CN111130755A - Matrix double encryption method based on signature - Google Patents

Matrix double encryption method based on signature Download PDF

Info

Publication number
CN111130755A
CN111130755A CN201911394658.4A CN201911394658A CN111130755A CN 111130755 A CN111130755 A CN 111130755A CN 201911394658 A CN201911394658 A CN 201911394658A CN 111130755 A CN111130755 A CN 111130755A
Authority
CN
China
Prior art keywords
data
matrix
key
signature
encryption method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911394658.4A
Other languages
Chinese (zh)
Other versions
CN111130755B (en
Inventor
杨兴荣
胡勇
杨兴海
廖毅
朱恒
刘洋
邓孔祥
王芳
王龙
漆国强
刘冬洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shijihengtong Technology Co ltd
Original Assignee
Shijihengtong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shijihengtong Technology Co ltd filed Critical Shijihengtong Technology Co ltd
Priority to CN201911394658.4A priority Critical patent/CN111130755B/en
Publication of CN111130755A publication Critical patent/CN111130755A/en
Application granted granted Critical
Publication of CN111130755B publication Critical patent/CN111130755B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/16Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Computational Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Algebra (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a matrix double encryption method based on a signature, which comprises a data encryption method and a data decryption method; the encryption process is used in the stage of waiting for data transmission, and the decryption process is used in the stage of data completion; data is encrypted through a secret key, and then the secret key is converted into a signature matrix through an agreed matrix, so that the purpose of data encryption transmission is achieved; after the server side receives the signature data and the encrypted data, the original data can be decrypted through the signature data; the invention ensures the safety of data and greatly reduces the possibility of information leakage in the data transmission process.

Description

Matrix double encryption method based on signature
Technical Field
The invention belongs to the field of information security, and particularly relates to a matrix double encryption method based on a signature.
Background
With the rapid development of the internet, the use range of the internet is continuously expanded, and the internet and ideas also permeate into various fields. However, information develops at a high speed like a double-edged sword, convenience is brought, information is possibly leaked, and information security is ensured to be paid more and more attention by enterprises. Ensuring the reliability of encrypted data in the data transmission process is an effective method for solving the information security.
Disclosure of Invention
The purpose of the invention is as follows: the invention provides a matrix double encryption method based on signature, which ensures data security and greatly reduces information leakage.
The technical scheme is as follows: a matrix double encryption method based on signature comprises a data encryption method and a data decryption method; the data encryption method comprises the steps of generating a secret key, and encrypting original data by using the secret key, so that the original data are converted into encrypted data; after the data plaintext is encrypted, the data decryption can decrypt the ciphertext only after the key matrix conversion signature data is mastered; matrixing the signatures, wherein the matrixing process is the same as the above process, and a converted matrix is obtained; the signature data is a data string obtained after key and key matrix conversion and is transmitted together with a ciphertext; the key matrix is a digital matrix obtained after the coding conversion of the key data, and the key matrix is a matrix agreed by the encryption terminal and the decryption terminal and used for analyzing the intermediate data of the real key.
Specifically, the key data is code-converted to 0 to 9 and the letters a to z are correspondingly converted to corresponding numbers.
Specifically, in the data encryption method, a 128-bit key is generated, and the original data is AES-encrypted with the key.
More specifically, in the data encryption method, after the key needs to be subjected to matrix conversion to obtain a matrixed key matrix, the matrix is multiplied by a decryption matrix agreed with a decryption end, so that the 128-bit key is subjected to encryption processing, and the signature obtained after the key is encrypted is random.
Specifically, when the data is decrypted, an agreed matrix is subjected to matrix inversion, then the inverted matrix is multiplied by the signature matrix to obtain a key original matrix, and a 128-bit key can be reversely obtained through key original matrix inversion coding.
More specifically, the inversely solved key is substituted into an AES decryption algorithm to analyze the original data of the ciphertext.
Has the advantages that: compared with the prior art, the invention has the advantages that: in the data transmission process, the safety of the data is ensured, the possibility of information leakage is reduced, and the safety of the encrypted ciphertext is greatly increased by adopting twice encryption; and the possibility that the signature password is converted into the matrix key is reduced by adopting the agreed decryption matrix and the agreed matrix conversion coding.
Drawings
Fig. 1 is an encryption flow diagram of the present invention.
Fig. 2 is a decryption flow diagram of the present invention.
Detailed Description
The invention is further elucidated with reference to the drawings and the detailed description.
As shown in fig. 1, a signature-based matrix double encryption method includes a data encryption method and a data decryption method; the data encryption method comprises the steps of generating a secret key, and encrypting original data by using the secret key, so that the original data are converted into encrypted data; after the data plaintext is encrypted, the data decryption can decrypt the ciphertext only after the key matrix conversion signature data is mastered; matrixing the signatures, wherein the matrixing process is the same as the above process, and a converted matrix is obtained; the signature data is a data string obtained after key and key matrix conversion and is transmitted together with a ciphertext; the key matrix is a digital matrix obtained after the coding conversion of the key data, and the key matrix is a matrix agreed by the encryption terminal and the decryption terminal and used for analyzing the intermediate data of the real key.
The encryption process is used in the stage of data waiting for transmission, the decryption process is used in the stage of data completion, the encryption is functionally used for preventing the leakage of the data in the transmission process, and the decryption enables the data to return to the original state for normal use.
The specific operation is as follows:
in the encryption phase, a 128-bit key is first randomly generated and the original data is AES encrypted with the key, whereby the original data is converted into encrypted data. In addition, the key needs to be subjected to matrix conversion, the conversion condition is that each character of the matrix key is digitized, the digitization is to convert the character into a digit number by using an encoding table, such as 0 to 9 and an integer set of a character a to a corresponding set bit (-18, 18), and a matrix corresponding to a 128-bit key is 16 x 8.
In the decryption stage, firstly, the signature is matrixed, the matrixing process is the same as the above, a converted matrix is obtained, an agreed matrix is subjected to matrix inversion, then the inverted matrix is multiplied by the signature matrix to obtain a key original matrix, and a 128-bit key can be reversely obtained through key original matrix inversion coding; and finally, substituting the key into an AES decryption algorithm to analyze the original data of the ciphertext.
By the encryption method and the decryption method, plaintext and original data are encrypted and packaged during data transmission, and a receiving end decrypts the data by using the decryption method after receiving the data, so that the safety of the data in the transmission process is effectively guaranteed.

Claims (6)

1. A matrix double encryption method based on signature is characterized in that: the method comprises a data encryption method and a data decryption method; the data encryption method comprises the steps of generating a secret key, and encrypting original data by using the secret key, so that the original data are converted into encrypted data; after the data plaintext is encrypted, the data decryption can decrypt the ciphertext only after the key matrix conversion signature data is mastered; matrixing the signatures, wherein the matrixing process is the same as the above process, and a converted matrix is obtained; the signature data is a data string obtained after key and key matrix conversion and is transmitted together with a ciphertext; the key matrix is a digital matrix obtained after the coding conversion of the key data, and the key matrix is a matrix agreed by the encryption terminal and the decryption terminal and used for analyzing the intermediate data of the real key.
2. A signature-based matrix double encryption method according to claim 1, characterized in that:
the key data is code converted to 0 to 9 and the letters a to z are correspondingly converted to corresponding numbers.
3. A signature-based matrix double encryption method according to claim 1, characterized in that:
in the data encryption method, a 128-bit key is generated, and the original data is AES-encrypted with the key.
4. A signature-based matrix double encryption method according to claim 1 or 3, characterized in that: in the data encryption method, after the key needs to be subjected to matrix conversion to obtain a matrix of the key after matrixing, the matrix is multiplied by a decryption matrix agreed with a decryption end, so that the 128-bit key is subjected to encryption processing, and the signature obtained after the key is encrypted is random.
5. A signature-based matrix double encryption method according to claim 1, characterized in that:
when the data is decrypted, an appointed matrix is subjected to matrix inversion, then the inverted matrix is multiplied by the signature matrix to obtain a key original matrix, and a 128-bit key can be reversely obtained through key original matrix inversion coding.
6. A signature-based matrix double encryption method according to claim 5, characterized in that:
and substituting the inversely solved secret key into an AES decryption algorithm to analyze the original data of the ciphertext.
CN201911394658.4A 2019-12-30 2019-12-30 Matrix double encryption method based on signature Active CN111130755B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911394658.4A CN111130755B (en) 2019-12-30 2019-12-30 Matrix double encryption method based on signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911394658.4A CN111130755B (en) 2019-12-30 2019-12-30 Matrix double encryption method based on signature

Publications (2)

Publication Number Publication Date
CN111130755A true CN111130755A (en) 2020-05-08
CN111130755B CN111130755B (en) 2023-05-09

Family

ID=70505033

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911394658.4A Active CN111130755B (en) 2019-12-30 2019-12-30 Matrix double encryption method based on signature

Country Status (1)

Country Link
CN (1) CN111130755B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117440372A (en) * 2023-12-20 2024-01-23 商飞智能技术有限公司 Zero trust authentication method and device for wireless network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060034456A1 (en) * 2002-02-01 2006-02-16 Secure Choice Llc Method and system for performing perfectly secure key exchange and authenticated messaging
US20150326392A1 (en) * 2014-05-06 2015-11-12 Cavalry Storage, Inc. Matrix-based cryptosystem
CN106921485A (en) * 2015-12-24 2017-07-04 航天信息股份有限公司 Encrypting and decrypting method based on matrix operation
CN110071794A (en) * 2019-04-28 2019-07-30 苏州国芯科技股份有限公司 A kind of information ciphering method based on aes algorithm, system and associated component
CN110266481A (en) * 2019-06-14 2019-09-20 深圳职业技术学院 Rear quantum Encrypt and Decrypt method and decryption device based on matrix

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060034456A1 (en) * 2002-02-01 2006-02-16 Secure Choice Llc Method and system for performing perfectly secure key exchange and authenticated messaging
US20150326392A1 (en) * 2014-05-06 2015-11-12 Cavalry Storage, Inc. Matrix-based cryptosystem
CN106921485A (en) * 2015-12-24 2017-07-04 航天信息股份有限公司 Encrypting and decrypting method based on matrix operation
CN110071794A (en) * 2019-04-28 2019-07-30 苏州国芯科技股份有限公司 A kind of information ciphering method based on aes algorithm, system and associated component
CN110266481A (en) * 2019-06-14 2019-09-20 深圳职业技术学院 Rear quantum Encrypt and Decrypt method and decryption device based on matrix

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
ZHENGFENG HOU: ""Multi-secret Images Sharing Based on Matrix Multiplication"", 《2009 INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING》 *
于琳等: "基于矩阵乘法的加密算法研究", 《信息***工程》 *
张新文等: "基于可逆矩阵加密技术的保密通信数学模型", 《西南师范大学学报(自然科学版)》 *
徐小华;黎民英;: "Hill密码加密解密时矩阵的求法", 电脑与信息技术 *
杨录峰;: "自可逆矩阵在Hill密码算法中的应用", 高师理科学刊 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117440372A (en) * 2023-12-20 2024-01-23 商飞智能技术有限公司 Zero trust authentication method and device for wireless network
CN117440372B (en) * 2023-12-20 2024-05-31 商飞智能技术有限公司 Zero trust authentication method and device for wireless network

Also Published As

Publication number Publication date
CN111130755B (en) 2023-05-09

Similar Documents

Publication Publication Date Title
US7260215B2 (en) Method for encryption in an un-trusted environment
CN104468090B (en) Character cipher coding method based on image pixel coordinates
US8401186B2 (en) Cloud storage data access method, apparatus and system based on OTP
CN102664740B (en) Remote-authorization-based bidding document encryption and decryption method
CN105681025A (en) Security white box realizing method and device for national cipher standard algorithm SM4
CN108123794A (en) The generation method and encryption method of whitepack key, apparatus and system
TW201349823A (en) Data encryption method, data verification method and electronic apparatus
CN112202754A (en) Data encryption method and device, electronic equipment and storage medium
CN107181584B (en) Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof
CN104378198A (en) Voice encryption method based on block cipher system
CN108090370A (en) Instant messaging encryption method and system based on index
Andriani et al. Comparision of AES 128, 192 and 256 bit algorithm for encryption and description file
CN103942500B (en) Hash ciphertext re-encryption method based on noise and decryption method after re-encryption
CN104660590A (en) Cloud storage scheme for file encryption security
CN111884802B (en) Media stream encryption transmission method, system, terminal and electronic equipment
CN105656626A (en) Reverse reconstruction encryption method
Joshy et al. Text to image encryption technique using RGB substitution and AES
CN114826590B (en) Packet mode encryption method, packet mode decryption method, packet mode encryption device, packet mode decryption device and packet mode decryption equipment
JP2008035305A (en) Encryption method and data concealing method
CN107070637A (en) A kind of data encryption/decryption method of overlapping packet
JP5992651B2 (en) ENCRYPTION METHOD, PROGRAM, AND SYSTEM
CN109413299A (en) Linear canonical transform and chaos Double random phase dual image encryption method
Atikah et al. AES-RC4 Encryption Technique to Improve File Security
CN111130755B (en) Matrix double encryption method based on signature
CN111314270B (en) Data encryption and decryption method based on validity period uniform distribution symmetric algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant