CN114785484A - Big data secure transmission method and system - Google Patents

Big data secure transmission method and system Download PDF

Info

Publication number
CN114785484A
CN114785484A CN202210359000.5A CN202210359000A CN114785484A CN 114785484 A CN114785484 A CN 114785484A CN 202210359000 A CN202210359000 A CN 202210359000A CN 114785484 A CN114785484 A CN 114785484A
Authority
CN
China
Prior art keywords
data
key
round
hash value
word data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210359000.5A
Other languages
Chinese (zh)
Other versions
CN114785484B (en
Inventor
赵雪儿
赵嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Kuilin Information Technology Co ltd
Original Assignee
Henan Yizhifa Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Yizhifa Electronic Technology Co ltd filed Critical Henan Yizhifa Electronic Technology Co ltd
Priority to CN202210359000.5A priority Critical patent/CN114785484B/en
Publication of CN114785484A publication Critical patent/CN114785484A/en
Application granted granted Critical
Publication of CN114785484B publication Critical patent/CN114785484B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of artificial intelligence, in particular to a big data secure transmission method and a big data secure transmission system. The method comprises the following steps: setting an initial key, dividing the initial key into ten groups, and acquiring the carry digit of each group of keys in the hash code; expanding the initial key to obtain a first round key, wherein the initial key and the sub-keys both comprise four words of data; calculating hash coding values of four words of data of the initial key and the subkeys; adjusting four words of data of the first wheel key according to the KM optimal matching result to obtain an adjusted first wheel key; sequentially iterating to obtain ten rounds of adjusted sub-keys, encrypting the data and transmitting the data; and the data receiver decrypts the encrypted data according to the initial key to obtain the transmitted data. According to the technical means provided by the invention, KM matching is carried out by calculating the hash coding result of each round of key, so that the generated key is influenced, the randomness of key generation is increased, and the safety of data transmission is ensured.

Description

Big data secure transmission method and system
Technical Field
The invention relates to the field of artificial intelligence, in particular to a big data safe transmission method and a big data safe transmission system.
Background
The encryption algorithm is mainly divided into a symmetric encryption algorithm and an asymmetric encryption algorithm, wherein the asymmetric encryption algorithm has higher security but lower efficiency, and the symmetric encryption algorithm is often used for the transmission of large data.
In the symmetric encryption algorithm, AES has the characteristics of simple interface, convenient implementation and the like, but in the process of expanding the round keys of the AES algorithm, the generation of the round keys of each round only depends on the keys of the previous round as input, but the key expansion in the process is reversible, so that an attacker can easily obtain the keys of other rounds by calculation after intercepting the keys of a certain round, and further obtain the seed keys.
Based on the method and the system, the invention provides a big data secure transmission method and a big data secure transmission system, and the decoding difficulty is increased by reducing the recursion among different keys, so that the security in the data transmission process is increased.
Disclosure of Invention
The invention provides a method and a system for safely transmitting big data, which are used for solving the existing problems and comprise the following steps: setting an initial key, dividing the initial key into ten groups, and acquiring the carry digit of each group of keys in the hash code; expanding the initial key to obtain a first round key, wherein the initial key and the sub-keys both comprise four words of data; calculating hash coding values of four words of data of the initial key and the sub-key; adjusting four words of data of the first wheel key according to the KM optimal matching result to obtain an adjusted first wheel key; repeating the steps to obtain ten rounds of adjusted sub-keys, encrypting the data and transmitting the data; and the data receiver decrypts the encrypted data according to the initial key to obtain the transmitted data.
According to the technical means provided by the invention, the irreversibility of the hash code is utilized to enhance the decoding difficulty, and arithmetic coding is carried out according to the hash coding result of each round of key after expansion, so that the sequence of word data in each round of key is adjusted according to arithmetic coding, the randomness generated by keys among each round of keys is increased, and other sub-keys are difficult to obtain through the obtained sub-keys on the premise that an attacker obtains the sub-keys by decoding, thereby ensuring the security of data transmission.
The invention adopts the following technical scheme that a big data secure transmission method comprises the following steps:
s1, setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES key expansion method to obtain four words of data corresponding to a first round of keys;
s2, respectively obtaining a hash value of four-word data of the initial key and a hash value of four-word data of the first round key; respectively carrying out arithmetic coding on the hash value of the four-word data of the initial key and the hash value of the four-word data of the first round key to obtain the arithmetic coding value of the hash value of each word data in the initial key and the first round key;
s3, carrying out KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key, and adjusting the sequence of four words of data of the first round key according to the matching result to obtain four words of data of the adjusted first round key;
s4, expanding the four word data of the adjusted first wheel key again to obtain four word data of a second wheel key; acquiring four word data of the adjusted second round keys according to the method of S2-S3; iteration is carried out in sequence, and four word data of the sub-secret key after adjustment of the set round are obtained;
and encrypting and transmitting the data to be transmitted according to the obtained four-word data of the subkey after the adjustment of the set round.
Further, the method for safely transmitting the big data divides the initial key into four word data in sequence, and calculates each word data by using an AES key expansion method to obtain each word data in the corresponding sequence in the first round of keys.
Furthermore, a big data secure transmission method is used for calculating a hash value of four-word data of an initial key and a hash value of four-word data of a first round key by using a hash coding algorithm, and each word data corresponds to one hash value.
Further, a method for secure transmission of big data, in which the arithmetic coding value of the hash value of each word is obtained, is as follows:
and respectively carrying out arithmetic coding on the hash value corresponding to each word data to obtain a coding interval corresponding to the hash value of each word data, and selecting the middle of the coding interval as an arithmetic coding value corresponding to the hash value of the word data.
Further, a method for performing KM matching on the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key comprises the following steps:
and taking the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round of keys as an edge weight value, and matching the four word data of the initial key and the four word data of the first round of keys by utilizing a KM matching algorithm to obtain the word data of each word data of the initial key, which is correspondingly matched in the first round of keys.
Further, a method for safely transmitting big data, which adjusts four words of data of a first round key, comprises the following steps:
and acquiring each word data corresponding to each KM matched word data of the initial key and the first round key, and correspondingly adjusting the sequence of the four word data of the first round key and the sequence of the four word data of the initial key according to a matching result.
A big data secure transmission system comprises a key expansion module, a hash code calculation module, a KM matching module, a data encryption module and a data receiving module;
the key expansion module is used for setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES key expansion method to obtain four words of data corresponding to the first round of keys;
the Hash code calculation module is used for receiving the initial password and the first round key obtained in the key expansion module and respectively obtaining a Hash value of four words of data of the initial key and a Hash value of four words of data of the first round key; respectively carrying out arithmetic coding on the hash value of the four-character data of the initial key and the hash value of the four-character data of the first round key to obtain the arithmetic coding value of the hash value of each character data in the initial key and the first round key;
the KM matching module is used for performing KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key, and adjusting the sequence of four words of data of the first round key according to a matching result to obtain the four words of data of the adjusted first round key;
the data encryption module is used for expanding the four word data of the adjusted first wheel key again to obtain the four word data of the second wheel key, repeating the method of the hash code calculation module and the KM matching module and obtaining the four word data of the adjusted second wheel key; and sequentially iterating to obtain four word data of the subkey after setting round adjustment.
The beneficial effects of the invention are: according to the technical means provided by the invention, the irreversibility of the hash code is utilized to enhance the decoding difficulty, and arithmetic coding is carried out according to the hash coding result of each round of key after expansion, so that the sequence of word data in each round of key is adjusted according to arithmetic coding, the randomness generated by keys among each round of keys is increased, and other sub-keys are difficult to obtain through the obtained sub-keys on the premise that an attacker obtains the sub-keys by decoding, thereby ensuring the security of data transmission.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a secure big data transmission method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a big data secure transmission system according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating an AES key expansion process of the secure large data transmission method in FIG. 1;
fig. 4 is a schematic diagram of a KM matching process of the method for secure transmission of big data in fig. 1.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
As shown in fig. 1, a schematic structural diagram of a big data secure transmission method according to an embodiment of the present invention is provided, including:
101. setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES (advanced encryption Standard) key expansion method to obtain four words of data corresponding to the first round of keys.
The AES encryption algorithm has three keys, namely 128 bits, 196 bits and 256 bits, and the invention takes 128 bits as an example, but the improved method is also effective for 196 bits and 256 bits of key expansion process, and all belong to the protection scope of the invention.
As shown in fig. 3, a schematic diagram of an AES key expansion process of the large data secure transmission method in fig. 1 is provided, where W0, W1, W2, and W3 are four word data in an initial key, W4, W5, W6, and W7 are four word data in a first round key, AES adopts a method of expanding a seed key to obtain a sub key, a 128-bit initial key of the algorithm is the seed key, first, a 128-bit key of each round is divided equally into 4 words, W0, W1, W2, and W3, each word is 32 bits, the 128-bit key is also a round key participating in calculation in the first round transformation, then, W4 is calculated by using W0 and W3, W1 and W4 are calculated to obtain W5, W2 and W5 are calculated to obtain W6, and W3 and W6 are calculated to obtain W7. The generated W4, W5, W6, and W7 are keys of the first round, and are also keys of the round used in the second round transformation.
In the invention, all the sub-key keys of the 10-round transformation are calculated by the analogy method.
102. Respectively acquiring a hash value of the four-word data of the initial key and a hash value of the four-word data of the first round key; and respectively carrying out arithmetic coding on the hash value of the four-word data of the initial key and the hash value of the four-word data of the first round key to obtain the arithmetic coding value of the hash value of each word data in the initial key and the first round key.
The hash algorithm maps binary values with any length into binary values with shorter fixed lengths, the small binary values are called hash values, the hash coding is irreversible, and the hash coding input cannot be calculated through the hash coding result.
The big data comprises Chinese characters, numbers and the like, and can realize digital conversion through national standard codes, Ascll codes and the like, namely, the big data is converted into a binary format.
103. And carrying out KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key, and adjusting the sequence of the four words of data of the first round key according to the matching result to obtain the four words of data of the adjusted first round key.
As shown in fig. 4, the method for KM matching according to the hash code value of the four words of data of the initial key and the first round key is as follows:
the method comprises the steps of respectively calculating hash values of four word data of an initial key and a first round key, respectively carrying out arithmetic coding calculation on the hash value of the four word data of the initial key and the hash value of the four word data of the first round key, wherein the arithmetic coding result is an interval, and any number selected from the obtained interval can be used as a coding result.
W0, W1, W2 and W3 are four word data in the initial key, W4, W5, W6 and W7 are four word data in the first round key, the result of arithmetic coding corresponding to the hash value of each word data is used as a weight, and the matching result with the minimum weight is obtained by performing KM matching on each word data.
Adjusting four-word data of the first wheel key, and adjusting the sequence of the four-word data of the first wheel key according to the KM matching result, as shown in fig. 3, the calculation results of W0 and W3 in the first wheel key before the adjustment are W4, and according to the result after the KM matching, W7 is the optimal matching result, the positions of W4 and W7 are adjusted, and the four-word data are sequentially adjusted by using the same method.
104. Expanding the four word data of the adjusted first round key again to obtain four word data of a second round key; acquiring four word data of the adjusted second round key according to the method 102-103; and sequentially iterating to obtain four word data of the subkey after setting round adjustment.
The expansion method is the same as the steps 101 to 103, wherein each round key is obtained by expanding the key of the previous round, that is, the key of the second round is obtained by expanding according to the adjusted key of the first round, and the adjusted key of the second round is obtained after the steps 102 to 103 are performed on the adjusted key of the first round and the adjusted key of the second round;
similarly, a third round of sub-keys is obtained according to the adjusted second round of keys, the third round of sub-keys is adjusted, and key expansion is sequentially carried out, so that the ten-round of keys is obtained.
The transmitted data is encrypted according to the obtained ten round keys, the encryption method is an AES key encryption process, the specific content is the existing means, and no more explanation is made.
And after receiving the encrypted data, the data receiver decrypts the encrypted data according to the initial key to obtain the transmitted data.
The specific decryption method is opposite to the AES data encryption process, and the encrypted key is subjected to inverse expansion according to the initial key to complete decryption.
As shown in fig. 2, a schematic structural diagram of a secure transmission system for big data according to an embodiment of the present invention is shown, and includes a key expansion module, a hash code calculation module, a KM matching module, a data encryption module, and a data receiving module;
in the invention, a data sending end uploads data to be transmitted through a server, the server is stored in a computer medium, the server transmits the data by connecting a public internet or a private network channel, and meanwhile, the server is subjected to security protection, namely, the transmitted data is encrypted firstly, the encryption process is carried out in the computer medium, the specific process comprises each module and the function corresponding to the module as shown in figure 2, and after the encryption is finished, the data sending end sends or informs a data receiving end of an initial key in other forms.
And the data receiving end receives the encrypted data through the server, and the operator decrypts the encrypted data according to the initial key informed by the data sending end, so that the transmitted data is obtained.
The key expansion module is used for setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES (advanced encryption Standard) key expansion method to obtain four words of data corresponding to the first round of keys;
the Hash code calculation module is used for receiving the initial password and the first round key obtained in the key expansion module and respectively obtaining a Hash value of four words of data of the initial key and a Hash value of four words of data of the first round key; carrying out arithmetic coding on the hash value of the four-word data of the initial key and the hash value of the four-word data of the first round key, and respectively obtaining the arithmetic coding value of the hash value of each word data in the initial key and the first round key;
the KM matching module is used for performing KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key, and adjusting four words of data of the first round key according to a matching result to obtain an adjusted first round key;
the data encryption module is used for repeating the steps of the key expansion module, the hash code calculation module and the KM matching module to obtain the adjusted sub-keys of the set round; and encrypting and transmitting the data to be transmitted according to the obtained sub-key adjusted in the set round.
According to the technical means provided by the invention, the irreversibility of the hash code is utilized to enhance the decoding difficulty, and arithmetic coding is carried out according to the hash coding result of each round of key after expansion, so that the sequence of word data in each round of key is adjusted according to arithmetic coding, the randomness generated by keys among each round of keys is increased, and other sub-keys are difficult to obtain through the obtained sub-keys on the premise that an attacker obtains the sub-keys by decoding, thereby ensuring the security of data transmission.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.

Claims (7)

1. A big data secure transmission method is characterized by comprising the following steps:
s1, setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES (advanced encryption Standard) key expansion method to obtain four words of data corresponding to a first round of keys;
s2, respectively obtaining a hash value of four-word data of the initial key and a hash value of four-word data of the first round key; respectively carrying out arithmetic coding on the hash value of the four-character data of the initial key and the hash value of the four-character data of the first round key to obtain the arithmetic coding value of the hash value of each character data in the initial key and the first round key;
s3, carrying out KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first wheel key, and adjusting the sequence of four words of data of the first wheel key according to the matching result to obtain the adjusted four words of data of the first wheel key;
s4, expanding the four character data of the adjusted first round key again to obtain four character data of a second round key; acquiring four word data of the adjusted second round keys according to the method of S2-S3; sequentially iterating to obtain four word data of the subkey after setting round adjustment;
and encrypting and transmitting the data to be transmitted according to the obtained four-word data of the subkey after the adjustment of the set round.
2. The method as claimed in claim 1, wherein the initial key is divided into four words in sequence, and each word is calculated by AES key expansion to obtain the word data in the corresponding sequence in the first round of keys.
3. The method for safely transmitting the big data according to claim 1, wherein a hash value of four words of data of the initial key and a hash value of four words of data of the first round key are calculated by using a hash coding algorithm, and each word of data corresponds to one hash value.
4. The method for securely transmitting big data according to claim 3, wherein the method for obtaining the arithmetic coding value of the hash value of each word data comprises:
and respectively carrying out arithmetic coding on the hash value corresponding to each word data to obtain a coding interval corresponding to the hash value of each word data, and selecting the middle number of the coding intervals as the arithmetic coding value corresponding to the hash value of the word data.
5. The method as claimed in claim 4, wherein the KM matching is performed according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key by:
and taking the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round of keys as an edge weight value, and matching the four word data of the initial key and the four word data of the first round of keys by utilizing a KM matching algorithm to obtain the word data of each word data of the initial key, which is correspondingly matched in the first round of keys.
6. The method for safely transmitting the big data according to claim 1, wherein the method for adjusting the four words of data of the first round key comprises:
and acquiring each word data corresponding to each KM matched word data of the initial key and the first round key, and correspondingly adjusting the sequence of the four word data of the first round key and the sequence of the four word data of the initial key according to the matching result.
7. A big data secure transmission system is characterized by comprising a key expansion module, a hash coding calculation module, a KM matching module, a data encryption module and a data receiving module;
the key expansion module is used for setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES (advanced encryption Standard) key expansion method to obtain four words of data corresponding to the first round of keys;
the Hash code calculation module is used for receiving the initial password and the first round key obtained in the key expansion module and respectively obtaining a Hash value of four words of data of the initial key and a Hash value of four words of data of the first round key; respectively carrying out arithmetic coding on the hash value of the four-word data of the initial key and the hash value of the four-word data of the first round key to obtain the arithmetic coding value of the hash value of each word data in the initial key and the first round key;
the KM matching module is used for performing KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first wheel key, and adjusting the sequence of four words of data of the first wheel key according to the matching result to obtain the adjusted four words of data of the first wheel key;
the data encryption module is used for expanding the four word data of the adjusted first wheel key again to obtain the four word data of the second wheel key, repeating the method of the hash code calculation module and the KM matching module and obtaining the four word data of the adjusted second wheel key; and sequentially iterating to obtain four word data of the subkey after setting round adjustment.
CN202210359000.5A 2022-04-06 2022-04-06 Big data safety transmission method and system Active CN114785484B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210359000.5A CN114785484B (en) 2022-04-06 2022-04-06 Big data safety transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210359000.5A CN114785484B (en) 2022-04-06 2022-04-06 Big data safety transmission method and system

Publications (2)

Publication Number Publication Date
CN114785484A true CN114785484A (en) 2022-07-22
CN114785484B CN114785484B (en) 2023-05-09

Family

ID=82427313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210359000.5A Active CN114785484B (en) 2022-04-06 2022-04-06 Big data safety transmission method and system

Country Status (1)

Country Link
CN (1) CN114785484B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8341417B1 (en) * 2006-12-12 2012-12-25 Cisco Technology, Inc. Data storage using encoded hash message authentication code
WO2016045217A1 (en) * 2014-09-23 2016-03-31 深圳市汇顶科技股份有限公司 Encryption method and encryption device
CN105515776A (en) * 2010-03-05 2016-04-20 交互数字专利控股公司 Method and apparatus for providing security to devices
CN108701197A (en) * 2016-02-29 2018-10-23 国际商业机器公司 The safety slice of efficient secret key encryption
CN111400730A (en) * 2020-03-11 2020-07-10 西南石油大学 AES key expansion method based on weak correlation
KR20210032647A (en) * 2019-09-17 2021-03-25 (주)라닉스 Multiple Implicit Certificates Issuing System Using Extension Functions and Issuing Method Therefor
CN113626774A (en) * 2021-06-30 2021-11-09 全球能源互联网研究院有限公司 Reversible database watermarking method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8341417B1 (en) * 2006-12-12 2012-12-25 Cisco Technology, Inc. Data storage using encoded hash message authentication code
CN105515776A (en) * 2010-03-05 2016-04-20 交互数字专利控股公司 Method and apparatus for providing security to devices
WO2016045217A1 (en) * 2014-09-23 2016-03-31 深圳市汇顶科技股份有限公司 Encryption method and encryption device
CN108701197A (en) * 2016-02-29 2018-10-23 国际商业机器公司 The safety slice of efficient secret key encryption
KR20210032647A (en) * 2019-09-17 2021-03-25 (주)라닉스 Multiple Implicit Certificates Issuing System Using Extension Functions and Issuing Method Therefor
CN111400730A (en) * 2020-03-11 2020-07-10 西南石油大学 AES key expansion method based on weak correlation
CN113626774A (en) * 2021-06-30 2021-11-09 全球能源互联网研究院有限公司 Reversible database watermarking method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡亮: "单向性策略与AES密钥生成算法的改进" *

Also Published As

Publication number Publication date
CN114785484B (en) 2023-05-09

Similar Documents

Publication Publication Date Title
US11734435B2 (en) Image encryption and decryption communication algorithm based on two-dimensional lag complex logistic map
Jakimoski et al. Analysis of some recently proposed chaos-based encryption algorithms
CN108696867B (en) Lightweight group key distribution method based on wireless channel characteristics
CN110086616B (en) Forward one-time pad secret communication method based on wireless channel
CN112165443A (en) Multi-key information encryption and decryption method and device and storage medium
CN110677236A (en) OFDM encryption method based on composite chaotic system and XOR operation
CN111224974A (en) Method, system, electronic device and storage medium for network communication content encryption
CN116707771B (en) Communication method based on data encryption
Roy et al. A novel encryption model for text messages using delayed chaotic neural network and DNA cryptography
CN117278324B (en) Message encryption transmission method and system
CN115834060A (en) Cryptology-based electronic official document secure import and export method and system
US8458452B1 (en) System and method for encryption and decryption of data transferred between computer systems
CN114157433B (en) Encryption method and system for chaotic optical communication system with secret key and plaintext associated
Al-Arjan et al. Intelligent security in the era of AI: The key vulnerability of RC4 algorithm
CN102946315B (en) A kind of method and system adopting packet mode to construct MAC code
Khan et al. Elliptic curve cryptography for the security of insecure Internet of Things
CN111416656B (en) Low-orbit satellite Internet of things access authentication method based on NTRU algorithm
CN116980194A (en) Safe and efficient data transmission method and system based on cloud edge end cooperation
CN114785484B (en) Big data safety transmission method and system
CN115834163A (en) Method, device, equipment and storage medium for generating secret key of encrypted data
CN116132016A (en) Method for realizing additive expansion of cipher algorithm
CN115632765A (en) Encryption method, decryption device, electronic equipment and storage medium
CN111314055A (en) Method and device for key agreement and information transmission integration based on Y-00
CN109905241A (en) A kind of short encoding of chinese characters of curve public key, coding/decoding method
CN111835506B (en) Information security digital encryption method based on one-time use codebook

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230412

Address after: 4-4, Building 5, No. 8 Gangcheng East Road, Jiangbei District, Chongqing 400020

Applicant after: Chongqing Kuilin Information Technology Co.,Ltd.

Address before: 450044 floor 13, unit 1, building 12, Beijun, East Min'an, Kaiyuan Road North and Gucheng Road, Huiji District, Zhengzhou City, Henan Province

Applicant before: Henan yizhifa Electronic Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant