CN116633543B - 1553B communication protocol data encryption method - Google Patents

1553B communication protocol data encryption method Download PDF

Info

Publication number
CN116633543B
CN116633543B CN202310896293.5A CN202310896293A CN116633543B CN 116633543 B CN116633543 B CN 116633543B CN 202310896293 A CN202310896293 A CN 202310896293A CN 116633543 B CN116633543 B CN 116633543B
Authority
CN
China
Prior art keywords
data
encryption
data block
algorithm
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310896293.5A
Other languages
Chinese (zh)
Other versions
CN116633543A (en
Inventor
牛泽田
赵金鹏
宁鑫
郭岩
李博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenyang Hangsheng Technology Co ltd
Original Assignee
Shenyang Hangsheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenyang Hangsheng Technology Co ltd filed Critical Shenyang Hangsheng Technology Co ltd
Priority to CN202310896293.5A priority Critical patent/CN116633543B/en
Publication of CN116633543A publication Critical patent/CN116633543A/en
Application granted granted Critical
Publication of CN116633543B publication Critical patent/CN116633543B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

A1553B communication protocol data encryption method belongs to the technical field of communication protocol data encryption, and comprises the following steps: step S01: defining an interface data file format for specifying data writing and reading; step S02: each data block contains data content having bytes, defining the meaning of the individual data bits of each byte; step S03: data is input according to the interface data file prescribed format; step S04: splitting the input data block into data blocks to be encrypted with equal size, and the like. The 1553B data transmission communication network of the encryption algorithm adopts a plurality of encryption algorithms to randomly combine and encrypt, and has strong safety and reliability.

Description

1553B communication protocol data encryption method
Technical Field
The invention belongs to the technical field of communication protocol data encryption, and particularly relates to a 1553B communication protocol data encryption method.
Background
The 1553B bus is called MIL-STD-1553B digital time-division command/response type multiplexing data bus, and is a digital time-division serial data bus. Currently, standard 1553B communication protocols are widely adopted in an avionics system for data transmission. The 1553B communication protocol is efficient and stable in data transmission, but because all devices adopt the 1553B communication protocol with the same standard, potential safety hazards exist, and the safety and reliability of a communication network are affected.
At present, the common 1553B data encryption method comprises the following steps:
1) Obtaining data to be encrypted, and determining the dividing number according to the memory occupation size of the data to be encrypted;
2) Average segmentation is carried out on the data to be encrypted according to the segmentation quantity, and unordered data blocks are obtained;
3) Adding sequential codes to the head of the unordered data block to obtain a data block to be encrypted;
4) Recording time information formed by each data block to be encrypted to obtain encrypted time data;
5) According to the encryption time data, a corresponding data extraction scheme is called from a preset database, and data extraction is carried out on the data blocks to be encrypted according to the data extraction scheme;
6) Analyzing the encryption time data, and extracting seconds and milliseconds to obtain two groups of random numbers;
7) According to the two groups of random numbers, a corresponding data extraction method is called from a database;
8) Analyzing a data extraction scheme, and carrying out data extraction on the data block to be encrypted according to the extracted position and the data size to obtain random encrypted data;
9) Splitting the data blocks to be encrypted according to a preset insertion sequence to obtain a plurality of split data blocks;
10 Adding random encryption data into the head of each split data block, and splicing all split data blocks according to the splitting sequence;
11 Encryption time data is encrypted before transmission.
The disadvantage is that when the encryption time is matched with the encrypted data, errors exist, and the data is lost; the encryption process is complicated and the transmission efficiency is low.
Disclosure of Invention
In view of the above-mentioned drawbacks and shortcomings of the prior art, the present invention provides a 1553B communication protocol data encryption method, which improves the safety of 1553B data transmission.
In order to achieve the above purpose, the main technical scheme adopted by the invention comprises the following steps:
A1553B communication protocol data encryption method comprises the following steps:
step S01: defining an interface data file format for prescribing data writing and reading, wherein the interface data file classifies data according to different devices on a bus, and divides data blocks;
step S02: each data block contains data content having bytes, defining the meaning of the individual data bits of each byte;
step S03: data is input according to the interface data file prescribed format;
step S04: splitting an input data block into data blocks to be encrypted with equal size;
step S05: adding a data head in front of each data block to be encrypted, and recording the sequence of the data blocks to be encrypted;
step S06: recording the current system time, and extracting the number of seconds, the number of milliseconds and the number of microseconds;
step S07: establishing a corresponding relation between microsecond numbers and seconds and an encryption algorithm to form an encryption algorithm linked list;
step S08: establishing a corresponding relation between the millisecond number and the sorting algorithm to form a sorting algorithm linked list;
step S09: inquiring a corresponding encryption algorithm in an encryption algorithm linked list by utilizing microsecond numbers, and respectively encrypting data of each data block to be encrypted;
step S10: querying a corresponding sorting algorithm in a sorting algorithm linked list by utilizing the millisecond number, and reordering each encrypted data block;
step S11: inquiring a corresponding encryption algorithm in the encryption algorithm linked list by using the seconds, and performing secondary encryption on the ordered data blocks;
step S12: the second, millisecond and microsecond are combined, the corresponding encryption algorithm is inquired in the encryption database catalog for encryption through the microsecond, the encryption algorithm is used as the first block of data to be sent independently, and the decoding basis of the receiving end is used.
Further, in the step S01, the interface data file classifies the data according to different devices on the bus, that is, the data of different devices uses different RT numbers; under the same device, the data blocks are divided again according to the message content, i.e. different SA numbers are used for different data blocks.
Further, in the step S02, each data block includes a data content of at most 28 bytes, and the definition content includes a byte number, a start word bit, an end word bit, an existence symbol bit, a numerical value type, and an interpretation type in which the data block is located.
Further, in the step S04, the splitting process is as follows: when the byte number of the data block is greater than 18 bytes, the data block is padded to 28 bytes, the padded parts are all 0, and the data block is uniformly divided into 4 data blocks to be encrypted; when the byte number of the data block is equal to 18 bytes, uniformly dividing the data block into 3 data blocks to be encrypted; when the byte number of the data block is more than 10 bytes and less than 18 bytes, the data block is padded to 18 bytes, the padded parts are all 0, and the data block is uniformly divided into 3 data blocks to be encrypted; when the byte number of the data block is equal to 10 bytes, uniformly dividing the data block into 2 data blocks to be encrypted; when the byte number of the data block is smaller than 10 bytes, the data block is padded to 10 bytes, the padded parts are all 0, and the data block is uniformly divided into 2 data blocks to be encrypted.
Further, in the step S09, the encryption algorithm linked list includes an RSA algorithm, an ElGamal algorithm, a DES algorithm, and an IDEA algorithm.
Further, in the step S10, the sorting algorithm linked list includes direct insert sorting, hil sorting, bubbling sorting, fast sorting, direct selection sorting, heap sorting, merging sorting, and radix sorting.
Further, in the step S11, the linked list of the encryption algorithm is the same as the linked list of the encryption algorithm in the step S07, that is, each data block to be encrypted is subjected to algorithm combination encryption twice.
Further, the encryption algorithm linked list, the ordering algorithm linked list, the encryption algorithms and the ordering algorithms are placed in terminal devices of the 1553B bus network.
The beneficial effects of the invention are as follows:
1. the 1553B data transmission communication network of the encryption algorithm of the 1553B communication protocol adopts a plurality of encryption algorithms to randomly combine and encrypt, and has strong safety and reliability;
2. the encryption algorithm of the 1553B communication protocol is integrated before and after data packet encryption, so that the probability of data loss caused in the encryption and decryption processes is low;
3. the encryption algorithm linked list, the ordering algorithm linked list, the encryption algorithms and the ordering algorithms of the 1553B communication protocol are placed in each terminal device of the 1553B bus network in advance, so that the encryption and decryption efficiency is high;
4. the 1553B communication protocol has low probability of brute force cracking through an exhaustion method under the condition of no encryption database and no ordering database, and has high data transmission safety.
Detailed Description
The invention will be described in detail by way of specific embodiments for better explaining the invention.
The invention provides a 1553B communication protocol data encryption method, which comprises the following steps:
step S01: defining an interface data file format for prescribing data writing and reading, wherein the interface data file classifies data according to different devices on a bus, and divides data blocks;
in step S01, the interface data file classifies the data according to different devices on the bus, i.e. the data of different devices uses different RT numbers; under the same device, the data blocks are divided again according to the message content, i.e. different SA numbers are used for different data blocks.
Step S02: each data block contains data content having bytes, defining the meaning of the individual data bits of each byte;
in step S02, each data block contains data content of at most 28 bytes, and the definition content contains a byte number, a start word bit, an end word bit, a sign bit, a numeric value, and an explanatory type in which the data block is located.
Step S03: data is input according to the interface data file prescribed format;
step S04: splitting an input data block into data blocks to be encrypted with equal size;
in step S04, the data splitting process needs to comprehensively consider two attributes of encryption degree and encryption transmission efficiency, if the number of split encrypted data blocks is reduced, the encryption transmission efficiency can be improved, but the encryption degree can be reduced; if the number of split encrypted data blocks increases, the encryption degree can be improved, but the encryption transmission efficiency can be reduced. Considering the encryption degree and the encryption transmission efficiency comprehensively, the splitting process is carried out according to the following modes: when the byte number of the data block is greater than 18 bytes, the data block is padded to 28 bytes, the padded parts are all 0, and the data block is uniformly divided into 4 data blocks to be encrypted; when the byte number of the data block is equal to 18 bytes, uniformly dividing the data block into 3 data blocks to be encrypted; when the byte number of the data block is more than 10 bytes and less than 18 bytes, the data block is padded to 18 bytes, the padded parts are all 0, and the data block is uniformly divided into 3 data blocks to be encrypted; when the byte number of the data block is equal to 10 bytes, uniformly dividing the data block into 2 data blocks to be encrypted; when the byte number of the data block is smaller than 10 bytes, the data block is padded to 10 bytes, the padded parts are all 0, and the data block is uniformly divided into 2 data blocks to be encrypted. On the basis of ensuring the encryption degree, the encryption transmission rate is accelerated as much as possible.
Step S05: adding a data head in front of each data block to be encrypted, and recording the sequence of the data blocks to be encrypted;
step S06: recording the current system time, and extracting the number of seconds, the number of milliseconds and the number of microseconds;
step S07: establishing a corresponding relation between microsecond numbers and seconds and an encryption algorithm to form an encryption algorithm linked list;
step S08: establishing a corresponding relation between the millisecond number and the sorting algorithm to form a sorting algorithm linked list;
the encryption algorithm linked list, the ordering algorithm linked list, the encryption algorithms and the ordering algorithms are arranged in each device of the bus in advance, so that the devices can inquire, encrypt and order conveniently.
Step S09: inquiring a corresponding encryption algorithm in an encryption algorithm linked list by utilizing microsecond numbers, and respectively encrypting data of each data block to be encrypted;
in step S09, the encryption algorithm linked list includes an RSA algorithm, an ElGamal algorithm, a DES algorithm, an IDEA algorithm, and the like. The microsecond change rate is extremely high, so that the encryption method belongs to random numbers, and the randomness of the encryption process is increased; the encryption algorithm linked list containing a plurality of encryption algorithms enables each data block to be encrypted to adopt different encryption modes, effectively increases encryption degree and greatly reduces decoding risks.
Step S10: querying a corresponding sorting algorithm in a sorting algorithm linked list by utilizing the millisecond number, and reordering each encrypted data block;
in step S10, the sorting algorithm linked list includes direct insert sorting, hil sorting, bubble sorting, quick sorting, direct select sorting, heap sorting, merge sorting, radix sorting, and the like. As the millisecond number has high change rate, belongs to random numbers, and contains various sorting algorithms, the randomness of the sorting encryption process is increased, and the encryption degree is effectively increased.
Step S11: inquiring a corresponding encryption algorithm in the encryption algorithm linked list by using the seconds, and performing secondary encryption on the ordered data blocks;
in step S11, since the number of seconds belongs to a random number, the randomness of the encryption process is increased. The encryption algorithm linked list is the same as the encryption algorithm linked list in the step S07, namely, each data block to be encrypted is subjected to combined encryption of two algorithms, so that the data security is greatly improved.
Step S12: the second, millisecond and microsecond are combined, the corresponding encryption algorithm is inquired in the encryption database catalog for encryption through the microsecond, the encryption algorithm is used as the first block of data to be sent independently, and the decoding basis of the receiving end is used.
While embodiments of the present invention have been shown and described above, it should be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that alterations, modifications, substitutions and variations may be made by those of ordinary skill in the art without departing from the scope of the invention.

Claims (8)

1. The 1553B communication protocol data encryption method is characterized by comprising the following steps of:
step S01: defining an interface data file format for prescribing data writing and reading, wherein the interface data file classifies data according to different devices on a bus, and divides data blocks;
step S02: each data block contains data content having bytes, defining the meaning of the individual data bits of each byte;
step S03: data is input according to the interface data file prescribed format;
step S04: splitting an input data block into data blocks to be encrypted with equal size;
step S05: adding a data head in front of each data block to be encrypted, and recording the sequence of the data blocks to be encrypted;
step S06: recording the current system time, and extracting the number of seconds, the number of milliseconds and the number of microseconds;
step S07: establishing a corresponding relation between microsecond numbers and seconds and an encryption algorithm to form an encryption algorithm linked list;
step S08: establishing a corresponding relation between the millisecond number and the sorting algorithm to form a sorting algorithm linked list;
step S09: inquiring a corresponding encryption algorithm in an encryption algorithm linked list by utilizing microsecond numbers, and respectively encrypting data of each data block to be encrypted;
step S10: querying a corresponding sorting algorithm in a sorting algorithm linked list by utilizing the millisecond number, and reordering each encrypted data block;
step S11: inquiring a corresponding encryption algorithm in the encryption algorithm linked list by using the seconds, and performing secondary encryption on the ordered data blocks;
step S12: the second, millisecond and microsecond are combined, the corresponding encryption algorithm is inquired in the encryption database catalog for encryption through the microsecond, the encryption algorithm is used as the first block of data to be sent independently, and the decoding basis of the receiving end is used.
2. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S01, the interface data file classifies the data according to different devices on the bus, that is, the data of different devices uses different RT numbers; under the same device, the data blocks are divided again according to the message content, i.e. different SA numbers are used for different data blocks.
3. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S02, each data block includes a data content of at most 28 bytes, and the definition content includes a byte number, a start word bit, an end word bit, a sign bit, a numerical value type, and an interpretation type in which the data block is located.
4. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S04, the splitting process is as follows: when the byte number of the data block is greater than 18 bytes, the data block is padded to 28 bytes, the padded parts are all 0, and the data block is uniformly divided into 4 data blocks to be encrypted; when the byte number of the data block is equal to 18 bytes, uniformly dividing the data block into 3 data blocks to be encrypted; when the byte number of the data block is more than 10 bytes and less than 18 bytes, the data block is padded to 18 bytes, the padded parts are all 0, and the data block is uniformly divided into 3 data blocks to be encrypted; when the byte number of the data block is equal to 10 bytes, uniformly dividing the data block into 2 data blocks to be encrypted; when the byte number of the data block is smaller than 10 bytes, the data block is padded to 10 bytes, the padded parts are all 0, and the data block is uniformly divided into 2 data blocks to be encrypted.
5. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S09, the encryption algorithm linked list includes an RSA algorithm, an ElGamal algorithm, a DES algorithm, and an IDEA algorithm.
6. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S10, the sorting algorithm linked list includes direct insert sorting, hil sorting, bubble sorting, fast sorting, direct select sorting, heap sorting, merge sorting, and radix sorting.
7. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S11, the encryption algorithm linked list is the same as the encryption algorithm linked list in the step S07, that is, each data block to be encrypted is subjected to algorithm combination encryption twice.
8. The 1553B communication protocol data encryption method of claim 1, wherein: the encryption algorithm linked list, the ordering algorithm linked list, the encryption algorithms and the ordering algorithms are placed in terminal devices of the 1553B bus network.
CN202310896293.5A 2023-07-21 2023-07-21 1553B communication protocol data encryption method Active CN116633543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310896293.5A CN116633543B (en) 2023-07-21 2023-07-21 1553B communication protocol data encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310896293.5A CN116633543B (en) 2023-07-21 2023-07-21 1553B communication protocol data encryption method

Publications (2)

Publication Number Publication Date
CN116633543A CN116633543A (en) 2023-08-22
CN116633543B true CN116633543B (en) 2023-09-15

Family

ID=87597605

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310896293.5A Active CN116633543B (en) 2023-07-21 2023-07-21 1553B communication protocol data encryption method

Country Status (1)

Country Link
CN (1) CN116633543B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410616A (en) * 2014-11-20 2015-03-11 广州日滨科技发展有限公司 Method and system for encrypting, decrypting and transmitting data
CN109636334A (en) * 2018-12-07 2019-04-16 深圳市汇鑫科技股份有限公司 A kind of property intelligence community service system and method
CN112134696A (en) * 2020-08-21 2020-12-25 杭州海兴电力科技股份有限公司 Electric energy meter dynamic password generation and communication method and communication system thereof
CN112398779A (en) * 2019-08-12 2021-02-23 中国科学院国家空间科学中心 Network traffic data analysis method and system
CN114595475A (en) * 2022-03-14 2022-06-07 北京科乃思技术有限公司 1553B bus module and data encryption method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019204213A1 (en) * 2018-04-15 2019-10-24 Cooner Jason Encryption for blockchain cryptocurrency transactions and uses in conjunction with carbon credits

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410616A (en) * 2014-11-20 2015-03-11 广州日滨科技发展有限公司 Method and system for encrypting, decrypting and transmitting data
CN109636334A (en) * 2018-12-07 2019-04-16 深圳市汇鑫科技股份有限公司 A kind of property intelligence community service system and method
CN112398779A (en) * 2019-08-12 2021-02-23 中国科学院国家空间科学中心 Network traffic data analysis method and system
CN112134696A (en) * 2020-08-21 2020-12-25 杭州海兴电力科技股份有限公司 Electric energy meter dynamic password generation and communication method and communication system thereof
CN114595475A (en) * 2022-03-14 2022-06-07 北京科乃思技术有限公司 1553B bus module and data encryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
面向星载应用的地面测试***设计;黄欣欣;盛利元;冯旭哲;;宇航计测技术(05);40-41 *

Also Published As

Publication number Publication date
CN116633543A (en) 2023-08-22

Similar Documents

Publication Publication Date Title
US8577022B2 (en) Data processing apparatus
CN110505161B (en) Message processing method and device
CN111061804A (en) Asynchronous data processing method, device, equipment and storage medium based on big data
CN103366132A (en) Device and method for encrypting data
CN109409079B (en) Weak password checking method and device
WO2019165175A1 (en) System and method for securely transferring data
CN112235104B (en) Data encryption transmission method, system, terminal and storage medium
CN113014580A (en) File transmission method and device, electronic equipment and storage medium
CN116633543B (en) 1553B communication protocol data encryption method
CN114338217B (en) Data encryption transmission method
CN114861204A (en) Big data information safe storage encryption system
CN114221792A (en) Internet data transmission encryption system
CN113541945A (en) Electronic information encryption transmission system
CN112235101B (en) Coding method and device based on hybrid coding mechanism, decoding method and device
CN114756887A (en) Method and device for encrypting and storing sensitive information block in file
CN114422230B (en) Information transmission system based on data encryption
CN117439744A (en) Service data transmission method and device based on service security level
CN111414341B (en) Data normalization description method in Internet of things environment
CN113572755A (en) Intelligent media terminal data secure transmission method
CN114095746B (en) Live order data processing and storing system based on block chain
CN114465826B (en) Data encryption method, system and storage medium of coding technology
CN110519055B (en) Method and device for image comparison encryption and decryption algorithm
CN105843759B (en) A kind of multi-serial communication method based on HDLC
CN113742759B (en) Data encryption method and device for financial accounting system
CN113783887B (en) Remote control method, system and storage medium based on network communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant