CN114065264A - Audio data processing device and method - Google Patents

Audio data processing device and method Download PDF

Info

Publication number
CN114065264A
CN114065264A CN202111425010.6A CN202111425010A CN114065264A CN 114065264 A CN114065264 A CN 114065264A CN 202111425010 A CN202111425010 A CN 202111425010A CN 114065264 A CN114065264 A CN 114065264A
Authority
CN
China
Prior art keywords
module
sender
receiver
key
audio data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111425010.6A
Other languages
Chinese (zh)
Inventor
张学习
梁润华
杨佳诚
詹瑞典
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chipeye Microelectronics Foshan Ltd
Original Assignee
Chipeye Microelectronics Foshan Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chipeye Microelectronics Foshan Ltd filed Critical Chipeye Microelectronics Foshan Ltd
Priority to CN202111425010.6A priority Critical patent/CN114065264A/en
Publication of CN114065264A publication Critical patent/CN114065264A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an audio data processing device and a processing method, wherein the processing device is arranged at a sender A and a receiver B at the same time and comprises an SM2 module, an SM3 module, an SM4 module, a microcontroller and a communication module, wherein: the SM2 module is used for generating a public key and a private key, encrypting and decrypting, and signing and checking; the SM3 module is used for verifying data integrity; the SM4 module is used for encrypting and decrypting audio data; the communication module is used for data transmission between the sender A and the receiver B; the controller of the receiver B calls the SM2 module, the SM3 module and the SM4 module to perform corresponding data processing according to the information sent by the sender A, and sends the processed data to the sender A through the communication module. The invention overcomes the safety defect that the receiving party does not carry out data integrity and identity verification when receiving data.

Description

Audio data processing device and method
Technical Field
The invention relates to the field of data processing, in particular to an audio data processing device and an audio data processing method.
Background
In the modern times, people need to actively or passively receive and transmit information every day. For audio, a form of information carrier, it also contains a large amount of information. For some paid music resources or reading audio of books, if the audio is leaked, the copyright problem of the original author can be infringed, so that economic loss is caused, and social vitality is not facilitated; for some important audios related to national secrets or internal data of enterprises, information protection is required; even in the background of military wars, once information is acquired by an enemy, the information is no different from the information which is not battled and is first defeated. It can be seen how important is the protection of information in some application scenarios where security requirements are extremely high. Therefore, in order to protect the audio information, some audio encryption method must be adopted.
At present, the mainstream encryption implementation mode is realized in a hardware mode, the speed is high, and the safety is higher. The cryptographic algorithms used are divided into two categories: international algorithms and national cryptographic algorithms. The international algorithm comprises an AES algorithm, an ECC algorithm, an RSA algorithm and the like, but in order to realize real national information security, a national cryptographic algorithm which is developed and created by the nation, an existing SM2 elliptic curve public key algorithm, an SM3 hash algorithm, an SM4 block cipher algorithm and the like must be adopted. Reading related documents shows that the hardware encryption and decryption modes realized by the cryptographic algorithm can be divided into two types: single encryption methods and hybrid encryption methods.
In the single encryption method using the national encryption algorithm, there are: firstly, an SM4 block cipher algorithm is adopted to realize encryption and decryption, the SM4 algorithm is high in encryption and decryption speed, but the same key is used for encryption and decryption, once the key is leaked, the key is dangerous, and the security is relatively low; secondly, the SM2 public key algorithm is adopted for encryption and decryption, the method adopts the public key for encryption and adopts the private key for decryption, the complexity is increased, the safety is high, but the encryption and decryption speed is low.
In order to achieve the trade-off between security and speed, a hybrid encryption method has appeared, and in the hybrid encryption method using the national cryptographic algorithm, the SM2 algorithm and the SM4 algorithm are mostly used in combination, but the specific implementation and the specific emphasis point are different. Respectively comprises the following steps: the mixed encryption scheme adopts the SM4 algorithm to encrypt the main plaintext and uses the SM2 algorithm to encrypt the key of the SM4 algorithm, so that the security of the key is protected and the security is increased; and secondly, a mode of continuously encrypting the SM4 algorithm and the SM2 algorithm is adopted, the encryption of the SM4 algorithm is firstly carried out on plaintext data, and then the encryption of the SM2 algorithm is carried out, so that the defect of insufficient safety of the SM4 algorithm is overcome.
However, it is carefully found that, in the above encryption and decryption processes, when the receiving party receives the data sent by the sending party, the integrity of the data and the identity of the sending party are not verified, but the received encrypted data is directly processed, which has security defects. In the data transmission process, data transmission is unsafe, and the danger that data is tampered and a third party sends false information exists, so that subsequent data processing operation and the like are carried out without verifying received data, and the data transmission process is invalid and unsafe.
Disclosure of Invention
The invention aims to provide an audio data processing device and an audio data processing method, which are used for overcoming the safety defect that the integrity and the identity authentication of data are not carried out when a receiver receives the data.
In order to realize the task, the invention adopts the following technical scheme:
an audio data processing apparatus, provided at both a sender a and a receiver b, comprising an SM2 module, an SM3 module, an SM4 module, a microcontroller, and a communication module, wherein:
the SM2 module is used for generating a public key and a private key, encrypting and decrypting, and signing and checking; for generating a public key and a private key, the sender A and the receiver B both generate respective public keys and private keys by using respective SM2 modules; for encryption and decryption, the SM2 module is responsible for encryption and decryption of an SM4 symmetric algorithm key, public key encryption is utilized, and private key decryption is adopted; for signature verification, the SM2 module adopts a private key to perform signature verification and adopts a public key to perform signature verification, a sender A is required to generate a signature in each sending and receiving process, and a receiver B completes signature verification;
the SM3 module is used for verifying data integrity, and before the sender A and the receiver B send information, the microcontroller sends the information to the SM3 module to generate a 256-bit hash value; after receiving the information, the sender A and the receiver B firstly send the information to an SM3 module, the received information is used for generating a hash value in the same way, and the received hash value is compared with the received hash value to determine whether the received hash value is the same, if the received hash value is the same, the data is complete, otherwise, the data is incomplete;
the SM4 module is used for encrypting and decrypting audio data; for encryption, the sender A receives the SM4 symmetric key sent by the receiver B, and the SM4 module of the sender A symmetrically encrypts the audio data to obtain the encrypted audio data; for decryption, the receiver B receives the encrypted audio data of the sender A, and the SM4 module decrypts the encrypted audio data to obtain original audio data;
the communication module is used for data transmission between the sender A and the receiver B;
the controller of the receiver B calls the SM2 module, the SM3 module and the SM4 module to perform corresponding data processing according to the information sent by the sender A, and sends the processed data to the sender A through the communication module.
Further, the encryption and decryption process of the SM2 module includes:
encryption: for the receiver B, the microcontroller of the receiver B controls the SM4 module to generate a symmetric key to the SM2 module, and the SM2 module uses the public key of the sender A to encrypt;
and (3) decryption: for the sender A, the encrypted information sent by the sender A is received by the sender A and sent to the SM2 module, and the encrypted information is decrypted by using a private key to obtain an SM4 symmetric key.
Further, the signature verification process of the SM2 module includes:
signature: for a sender A, besides sending information to be sent, an SM2 module of the sender A also encrypts identity information of the sender A in an SM2 mode according to a private key of the sender A to generate a signature of the sender A and sends the signature to a receiver B;
and (4) checking the label: for the receiver B, the SM2 module of the receiver B performs SM2 decryption on the signature of the first according to the public key of the first sent by the first, namely, signature verification, checks whether the signature is the personal identity information of the sender A, if the sender is correct, then the subsequent operation is performed, and if the sender is wrong, then the following feedback is performed: "information authentication error, please resend".
Further, the communication module is an RS232 communication module.
Further, in the whole audio data transmission process, if the identity authentication or the data integrity authentication is not passed, the receiver B feeds back information to the sender A, and the current sending and receiving process is carried out again until the identity authentication and the data integrity authentication are successful, and then the next data operation can be carried out.
A method of audio processing with the audio data processing device, comprising the steps of:
step one, for a sender A, generating a public key and a private key of the sender A by using an SM2 module; for the receiver B, generating a public key and a private key of the receiver B by using an SM2 module, and setting an SM4 key;
step two, for the sender A, processing the public key information of the sender A by using an SM3 module to generate a corresponding hash value; the private key of the first is utilized, and the SM2 module is utilized to carry out signature processing on the personal identity information of the first to obtain the signature of the first; then, the sender A sends the public key information of the sender A and the hash value correspondingly generated by the public key information of the sender A and the signature generated by the private key of the sender A to the communication module of the receiver B by utilizing the communication module of the sender A;
step three, for a receiver B, after a communication module of the receiver B receives the information sent by the sender A, the receiver B utilizes an SM3 module to process the received public key information of the sender A, compares the hash value generated at the moment with the hash value sent together, and if the result is consistent, the public key data of the sender A is complete, and the public key of the sender A is obtained; then, the public key of the first is subsequently utilized to carry out signature checking processing in an SM2 module of the second to verify the identity of the first;
step four, after the second signature is successfully checked, for the receiver B, the public key of the first user is used for encrypting the SM4 secret key in the SM2 module; b, processing the public key of B and the encrypted SM4 secret key by using an SM3 module to generate a corresponding hash value; b utilizes SM2 module to generate signature of B; b, sending the public key information, the encrypted SM4 secret key, the corresponding hash value and the digital signature generated by the B to the first sender through the communication module of B;
step five, for the sender A, the sender A verifies whether the public key of the sent sender B is consistent with the hash value of the encrypted SM4 key by using an SM3 module, and if so, the public key of the sender B and the encrypted SM4 key are obtained; then, the first party completes the check signing in an SM2 module by using the public key of the second party, and after the sender is verified to be the second party, the first party decrypts by using the private key of the first party to obtain an SM4 secret key;
step six, after the sender A takes the SM4 key, SM4 encryption is carried out on the audio data in an SM4 module to obtain the encrypted audio data; processing the encrypted audio data by using an SM3 module to obtain a hash value; then, the first sends the encrypted audio data, the corresponding hash value and the signature of the first to a receiver B through a communication module;
and step seven, for the receiver B, verifying whether the hash values are consistent by using the SM3 module, completing authentication by using the SM2 module, and after the data integrity and the authentication are passed, performing SM4 decryption on the sent audio data in the SM4 module to obtain the original audio data.
Compared with the prior art, the invention has the following technical characteristics:
1. during the whole audio data processing process, the data can be tampered, and the hash value of the data can be changed. According to the scheme, the hash value is calculated by adopting the SM3 algorithm for multiple times, the hash value of the information is sent every time the information is sent, so that the integrity of the data is verified, and the data is ensured not to be changed in the transmission process; the information sent each time comprises the information signed by the SM2 private key, so that the identity information of the sender is verified by the receiver, and the non-repudiation is ensured; after data are received, hash value verification and signature verification are carried out, and decryption is carried out if the data are the same, so that the decryption times are reduced, the data security is improved, and unnecessary useless operation is reduced.
2. In the whole audio data processing process, the SM2 signature and signature verification algorithm is adopted, the identity information of the sender needs to be verified by the receiver every time, the sender is ensured to be correct, the identity verification is completed, the potential safety hazard that a third party sends false information to the receiver is effectively prevented, the safety is improved, and the time wasted in processing wrong information is reduced.
Drawings
FIG. 1 is a schematic view of a processing apparatus according to the present invention;
fig. 2 is a schematic view of an audio data processing flow.
Detailed Description
The invention provides a scheme for combining SM2, SM3 and SM4 hybrid encryption. The audio data with large data volume is encrypted by adopting a fast SM4 symmetric algorithm, and the SM4 key is encrypted by adopting an SM2 public key and then transmitted, so that the security of the SM4 key is ensured, and the security is increased while the fast speed is ensured; in addition, each time the received data is sent, both parties agree to use the same hash algorithm, here the SM3 algorithm is used. The private key in the SM2 algorithm is used for encrypting the identity information of the user to generate a digital signature in each sending and receiving process, the SM3 algorithm compresses the sending data to generate a hash value, the hash value is sent to the receiving party, the signature is used for identity verification, the hash value is used for verifying the integrity of the data, once the identity is incorrect or the data is incomplete, subsequent data operation is not carried out, useless operation is reduced, and the scheme ensures high speed and obviously increases safety.
Referring to fig. 1, an audio data processing apparatus of the present invention, which is provided at both a sender a and a receiver b, includes an SM2 module, an SM3 module, an SM4 module, a microcontroller, and a communication module, wherein:
SM2 module
The module realizes 3 functions, namely generating a public key and a private key, encrypting and decrypting, and signing and checking.
(1) Generating public and private keys
The sender A and the receiver B both need the SM2 module to generate respective public keys and private keys for subsequent encryption and decryption, signature verification and signature verification.
(2) Encryption and decryption
The SM2 module uses the SM2 algorithm to encrypt with a public key and decrypt with a private key. In the present device, the SM2 module will be responsible for the encryption and decryption of the SM4 symmetric algorithm key.
Encryption: for receiver b, the microcontroller of b controls the SM4 module to generate a symmetric key to the SM2 module, which SM2 module encrypts using the public key of sender a. And (3) decryption: for the sender A, the encrypted information sent by the sender A is received by the sender A and sent to the SM2 module, and the encrypted information is decrypted by using a private key to obtain an SM4 symmetric key.
(3) Signature verification label
The SM2 algorithm uses a private key for signature and a public key for signature verification. In the present device system, the SM2 module is also responsible for authentication. In each sending and receiving process, a signature verification link is required, namely, a sender A generates a signature, and a receiver B completes the signature verification.
Signature: in the process of sending and receiving, the sender is assumed to be A, and the receiver is assumed to be B; for a sender A, besides sending information to be sent, an SM2 module of the sender A also encrypts identity information of the sender A in an SM2 mode according to a private key of the sender A to generate a signature of the sender A and sends the signature to a receiver B; and (4) checking the label: for the SM2 modules of the receiver B and the receiver B, the SM2 decryption is carried out on the signature of the receiver A according to the public key of the receiver A, namely, the signature is checked, whether the signature is the personal identity information of the sender A is checked, if the sender is correct, subsequent operation is carried out, and if the sender is wrong, the following feedback is carried out: "information authentication error, please resend".
SM3 Module
The SM3 module adopts SM3 hash algorithm and is responsible for verifying data integrity. Before the sender A and the receiver B send the messages, the microcontroller sends the messages to an SM3 module to generate 256-bit hash values. After receiving the information, the sender A and the receiver B firstly send the information to an SM3 module, the received information is used for generating a hash value, and the received hash value is compared with the received hash value to determine whether the received hash value is the same, if the received hash value is the same, the data is complete, otherwise, the data is incomplete.
SM4 Module
The SM4 module utilizes the SM4 algorithm to encrypt and decrypt audio data. Encryption: the sender A receives the SM4 symmetric key sent by the sender B, and the SM4 module of the sender A symmetrically encrypts the audio data to obtain the encrypted audio data; and (3) decryption: and the receiver receives the encrypted audio data of the A, and the SM4 module decrypts the encrypted audio data to obtain the original audio data.
4. Communication module
The communication module is an RS232 communication module. The communication module is responsible for data transmission between the sender A and the receiver B.
5. Micro-controller
The microcontroller coordinates and controls the data processing of the whole audio data processing device. For the microcontroller of the receiver B, the microcontroller calls corresponding modules to perform corresponding data processing, such as SM2 encryption and decryption, SM4 encryption and decryption and the like, according to the information sent by the sender, and sends the processed information back through the communication module; and for the microcontroller of the sender A, calling the corresponding module to perform data processing and coordinating data receiving and sending of the communication module are also realized.
Based on the audio data processing device system shown in fig. 1, encryption and decryption of audio data can be performed, and a specific flow method is as shown in fig. 2:
particularly, in the whole audio data transmission process, if the authentication or the data integrity verification fails, the receiver b feeds back information to the sender a, and the current sending and receiving process is performed again, that is, the sender a sends the content to the receiver b again, until the authentication and the data integrity verification are successful, the next data operation cannot be performed, and thus, the occurrence of useless data processing operation is reduced.
Based on the audio data processing device, the audio data processing method of the invention comprises the following steps:
step one, for a sender A, a microcontroller of the A generates a public key and a private key of the A by using an SM2 module; for receiver B, the microcontroller of B uses SM2 module to generate public key and private key of B and sets SM4 key;
step two, for the sender A, the microcontroller of the A processes the public key information of the A by using an SM3 module to generate a corresponding hash value; the private key of the first is utilized, and the SM2 module is utilized to carry out signature processing on the personal identity information of the first to obtain the signature of the first; then, the microcontroller of the sender A sends the public key information of the sender A and the hash value correspondingly generated by the public key information of the sender A and the signature generated by the private key of the sender A to the communication module of the receiver B by utilizing the communication module of the sender A;
step three, for a receiver B, after a communication module of the receiver B receives the information sent by the sender A, a microcontroller of the receiver B utilizes an SM3 module to process the received public key information of the sender A, compares the hash value generated at the moment with the hash value sent together, and if the result is consistent, the public key data of the sender A is complete, and the public key of the sender A is obtained; then, the public key of the first is subsequently utilized to carry out signature checking processing in an SM2 module of the second to verify the identity of the first;
step four, after the second signature is successfully checked, for the receiver B, the microcontroller of the receiver B uses the public key of the first to encrypt an SM4 secret key in an SM2 module; the microcontroller of the second uses the SM3 module to process the public key of the second and the encrypted SM4 key to generate a corresponding hash value; the microcontroller of B generates signature of B by using SM2 module; b, sending the public key information, the encrypted SM4 secret key, the corresponding hash value and the digital signature generated by the B to the first sender through the communication module of B;
step five, for the sender A, the microcontroller of the sender A verifies whether the sent public key of the sender B is consistent with the encrypted SM4 key hash value by using an SM3 module, and if so, the public key of the sender B and the encrypted SM4 key are obtained; then, the microcontroller of the first uses the public key of the second to complete the signature verification in the SM2 module, and after the sender is verified to be the second, the sender A uses the private key of the first to decrypt and obtain the SM4 secret key;
step six, after the microcontroller of the sender A and the sender A takes the SM4 key, SM4 encryption is carried out on the audio data in an SM4 module to obtain the encrypted audio data; processing the encrypted audio data by using an SM3 module to obtain a hash value; then, the microcontroller A sends the encrypted audio data, the corresponding hash value and the signature of the microcontroller A to a receiver B through a communication module;
and seventhly, for the receiver B, the microcontroller of the receiver B verifies whether the hash values are consistent by using the SM3 module, and completes the authentication by using the SM2 module, and after the data integrity and the authentication are passed, the microcontroller of the receiver B performs SM4 decryption on the sent audio data in the SM4 module to obtain the original audio data.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (6)

1. An audio data processing apparatus, provided at both a sender a and a receiver b, comprising an SM2 module, an SM3 module, an SM4 module, a microcontroller, and a communication module, wherein:
the SM2 module is used for generating a public key and a private key, encrypting and decrypting, and signing and checking; for generating a public key and a private key, the sender A and the receiver B both generate respective public keys and private keys by using respective SM2 modules; for encryption and decryption, the SM2 module is responsible for encryption and decryption of an SM4 symmetric algorithm key, public key encryption is utilized, and private key decryption is adopted; for signature verification, the SM2 module adopts a private key to perform signature verification and adopts a public key to perform signature verification, a sender A is required to generate a signature in each sending and receiving process, and a receiver B completes signature verification;
the SM3 module is used for verifying data integrity, and before the sender A and the receiver B send information, the microcontroller sends the information to the SM3 module to generate a 256-bit hash value; after receiving the information, the sender A and the receiver B firstly send the information to an SM3 module, the received information is used for generating a hash value in the same way, and the received hash value is compared with the received hash value to determine whether the received hash value is the same, if the received hash value is the same, the data is complete, otherwise, the data is incomplete;
the SM4 module is used for encrypting and decrypting audio data; for encryption, the sender A receives the SM4 symmetric key sent by the receiver B, and the SM4 module of the sender A symmetrically encrypts the audio data to obtain the encrypted audio data; for decryption, the receiver B receives the encrypted audio data of the sender A, and the SM4 module decrypts the encrypted audio data to obtain original audio data;
the communication module is used for data transmission between the sender A and the receiver B;
the controller of the receiver B calls the SM2 module, the SM3 module and the SM4 module to perform corresponding data processing according to the information sent by the sender A, and sends the processed data to the sender A through the communication module.
2. The audio data processing apparatus of claim 1, wherein the encryption and decryption process of the SM2 module comprises:
encryption: for the receiver B, the microcontroller of the receiver B controls the SM4 module to generate a symmetric key to the SM2 module, and the SM2 module uses the public key of the sender A to encrypt;
and (3) decryption: for the sender A, the encrypted information sent by the sender A is received by the sender A and sent to the SM2 module, and the encrypted information is decrypted by using a private key to obtain an SM4 symmetric key.
3. The audio data processing device of claim 1, wherein the signature verification process of the SM2 module comprises:
signature: for a sender A, besides sending information to be sent, an SM2 module of the sender A also encrypts identity information of the sender A in an SM2 mode according to a private key of the sender A to generate a signature of the sender A and sends the signature to a receiver B;
and (4) checking the label: for the receiver B, the SM2 module of the receiver B performs SM2 decryption on the signature of the first according to the public key of the first sent by the first, namely, signature verification, checks whether the signature is the personal identity information of the sender A, if the sender is correct, then the subsequent operation is performed, and if the sender is wrong, then the following feedback is performed: "information authentication error, please resend".
4. The audio data processing device of claim 1, wherein the communication module is an RS232 communication module.
5. The audio data processing device of claim 1, wherein during the whole audio data transmission process, if the authentication or data integrity verification fails, the receiver b feeds back information to the sender a, and the current sending and receiving process is resumed until the authentication and data integrity verification succeeds, so that the next data operation cannot be performed.
6. A method for audio processing using the audio data processing apparatus, comprising:
step one, for a sender A, a microcontroller of the A generates a public key and a private key of the A by using an SM2 module; for receiver B, the microcontroller of B uses SM2 module to generate public key and private key of B and sets SM4 key;
step two, for the sender A, the microcontroller of the A processes the public key information of the A by using an SM3 module to generate a corresponding hash value; the private key of the first is utilized, and the SM2 module is utilized to carry out signature processing on the personal identity information of the first to obtain the signature of the first; then, the microcontroller of the sender A sends the public key information of the sender A and the hash value correspondingly generated by the public key information of the sender A and the signature generated by the private key of the sender A to the communication module of the receiver B by utilizing the communication module of the sender A;
step three, for a receiver B, after a communication module of the receiver B receives the information sent by the sender A, a microcontroller of the receiver B utilizes an SM3 module to process the received public key information of the sender A, compares the hash value generated at the moment with the hash value sent together, and if the result is consistent, the public key data of the sender A is complete, and the public key of the sender A is obtained; then, the public key of the first is subsequently utilized to carry out signature checking processing in an SM2 module of the second to verify the identity of the first;
step four, after the second signature is successfully checked, for the receiver B, the microcontroller of the receiver B uses the public key of the first to encrypt an SM4 secret key in an SM2 module; the microcontroller of the second uses the SM3 module to process the public key of the second and the encrypted SM4 key to generate a corresponding hash value; the microcontroller of B generates signature of B by using SM2 module; b, sending the public key information, the encrypted SM4 secret key, the corresponding hash value and the digital signature generated by the B to the first sender through the communication module of B;
step five, for the sender A, the microcontroller of the sender A verifies whether the sent public key of the sender B is consistent with the encrypted SM4 key hash value by using an SM3 module, and if so, the public key of the sender B and the encrypted SM4 key are obtained; then, the microcontroller of the first uses the public key of the second to complete the signature verification in the SM2 module, and after the sender is verified to be the second, the sender A uses the private key of the first to decrypt and obtain the SM4 secret key;
step six, after the microcontroller of the sender A and the sender A takes the SM4 key, SM4 encryption is carried out on the audio data in an SM4 module to obtain the encrypted audio data; processing the encrypted audio data by using an SM3 module to obtain a hash value; then, the microcontroller A sends the encrypted audio data, the corresponding hash value and the signature of the microcontroller A to a receiver B through a communication module;
and seventhly, for the receiver B, the microcontroller of the receiver B verifies whether the hash values are consistent by using the SM3 module, and completes the authentication by using the SM2 module, and after the data integrity and the authentication are passed, the microcontroller of the receiver B performs SM4 decryption on the sent audio data in the SM4 module to obtain the original audio data.
CN202111425010.6A 2021-11-26 2021-11-26 Audio data processing device and method Pending CN114065264A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111425010.6A CN114065264A (en) 2021-11-26 2021-11-26 Audio data processing device and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111425010.6A CN114065264A (en) 2021-11-26 2021-11-26 Audio data processing device and method

Publications (1)

Publication Number Publication Date
CN114065264A true CN114065264A (en) 2022-02-18

Family

ID=80276619

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111425010.6A Pending CN114065264A (en) 2021-11-26 2021-11-26 Audio data processing device and method

Country Status (1)

Country Link
CN (1) CN114065264A (en)

Similar Documents

Publication Publication Date Title
CN108199835B (en) Multi-party combined private key decryption method
CN107294937B (en) Data transmission method based on network communication, client and server
CN110958219B (en) SM2 proxy re-encryption method and device for medical cloud shared data
CN105447407A (en) Off-line data encryption method and decryption method and corresponding apparatus and system
CN109818741B (en) Decryption calculation method and device based on elliptic curve
CN103095456A (en) Method and system for processing transaction messages
CA2838675A1 (en) Implicitly certified digital signatures
CN112564906B (en) Block chain-based data security interaction method and system
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN114726546B (en) Digital identity authentication method, device, equipment and storage medium
CN112422276B (en) Method and system for realizing multi-party key agreement
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN114553441B (en) Electronic contract signing method and system
CN114598533A (en) Block chain side chain cross-chain identity trusted authentication and data encryption transmission method
CN110233729A (en) A kind of encryption solid-state disk key management method based on PUF
CN114650173A (en) Encryption communication method and system
CN111565108B (en) Signature processing method, device and system
CN109633693A (en) The anti-fraud schemes of Beidou II navigation system based on domestic password
JP4615128B2 (en) Voice and data encryption method using encryption key split combiner
CN108242997B (en) Method and apparatus for secure communication
CN116132025A (en) Key negotiation method, device and communication system based on preset key group
CN114065264A (en) Audio data processing device and method
CN103634113B (en) Encryption and decryption method and device with user/equipment identity authentication
CN114844640A (en) Encryption and decryption method based on RSA algorithm
CN112039670A (en) Construction method, device and system of post-quantum enhanced encryption channel

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination