number of the corresponding column vector of initial data.It needs to illustrate It is that select cross-correlation coefficient for 0 row vector be orthogonality in order to guarantee encryption key matrix, and then guarantees that receiving end can be with Decryption obtains accurate initial data.
Cross-correlation coefficient between scheme two, any two column column vector of calculating multi-dimension quasi-orthogonal pseudo-random matrix;Selection Column vector with identical cross-correlation coefficient forms first object matrix;Using the transposed matrix of first object matrix as encryption Cipher key matrix.
Wherein, this embodiment is not limited for the specific calculation of the cross-correlation coefficient between any two column column vector.Tool Body, after obtaining cross-correlation coefficient, count the corresponding column vector of each cross-correlation coefficient.For example, some cross-correlation coefficient is corresponding The column vector of 1st, 2,3,4,8 column of multi-dimension quasi-orthogonal pseudo-random matrix, then can illustrate the column vector of the 1st, 2,3,4,8 column Between cross-correlation coefficient be equal.At this point it is possible to which the column vector of the 1st, 2,3,4,8 column is screened composition first object Matrix.Optionally, form first object matrix when, can in the column vector with identical cross-correlation coefficient selection target columns Column vector groups at first object matrix, wherein target columns be the corresponding column vector of initial data number.
Optionally, if there is multiple cross-correlation coefficients, and the quantity of the corresponding column vector of each cross-correlation coefficient is all larger than Target columns, it is possible to arbitrarily select a cross-correlation coefficient in multiple cross-correlation coefficients, and based on its it is corresponding arrange to It measures and determines first object matrix.
Further, the transposed matrix of first object matrix is determined, and using the transposed matrix as encryption key matrix, with Guarantee that the row vector quantity of encryption key matrix is equal with the column vector quantity of initial data.
S120, encryption key matrix is distributed to receiving end.
Illustratively, only receiving end and transmitting terminal all must clear encryption key matrix, just can guarantee that receiving end is accurate Decryption obtains initial data.Accordingly, it is determined that transmitting terminal distributes encryption key matrix to receiving end after encryption key matrix, to protect After card receiving end receives encryption data, it can accurately decrypt to obtain initial data, i.e., receiving end be authorized.Wherein, add This embodiment is not limited for the method for salary distribution of close cipher key matrix.For example, transmitting terminal sends out encryption key matrix by safe lane It send to receiving end, while informing the generation method of receiving end decruption key matrix.For another example, transmitting terminal is true according to encryption key matrix Fixed corresponding decruption key matrix, and decruption key matrix is sent to receiving end by safe lane.Wherein, decruption key square The method of determination embodiment of battle array is not construed as limiting.In the present embodiment, encryption key matrix is preferably sent to receiving end by transmitting terminal, And inform the generation method of receiving end decruption key matrix.
S130, initial data is encrypted by encryption key matrix, to obtain encryption data.
Specifically, initial data is to be loaded with the Serial No. for sending message, message will be sent according to pre-arranged code rule It is encoded into Serial No..Correspondingly, receiving end has corresponding decoding rule, sent with realizing to decode from initial data Message, wherein the present embodiment does not limit for specific coding and decoding rule.Further, initial data is row vector quantity At least 1 matrix, in the present embodiment, preferably setting initial data is the binary matrix that row vector quantity is 1, i.e. original number According to the binary row vector being made of 0 and 1.Further, setting is by initial data and encryption key matrix multiple, and by phase Multiply result as encryption data.At this point, completing the encryption data of initial data.It is made of since initial data is one 0 and 1 Binary row vector, then, after initial data and encryption key matrix multiple, can obtain one be not limited to it is binary Row vector.
S140, encryption data is sent to receiving end.
Wherein, the specific sending method embodiment of encryption data is not construed as limiting.
Technical solution provided in this embodiment, by generating encryption key matrix according to multi-dimension quasi-orthogonal pseudo-random matrix, And inform receiving end encryption key matrix, later, initial data is encrypted based on encryption key matrix, and by encryption data It is sent to the technological means of receiving end, solves the puppet being unable to get in the prior art with good randomness and unpredictability The technical issues of random sequence is as encryption key matrix, realize by multi-dimension quasi-orthogonal pseudo-random matrix obtain having it is pseudo- with The encryption key matrix of machine characteristic and orthogonal characteristic ensure that the safety and accuracy of original data transmissions.
Embodiment two
Fig. 2 is a kind of flow chart of data decryption method provided by Embodiment 2 of the present invention.Data provided in this embodiment Decryption method can be executed by data decryption apparatus, which is realized by way of software and/or hardware, union At in a device.Wherein, which is the equipment with communication function and data processing function.For example, desktop computer etc..It is real It applies in example, the equipment for being used to execute data decryption method is denoted as receiving end.Correspondingly, in practical application, exist and receiving end The transmitting terminal communicated, the transmitting terminal is for generating encryption data and being sent to receiving end, the specific working mode of transmitting terminal It is referred to embodiment one.
Specifically, data decryption method provided in this embodiment specifically includes with reference to Fig. 2:
The encryption key matrix that S210, confirmation transmitting terminal distribute.
Wherein, encryption key matrix is determined according to multi-dimension quasi-orthogonal pseudo-random matrix.Specifically, multi-dimension quasi-orthogonal pseudo-random The method of determination of matrix and encryption key matrix is referred to embodiment one, and therefore not to repeat here.Further, transmitting terminal can be with Encryption key matrix is sent to receiving end by safe lane, while informing the generation method of receiving end decruption key matrix, Alternatively, transmitting terminal determines corresponding decruption key matrix according to encryption key matrix, and decruption key matrix is passed through safety letter Road is sent to receiving end.Therefore, receiving end is possible to receive encryption key matrix and decrypts the generation method of cipher key matrix, or Person is decruption key matrix.In embodiment, transmitting terminal is set by encryption key matrix, receiving end is sent to by safe lane, together When inform receiving end decruption key matrix generation method, at this point, receiving end receives encryption key matrix and decruption key square The generation method of battle array.In general, after transmitting terminal determines encryption key matrix, just by encryption key matrix and decruption key square The generation method of battle array is distributed together to receiving end, and therefore, it is earlier than reception encryption data that receiving end, which receives encryption key,.
S220, the encryption data that transmitting terminal is sent is received.
Wherein, this embodiment is not limited for the transmission mode of encryption data and reception mode.
S230, decruption key matrix is determined according to encryption key matrix.
Specifically, since receiving end has been allocated that encryption key matrix, then, it, can after receiving encryption data To determine corresponding decruption key matrix according to encryption key matrix.Wherein, decruption key matrix again it will be understood that as sequence The key sequence of password can be decrypted encryption data, to obtain initial data.In general, in order to guarantee to decrypt Cipher key matrix can accurately be decrypted encryption data, and in embodiment, basis of design encryption key matrix generates corresponding Decruption key matrix.
Optionally, the method for determination of decruption key matrix may be set according to actual conditions.It is illustratively adopted in embodiment Decruption key matrix is determined with following manner, specifically, S230 may include: S231-S233.
The total quantity of column vector in S231, statistics encryption key matrix.
S232, using the transposed matrix of encryption key matrix as the second objective matrix.
S233, the inverse of total quantity is multiplied with the second objective matrix, to obtain decruption key matrix.
Specifically, due to completely orthogonal between each row vector of encryption key matrix or between each column vector, then, add Close cipher key matrix can obtain the result that a n multiplies unit matrix multiplied by the second objective matrix, wherein n is encryption key square The total quantity of the column vector of battle array, the second objective matrix are the transposed matrix of encryption key matrix.Further, due to encryption data It is initial data multiplied by the data obtained after encryption key matrix, then, by encryption data multiplied by the second objective matrix and 1/n When, initial data can be obtained.Therefore, it is set the multiplied result of the inverse and the second objective matrix of total quantity in embodiment As decruption key matrix.
S240, the encryption data is decrypted by decruption key matrix, to obtain initial data.
Specifically, by encryption data multiplied by decruption key matrix after, obtained result is initial data.
Further, when encryption key matrix according in multi-dimension quasi-orthogonal pseudo-random matrix with identical cross-correlation coefficient When column vector determines, since cross-correlation coefficient endless may be all zero, then, encryption key Matrix Multiplication is with the second objective matrix When, unit matrix may not included in obtained result, therefore, after determining decruption key matrix according to encryption key matrix, led to Accurate initial data may be cannot get by crossing decruption key matrix, that is, there is data error.Because being set in the present embodiment, when When encryption key matrix is determined according to the column vector in multi-dimension quasi-orthogonal pseudo-random matrix with identical cross-correlation coefficient, S240 packet It includes: S241-S247.
S241, by encryption data and decruption key matrix multiple, to obtain target data.
Wherein, target data may be considered the data that encryption data is decrypted by decruption key matrix. At this point, target data may be not binary sequence.
S242, maximum data value and minimum data value in target data are determined.
Specifically, the total data value in traversal target data, selects maximum data value and minimum data value.
S243, the average data values for calculating maximum data value and minimum data value.
S244, data value each in target data is compared with average data values respectively.If comparison result states data value Greater than the average data values, then S245 is executed.If comparison result is that data value is less than or equal to the average data values, execute S246。
S245, data value is revised as to the first numerical value.Execute S247.
S246, data value is revised as second value.Execute S247.
Specifically, due to the cross-correlation coefficient between each row of encryption key matrix be it is identical, obtained data Error is also identical.So setting is modified by the target data that average data values obtain decryption in embodiment.Tool Body, each data value in target data is compared by setting with average data values, if some data value is greater than average data Value, then by target data, which is revised as the first numerical value, i.e. progress numerical value replacement.If some data value is less than or waits In average data values, then by target data, which is revised as second value, i.e., progress numerical value replacement, with obtain two into The target data of system.Optionally, the first numerical value is set as 1, second value 0.
S247, modified target data is obtained, and using modified target data as initial data.
Specifically, modified target data is initial data.
Technical solution provided in this embodiment receives transmitting terminal by the encryption key matrix of confirmation transmitting terminal distribution Encryption data, and decruption key matrix is determined by encryption key matrix, and then initial data is obtained by decruption key matrix Technical solution, ensure that in the encryption key matrix that selection has pseudorandom feature, obtain accurate initial data, and protect Information Security has been demonstrate,proved, only in encryption key matrix having the same with transmitting terminal, can just decrypt to obtain initial data.
Embodiment three
Fig. 3 is a kind of flow chart for data interactive method that the embodiment of the present invention three provides.Data provided in this embodiment Exchange method is suitable for receiving end and transmitting terminal carries out the scene of information transmission, is a preferable example.Wherein, transmitting terminal is specific It executes function and please refers to embodiment one, the specific execution function of receiving end please refers to
Embodiment two.
With reference to Fig. 3, data interactive method provided in this embodiment is specifically included:
S310, transmitting terminal are based on multi-dimension quasi-orthogonal pseudo-random matrix and generate encryption key matrix.
S320, transmitting terminal distribute encryption key matrix to receiving end.
The encryption key matrix that S330, receiving end confirmation transmitting terminal distribute.
Wherein, encryption key matrix is determined according to multi-dimension quasi-orthogonal pseudo-random matrix.
S340, transmitting terminal encrypt initial data by encryption key matrix, to obtain encryption data.
Encryption data is sent to receiving end by S350, transmitting terminal.
S360, receiving end receive the encryption data that transmitting terminal is sent.
S370, receiving end determine decruption key matrix according to encryption key matrix.
S380, receiving end are decrypted encryption data by decruption key matrix, to obtain initial data.
The ciphering process of transmitting terminal and the decrypting process of receiving end is illustratively described below:
Multi-dimension quasi-orthogonal pseudo-random matrix is set as M1, and Initial data is X1, and X1=(0110100).Due to X1It is the vector comprising 7 elements, then, it sets M1It is close as encrypting Key matrix, at this point, not to M1Execute any operation.Transmitting terminal distributes encryption key matrix M to receiving end1
Further, transmitting terminal is to X1It is encrypted, obtains encryption data, encryption data is denoted as Y1, i.e.,
Further, transmitting terminal is by Y1It is sent to receiving end.Receiving end receives Y1Afterwards, firstly, obtaining M1, then, statistics M1The total quantity for the column vector for including is 8, at this point, determining decruption key matrix M1 -1, i.e.,
Later, receiving end decrypts to obtain initial data by decruption key matrix, which is X1', i.e.,
At this point it is possible to determine, the X that receiving end is decrypted1' with transmitting terminal actually want to send X1It is not fully identical, There is a certain error between them.This is because mutual between any two row vector of multi-dimension quasi-orthogonal pseudo-random matrix Relationship number may not exclusively be 0, and be close to 0, at this point, the row vector that cross-correlation coefficient is close to 0 will affect initial data Restore.
In view of this, when setting determines encryption key matrix according to multi-dimension quasi-orthogonal pseudo-random matrix in embodiment, to more It ties up quadrature pseudo-random matrix and executes following two generic operations modes.
One, Maximum likelihood sequence selector is set, and its threshold value is 0.At this point, by Maximum likelihood sequence selector more Completely orthogonal matrix is as encryption key matrix between filtering out each row vector in dimension quadrature pseudo-random matrix.
For example, primitive polynomial top step number is set as 6, and two primitive polynomials used are respectively as follows: f1(x) =x6+x5+ 1, f2(x)=x6+x5+x4+x2+1.At this point, transmitting terminal is multinomial according to the generation that above-mentioned two primitive polynomial obtains Formula are as follows: g (x)=x12+x9+x8+x7+x4+x2+1.Further, transmitting terminal carries out group translating and numerical value conversion to generator polynomial Afterwards, multi-dimension quasi-orthogonal pseudo-random matrix is obtained, M is denoted as2.Further, transmitting terminal is by M2It is input to the maximum likelihood that threshold value is 0 Sequence selector, to obtain a completely orthogonal matrix, which is denoted as PN '.At this point, in PN ' any two row vector it Between cross-correlation coefficient be 0.
Further, initial data X is set2=(0111).At this point, transmitting terminal determines X2In include 4 elements, i.e. X2's The quantity of column vector is 4, at this point, in PN ' in arbitrarily select 4 row vectors composition encryption key matrix Ns1.SettingAt this point, transmitting terminal is by N1Distribute to reception End.
Further, transmitting terminal is to X2It is encrypted, obtains encryption data, which is denoted as Y2, that is,
Further, transmitting terminal is by Y2It is sent to receiving end.At this point, receiving end receives Y2Afterwards, firstly, obtaining N1, so Afterwards, N is counted1The total quantity for the column vector for including is 12, and determines that decruption key matrix is M2 -1.I.e.Later, pass through solution Close cipher key matrix is to Y2Decryption obtains initial data, which is denoted as X2', at this point,
Based on the above results it is found that the X that decryption obtains2' and X2It is equal, i.e., it is determined and is added using Maximum likelihood sequence selector Close cipher key matrix can make receiving end obtain accurate initial data.
Two, the cross-correlation coefficient in multi-dimension quasi-orthogonal pseudo-random matrix between each column vector is calculated, cross-correlation coefficient is selected Identical column vector is to obtain encryption key matrix.
For example, it is assumed that generator polynomial f3(x)=x8+x4+x2+ x+1, code length n=15, information bit length k= 7, the order r=8 of generator polynomial.By the generator polynomial after group's variation and numerical value conversion, multi-dimension quasi-orthogonal is obtained Pseudo random matrix M3.Further, M is calculated3In cross-correlation coefficient between each column vector.Wherein, the column of the 1st, 2,3,4,8 column Cross-correlation coefficient between vector is identical, is -0.14286, i.e., the cross-correlation coefficient between above-mentioned column vector levels off to 0.Into One step, confirm initial data X3=(10100), i.e. initial data include 5 elements, at this point, taking M3In the 1st, 2,3,4,8 column Column vector groups at first object matrix, be denoted as P5, at this point,Further, by P5's Transposed matrix is as encryption key matrix.At this point, encryption key matrix is denoted as N2,Transmitting terminal is by N2Distribute to receiving end.
Further, transmitting terminal is to X3It is encrypted, obtains encryption data, which is denoted as Y3, that is,
Further, transmitting terminal is by Y3It is sent to receiving end.At this point, receiving end receives Y3Afterwards, firstly, obtaining N2, so Afterwards, N is counted2The total quantity for the column vector for including is 7, and determines that decruption key matrix is M3 -1.I.e.Later, pass through M3 -1To Y3Decryption obtains number of targets According to the target data is denoted as X3', at this point,
Further, determine that maximum data value is 0.8571 in target data, minimum data value is -0.2857.Later, it counts The average data values for calculating maximum data value and minimum data value are 0.2857.At this point, we will be greater than average in target data It is denoted as 1 according to the data value of value, the data value less than or equal to average data values is denoted as 0, and obtained data are denoted as original number According at this point, initial data X3'=(10100).
Based on the above results it is found that X3' and X3It is equal, that is, select cross-correlation coefficient phase in multi-dimension quasi-orthogonal pseudo-random matrix Same Column vector groups can make receiving end receive accurate original at encryption key matrix, and after handling decrypted result Beginning data.
It should be noted that remove and encryption key matrix is determined by multi-dimension quasi-orthogonal pseudo-random matrix in practical application, Encryption key matrix can also be determined by hadamard matrix.Wherein, hadamard matrix is a completely orthogonal matrix, times Cross-correlation coefficient between two row vectors of meaning is 0, and the auto-correlation coefficient of each row vector is 1, i.e. hadamard matrix and Kazakhstan It is equal to n × E after up to the transposed matrix multiplication of Ma matrix, wherein n is the columns of Hadamard matrix.
Specifically, setting initial data as X4=(x1, x2, x3... ..., xn).Hadamard matrix is denoted as Hn, and HnFor n rank Hadamard matrix.Meanwhile there are the hadamard matrix in setting transmitting terminal and receiving end.
Further, HnIt can indicate are as follows:Wherein,
At this point, being based on HnTo X4Encryption, encryption data are denoted as Y4, and Y4=X4·Hn=(y1, y2, y3... ..., yn).Transmitting It holds Y4It is sent to receiving end.
Further, receiving end receives Y4Afterwards, it is based on HnIt determines decruption key matrix, is denoted as M4 -1, at this point,
Further, pass through M4 -1To Y4It is decrypted, and original matrix will be obtained and be denoted as X4'.At this point,
Further, due to Hn·Hn T=n × E, soThat is X4’ =X4.At this point, receiving end can decrypt ciphertext data to obtain accurate initial data according to hadamard matrix.
For example, it sets, initial data X5, and X5=(10101100), hadamard matrix are 8 ranks, are denoted as H8, this When,End and receiving end, which occurs, H8
Further, transmitting terminal is that initial data is encrypted, and obtains encryption data, is denoted as Y5, and
Further, transmitting terminal sends Y to receiving end5, receiving end receives Y5Afterwards, H is obtained8, and determine decruption key square Battle array is H8 -1, and
Further, receiving end is to Y5Decryption obtains X5', and Solve Close obtained X5'=X5
Therefore, according to foregoing description it is found that we can add information in transmitting terminal using Hadamard matrix It is close;In receiving end, as long as by the encryption information received and Hadamard " inverse " matrix multiple, the prime information that can be recovered. Therefore, can be applied to Hadamard matrix as key sequence in stream cipher.
Example IV
Fig. 4 is a kind of structural schematic diagram for data encryption device that the embodiment of the present invention four provides.With reference to Fig. 4, the data Encryption device includes: scrambled matrix determining module 401, secret key distribution module 402, encrypting module 403 and data transmission blocks 404。
Wherein, scrambled matrix determining module 401, for generating encryption key square based on multi-dimension quasi-orthogonal pseudo-random matrix Battle array;Secret key distribution module 402, for distributing the encryption key matrix to receiving end;Encrypting module 403, for by described Encryption key matrix encrypts initial data, to obtain encryption data;Data transmission blocks 404 are used for the encryption Data are sent to the receiving end.
Technical solution provided in this embodiment, by generating encryption key matrix according to multi-dimension quasi-orthogonal pseudo-random matrix, And inform receiving end encryption key matrix, later, initial data is encrypted based on encryption key matrix, and by encryption data It is sent to the technological means of receiving end, solves the puppet being unable to get in the prior art with good randomness and unpredictability The technical issues of random sequence is as encryption key matrix, realize by multi-dimension quasi-orthogonal pseudo-random matrix obtain having it is pseudo- with The encryption key matrix of machine characteristic and orthogonal characteristic ensure that the safety and accuracy of original data transmissions.
On the basis of the above embodiments, scrambled matrix determining module 401 is specifically used for: by multi-dimension quasi-orthogonal pseudo-random square Battle array is input to Maximum likelihood sequence selector, and to obtain encryption key matrix, the threshold value of the Maximum likelihood sequence selector is 0。
On the basis of the above embodiments, scrambled matrix determining module 401 includes: coefficient calculation unit, more for calculating Tie up the cross-correlation coefficient between any two column column vector of quadrature pseudo-random matrix;Objective matrix component units, for selecting Column vector with identical cross-correlation coefficient forms first object matrix;Transposed matrix determination unit is used for first object square The transposed matrix of battle array is as encryption key matrix.
Data encryption device provided in this embodiment can be used for executing the data ciphering method of the offer of above-described embodiment one, tool Standby corresponding function and beneficial effect.
Embodiment five
Fig. 5 is a kind of structural schematic diagram for data decryption apparatus that the embodiment of the present invention five provides.With reference to Fig. 5, this implementation The data decryption apparatus that example provides specifically includes: key confirmation module 501, data reception module 502, decryption matrix deciding module 503 and deciphering module 504.
Wherein, key confirmation module 501, for confirming the encryption key matrix of transmitting terminal distribution, the encryption key square Battle array is determined according to multi-dimension quasi-orthogonal pseudo-random matrix;Data reception module 502, for receiving the encryption data of transmitting terminal transmission; Matrix deciding module 503 is decrypted, for determining decruption key matrix according to the encryption key matrix;Deciphering module 504, is used for The encryption data is decrypted by the decruption key matrix, to obtain initial data.
Technical solution provided in this embodiment receives transmitting terminal by the encryption key matrix of confirmation transmitting terminal distribution Encryption data, and decruption key matrix is determined by encryption key matrix, and then initial data is obtained by decruption key matrix Technical solution, ensure that in the encryption key matrix that selection has pseudorandom feature, obtain accurate initial data, and protect Information Security has been demonstrate,proved, only in encryption key matrix having the same with transmitting terminal, can just decrypt to obtain initial data.
On the basis of the above embodiments, decryption matrix deciding module 503 includes: total quantity statistic unit, for counting The total quantity of column vector in encryption key matrix;Objective matrix determination unit, for making the transposed matrix of encryption key matrix For the second objective matrix;Multiplying unit, for the inverse of the total quantity to be multiplied with second objective matrix, to be solved Close cipher key matrix.
On the basis of the above embodiments, encryption key matrix is identical mutual according to having in multi-dimension quasi-orthogonal pseudo-random matrix The column vector of related coefficient determines that deciphering module 504 includes: data determination unit, is used for the encryption data and the solution Close cipher key matrix is multiplied, to obtain target data;Data value determination unit, for determine the maximum data value in target data and Minimum data value;Average calculation unit, for calculating the average data values of the maximum data value and the minimum data value; Comparing unit, for being respectively compared data value each in target data with average data values;First modification unit, if for Comparison result is that the data value is greater than the average data values, then the data value is revised as the first numerical value;Second modification The data value is revised as by unit if being that the data value is less than or equal to the average data values for comparison result Second value;Acquiring unit, for obtaining modified target data, and using modified target data as initial data.
Data decryption apparatus provided in this embodiment can be used for executing the data decryption method of the offer of above-described embodiment two, tool Standby corresponding function and beneficial effect.
Embodiment six
Fig. 6 is a kind of hardware structural diagram for equipment that the embodiment of the present invention six provides.In the embodiment of the present invention six Equipment is transmitting terminal, as data encryption equipment.As shown in fig. 6, the data encryption equipment that the embodiment of the present invention six provides, packet It includes: processor 610 and memory 620, input unit 630, output device 640 and communication device 650.In the data encryption equipment Processor 610 can be one or more, the processing in Fig. 6 by taking a processor 610 as an example, in the data encryption equipment Device 610, memory 620, input unit 630, output device 640 and communication device 650 can be connected by bus or other modes It connects, in Fig. 6 for being connected by bus.
Wherein, the memory 620 in the data encryption equipment is used as a kind of computer readable storage medium, can be used for storing One or more programs, described program can be software program, computer executable program and module, such as embodiment of the present invention One provides the corresponding program instruction/module of data ciphering method applied to transmitting terminal (for example, data encryption shown in Fig. 4 Module in device, comprising: scrambled matrix determining module 401, secret key distribution module 402, encrypting module 403 and data send mould Block 404).Software program, instruction and the module that processor 610 is stored in memory 620 by operation, thereby executing calculating The various function application and data processing of machine equipment, i.e. data ciphering method in realization above method embodiment.
Memory 620 may include storing program area and storage data area, wherein storing program area can storage program area, Application program needed at least one function;Storage data area, which can be stored, uses created data etc. according to equipment.In addition, Memory 620 may include high-speed random access memory, can also include nonvolatile memory, for example, at least a disk Memory device, flush memory device or other non-volatile solid state memory parts.In some instances, memory 620 can be wrapped further The memory remotely located relative to processor 610 is included, these remote memories can pass through network connection to equipment.Above-mentioned net The example of network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Input unit 630 can be used for receiving the number or character information of user's input, to generate and data encryption equipment User setting and the related key signals input of function control.Output device 640 may include that display screen etc. shows equipment.Communication dress 650 are set, for carrying out data communication with receiving end, for example, distributing encryption key matrix to receiving end and sending encryption data.
When above-mentioned data encryption equipment is as transmitting terminal, it can be performed provided by any embodiment of the invention applied to transmission The data ciphering method at end, and have corresponding function and beneficial effect.
Embodiment seven
Fig. 7 is a kind of hardware structural diagram for equipment that the embodiment of the present invention seven provides.In the embodiment of the present invention six Equipment is receiving end, as data decryption apparatus.As shown in fig. 7, the data decryption apparatus that the embodiment of the present invention seven provides, packet It includes: processor 710, memory 720, input unit 730, output device 740 and communication device 750.In the data decryption apparatus Processor 710 can be one or more, the processing in Fig. 7 by taking a processor 710 as an example, in the data decryption apparatus Device 710, memory 720, input unit 730, output device 740 and communication device 750 can be connected by bus or other modes It connects, in Fig. 7 for being connected by bus.
Wherein, the memory 720 in the data decryption apparatus is used as a kind of computer readable storage medium, can be used for storing One or more programs, described program can be software program, computer executable program and module, such as embodiment of the present invention Two provide the corresponding program instruction/module of data decryption method applied to receiving end (for example, data deciphering shown in fig. 5 Module in device, comprising: key confirmation module 501, data reception module 502, decryption matrix deciding module 503 and decryption mould Block 504).Software program, instruction and the module that processor 710 is stored in memory 720 by operation, thereby executing calculating The various function application and data processing of machine equipment, i.e. data decryption method in realization above method embodiment.
Memory 720 may include storing program area and storage data area, wherein storing program area can storage program area, Application program needed at least one function;Storage data area, which can be stored, uses created data etc. according to equipment.In addition, Memory 720 may include high-speed random access memory, can also include nonvolatile memory, for example, at least a disk Memory device, flush memory device or other non-volatile solid state memory parts.In some instances, memory 720 can be wrapped further The memory remotely located relative to processor 710 is included, these remote memories can pass through network connection to equipment.Above-mentioned net The example of network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Input unit 730 can be used for receiving the number or character information of user's input, to generate and data decryption apparatus User setting and the related key signals input of function control.Output device 740 may include that display screen etc. shows equipment.Communication dress 750 are set, for carrying out data communication with transmitting terminal, for example, receiving the encryption key matrix and transmitting terminal hair of transmitting terminal distribution The encryption data sent.
When above-mentioned data decryption apparatus is as receiving end, it can be performed provided by any embodiment of the invention applied to reception The data decryption method at end, and have corresponding function and beneficial effect.
Embodiment eight
The embodiment of the present invention eight additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should The data ciphering method provided in an embodiment of the present invention applied to transmitting terminal, this method packet are realized when program is executed by processor It includes:
Encryption key matrix is generated based on multi-dimension quasi-orthogonal pseudo-random matrix;
The encryption key matrix is distributed to receiving end;
Initial data is encrypted by the encryption key matrix, to obtain encryption data;
The encryption data is sent to the receiving end.
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present invention The data ciphering method applied to transmitting terminal that executable instruction is not limited to the described above operates, and can also be performed of the invention any Applied to the relevant operation in the data ciphering method of transmitting terminal provided by embodiment, and have corresponding function and beneficial effect Fruit.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention It can be realized by software and required common hardware, naturally it is also possible to which by hardware realization, but in many cases, the former is more Good embodiment.Based on this understanding, technical solution of the present invention substantially in other words contributes to the prior art Part can be embodied in the form of software products, which can store in computer readable storage medium In, floppy disk, read-only memory (Read-Only Memory, ROM), random access memory (Random such as computer Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions are with so that a computer is set Standby (can be robot, personal computer, server or the network equipment etc.) executes answers described in any embodiment of that present invention Data ciphering method for transmitting terminal.
Embodiment nine
The embodiment of the present invention nine additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should The data decryption method provided in an embodiment of the present invention applied to receiving end, this method packet are realized when program is executed by processor It includes:
Confirm the encryption key matrix of transmitting terminal distribution, the encryption key matrix is according to multi-dimension quasi-orthogonal pseudo-random matrix It determines;
Receive the encryption data that transmitting terminal is sent;
Decruption key matrix is determined according to the encryption key matrix;
The encryption data is decrypted by the decruption key matrix, to obtain initial data.
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present invention The data decryption method applied to receiving end that executable instruction is not limited to the described above operates, and can also be performed of the invention any Applied to the relevant operation in the data decryption method of receiving end provided by embodiment, and have corresponding function and beneficial effect Fruit.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention It can be realized by software and required common hardware, naturally it is also possible to which by hardware realization, but in many cases, the former is more Good embodiment.Based on this understanding, technical solution of the present invention substantially in other words contributes to the prior art Part can be embodied in the form of software products, which can store in computer readable storage medium In, floppy disk, read-only memory (Read-Only Memory, ROM), random access memory (Random such as computer Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions are with so that a computer is set Standby (can be robot, personal computer, server or the network equipment etc.) executes answers described in any embodiment of that present invention Data decryption method for receiving end.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (10)

1. a kind of data ciphering method characterized by comprising
Encryption key matrix is generated based on multi-dimension quasi-orthogonal pseudo-random matrix;
The encryption key matrix is distributed to receiving end;
Initial data is encrypted by the encryption key matrix, to obtain encryption data;
The encryption data is sent to the receiving end.
2. data ciphering method according to claim 1, which is characterized in that described to be based on multi-dimension quasi-orthogonal pseudo-random matrix Generating encryption key matrix includes:
Multi-dimension quasi-orthogonal pseudo-random matrix is input to Maximum likelihood sequence selector, to obtain encryption key matrix, it is described most The threshold value of maximum-likelihood sequence selector is 0.
3. data ciphering method according to claim 1, which is characterized in that described to be based on multi-dimension quasi-orthogonal pseudo-random matrix Generating encryption key matrix includes:
Calculate the cross-correlation coefficient between any two column column vector of multi-dimension quasi-orthogonal pseudo-random matrix;
The column vector with identical cross-correlation coefficient is selected, first object matrix is formed;
Using the transposed matrix of first object matrix as encryption key matrix.
4. a kind of data decryption method characterized by comprising
Confirm that the encryption key matrix of transmitting terminal distribution, the encryption key matrix are true according to multi-dimension quasi-orthogonal pseudo-random matrix It is fixed;
Receive the encryption data that transmitting terminal is sent;
Decruption key matrix is determined according to the encryption key matrix;
The encryption data is decrypted by the decruption key matrix, to obtain initial data.
5. data decryption method according to claim 4, which is characterized in that described determined according to encryption key matrix is decrypted Cipher key matrix includes:
Count the total quantity of column vector in encryption key matrix;
Using the transposed matrix of encryption key matrix as the second objective matrix;
The inverse of the total quantity is multiplied with second objective matrix, to obtain decruption key matrix.
6. data decryption method according to claim 4, which is characterized in that the encryption key matrix according to multidimensional class just The column vector in pseudo random matrix with identical cross-correlation coefficient is handed over to determine;
It is described that the encryption data is decrypted by the decruption key matrix, include to obtain initial data:
By the encryption data and the decruption key matrix multiple, to obtain target data;
Determine the maximum data value and minimum data value in target data;
Calculate the average data values of the maximum data value and the minimum data value;
Data value each in target data is compared with average data values respectively;
If comparison result is that the data value is greater than the average data values, the data value is revised as the first numerical value;
If comparison result is that the data value is less than or equal to the average data values, the data value is revised as the second number Value;
Modified target data is obtained, and using modified target data as initial data.
7. a kind of data encryption device characterized by comprising
Scrambled matrix determining module, for generating encryption key matrix based on multi-dimension quasi-orthogonal pseudo-random matrix;
Secret key distribution module, for distributing the encryption key matrix to receiving end;
Encrypting module, for being encrypted by the encryption key matrix to initial data, to obtain encryption data;
Data transmission blocks, for the encryption data to be sent to the receiving end.
8. a kind of data decryption apparatus characterized by comprising
Key confirmation module, for confirming the encryption key matrix of transmitting terminal distribution, the encryption key matrix is according to multidimensional class Orthogonal pseudo-random matrix determines;
Data reception module, for receiving the encryption data of transmitting terminal transmission;
Matrix deciding module is decrypted, for determining decruption key matrix according to the encryption key matrix;
Deciphering module, for the encryption data to be decrypted by the decruption key matrix, to obtain initial data.
9. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs;
Communication device, for carrying out data communication;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real Now such as data ciphering method as claimed in any one of claims 1-3 or the data deciphering side as described in any in claim 4-6 Method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor Such as data ciphering method as claimed in any one of claims 1-3 or the number as described in any in claim 4-6 are realized when execution According to decryption method.
CN201910146798.3A 2019-02-27 2019-02-27 Data encryption method, data decryption method, and corresponding devices and equipment Active CN109902498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910146798.3A CN109902498B (en) 2019-02-27 2019-02-27 Data encryption method, data decryption method, and corresponding devices and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910146798.3A CN109902498B (en) 2019-02-27 2019-02-27 Data encryption method, data decryption method, and corresponding devices and equipment

Publications (2)

Publication Number Publication Date
CN109902498A true CN109902498A (en) 2019-06-18
CN109902498B CN109902498B (en) 2023-08-18

Family

ID=66945738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910146798.3A Active CN109902498B (en) 2019-02-27 2019-02-27 Data encryption method, data decryption method, and corresponding devices and equipment

Country Status (1)

Country Link
CN (1) CN109902498B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489989A (en) * 2019-08-27 2019-11-22 深圳市道通智能航空技术有限公司 Data encrypting/de-encrypling method, its encryption/deciphering chip and its unmanned plane
CN117749532A (en) * 2024-02-07 2024-03-22 珠海芯烨电子科技有限公司 Cloud printer data encryption method and related device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104009835A (en) * 2014-05-16 2014-08-27 南京邮电大学 File encrypting and decrypting method allowing parallel computing to be conducted in cloud storage system
CN105426345A (en) * 2015-12-25 2016-03-23 南京大学 Matrix inverse operation method
CN105630741A (en) * 2015-12-22 2016-06-01 合肥工业大学 Improved module for solving inverse matrixes of matrixes according to bit replacement method
CN107277048A (en) * 2017-07-26 2017-10-20 浙江吉利汽车研究院有限公司 A kind of encrypting and decrypting method for communication authentication
CN108683497A (en) * 2018-05-11 2018-10-19 南京师范大学 The constituent apparatus of hyperspace code
CN108696327A (en) * 2018-05-04 2018-10-23 南京师范大学 Large size mixing P-H is orthogonal, constructive method of class orthogonal matrix

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104009835A (en) * 2014-05-16 2014-08-27 南京邮电大学 File encrypting and decrypting method allowing parallel computing to be conducted in cloud storage system
CN105630741A (en) * 2015-12-22 2016-06-01 合肥工业大学 Improved module for solving inverse matrixes of matrixes according to bit replacement method
CN105426345A (en) * 2015-12-25 2016-03-23 南京大学 Matrix inverse operation method
CN107277048A (en) * 2017-07-26 2017-10-20 浙江吉利汽车研究院有限公司 A kind of encrypting and decrypting method for communication authentication
CN108696327A (en) * 2018-05-04 2018-10-23 南京师范大学 Large size mixing P-H is orthogonal, constructive method of class orthogonal matrix
CN108683497A (en) * 2018-05-11 2018-10-19 南京师范大学 The constituent apparatus of hyperspace code

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489989A (en) * 2019-08-27 2019-11-22 深圳市道通智能航空技术有限公司 Data encrypting/de-encrypling method, its encryption/deciphering chip and its unmanned plane
CN117749532A (en) * 2024-02-07 2024-03-22 珠海芯烨电子科技有限公司 Cloud printer data encryption method and related device

Also Published As

Publication number Publication date
CN109902498B (en) 2023-08-18

Similar Documents

Publication Publication Date Title
Fu et al. A new chaos‐based color image encryption scheme with an efficient substitution keystream generation strategy
Shankar et al. RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique
Almaiah et al. A new hybrid text encryption approach over mobile ad hoc network
KR100363457B1 (en) Mapping Repertoire for Cryptosystems
US8553880B2 (en) Pseudorandom number generating system, encryption system, and decryption system
CN111510281B (en) Homomorphic encryption method and device
US11381394B2 (en) High speed encryption key generating engine
JPH08510365A (en) Method and apparatus for data encryption
US20140270165A1 (en) Cryptographic system based on reproducible random sequences
CN109274485A (en) A kind of data ciphering method, data authentication method and relevant device and system
Laiphrakpam et al. Encrypting multiple images with an enhanced chaotic map
Singh et al. Image encryption scheme based on Knight's tour problem
Saraswathi et al. A block cipher algorithm for multimedia content protection with random substitution using binary tree traversal
CN109902498A (en) Data ciphering method, data decryption method and corresponding device and equipment
JP5689826B2 (en) Secret calculation system, encryption apparatus, secret calculation apparatus and method, program
Ramírez-Torres et al. Image encryption with an improved cryptosystem based on a matrix approach
CN109639423B (en) Constituent device of decryption algorithm
Dömösi et al. A novel cryptosystem based on abstract automata and Latin cubes
Iovane et al. An Information Fusion approach based on prime numbers coming from RSA algorithm and Fractals for secure coding
Ramírez-Torres et al. Fpga implementation of a reconfigurable image encryption system
Wei et al. Image encryption algorithm based on fractional order chaotic system
CN107078900B (en) Cryptographic system based on reproducible random sequences
Kar et al. RGB image encryption using hyper chaotic system
KLEF An efficient light weight cryptography algorithm scheme for WSN devices using chaotic map and GE
Xian et al. Image encryption algorithm based on chaos and S-boxes scrambling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant