CN114785484A - Big data secure transmission method and system - Google Patents
Big data secure transmission method and system Download PDFInfo
- Publication number
- CN114785484A CN114785484A CN202210359000.5A CN202210359000A CN114785484A CN 114785484 A CN114785484 A CN 114785484A CN 202210359000 A CN202210359000 A CN 202210359000A CN 114785484 A CN114785484 A CN 114785484A
- Authority
- CN
- China
- Prior art keywords
- data
- key
- round
- hash value
- word data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the field of artificial intelligence, in particular to a big data secure transmission method and a big data secure transmission system. The method comprises the following steps: setting an initial key, dividing the initial key into ten groups, and acquiring the carry digit of each group of keys in the hash code; expanding the initial key to obtain a first round key, wherein the initial key and the sub-keys both comprise four words of data; calculating hash coding values of four words of data of the initial key and the subkeys; adjusting four words of data of the first wheel key according to the KM optimal matching result to obtain an adjusted first wheel key; sequentially iterating to obtain ten rounds of adjusted sub-keys, encrypting the data and transmitting the data; and the data receiver decrypts the encrypted data according to the initial key to obtain the transmitted data. According to the technical means provided by the invention, KM matching is carried out by calculating the hash coding result of each round of key, so that the generated key is influenced, the randomness of key generation is increased, and the safety of data transmission is ensured.
Description
Technical Field
The invention relates to the field of artificial intelligence, in particular to a big data safe transmission method and a big data safe transmission system.
Background
The encryption algorithm is mainly divided into a symmetric encryption algorithm and an asymmetric encryption algorithm, wherein the asymmetric encryption algorithm has higher security but lower efficiency, and the symmetric encryption algorithm is often used for the transmission of large data.
In the symmetric encryption algorithm, AES has the characteristics of simple interface, convenient implementation and the like, but in the process of expanding the round keys of the AES algorithm, the generation of the round keys of each round only depends on the keys of the previous round as input, but the key expansion in the process is reversible, so that an attacker can easily obtain the keys of other rounds by calculation after intercepting the keys of a certain round, and further obtain the seed keys.
Based on the method and the system, the invention provides a big data secure transmission method and a big data secure transmission system, and the decoding difficulty is increased by reducing the recursion among different keys, so that the security in the data transmission process is increased.
Disclosure of Invention
The invention provides a method and a system for safely transmitting big data, which are used for solving the existing problems and comprise the following steps: setting an initial key, dividing the initial key into ten groups, and acquiring the carry digit of each group of keys in the hash code; expanding the initial key to obtain a first round key, wherein the initial key and the sub-keys both comprise four words of data; calculating hash coding values of four words of data of the initial key and the sub-key; adjusting four words of data of the first wheel key according to the KM optimal matching result to obtain an adjusted first wheel key; repeating the steps to obtain ten rounds of adjusted sub-keys, encrypting the data and transmitting the data; and the data receiver decrypts the encrypted data according to the initial key to obtain the transmitted data.
According to the technical means provided by the invention, the irreversibility of the hash code is utilized to enhance the decoding difficulty, and arithmetic coding is carried out according to the hash coding result of each round of key after expansion, so that the sequence of word data in each round of key is adjusted according to arithmetic coding, the randomness generated by keys among each round of keys is increased, and other sub-keys are difficult to obtain through the obtained sub-keys on the premise that an attacker obtains the sub-keys by decoding, thereby ensuring the security of data transmission.
The invention adopts the following technical scheme that a big data secure transmission method comprises the following steps:
s1, setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES key expansion method to obtain four words of data corresponding to a first round of keys;
s2, respectively obtaining a hash value of four-word data of the initial key and a hash value of four-word data of the first round key; respectively carrying out arithmetic coding on the hash value of the four-word data of the initial key and the hash value of the four-word data of the first round key to obtain the arithmetic coding value of the hash value of each word data in the initial key and the first round key;
s3, carrying out KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key, and adjusting the sequence of four words of data of the first round key according to the matching result to obtain four words of data of the adjusted first round key;
s4, expanding the four word data of the adjusted first wheel key again to obtain four word data of a second wheel key; acquiring four word data of the adjusted second round keys according to the method of S2-S3; iteration is carried out in sequence, and four word data of the sub-secret key after adjustment of the set round are obtained;
and encrypting and transmitting the data to be transmitted according to the obtained four-word data of the subkey after the adjustment of the set round.
Further, the method for safely transmitting the big data divides the initial key into four word data in sequence, and calculates each word data by using an AES key expansion method to obtain each word data in the corresponding sequence in the first round of keys.
Furthermore, a big data secure transmission method is used for calculating a hash value of four-word data of an initial key and a hash value of four-word data of a first round key by using a hash coding algorithm, and each word data corresponds to one hash value.
Further, a method for secure transmission of big data, in which the arithmetic coding value of the hash value of each word is obtained, is as follows:
and respectively carrying out arithmetic coding on the hash value corresponding to each word data to obtain a coding interval corresponding to the hash value of each word data, and selecting the middle of the coding interval as an arithmetic coding value corresponding to the hash value of the word data.
Further, a method for performing KM matching on the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key comprises the following steps:
and taking the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round of keys as an edge weight value, and matching the four word data of the initial key and the four word data of the first round of keys by utilizing a KM matching algorithm to obtain the word data of each word data of the initial key, which is correspondingly matched in the first round of keys.
Further, a method for safely transmitting big data, which adjusts four words of data of a first round key, comprises the following steps:
and acquiring each word data corresponding to each KM matched word data of the initial key and the first round key, and correspondingly adjusting the sequence of the four word data of the first round key and the sequence of the four word data of the initial key according to a matching result.
A big data secure transmission system comprises a key expansion module, a hash code calculation module, a KM matching module, a data encryption module and a data receiving module;
the key expansion module is used for setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES key expansion method to obtain four words of data corresponding to the first round of keys;
the Hash code calculation module is used for receiving the initial password and the first round key obtained in the key expansion module and respectively obtaining a Hash value of four words of data of the initial key and a Hash value of four words of data of the first round key; respectively carrying out arithmetic coding on the hash value of the four-character data of the initial key and the hash value of the four-character data of the first round key to obtain the arithmetic coding value of the hash value of each character data in the initial key and the first round key;
the KM matching module is used for performing KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key, and adjusting the sequence of four words of data of the first round key according to a matching result to obtain the four words of data of the adjusted first round key;
the data encryption module is used for expanding the four word data of the adjusted first wheel key again to obtain the four word data of the second wheel key, repeating the method of the hash code calculation module and the KM matching module and obtaining the four word data of the adjusted second wheel key; and sequentially iterating to obtain four word data of the subkey after setting round adjustment.
The beneficial effects of the invention are: according to the technical means provided by the invention, the irreversibility of the hash code is utilized to enhance the decoding difficulty, and arithmetic coding is carried out according to the hash coding result of each round of key after expansion, so that the sequence of word data in each round of key is adjusted according to arithmetic coding, the randomness generated by keys among each round of keys is increased, and other sub-keys are difficult to obtain through the obtained sub-keys on the premise that an attacker obtains the sub-keys by decoding, thereby ensuring the security of data transmission.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a secure big data transmission method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a big data secure transmission system according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating an AES key expansion process of the secure large data transmission method in FIG. 1;
fig. 4 is a schematic diagram of a KM matching process of the method for secure transmission of big data in fig. 1.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
As shown in fig. 1, a schematic structural diagram of a big data secure transmission method according to an embodiment of the present invention is provided, including:
101. setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES (advanced encryption Standard) key expansion method to obtain four words of data corresponding to the first round of keys.
The AES encryption algorithm has three keys, namely 128 bits, 196 bits and 256 bits, and the invention takes 128 bits as an example, but the improved method is also effective for 196 bits and 256 bits of key expansion process, and all belong to the protection scope of the invention.
As shown in fig. 3, a schematic diagram of an AES key expansion process of the large data secure transmission method in fig. 1 is provided, where W0, W1, W2, and W3 are four word data in an initial key, W4, W5, W6, and W7 are four word data in a first round key, AES adopts a method of expanding a seed key to obtain a sub key, a 128-bit initial key of the algorithm is the seed key, first, a 128-bit key of each round is divided equally into 4 words, W0, W1, W2, and W3, each word is 32 bits, the 128-bit key is also a round key participating in calculation in the first round transformation, then, W4 is calculated by using W0 and W3, W1 and W4 are calculated to obtain W5, W2 and W5 are calculated to obtain W6, and W3 and W6 are calculated to obtain W7. The generated W4, W5, W6, and W7 are keys of the first round, and are also keys of the round used in the second round transformation.
In the invention, all the sub-key keys of the 10-round transformation are calculated by the analogy method.
102. Respectively acquiring a hash value of the four-word data of the initial key and a hash value of the four-word data of the first round key; and respectively carrying out arithmetic coding on the hash value of the four-word data of the initial key and the hash value of the four-word data of the first round key to obtain the arithmetic coding value of the hash value of each word data in the initial key and the first round key.
The hash algorithm maps binary values with any length into binary values with shorter fixed lengths, the small binary values are called hash values, the hash coding is irreversible, and the hash coding input cannot be calculated through the hash coding result.
The big data comprises Chinese characters, numbers and the like, and can realize digital conversion through national standard codes, Ascll codes and the like, namely, the big data is converted into a binary format.
103. And carrying out KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key, and adjusting the sequence of the four words of data of the first round key according to the matching result to obtain the four words of data of the adjusted first round key.
As shown in fig. 4, the method for KM matching according to the hash code value of the four words of data of the initial key and the first round key is as follows:
the method comprises the steps of respectively calculating hash values of four word data of an initial key and a first round key, respectively carrying out arithmetic coding calculation on the hash value of the four word data of the initial key and the hash value of the four word data of the first round key, wherein the arithmetic coding result is an interval, and any number selected from the obtained interval can be used as a coding result.
W0, W1, W2 and W3 are four word data in the initial key, W4, W5, W6 and W7 are four word data in the first round key, the result of arithmetic coding corresponding to the hash value of each word data is used as a weight, and the matching result with the minimum weight is obtained by performing KM matching on each word data.
Adjusting four-word data of the first wheel key, and adjusting the sequence of the four-word data of the first wheel key according to the KM matching result, as shown in fig. 3, the calculation results of W0 and W3 in the first wheel key before the adjustment are W4, and according to the result after the KM matching, W7 is the optimal matching result, the positions of W4 and W7 are adjusted, and the four-word data are sequentially adjusted by using the same method.
104. Expanding the four word data of the adjusted first round key again to obtain four word data of a second round key; acquiring four word data of the adjusted second round key according to the method 102-103; and sequentially iterating to obtain four word data of the subkey after setting round adjustment.
The expansion method is the same as the steps 101 to 103, wherein each round key is obtained by expanding the key of the previous round, that is, the key of the second round is obtained by expanding according to the adjusted key of the first round, and the adjusted key of the second round is obtained after the steps 102 to 103 are performed on the adjusted key of the first round and the adjusted key of the second round;
similarly, a third round of sub-keys is obtained according to the adjusted second round of keys, the third round of sub-keys is adjusted, and key expansion is sequentially carried out, so that the ten-round of keys is obtained.
The transmitted data is encrypted according to the obtained ten round keys, the encryption method is an AES key encryption process, the specific content is the existing means, and no more explanation is made.
And after receiving the encrypted data, the data receiver decrypts the encrypted data according to the initial key to obtain the transmitted data.
The specific decryption method is opposite to the AES data encryption process, and the encrypted key is subjected to inverse expansion according to the initial key to complete decryption.
As shown in fig. 2, a schematic structural diagram of a secure transmission system for big data according to an embodiment of the present invention is shown, and includes a key expansion module, a hash code calculation module, a KM matching module, a data encryption module, and a data receiving module;
in the invention, a data sending end uploads data to be transmitted through a server, the server is stored in a computer medium, the server transmits the data by connecting a public internet or a private network channel, and meanwhile, the server is subjected to security protection, namely, the transmitted data is encrypted firstly, the encryption process is carried out in the computer medium, the specific process comprises each module and the function corresponding to the module as shown in figure 2, and after the encryption is finished, the data sending end sends or informs a data receiving end of an initial key in other forms.
And the data receiving end receives the encrypted data through the server, and the operator decrypts the encrypted data according to the initial key informed by the data sending end, so that the transmitted data is obtained.
The key expansion module is used for setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES (advanced encryption Standard) key expansion method to obtain four words of data corresponding to the first round of keys;
the Hash code calculation module is used for receiving the initial password and the first round key obtained in the key expansion module and respectively obtaining a Hash value of four words of data of the initial key and a Hash value of four words of data of the first round key; carrying out arithmetic coding on the hash value of the four-word data of the initial key and the hash value of the four-word data of the first round key, and respectively obtaining the arithmetic coding value of the hash value of each word data in the initial key and the first round key;
the KM matching module is used for performing KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key, and adjusting four words of data of the first round key according to a matching result to obtain an adjusted first round key;
the data encryption module is used for repeating the steps of the key expansion module, the hash code calculation module and the KM matching module to obtain the adjusted sub-keys of the set round; and encrypting and transmitting the data to be transmitted according to the obtained sub-key adjusted in the set round.
According to the technical means provided by the invention, the irreversibility of the hash code is utilized to enhance the decoding difficulty, and arithmetic coding is carried out according to the hash coding result of each round of key after expansion, so that the sequence of word data in each round of key is adjusted according to arithmetic coding, the randomness generated by keys among each round of keys is increased, and other sub-keys are difficult to obtain through the obtained sub-keys on the premise that an attacker obtains the sub-keys by decoding, thereby ensuring the security of data transmission.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.
Claims (7)
1. A big data secure transmission method is characterized by comprising the following steps:
s1, setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES (advanced encryption Standard) key expansion method to obtain four words of data corresponding to a first round of keys;
s2, respectively obtaining a hash value of four-word data of the initial key and a hash value of four-word data of the first round key; respectively carrying out arithmetic coding on the hash value of the four-character data of the initial key and the hash value of the four-character data of the first round key to obtain the arithmetic coding value of the hash value of each character data in the initial key and the first round key;
s3, carrying out KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first wheel key, and adjusting the sequence of four words of data of the first wheel key according to the matching result to obtain the adjusted four words of data of the first wheel key;
s4, expanding the four character data of the adjusted first round key again to obtain four character data of a second round key; acquiring four word data of the adjusted second round keys according to the method of S2-S3; sequentially iterating to obtain four word data of the subkey after setting round adjustment;
and encrypting and transmitting the data to be transmitted according to the obtained four-word data of the subkey after the adjustment of the set round.
2. The method as claimed in claim 1, wherein the initial key is divided into four words in sequence, and each word is calculated by AES key expansion to obtain the word data in the corresponding sequence in the first round of keys.
3. The method for safely transmitting the big data according to claim 1, wherein a hash value of four words of data of the initial key and a hash value of four words of data of the first round key are calculated by using a hash coding algorithm, and each word of data corresponds to one hash value.
4. The method for securely transmitting big data according to claim 3, wherein the method for obtaining the arithmetic coding value of the hash value of each word data comprises:
and respectively carrying out arithmetic coding on the hash value corresponding to each word data to obtain a coding interval corresponding to the hash value of each word data, and selecting the middle number of the coding intervals as the arithmetic coding value corresponding to the hash value of the word data.
5. The method as claimed in claim 4, wherein the KM matching is performed according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round key by:
and taking the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first round of keys as an edge weight value, and matching the four word data of the initial key and the four word data of the first round of keys by utilizing a KM matching algorithm to obtain the word data of each word data of the initial key, which is correspondingly matched in the first round of keys.
6. The method for safely transmitting the big data according to claim 1, wherein the method for adjusting the four words of data of the first round key comprises:
and acquiring each word data corresponding to each KM matched word data of the initial key and the first round key, and correspondingly adjusting the sequence of the four word data of the first round key and the sequence of the four word data of the initial key according to the matching result.
7. A big data secure transmission system is characterized by comprising a key expansion module, a hash coding calculation module, a KM matching module, a data encryption module and a data receiving module;
the key expansion module is used for setting an initial key, dividing the initial key into four words of data, and expanding the four words of data of the initial key according to an AES (advanced encryption Standard) key expansion method to obtain four words of data corresponding to the first round of keys;
the Hash code calculation module is used for receiving the initial password and the first round key obtained in the key expansion module and respectively obtaining a Hash value of four words of data of the initial key and a Hash value of four words of data of the first round key; respectively carrying out arithmetic coding on the hash value of the four-word data of the initial key and the hash value of the four-word data of the first round key to obtain the arithmetic coding value of the hash value of each word data in the initial key and the first round key;
the KM matching module is used for performing KM matching according to the arithmetic coding value of the hash value of each word data in the initial key and the arithmetic coding value of the hash value of each word data in the first wheel key, and adjusting the sequence of four words of data of the first wheel key according to the matching result to obtain the adjusted four words of data of the first wheel key;
the data encryption module is used for expanding the four word data of the adjusted first wheel key again to obtain the four word data of the second wheel key, repeating the method of the hash code calculation module and the KM matching module and obtaining the four word data of the adjusted second wheel key; and sequentially iterating to obtain four word data of the subkey after setting round adjustment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210359000.5A CN114785484B (en) | 2022-04-06 | 2022-04-06 | Big data safety transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210359000.5A CN114785484B (en) | 2022-04-06 | 2022-04-06 | Big data safety transmission method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114785484A true CN114785484A (en) | 2022-07-22 |
CN114785484B CN114785484B (en) | 2023-05-09 |
Family
ID=82427313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210359000.5A Active CN114785484B (en) | 2022-04-06 | 2022-04-06 | Big data safety transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114785484B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8341417B1 (en) * | 2006-12-12 | 2012-12-25 | Cisco Technology, Inc. | Data storage using encoded hash message authentication code |
WO2016045217A1 (en) * | 2014-09-23 | 2016-03-31 | 深圳市汇顶科技股份有限公司 | Encryption method and encryption device |
CN105515776A (en) * | 2010-03-05 | 2016-04-20 | 交互数字专利控股公司 | Method and apparatus for providing security to devices |
CN108701197A (en) * | 2016-02-29 | 2018-10-23 | 国际商业机器公司 | The safety slice of efficient secret key encryption |
CN111400730A (en) * | 2020-03-11 | 2020-07-10 | 西南石油大学 | AES key expansion method based on weak correlation |
KR20210032647A (en) * | 2019-09-17 | 2021-03-25 | (주)라닉스 | Multiple Implicit Certificates Issuing System Using Extension Functions and Issuing Method Therefor |
CN113626774A (en) * | 2021-06-30 | 2021-11-09 | 全球能源互联网研究院有限公司 | Reversible database watermarking method and system |
-
2022
- 2022-04-06 CN CN202210359000.5A patent/CN114785484B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8341417B1 (en) * | 2006-12-12 | 2012-12-25 | Cisco Technology, Inc. | Data storage using encoded hash message authentication code |
CN105515776A (en) * | 2010-03-05 | 2016-04-20 | 交互数字专利控股公司 | Method and apparatus for providing security to devices |
WO2016045217A1 (en) * | 2014-09-23 | 2016-03-31 | 深圳市汇顶科技股份有限公司 | Encryption method and encryption device |
CN108701197A (en) * | 2016-02-29 | 2018-10-23 | 国际商业机器公司 | The safety slice of efficient secret key encryption |
KR20210032647A (en) * | 2019-09-17 | 2021-03-25 | (주)라닉스 | Multiple Implicit Certificates Issuing System Using Extension Functions and Issuing Method Therefor |
CN111400730A (en) * | 2020-03-11 | 2020-07-10 | 西南石油大学 | AES key expansion method based on weak correlation |
CN113626774A (en) * | 2021-06-30 | 2021-11-09 | 全球能源互联网研究院有限公司 | Reversible database watermarking method and system |
Non-Patent Citations (1)
Title |
---|
胡亮: "单向性策略与AES密钥生成算法的改进" * |
Also Published As
Publication number | Publication date |
---|---|
CN114785484B (en) | 2023-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11734435B2 (en) | Image encryption and decryption communication algorithm based on two-dimensional lag complex logistic map | |
Jakimoski et al. | Analysis of some recently proposed chaos-based encryption algorithms | |
CN108696867B (en) | Lightweight group key distribution method based on wireless channel characteristics | |
CN110086616B (en) | Forward one-time pad secret communication method based on wireless channel | |
CN112165443A (en) | Multi-key information encryption and decryption method and device and storage medium | |
CN110677236A (en) | OFDM encryption method based on composite chaotic system and XOR operation | |
CN111224974A (en) | Method, system, electronic device and storage medium for network communication content encryption | |
CN116707771B (en) | Communication method based on data encryption | |
Roy et al. | A novel encryption model for text messages using delayed chaotic neural network and DNA cryptography | |
CN117278324B (en) | Message encryption transmission method and system | |
CN115834060A (en) | Cryptology-based electronic official document secure import and export method and system | |
US8458452B1 (en) | System and method for encryption and decryption of data transferred between computer systems | |
CN114157433B (en) | Encryption method and system for chaotic optical communication system with secret key and plaintext associated | |
Al-Arjan et al. | Intelligent security in the era of AI: The key vulnerability of RC4 algorithm | |
CN102946315B (en) | A kind of method and system adopting packet mode to construct MAC code | |
Khan et al. | Elliptic curve cryptography for the security of insecure Internet of Things | |
CN111416656B (en) | Low-orbit satellite Internet of things access authentication method based on NTRU algorithm | |
CN116980194A (en) | Safe and efficient data transmission method and system based on cloud edge end cooperation | |
CN114785484B (en) | Big data safety transmission method and system | |
CN115834163A (en) | Method, device, equipment and storage medium for generating secret key of encrypted data | |
CN116132016A (en) | Method for realizing additive expansion of cipher algorithm | |
CN115632765A (en) | Encryption method, decryption device, electronic equipment and storage medium | |
CN111314055A (en) | Method and device for key agreement and information transmission integration based on Y-00 | |
CN109905241A (en) | A kind of short encoding of chinese characters of curve public key, coding/decoding method | |
CN111835506B (en) | Information security digital encryption method based on one-time use codebook |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20230412 Address after: 4-4, Building 5, No. 8 Gangcheng East Road, Jiangbei District, Chongqing 400020 Applicant after: Chongqing Kuilin Information Technology Co.,Ltd. Address before: 450044 floor 13, unit 1, building 12, Beijun, East Min'an, Kaiyuan Road North and Gucheng Road, Huiji District, Zhengzhou City, Henan Province Applicant before: Henan yizhifa Electronic Technology Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |