CN111130755A - Matrix double encryption method based on signature - Google Patents
Matrix double encryption method based on signature Download PDFInfo
- Publication number
- CN111130755A CN111130755A CN201911394658.4A CN201911394658A CN111130755A CN 111130755 A CN111130755 A CN 111130755A CN 201911394658 A CN201911394658 A CN 201911394658A CN 111130755 A CN111130755 A CN 111130755A
- Authority
- CN
- China
- Prior art keywords
- data
- matrix
- key
- signature
- encryption method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/16—Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Computational Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Algebra (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a matrix double encryption method based on a signature, which comprises a data encryption method and a data decryption method; the encryption process is used in the stage of waiting for data transmission, and the decryption process is used in the stage of data completion; data is encrypted through a secret key, and then the secret key is converted into a signature matrix through an agreed matrix, so that the purpose of data encryption transmission is achieved; after the server side receives the signature data and the encrypted data, the original data can be decrypted through the signature data; the invention ensures the safety of data and greatly reduces the possibility of information leakage in the data transmission process.
Description
Technical Field
The invention belongs to the field of information security, and particularly relates to a matrix double encryption method based on a signature.
Background
With the rapid development of the internet, the use range of the internet is continuously expanded, and the internet and ideas also permeate into various fields. However, information develops at a high speed like a double-edged sword, convenience is brought, information is possibly leaked, and information security is ensured to be paid more and more attention by enterprises. Ensuring the reliability of encrypted data in the data transmission process is an effective method for solving the information security.
Disclosure of Invention
The purpose of the invention is as follows: the invention provides a matrix double encryption method based on signature, which ensures data security and greatly reduces information leakage.
The technical scheme is as follows: a matrix double encryption method based on signature comprises a data encryption method and a data decryption method; the data encryption method comprises the steps of generating a secret key, and encrypting original data by using the secret key, so that the original data are converted into encrypted data; after the data plaintext is encrypted, the data decryption can decrypt the ciphertext only after the key matrix conversion signature data is mastered; matrixing the signatures, wherein the matrixing process is the same as the above process, and a converted matrix is obtained; the signature data is a data string obtained after key and key matrix conversion and is transmitted together with a ciphertext; the key matrix is a digital matrix obtained after the coding conversion of the key data, and the key matrix is a matrix agreed by the encryption terminal and the decryption terminal and used for analyzing the intermediate data of the real key.
Specifically, the key data is code-converted to 0 to 9 and the letters a to z are correspondingly converted to corresponding numbers.
Specifically, in the data encryption method, a 128-bit key is generated, and the original data is AES-encrypted with the key.
More specifically, in the data encryption method, after the key needs to be subjected to matrix conversion to obtain a matrixed key matrix, the matrix is multiplied by a decryption matrix agreed with a decryption end, so that the 128-bit key is subjected to encryption processing, and the signature obtained after the key is encrypted is random.
Specifically, when the data is decrypted, an agreed matrix is subjected to matrix inversion, then the inverted matrix is multiplied by the signature matrix to obtain a key original matrix, and a 128-bit key can be reversely obtained through key original matrix inversion coding.
More specifically, the inversely solved key is substituted into an AES decryption algorithm to analyze the original data of the ciphertext.
Has the advantages that: compared with the prior art, the invention has the advantages that: in the data transmission process, the safety of the data is ensured, the possibility of information leakage is reduced, and the safety of the encrypted ciphertext is greatly increased by adopting twice encryption; and the possibility that the signature password is converted into the matrix key is reduced by adopting the agreed decryption matrix and the agreed matrix conversion coding.
Drawings
Fig. 1 is an encryption flow diagram of the present invention.
Fig. 2 is a decryption flow diagram of the present invention.
Detailed Description
The invention is further elucidated with reference to the drawings and the detailed description.
As shown in fig. 1, a signature-based matrix double encryption method includes a data encryption method and a data decryption method; the data encryption method comprises the steps of generating a secret key, and encrypting original data by using the secret key, so that the original data are converted into encrypted data; after the data plaintext is encrypted, the data decryption can decrypt the ciphertext only after the key matrix conversion signature data is mastered; matrixing the signatures, wherein the matrixing process is the same as the above process, and a converted matrix is obtained; the signature data is a data string obtained after key and key matrix conversion and is transmitted together with a ciphertext; the key matrix is a digital matrix obtained after the coding conversion of the key data, and the key matrix is a matrix agreed by the encryption terminal and the decryption terminal and used for analyzing the intermediate data of the real key.
The encryption process is used in the stage of data waiting for transmission, the decryption process is used in the stage of data completion, the encryption is functionally used for preventing the leakage of the data in the transmission process, and the decryption enables the data to return to the original state for normal use.
The specific operation is as follows:
in the encryption phase, a 128-bit key is first randomly generated and the original data is AES encrypted with the key, whereby the original data is converted into encrypted data. In addition, the key needs to be subjected to matrix conversion, the conversion condition is that each character of the matrix key is digitized, the digitization is to convert the character into a digit number by using an encoding table, such as 0 to 9 and an integer set of a character a to a corresponding set bit (-18, 18), and a matrix corresponding to a 128-bit key is 16 x 8.
In the decryption stage, firstly, the signature is matrixed, the matrixing process is the same as the above, a converted matrix is obtained, an agreed matrix is subjected to matrix inversion, then the inverted matrix is multiplied by the signature matrix to obtain a key original matrix, and a 128-bit key can be reversely obtained through key original matrix inversion coding; and finally, substituting the key into an AES decryption algorithm to analyze the original data of the ciphertext.
By the encryption method and the decryption method, plaintext and original data are encrypted and packaged during data transmission, and a receiving end decrypts the data by using the decryption method after receiving the data, so that the safety of the data in the transmission process is effectively guaranteed.
Claims (6)
1. A matrix double encryption method based on signature is characterized in that: the method comprises a data encryption method and a data decryption method; the data encryption method comprises the steps of generating a secret key, and encrypting original data by using the secret key, so that the original data are converted into encrypted data; after the data plaintext is encrypted, the data decryption can decrypt the ciphertext only after the key matrix conversion signature data is mastered; matrixing the signatures, wherein the matrixing process is the same as the above process, and a converted matrix is obtained; the signature data is a data string obtained after key and key matrix conversion and is transmitted together with a ciphertext; the key matrix is a digital matrix obtained after the coding conversion of the key data, and the key matrix is a matrix agreed by the encryption terminal and the decryption terminal and used for analyzing the intermediate data of the real key.
2. A signature-based matrix double encryption method according to claim 1, characterized in that:
the key data is code converted to 0 to 9 and the letters a to z are correspondingly converted to corresponding numbers.
3. A signature-based matrix double encryption method according to claim 1, characterized in that:
in the data encryption method, a 128-bit key is generated, and the original data is AES-encrypted with the key.
4. A signature-based matrix double encryption method according to claim 1 or 3, characterized in that: in the data encryption method, after the key needs to be subjected to matrix conversion to obtain a matrix of the key after matrixing, the matrix is multiplied by a decryption matrix agreed with a decryption end, so that the 128-bit key is subjected to encryption processing, and the signature obtained after the key is encrypted is random.
5. A signature-based matrix double encryption method according to claim 1, characterized in that:
when the data is decrypted, an appointed matrix is subjected to matrix inversion, then the inverted matrix is multiplied by the signature matrix to obtain a key original matrix, and a 128-bit key can be reversely obtained through key original matrix inversion coding.
6. A signature-based matrix double encryption method according to claim 5, characterized in that:
and substituting the inversely solved secret key into an AES decryption algorithm to analyze the original data of the ciphertext.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911394658.4A CN111130755B (en) | 2019-12-30 | 2019-12-30 | Matrix double encryption method based on signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911394658.4A CN111130755B (en) | 2019-12-30 | 2019-12-30 | Matrix double encryption method based on signature |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111130755A true CN111130755A (en) | 2020-05-08 |
CN111130755B CN111130755B (en) | 2023-05-09 |
Family
ID=70505033
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911394658.4A Active CN111130755B (en) | 2019-12-30 | 2019-12-30 | Matrix double encryption method based on signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111130755B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117440372A (en) * | 2023-12-20 | 2024-01-23 | 商飞智能技术有限公司 | Zero trust authentication method and device for wireless network |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060034456A1 (en) * | 2002-02-01 | 2006-02-16 | Secure Choice Llc | Method and system for performing perfectly secure key exchange and authenticated messaging |
US20150326392A1 (en) * | 2014-05-06 | 2015-11-12 | Cavalry Storage, Inc. | Matrix-based cryptosystem |
CN106921485A (en) * | 2015-12-24 | 2017-07-04 | 航天信息股份有限公司 | Encrypting and decrypting method based on matrix operation |
CN110071794A (en) * | 2019-04-28 | 2019-07-30 | 苏州国芯科技股份有限公司 | A kind of information ciphering method based on aes algorithm, system and associated component |
CN110266481A (en) * | 2019-06-14 | 2019-09-20 | 深圳职业技术学院 | Rear quantum Encrypt and Decrypt method and decryption device based on matrix |
-
2019
- 2019-12-30 CN CN201911394658.4A patent/CN111130755B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060034456A1 (en) * | 2002-02-01 | 2006-02-16 | Secure Choice Llc | Method and system for performing perfectly secure key exchange and authenticated messaging |
US20150326392A1 (en) * | 2014-05-06 | 2015-11-12 | Cavalry Storage, Inc. | Matrix-based cryptosystem |
CN106921485A (en) * | 2015-12-24 | 2017-07-04 | 航天信息股份有限公司 | Encrypting and decrypting method based on matrix operation |
CN110071794A (en) * | 2019-04-28 | 2019-07-30 | 苏州国芯科技股份有限公司 | A kind of information ciphering method based on aes algorithm, system and associated component |
CN110266481A (en) * | 2019-06-14 | 2019-09-20 | 深圳职业技术学院 | Rear quantum Encrypt and Decrypt method and decryption device based on matrix |
Non-Patent Citations (5)
Title |
---|
ZHENGFENG HOU: ""Multi-secret Images Sharing Based on Matrix Multiplication"", 《2009 INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING》 * |
于琳等: "基于矩阵乘法的加密算法研究", 《信息***工程》 * |
张新文等: "基于可逆矩阵加密技术的保密通信数学模型", 《西南师范大学学报(自然科学版)》 * |
徐小华;黎民英;: "Hill密码加密解密时矩阵的求法", 电脑与信息技术 * |
杨录峰;: "自可逆矩阵在Hill密码算法中的应用", 高师理科学刊 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117440372A (en) * | 2023-12-20 | 2024-01-23 | 商飞智能技术有限公司 | Zero trust authentication method and device for wireless network |
CN117440372B (en) * | 2023-12-20 | 2024-05-31 | 商飞智能技术有限公司 | Zero trust authentication method and device for wireless network |
Also Published As
Publication number | Publication date |
---|---|
CN111130755B (en) | 2023-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7260215B2 (en) | Method for encryption in an un-trusted environment | |
CN104468090B (en) | Character cipher coding method based on image pixel coordinates | |
US8401186B2 (en) | Cloud storage data access method, apparatus and system based on OTP | |
CN102664740B (en) | Remote-authorization-based bidding document encryption and decryption method | |
CN105681025A (en) | Security white box realizing method and device for national cipher standard algorithm SM4 | |
CN108123794A (en) | The generation method and encryption method of whitepack key, apparatus and system | |
TW201349823A (en) | Data encryption method, data verification method and electronic apparatus | |
CN112202754A (en) | Data encryption method and device, electronic equipment and storage medium | |
CN107181584B (en) | Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof | |
CN104378198A (en) | Voice encryption method based on block cipher system | |
CN108090370A (en) | Instant messaging encryption method and system based on index | |
Andriani et al. | Comparision of AES 128, 192 and 256 bit algorithm for encryption and description file | |
CN103942500B (en) | Hash ciphertext re-encryption method based on noise and decryption method after re-encryption | |
CN104660590A (en) | Cloud storage scheme for file encryption security | |
CN111884802B (en) | Media stream encryption transmission method, system, terminal and electronic equipment | |
CN105656626A (en) | Reverse reconstruction encryption method | |
Joshy et al. | Text to image encryption technique using RGB substitution and AES | |
CN114826590B (en) | Packet mode encryption method, packet mode decryption method, packet mode encryption device, packet mode decryption device and packet mode decryption equipment | |
JP2008035305A (en) | Encryption method and data concealing method | |
CN107070637A (en) | A kind of data encryption/decryption method of overlapping packet | |
JP5992651B2 (en) | ENCRYPTION METHOD, PROGRAM, AND SYSTEM | |
CN109413299A (en) | Linear canonical transform and chaos Double random phase dual image encryption method | |
Atikah et al. | AES-RC4 Encryption Technique to Improve File Security | |
CN111130755B (en) | Matrix double encryption method based on signature | |
CN111314270B (en) | Data encryption and decryption method based on validity period uniform distribution symmetric algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |