CN116600287A - Network data transmission encryption and decryption method - Google Patents
Network data transmission encryption and decryption method Download PDFInfo
- Publication number
- CN116600287A CN116600287A CN202310883259.4A CN202310883259A CN116600287A CN 116600287 A CN116600287 A CN 116600287A CN 202310883259 A CN202310883259 A CN 202310883259A CN 116600287 A CN116600287 A CN 116600287A
- Authority
- CN
- China
- Prior art keywords
- encryption
- transmission
- network
- data
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 105
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000004891 communication Methods 0.000 claims abstract description 21
- 238000006243 chemical reaction Methods 0.000 claims abstract description 17
- 238000013507 mapping Methods 0.000 claims abstract description 16
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 14
- 125000004122 cyclic group Chemical group 0.000 claims abstract description 9
- 230000008859 change Effects 0.000 claims abstract description 8
- 238000013519 translation Methods 0.000 claims abstract description 6
- 230000006870 function Effects 0.000 claims description 24
- 238000004590 computer program Methods 0.000 claims description 13
- 238000012360 testing method Methods 0.000 claims description 13
- 238000013102 re-test Methods 0.000 claims description 5
- 239000011159 matrix material Substances 0.000 claims description 4
- 238000010276 construction Methods 0.000 claims description 3
- 238000011438 discrete method Methods 0.000 claims description 3
- 238000012546 transfer Methods 0.000 claims description 3
- 239000013598 vector Substances 0.000 claims description 2
- 230000007704 transition Effects 0.000 claims 3
- 238000012545 processing Methods 0.000 abstract description 4
- 230000008569 process Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 4
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000007621 cluster analysis Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application discloses a network data transmission encryption and decryption method, which is applied to the technical field of electronic digital data processing and comprises the following steps: acquiring an instruction of transmitting data, outputting a corresponding transmission instruction according to a user transmission requirement, and setting the transmission instruction in a network encryption environment to enable the transmission instruction to be fused with the transmission data; constructing a multidimensional discrete encryption environment by utilizing an encryption mapping algebra, adjusting according to the change of the translation circulation total amount, creating new encryption logic, and determining a multidimensional discrete encryption target source; forming a cyclic period execution conversion encryption node network according to the encryption grade of the encryption target source; establishing a wireless communication network, executing a conversion encryption node network, carrying out encryption transmission on the encryption target source, wherein a transmission channel in the wireless communication network corresponds to the conversion encryption node; the data and the secret key are encrypted by utilizing an encryption algorithm, so that the efficiency of network data transmission is improved, and the safety is ensured.
Description
Technical Field
The application relates to the field of electronic digital data processing, in particular to a network data transmission encryption and decryption method.
Background
With the rapid development of information technology and the wide application of computer technology, computer networks have been widely developed and used, such as e-commerce, network-based product design, management, etc. Meanwhile, because the computer network lacks sufficient security, information transmitted on the network is threatened by illegal access, illegal hearing, tampering, damage and the like at any time, the network security problem is increasingly prominent, and the research on network security countermeasures is particularly important.
Network security is a new branch of computer science and is also a new area of information industry. Its creation stems from the privacy requirements of network communications, and its development benefits from the struggling to cope with various attacks that violate network-connected computer networks. With the penetration and popularity of internet applications, it has become critical to continuously take the most effective security measures to protect network traffic from theft, tampering, and counterfeiting, and to protect computer networks from intrusion.
The most important tool to date for network and data transmission security is encryption. When the data is transmitted on the network, the data can be encrypted, and the data can be decrypted after being received; it has the following problems in the prior art:
the security of the encryption algorithm used in the current data transmission is not guaranteed, and when a user uses the encryption algorithm each time, the user needs to use a unique key which is unknown to other people, so that the number of keys owned by both data sending and receiving parties is increased in geometric progression, and the key management becomes the burden of the user;
most of the existing data encryption adopts a group encryption technology, so that a great deal of system overhead is consumed for establishing and maintaining groups of network data, and the network data is not ideal to be applied in actual scenes.
The patent application number CN202210801788.0 discloses a data security encryption method and device fused with a self-coding network, which comprises the following specific contents: encrypting the text type data by adopting a text encryption module, constructing a picture self-coding network model, and precompression processing the original picture type data to be encrypted by adopting a picture compression module; the picture compression coding is encrypted by adopting a picture encryption module, text ciphertext data or picture ciphertext data which is required to be applied to a downstream task is decrypted by adopting a decryption module, the decrypted picture compression coding is reconstructed and restored by adopting a picture reconstruction module, and the decoder obtains reconstructed picture type data after the codeword is reconstructed.
Disclosure of Invention
The application aims to provide a network data transmission encryption and decryption method, which aims to solve the problems.
In order to achieve the above purpose, the present application provides the following technical solutions:
the application provides a network data transmission encryption and decryption method, which comprises the following steps:
s1: acquiring an instruction of transmitting data, outputting a corresponding transmission instruction according to a user transmission requirement, and setting the transmission instruction in a network encryption environment to enable the transmission instruction to be fused with the transmission data;
s2: establishing an encryption matrix, and calculating an encryption mapping algebra:where K is the number of encryption mapping algebra,for the total amount of shift cycles t is the encryption map range, < >>Is a cyclic variation value;
constructing a multidimensional discrete encryption environment by utilizing an encryption mapping algebra, adjusting according to the change of the translation circulation total amount, creating new encryption logic, and determining a multidimensional discrete encryption target source;
s3: forming a cyclic period execution conversion encryption node network according to the encryption grade of the encryption target source;
s4: and establishing a wireless communication network, executing a conversion encryption node network, carrying out encryption transmission on the encryption target source, and enabling a transmission channel in the wireless communication network to correspond to the conversion encryption node.
Further, the step of obtaining the instruction of transmitting data, outputting a corresponding transmission instruction according to a user transmission requirement, and setting the transmission instruction in a network encryption environment to be fused with the transmission data further includes:
s11: according to the transmission requirement, associating the terminal control area with the initial port to obtain the transmission distance;
s12: setting a target source according to the clustering result of the data and combining the encryption range;
s13: dividing the target source into three stages by using a multidimensional discrete method: an initial clustering stage, a medium-term optimizing stage and a final-stage separating stage.
Further, the step of establishing a wireless communication network, executing a transformed encrypted node network, and performing encrypted transmission on the encrypted target source, where a transmission channel in the wireless communication network corresponds to the transformed encrypted node, further includes:
the encrypting transmission of the encrypting target source is specifically as follows: encrypting a key generated by an initial port by adopting a public key algorithm, wherein the public key algorithm generates a pair of key pairs respectively used for encryption and decryption, and the key pairs are obtained based on large prime numbers;
encrypting the key generated by the initial port by the public key of the key pair to obtain a ciphertext, and encrypting and deriving the ciphertext;
after receiving the encrypted ciphertext, the terminal control area decrypts the ciphertext according to the private key to obtain a key generated by the initial port, and then outputs a corresponding encryption target source.
Further, the large prime number is output through computer equipment, and the specific steps are as follows:
generating an n-bit random number p;
setting the high position and the low position as 1;
detecting and determining that p is not divisible by any small prime number;
testing the preset random number a, and if p passes the test, outputting a random numberRe-testing;
5 tests were performed, and if p failed in one of the tests, a p retest was generated.
Further, in the step of forming the loop cycle execution conversion encryption node network according to the encryption level of the encryption target source, the method further includes:
transmitting the frequency difference signal to a terminal control area, and setting a replacement command at a core encryption node in the encryption node network.
Further, the transmission data is sent to the relay node by using a multiple access mode, and the obtained encrypted target source is sent to the relay node, and then the signal vectors sent by the relay nodes and received by the destination node are as follows:
;
wherein P is 1 Representing the transmission power of the source node, P 2 Representing the sum of the transmission powers of a plurality of relay nodes, v d Is the sum of amplified noise forwarded by the relay node and noise received by the destination node, M is the number of the relay nodes and X r For the code word of the destination node,a gaussian distribution obeying CN (0, N0) is represented.
Further, the wireless communication network adopts a client/server architecture based on a TCP/IP protocol to transmit the encrypted target source, wherein the client and the server can communicate with each other.
Further, the communication flow between the client and the server is as follows:
calling a construction function to respectively construct a server socket object and a client socket object;
creating a socket by calling a create function of an object, and binding the socket to a specified address by calling a Bind function by the create function, so as to specify a corresponding port number when creating the socket for a server;
the server calls a member function to intercept the connection request of the client, and the client requests the connection to the server by calling a connect function;
after the server monitors that the client requests connection, a new socket is created, and is transmitted to the Accept member function and receives the connection request of the client, if the function execution fails, a specific error code is returned;
distributing a corresponding CsocketFile object for socket objects of the server and the client;
distributing a CArchive object corresponding to the CsocketFile for socket objects of the server and the client, and transmitting and receiving data;
the CArchive object is used to transfer data between the server and client sockets.
The application also provides a computer device comprising a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the network data transmission encryption and decryption method when executing the computer program.
The present application also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the network data transmission encryption and decryption method described above.
The application provides a network data transmission encryption and decryption method, which has the following beneficial effects:
(1) The application provides a totally new transmission data encryption method, which is different from encryption and decryption of a single structure, and realizes the protection of transmission data through a multi-target multi-level mode; the multi-dimensional discrete encryption target source is determined through the cluster analysis and the processing of the transmission data, so that the creation of an encryption environment is facilitated;
(2) The encryption process of network data transmission is realized more efficiently by utilizing a hybrid encryption system combining two encryption algorithms, and the data and the secret key are encrypted, so that the efficiency of network data transmission is improved, the safety is ensured, and the problem that the speed and the safety in the cryptosystem cannot be simultaneously considered is solved.
Drawings
Fig. 1 is a flow chart of a network data transmission encryption and decryption method according to an embodiment of the application;
fig. 2 is a schematic block diagram of a computer device according to an embodiment of the present application.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, a flow diagram of a network data transmission encryption and decryption method according to the present application is provided;
the network data transmission encryption and decryption method provided by the application comprises the following steps:
s1: acquiring an instruction of transmitting data, outputting a corresponding transmission instruction according to a user transmission requirement, and setting the transmission instruction in a network encryption environment to enable the transmission instruction to be fused with the transmission data;
s11: according to the transmission requirement, associating the terminal control area with the initial port to obtain the transmission distance;
s12: setting a target source according to the clustering result of the data and combining the encryption range;
s13: dividing the target source into three stages by using a multidimensional discrete method: an initial clustering stage, a medium-term optimizing stage and a final-stage separating stage.
In the step, a corresponding instruction for transmitting data is obtained, and simultaneously, a transmission instruction is output in combination with a user transmission requirement; and set in the network encryption environment to fuse with the data to be transmitted, so as to achieve the agreed transmission condition. Therefore, the method not only can realize stronger protection in the transmission process, but also further improves the integral structure of the data encryption technology and optimizes the final encryption transmission effect.
S2: establishing an encryption matrix, and calculating an encryption mapping algebra:where K is the number of encryption mapping algebra,for the total amount of shift cycles t is the encryption map range, < >>Is a cyclic variation value;
and constructing a multidimensional discrete encryption environment by utilizing the encryption mapping algebra, adjusting according to the change of the translation circulation total amount, creating new encryption logic, and determining a multidimensional discrete encryption target source.
In the step, the encryption mapping algebra is utilized to build a multidimensional discrete encryption environment, and simultaneously, the encryption mapping calculation of the encryption target source can be simultaneously satisfied according to the change of the translation mapping circulation quantity and the creation of new encryption logic, and the actual multidimensional discrete encryption target source is finally determined.
S3: forming a cyclic period execution conversion encryption node network according to the encryption grade of the encryption target source; transmitting the frequency difference signal to a terminal control area, and setting a replacement command at a core encryption node in the encryption node network.
In this step, after the determination of the multidimensional discrete encryption target source is completed, a corresponding wireless communication network needs to be established to execute the conversion encryption node network, and in the data transmission process, the network transit transmission channels are provided with encryption nodes, each node is balanced and independent, but a certain relationship still exists between the fixed node and the dynamic change node along with the change of the interface node in the actual application process, so that the data information transmitted in daily life needs to be converted into a consistent special indication or protocol, and the data information is ensured not to be lost or damaged in the transmission process.
S4: establishing a wireless communication network, executing a conversion encryption node network, carrying out encryption transmission on the encryption target source, wherein a transmission channel in the wireless communication network corresponds to the conversion encryption node;
the encrypting transmission of the encrypting target source is specifically as follows: encrypting a key generated by an initial port by adopting a public key algorithm, wherein the public key algorithm generates a pair of key pairs respectively used for encryption and decryption, and the key pairs are obtained based on large prime numbers; encrypting the key generated by the initial port by the public key of the key pair to obtain a ciphertext, and encrypting and deriving the ciphertext; after receiving the encrypted ciphertext, the terminal control area decrypts the ciphertext according to the private key to obtain a key generated by the initial port, and then outputs a corresponding encryption target source.
The large prime number is output through computer equipment, and the specific steps are as follows:
generating an n-bit random number p;
setting the high position and the low position as 1;
detecting and determining that p is not divisible by any small prime number;
testing the preset random number a, and if p passes the test, outputting a random numberRe-testing;
5 tests were performed, and if p failed in one of the tests, a p retest was generated.
The communication flow between the client and the server is as follows:
calling a construction function to respectively construct a server socket object and a client socket object;
creating a socket by calling a create function of an object, and binding the socket to a specified address by calling a Bind function by the create function, so as to specify a corresponding port number when creating the socket for a server;
the server calls a member function to intercept the connection request of the client, and the client requests the connection to the server by calling a connect function;
after the server monitors that the client requests connection, a new socket is created, and is transmitted to the Accept member function and receives the connection request of the client, if the function execution fails, a specific error code is returned;
distributing a corresponding CsocketFile object for socket objects of the server and the client;
distributing a CArchive object corresponding to the CsocketFile for socket objects of the server and the client, and transmitting and receiving data;
the CArchive object is used to transfer data between the server and client sockets.
In this step, the basic principle of encrypting the encrypted target source is: firstly, encrypting a plaintext by using a DES method, and simultaneously encrypting a DES key by using an RSA method; let encryption azimuth A, decryption party B, plaintext file M, ciphertext file C, RSA public key K r And n, the private key is K r / DES Key K d ;
The implementation of the above encryption transmission scheme is: at the sender side, a DES key K is randomly generated by the system d Because of the random generation, each key is used only once, so that the security of the system is ensured. In the mixed encryption, the encrypted data file can also be encrypted by using 3DES, and if the 3DES is selected to be used for encryption, the system automatically generates two DES subkeys;
while encrypting the data file, it is also necessary to encrypt the key of DES. When the DES key is encrypted, a public key algorithm RSA is adopted, so that even if the key in encryption falls into the hands of a hacker, the hacker cannot unlock the encrypted key, and cannot decrypt the plaintext. Using the RSA algorithm, it is first necessary to generate a pair of keys for encryption and decryption, respectively, which are generated based on the principle of large prime number generation, which requires that large prime numbers p and q be generated first, and then the public key K of RSA be generated r Private key K r / Modulo n, a key for encrypting DES; public key K using generated RSA key pair r And modulo n to encrypt a key K of a system randomly generated DES d Generating a ciphertext C, and exporting an encrypted key C;
while using RSA public encryption, the plaintext file M is encrypted with the DES key K, generating the ciphertext file C, which is saved for future transmission. When encryption is carried out, the source file can be selected to be deleted, so that the plaintext is completely ensured not to be stolen in any way; after encrypting the DES key and the plaintext file, the ciphertext file C and the encrypted key are obtainedC, transmitting the data to a receiver through a data transmission system; after receiving the encrypted file and the secret key, the receiver decrypts C by using the private key to obtain the DES secret key K for encrypting the file d After that use K d Decrypting the ciphertext file C to obtain the desired plaintext file M, which completes the overall decryption process for the ciphertext file.
In one embodiment, both the sender and the receiver must generate a pair of keys before communicating using the RSA encryption algorithm. The RSA algorithm is based on the selection of the prime numbers p and q, the public key and the private key are selected according to the large prime numbers p and q, in order to avoid an attacker obtaining the p sum value by using an exhaustion method, the p and q should be selected from a large enough set of prime numbers, the key pair is generated after the prime numbers are generated, and the modulus, the public key and the private key are respectively led out and led in for use in encryption.
In another embodiment, the program code implementing the encrypted transmission scheme is as follows:
{
CHECK( RsaKeyStr&&RsaModStr&&OpenFile(OutFile,InFile))
chardeskey[17);
CWindow wnd;
wnd.ShowWaitCursor0;// display waiting cursor wnd.SetWindow Caption ("RSA is encrypting DES mi.," etc.);
DES. RandKeyStr (deskey);// generation of random key string if (1 s3 DES)
DES. RandKeyStr (& deskey [8 ])// if 3DES encryption is used, a key is regenerated again
FILE_CHECK (mcshead. KeyLen=rsa. Encrypt (mcshead. DesKey, deskey, is3DES
wndEndWaitCursor 0;// end wait cursor
lwrite (fh_out) & mcshhead, sizeof (mcshead));// write header
File_CHECK (DES. Encryptions (fh_out, fh_in, deskey), outFile)// DES encryption is performed
CloseFile0;
return true;
}
Decryption:
{
CHECK( RsaKeyStr&&RsaModStr&&OpenFile(OutFile,InFile))
CWindow wnd;
File_CHECK_MSG (_lread (fh_in, & mcshhead, sizeof (mcshead)) = sizeof (mcshead) OutFile, "error: this FILE is not a valid MCS encryption FILE |")// read header and CHECK length
wnd.ShowWaitCursor0; wnd.SetWindowCaption ("RSA in decrypting DES key.. The.);
intlen=rsa. Decrypt (mcshead.DesKey, mcsheadDesKey, mcshead.KeyLen, rsaKeyStr, rsaModStr);// decrypting DES key string
wnd.EndWaitCursor0;
File_CHECK (len, outFile)// CHECK the correctness of RSA keys
File_CHECKMSG (len < = 16, outFile "error: RSA Key incorrect-
mcshead.DesKey[len]=‘\0’;
FILE_CHECK( des.Decrypt(fhout,fh in,mcshead.DesKey),OutFile )
CloseFile(0);
return true;
}
Referring to fig. 2, in an embodiment of the present application, there is further provided a computer device, which may be a server, and an internal structure thereof may be as shown in fig. 2. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing data such as transmission data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a network data transmission encryption and decryption method.
It will be appreciated by those skilled in the art that the architecture shown in fig. 2 is merely a block diagram of a portion of the architecture in connection with the present inventive arrangements and is not intended to limit the computer devices to which the present inventive arrangements are applicable.
An embodiment of the present application further provides a computer readable storage medium having a computer program stored thereon, where the computer program when executed by a processor implements a network data transmission encryption and decryption method, specifically:
s1: acquiring an instruction of transmitting data, outputting a corresponding transmission instruction according to a user transmission requirement, and setting the transmission instruction in a network encryption environment to enable the transmission instruction to be fused with the transmission data;
s2: establishing an encryption matrix, and calculating an encryption mapping algebra:where K is the number of encryption mapping algebra,for the total amount of shift cycles t is the encryption map range, < >>Is a cyclic variation value;
constructing a multidimensional discrete encryption environment by utilizing an encryption mapping algebra, adjusting according to the change of the translation circulation total amount, creating new encryption logic, and determining a multidimensional discrete encryption target source;
s3: forming a cyclic period execution conversion encryption node network according to the encryption grade of the encryption target source;
s4: and establishing a wireless communication network, executing a conversion encryption node network, carrying out encryption transmission on the encryption target source, and enabling a transmission channel in the wireless communication network to correspond to the conversion encryption node.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided by the present application and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the scope of the application, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application or direct or indirect application in other related technical fields are included in the scope of the present application.
Although embodiments of the present application have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the application, the scope of which is defined in the appended claims and their equivalents.
Claims (10)
1. The network data transmission encryption and decryption method is characterized by comprising the following steps:
s1: acquiring an instruction of transmitting data, outputting a corresponding transmission instruction according to a user transmission requirement, and setting the transmission instruction in a network encryption environment to enable the transmission instruction to be fused with the transmission data;
s2: establishing an encryption matrix, and calculating an encryption mapping algebra:wherein K is encryption mapping algebra,>for the total amount of shift cycles t is the encryption map range, < >>Is a cyclic variation value;
constructing a multidimensional discrete encryption environment by utilizing an encryption mapping algebra, adjusting according to the change of the translation circulation total amount, creating new encryption logic, and determining a multidimensional discrete encryption target source;
s3: forming a cyclic period execution conversion encryption node network according to the encryption grade of the encryption target source;
s4: and establishing a wireless communication network, executing a conversion encryption node network, carrying out encryption transmission on the encryption target source, and enabling a transmission channel in the wireless communication network to correspond to the conversion encryption node.
2. The method for encrypting and decrypting network data according to claim 1, wherein the step of obtaining the command for transmitting data, outputting the corresponding transmission command according to the transmission requirement of the user, and setting the transmission command in the network encryption environment to be fused with the transmission data further comprises:
s11: according to the transmission requirement, associating the terminal control area with the initial port to obtain the transmission distance;
s12: setting a target source according to the clustering result of the data and combining the encryption range;
s13: dividing the target source into three stages by using a multidimensional discrete method: an initial clustering stage, a medium-term optimizing stage and a final-stage separating stage.
3. The method for encrypting and decrypting network data transmission according to claim 1, wherein said step of establishing a wireless communication network, performing a transition encryption node network, and encrypting transmission to said encryption target source, wherein a transmission channel in the wireless communication network corresponds to the transition encryption node, further comprises:
the encrypting transmission of the encrypting target source is specifically as follows: encrypting a key generated by an initial port by adopting a public key algorithm, wherein the public key algorithm generates a pair of key pairs respectively used for encryption and decryption, and the key pairs are obtained based on large prime numbers;
encrypting the key generated by the initial port by the public key of the key pair to obtain a ciphertext, and encrypting and deriving the ciphertext;
after receiving the encrypted ciphertext, the terminal control area decrypts the ciphertext according to the private key to obtain a key generated by the initial port, and then outputs a corresponding encryption target source.
4. A network data transmission encryption and decryption method according to claim 3, wherein the large prime number is output through a computer device, and the specific steps are:
generating an n-bit random number p;
setting the high position and the low position as 1;
detecting and determining that p is not divisible by any small prime number;
testing the preset random number a, and if p passes the test, outputting a random numberRe-testing;
and 5 times of testing are carried out, and if p fails in a preset test, a p is regenerated for further testing.
5. The method for encrypting and decrypting network data transmission according to claim 1, wherein said step of forming a loop cycle execution transition encryption node network according to the encryption level of said encryption target source further comprises:
transmitting the frequency difference signal to a terminal control area, and setting a replacement command at a core encryption node in the encryption node network.
6. The method for encrypting and decrypting network data according to claim 1, wherein the transmission data is transmitted in a multiple access manner in a time slot, the obtained encrypted target source is transmitted to the relay node, and the signal vectors transmitted by the plurality of relay nodes received by the destination node are:
;
wherein P is 1 Representing the transmission power of the source node, P 2 Representing the sum of the transmission powers of a plurality of relay nodes, v d Is the sum of amplified noise forwarded by the relay node and noise received by the destination node, M is the number of the relay nodes and X r For the code word of the destination node,a gaussian distribution obeying CN (0, N0) is represented.
7. The network data transmission encryption and decryption method according to claim 1, wherein the wireless communication network uses a client/server architecture based on TCP/IP protocol to transmit the encrypted target source, and wherein the client and the server can communicate with each other.
8. The network data transmission encryption and decryption method according to claim 7, wherein the communication flow between the client and the server is:
calling a construction function to respectively construct a server socket object and a client socket object;
creating a socket by calling a create function of an object, and binding the socket to a specified address by calling a Bind function by the create function, so as to specify a corresponding port number when creating the socket for a server;
the server calls a member function to intercept the connection request of the client, and the client requests the connection to the server by calling a connect function;
after the server monitors that the client requests connection, a new socket is created, and is transmitted to the Accept member function and receives the connection request of the client, if the function execution fails, a specific error code is returned;
distributing a corresponding CsocketFile object for socket objects of the server and the client;
distributing a CArchive object corresponding to the CsocketFile for socket objects of the server and the client, and transmitting and receiving data;
the CArchive object is used to transfer data between the server and client sockets.
9. A computer device comprising a memory and a processor, the memory having stored therein a computer program, characterized in that the processor, when executing the computer program, implements the steps of the network data transmission encryption and decryption method of any one of claims 1 to 8.
10. A computer readable storage medium having stored thereon a computer program, characterized in that the computer program when executed by a processor implements the steps of the network data transmission encryption and decryption method according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310883259.4A CN116600287A (en) | 2023-07-19 | 2023-07-19 | Network data transmission encryption and decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310883259.4A CN116600287A (en) | 2023-07-19 | 2023-07-19 | Network data transmission encryption and decryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116600287A true CN116600287A (en) | 2023-08-15 |
Family
ID=87594136
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310883259.4A Pending CN116600287A (en) | 2023-07-19 | 2023-07-19 | Network data transmission encryption and decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116600287A (en) |
-
2023
- 2023-07-19 CN CN202310883259.4A patent/CN116600287A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111314089B (en) | SM 2-based two-party collaborative signature method and decryption method | |
CN113691502B (en) | Communication method, device, gateway server, client and storage medium | |
US20030084292A1 (en) | Using atomic messaging to increase the security of transferring data across a network | |
US20190268145A1 (en) | Systems and Methods for Authenticating Communications Using a Single Message Exchange and Symmetric Key | |
KR20050084877A (en) | Secure implementation and utilization of device-specific security data | |
CN111294203B (en) | Information transmission method | |
US8422673B2 (en) | Method and system for protecting against unity keys | |
US7894608B2 (en) | Secure approach to send data from one system to another | |
CN111614621A (en) | Internet of things communication method and system | |
Priyadharshini et al. | Efficient Key Management System Based Lightweight Devices in IoT. | |
KR20180138349A (en) | IoT TERMINAL APPARATUS FOR GENERATING DYNAMIC SESSION KEY AND METHOD FOR USING THE SAME | |
CN116455572A (en) | Data encryption method, device and equipment | |
CN114553557B (en) | Key calling method, device, computer equipment and storage medium | |
CN116600287A (en) | Network data transmission encryption and decryption method | |
KR102304831B1 (en) | Encryption systems and method using permutaion group based cryptographic techniques | |
RU2707398C1 (en) | Method and system for secure storage of information in file storages of data | |
CN111431846B (en) | Data transmission method, device and system | |
CN112954388A (en) | Data file acquisition method and device, terminal equipment and storage medium | |
El-Hadidi et al. | Implementation of a hybrid encryption scheme for Ethernet | |
CN115242392B (en) | Method and system for realizing industrial information safety transmission based on safety transmission protocol | |
CN116318621B (en) | Industrial Internet of things data privacy protection system based on homomorphic encryption | |
CN116866029B (en) | Random number encryption data transmission method, device, computer equipment and storage medium | |
CN117955735B (en) | Data security access control method, system and storage medium | |
Moritz et al. | Secure delegation of group exponentiations: Efficient and fully verifiable schemes with two servers | |
CN116599771B (en) | Data hierarchical protection transmission method and device, storage medium and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20230815 |