CN110266488B - Key generation method based on position combination and data encryption transmission method and system - Google Patents

Key generation method based on position combination and data encryption transmission method and system Download PDF

Info

Publication number
CN110266488B
CN110266488B CN201910635307.1A CN201910635307A CN110266488B CN 110266488 B CN110266488 B CN 110266488B CN 201910635307 A CN201910635307 A CN 201910635307A CN 110266488 B CN110266488 B CN 110266488B
Authority
CN
China
Prior art keywords
key
length
long
short
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910635307.1A
Other languages
Chinese (zh)
Other versions
CN110266488A (en
Inventor
徐江涛
贾骏
胡成博
张照辉
徐阳
刘子全
路永玲
张国江
张军
陶风波
杨景刚
刘洋
王真
吴斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Inrich Technology Co ltd
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
Nanjing Inrich Technology Co ltd
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Inrich Technology Co ltd, State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd filed Critical Nanjing Inrich Technology Co ltd
Priority to CN201910635307.1A priority Critical patent/CN110266488B/en
Publication of CN110266488A publication Critical patent/CN110266488A/en
Application granted granted Critical
Publication of CN110266488B publication Critical patent/CN110266488B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Abstract

The invention discloses a key generation method based on position combination and a method and a system for encrypting and transmitting data, wherein the key generation method comprises the following steps: 1. determining a long key used by communication, wherein the length of the long key is N; determining the length K of a short secret key and the length m of a position code, wherein N is larger than K and larger than m; 2. determining a position codebook, wherein the position codebook comprises a plurality of different position sequences and numbers corresponding to the position sequences, and each position sequence is formed by selecting K positions from N positions and arranging; 3. randomly generating a short key with the length of K, wherein m bits in front of the short key are position codes, inquiring a position sequence q with the number corresponding to the m-bit position codes in a position codebook, and calculating K code elements in the random short key and code elements on K positions corresponding to the position sequence q in the long key to obtain an encryption key with the length of N. The method can reduce the communication overhead required by the length of the data frame sending key under the requirement of ensuring the encryption security.

Description

Key generation method based on position combination and data encryption transmission method and system
Technical Field
The invention belongs to the technical field of cryptography, and particularly relates to a method and a system for generating a secret key, and a method and a system for encrypting and transmitting data by applying the secret key.
Background
Cryptography is an ancient and young question, and with the development of an information-based society, the role and the status of information in the development of the society become more and more important, so that the life of each person is inseparable with the information generation, storage, processing and transmission, and the fields of commerce, finance and the like pay more attention to the information security problem. Meanwhile, the safety problem of the information system becomes a strategic problem influencing the social stability and the national security.
The encryption security is proportional to the length of the key, the longer the key is, the better the encryption effect is, but the too long key occupies most of the resources of the sending data frame, and especially when the sending data frame is very short, the key becomes a huge overhead. Therefore, the invention provides a position combination mode of the short key and the long key, reduces the length of the data frame sending key, ensures the encryption safety and reduces the complexity of key generation.
Disclosure of Invention
The purpose of the invention is as follows: the invention provides a key generation method, aiming at reducing the communication overhead required by the key length of data frame transmission under the requirement of ensuring encryption security.
The technical scheme is as follows: the invention discloses a key generation method based on position combination on one hand, which comprises the following steps:
(1) determining a long key used for communication, wherein the long key is a binary code element sequence with the length of N; determining the length K of a short secret key and the length m of a position code, wherein N is larger than K and larger than m; the short secret key is a binary code element sequence with the length of K;
(2) determining a position codebook, wherein the position codebook comprises a plurality of different position sequences and numbers corresponding to the position sequences, and each position sequence is formed by arranging K positions randomly selected from N positions;
the position codebook and the long password determined in the step 1 form an original codebook;
(3) randomly generating a binary code element sequence with the length of K as a short key, wherein m front bits of the short key are position codes; and inquiring a position sequence q with the number corresponding to the m-bit position code in the position codebook, and calculating K code elements in the random short secret key and the code elements on K positions corresponding to the position sequence q in the long secret key to obtain the encryption key with the length of N.
In the step 1, determining that the length of the long key and the long key is N, the length of the short key K and the length of the position code m adopt a fixed storage mode or a communication negotiation mode;
and 2, determining the position codebook in the step 2 by adopting a fixed storage or communication negotiation mode.
And 3, performing exclusive-or operation on the K code elements in the random short key and the code elements at the K positions corresponding to the position sequence q in the long key to obtain the encryption key.
Further comprising: updating at regular or irregular time: one or more of a long key, a short key length K and a position code length m used for communication, wherein the long key length is N.
The number of the long keys used for communication can be multiple, and the number of the long keys is numbered; a long key is randomly chosen to generate the encryption key.
On the other hand, the invention discloses a method for encrypting transmission data, which comprises the following steps:
the sender generates an encryption key according to the key generation method;
the sender encrypts the transmission data by using the encryption key and sends the encrypted data and the random short key to the receiver;
the receiving party resolves the short secret key from the received data, resolves the position code, calculates the number of the position sequence in the used position codebook, inquires the position sequence, recovers the encryption secret key by the operation with the used long secret key, and decrypts the transmission data by the recovered secret key.
In another aspect, the invention also discloses a key generation system based on position combination, which comprises a key storage module, a random short key generation module and an encryption key generation module which are connected in pairs;
the key storage module is used for determining and storing a long key, a short key length K, a position code length m and a position codebook;
the random short key generation module is used for generating a random short key with the length of K;
the encryption key generation module generates an encryption key according to the short key, the long key and the position codebook by adopting the key generation method.
The key generation system further comprises a timer, and the key storage module updates one or more of the long key, the short key length K and the position code length m according to the time set by the timer.
In another aspect, the invention also discloses a system for encrypting transmission data, which comprises a key generation module, an encryption module, an information sending module, an information receiving module, a key analysis module and a decryption module;
the key generation module generates an encryption key according to the key generation method;
the encryption module is used for encrypting transmission data;
the information sending module is used for sending encrypted data, a random short key and a long key number;
the information receiving module is used for receiving data; the key analysis module is used for inquiring the used long key from the received data according to the long key number, analyzing the short key to obtain a position code, inquiring the used position sequence and recovering the encryption key; the decryption module decrypts the transmitted data using the recovered key.
Has the advantages that: the security of the existing key is proportional to the length of the key, but an excessively long key occupies excessive data frame resources. The invention reduces the length of the key sent in the data frame while ensuring the length of the key, and reduces the complexity of encryption and decryption; the invention only sends the short key in the data frame, thus reducing the length of the data frame and the redundancy of the data frame, and simultaneously, the position combination of the two keys is utilized to not reduce the length of the key.
Drawings
FIG. 1 is a flowchart illustrating a method for generating a location-based key according to an embodiment of the present disclosure;
FIG. 2 is a block diagram of a location-based combinatorial key generation system according to an embodiment of the disclosure;
FIG. 3 is a flow chart of a method for encrypting transmission data according to the second embodiment;
fig. 4 is a block diagram of a system for encrypting transmission data according to the second embodiment;
fig. 5 is a flowchart of a location combination-based key generation method disclosed in the third embodiment.
Detailed Description
The invention is further elucidated with reference to the drawings and the detailed description.
The first embodiment is as follows:
the embodiment discloses a key generation method based on position combination, and the flow chart is shown in fig. 1, and the method comprises the following steps:
step 1: determining a long key used for communication, wherein the long key is a binary code element sequence with the length of N; determining the length K of a short secret key and the length m of a position code, wherein N is larger than K and larger than m; the short secret key is a binary code element sequence with the length of K;
step 2: determining a position codebook, wherein the position codebook comprises a plurality of different position sequences and numbers corresponding to the position sequences, and each position sequence is formed by arranging K positions randomly selected from N positions;
selecting K from N number of the arrays as
Figure BDA0002130117080000031
The numbering of the position sequences in the position codebook is
Figure BDA0002130117080000032
Each element in the sequence of positions represents a symbol position in the long key.
In this embodiment, the length N of the long key is 4, the length K of the short key is 3, and the length m of the position code is 2, for example, the determined long key is 1010. Selecting 3 of 4 arrays
Figure BDA0002130117080000033
The present embodiment uses decimal numbers to represent the number of the position sequence, and the position codebook is shown in the following table:
numbering Sequence of positions
0 1,2,3
1 1,3,4
2 2,3,4
…… …….
23 3,2,4
The location codebook and the long code 1010 determined in step 1 constitute the original codebook.
The following two ways of determining the long key, the length of the long key being N, the length of the short key K, the length of the position code m, and the position codebook are available:
firstly, a fixed storage mode is adopted: storing the content to be determined in a device executing a key generation method;
second, a communication negotiation mode is adopted: the content needing to be determined is stored in the third-party equipment, and when the content needs to be obtained, the content needing to be determined is sent to the third-party equipment by sending an information obtaining request message and a third-party equipment reply information obtaining response message, and the content needing to be determined is sent to the equipment executing the key generation method.
And step 3: randomly generating a binary code element sequence with the length of K as a short key, wherein m front bits of the short key are position codes; and inquiring a position sequence q with the number corresponding to the m-bit position code in the position codebook, and calculating K code elements in the random short secret key and the code elements on K positions corresponding to the position sequence q in the long secret key to obtain the encryption key with the length of N. And calculating the unique corresponding position sequence number according to the position code of m bits. The calculation methods are various and include direct value taking, magnification according to multiple times, residue taking, rounding after reduction according to multiple times and the like, and can be selected according to specific conditions.
Acquiring a corresponding position sequence q from the position codebook according to the calculated position sequence number,
in this embodiment, the randomly generated short secret key is 011, the first two digits 01 thereof are position codes, and in this embodiment, the short secret key is converted into decimal numbers to obtain position sequence numbers, that is, the number of the inquired position sequence q is 1, and the position sequence q is 1,3, 4. And respectively operating the 3 code elements of the random short key 011 and the 3 code elements of the long key with the positions 1,3 and 4 to obtain the encryption key with the length N. In the present invention, an exclusive-or operation is used to generate an encryption key, and the resulting encryption key is 1001.
In this way, by generating a short key of length K for each encryption, an encryption key of length N can be obtained, N > K.
FIG. 2 is a diagram of a key generation system based on position combination, which includes a key storage module, a random short key generation module, and an encryption key generation module connected in pairs; the key storage module is used for determining and storing a long key, a short key length K, a position code length m and a position codebook; the random short key generation module is used for generating a random short key with the length of K; the encryption key generation module is used for generating an encryption key according to the short key, the long key and the position codebook.
Example two:
the embodiment discloses a method for encrypting transmission data, as shown in fig. 3, including:
step 201, a sender generates an encryption key according to a key generation method in the first embodiment;
step 202, the sender encrypts the transmission data by using the encryption key and sends the encrypted data and the random short key to the receiver;
step 203, the receiving party resolves the short secret key from the received data, resolves the position code, calculates the number of the position sequence in the position codebook used for generating the encryption key, queries the position sequence, recovers the encryption key, and decrypts the transmission data by using the recovered secret key.
In this embodiment, the data sent by the sender includes a short key with a length of K and encrypted data, and the actual encryption uses a key with a length of N, so that the length of the encryption key is ensured and the length of the key sent in the data frame is reduced.
The data encryption transmission method in this embodiment is implemented by using the data encryption transmission system in fig. 4, and the system includes: the system comprises a key generation module, an encryption module and an information sending module which are positioned at a sender, and an information receiving module, a key analysis module and a decryption module which are positioned at a receiver; the key generation module of the sender generates an encryption key according to the key generation method in the first embodiment; the encryption module is used for encrypting the transmission data; the information sending module is used for sending the encrypted data and the random short secret key;
the information receiving module of the receiver is used for receiving data, the key analyzing module is used for resolving a short key from the received data, analyzing a position code, calculating the number of a position sequence in a position codebook used for generating an encryption key, inquiring the position sequence and recovering the encryption key; the decryption module decrypts the transmitted data using the recovered key.
In both the key generation module and the key analysis module, it is necessary to determine the long key and the long key length as N, the short key length K and the location code length m, and the location codebook, which are the same as those in the first embodiment, and the following two ways are also adopted in the determination of the above contents in this embodiment:
first, the fixed storage mode: the content needing to be determined is pre-stored in a key generation module and a key analysis module;
second, the communication negotiation mode: the content needing to be determined is stored in the third-party equipment, and when the key generation module and/or the key analysis module needs to acquire the content, the information acquisition request message is sent to the third-party equipment, the information acquisition response message is replied by the third-party equipment, and the content needing to be determined is sent to the key generation module and/or the key analysis module.
Example three:
the present embodiment is an extension of the first embodiment, and the key generation method based on location combination, as shown in fig. 5, includes the following steps:
step 301: determining a plurality of different long keys and numbers thereof, wherein the long keys are binary code element sequences with the length of N; determining the length K of a short secret key and the length m of a position code, wherein N is larger than K and larger than m; the short secret key is a binary code element sequence with the length of K;
step 302: determining a position codebook, wherein the position codebook comprises a plurality of different position sequences and numbers corresponding to the position sequences, and each position sequence is formed by arranging K positions randomly selected from N positions; (ii) a
Step 303: randomly generating a binary code element sequence with the length of K as a short key, randomly selecting one from a plurality of long keys, wherein m bits in front of the short key are position codes, inquiring a position sequence q with the number corresponding to the m-bit position codes in a position codebook, and carrying out operation on K code elements in the random short key and code elements on K positions corresponding to the position sequence q in the selected long key to obtain an encryption key with the length of N.
Compared with the first embodiment, the original codebook with multiple long keys can be obtained by adopting a plurality of long keys; i.e. further enlarging the length of the key.
Example four:
the embodiment discloses a method for encrypting transmission data, which comprises the following steps:
step 401, the sender generates an encryption key according to the key generation method in the third embodiment;
step 402, after encrypting the transmission data by the sender using the encryption key, sending the encrypted data, the random short key and the selected long key number to the receiver;
step 403, the receiver resolves the random short key and the long key number from the received data, resolves the short key to obtain the location code, determines the selected long key, queries the number of the location sequence in the location codebook used for generating the encryption key, queries the location sequence used, recovers the encryption key, and decrypts the transmission data by using the recovered key.
Symmetric encryption is adopted in the invention, namely an encryption key is the same as a decryption key, and DES, RC4 or BlowFish algorithm can be adopted.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing descriptions of specific exemplary embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain certain principles of the invention and its practical application to enable one skilled in the art to make and use various exemplary embodiments of the invention and various alternatives and modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.

Claims (11)

1. A method for generating a key based on a position combination is characterized by comprising the following steps:
(1) determining a long key used for communication, wherein the long key is a binary code element sequence with the length of N; determining the length K of the short secret key and the length m of the position code, wherein N is more than K and more than m; the short secret key is a binary code element sequence with the length of K;
(2) determining a position codebook, wherein the position codebook comprises a plurality of different position sequences and numbers corresponding to the position sequences, and each position sequence is formed by arranging K positions randomly selected from N positions;
(3) randomly generating a binary code element sequence with the length of K as a short key, wherein m front bits of the short key are position codes; and inquiring a position sequence q with the number corresponding to the m-bit position code in the position codebook, and calculating K code elements in the random short secret key and the code elements on K positions corresponding to the position sequence q in the long secret key to obtain the encryption key with the length of N.
2. The method for generating a key based on location combination according to claim 1, wherein the step 1 determines that the length of the long key and the long key is N, the length of the short key K and the length of the location code m adopt a fixed storage mode or a communication negotiation mode;
and 2, determining the position codebook in the step 2 by adopting a fixed storage or communication negotiation mode.
3. The method of claim 1, wherein the encryption key is obtained by performing an exclusive-or operation on K symbols in the random short key and K symbols at K positions corresponding to the position sequence q in the long key in step 3.
4. The method of claim 1, further comprising: updating at regular or irregular time: one or more of a long key, a short key length K and a position code length m used for communication, wherein the long key length is N.
5. The method of claim 1, wherein there are a plurality of long keys used for communication, and the plurality of long keys are numbered; a long key is randomly chosen to generate the encryption key.
6. A method for encrypting data for transmission, comprising:
the sender generates an encryption key according to the key generation method of any one of claims 1 to 4;
the sender encrypts the transmission data by using the encryption key and sends the encrypted data and the random short key to the receiver;
the receiver determines a long key, a long key length N, a short key length K, a position code length m and a position codebook used by the sender by adopting a fixed storage or communication negotiation mode;
the receiver resolves the short key from the received data, resolves the position code, calculates the number of the position sequence in the position codebook used by the sender, inquires the position sequence, recovers the encryption key, and decrypts the transmission data by using the recovered key.
7. A method for encrypting data for transmission, comprising:
the sender generates an encryption key according to the key generation method of claim 5;
after encrypting the transmission data by using the encryption key, the sender sends the encrypted data, the short key and the used long key number to the receiver;
the receiver determines a long key, a long key length N, a short key length K, a position code length m and a position codebook used by the sender by adopting a fixed storage or communication negotiation mode;
the receiver inquires the long key used by the sender according to the long key number, analyzes the short key to obtain the position code, inquires the position sequence used by the sender, recovers the encryption key, and decrypts the transmission data by using the recovered key.
8. The key generation system based on the position combination is characterized by comprising a key storage module, a random short key generation module and an encryption key generation module which are connected in pairs;
the key storage module is used for determining and storing a long key, a short key length K, a position code length m and a position codebook;
the random short key generation module is used for generating a random short key with the length of K;
the encryption key generation module generates an encryption key according to a short key, a long key and a position codebook by adopting the key generation method of any one of claims 1 to 5.
9. The system of claim 8, further comprising a timer, wherein the key storage module updates one or more of the long key, the short key length K, and the location code length m according to a time set by the timer.
10. A system for encrypting transmission data is characterized by comprising a key generation module, an encryption module, an information sending module, an information receiving module, a key analysis module and a decryption module;
the key generation module generates an encryption key according to the key generation method of any one of claims 1 to 4;
the encryption module is used for encrypting transmission data;
the information sending module is used for sending encrypted data and a random short key;
the information receiving module is used for receiving data;
the key analysis module is used for determining a long key, a long key length N, a short key length K, a position code length m and a position codebook used by the key generation module by adopting a fixed storage or communication negotiation mode, resolving the short key from the received data, analyzing the position code, calculating the number of a position sequence in the position codebook used for generating the encryption key, inquiring the position sequence and recovering the encryption key; the decryption module decrypts the transmitted data using the recovered key.
11. A system for encrypting transmission data is characterized by comprising a key generation module, an encryption module, an information sending module, an information receiving module, a key analysis module and a decryption module;
the key generation module generates an encryption key according to the key generation method of claim 5;
the encryption module is used for encrypting transmission data;
the information sending module is used for sending encrypted data, a random short key and a long key number;
the information receiving module is used for receiving data; the key analysis module is used for determining a long key, a long key length N, a short key length K, a position code length m and a position codebook used by the key generation module by adopting a fixed storage or communication negotiation mode, inquiring the long key used by the key generation module from received data according to a long key number, analyzing the short key to obtain a position code, inquiring a position sequence used by the key generation module and recovering an encryption key; the decryption module decrypts the transmitted data using the recovered key.
CN201910635307.1A 2019-07-15 2019-07-15 Key generation method based on position combination and data encryption transmission method and system Active CN110266488B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910635307.1A CN110266488B (en) 2019-07-15 2019-07-15 Key generation method based on position combination and data encryption transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910635307.1A CN110266488B (en) 2019-07-15 2019-07-15 Key generation method based on position combination and data encryption transmission method and system

Publications (2)

Publication Number Publication Date
CN110266488A CN110266488A (en) 2019-09-20
CN110266488B true CN110266488B (en) 2021-08-31

Family

ID=67926052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910635307.1A Active CN110266488B (en) 2019-07-15 2019-07-15 Key generation method based on position combination and data encryption transmission method and system

Country Status (1)

Country Link
CN (1) CN110266488B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497270A (en) * 2011-12-24 2012-06-13 王勇 Encryption method of standardized document
CN103684761A (en) * 2013-12-25 2014-03-26 广西宝恒电子科技有限公司 Coding and decoding method
CN104966525A (en) * 2015-01-14 2015-10-07 腾讯科技(深圳)有限公司 File encryption method and apparatus, and file decryption method and apparatus
WO2017200989A1 (en) * 2016-05-16 2017-11-23 Amgen Inc. Data encryption in medical devices with limited computational capability
CN109951268A (en) * 2019-02-18 2019-06-28 吉林大学珠海学院 The encrypting and decrypting method and device with bit map are changed based on position

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030112970A1 (en) * 2001-08-26 2003-06-19 Arindam Mitra How to generate unbreakable key through any communication channel
US10608814B2 (en) * 2015-05-17 2020-03-31 Gideon Samid Equivoe-T: Transposition equivocation cryptography
US10594480B2 (en) * 2016-05-13 2020-03-17 Gideon Samid Efficient proof of knowledge of arbitrarily large data which remains unexposed

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497270A (en) * 2011-12-24 2012-06-13 王勇 Encryption method of standardized document
CN103684761A (en) * 2013-12-25 2014-03-26 广西宝恒电子科技有限公司 Coding and decoding method
CN104966525A (en) * 2015-01-14 2015-10-07 腾讯科技(深圳)有限公司 File encryption method and apparatus, and file decryption method and apparatus
WO2017200989A1 (en) * 2016-05-16 2017-11-23 Amgen Inc. Data encryption in medical devices with limited computational capability
CN109951268A (en) * 2019-02-18 2019-06-28 吉林大学珠海学院 The encrypting and decrypting method and device with bit map are changed based on position

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
常数时间的轻量级RFID双向认证协议;周景贤等;《北京邮电大学学报》;20160615(第03期);全文 *

Also Published As

Publication number Publication date
CN110266488A (en) 2019-09-20

Similar Documents

Publication Publication Date Title
CN107276744B (en) File storage encryption method and system
CN107078899B (en) Method of obfuscating data
WO2019114122A1 (en) Encryption method for login information, device, electronic device, and medium
CN113343305A (en) Intersection calculation method, device and equipment of private data and storage medium
CN105373927A (en) Coupon code generation method of electronic coupon, device and server
CN106817358B (en) Encryption and decryption method and device for user resources
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN107483432A (en) File encryption processing method and processing device
CN110543778A (en) linear random encryption and decryption algorithm for character data
CN111241596B (en) Block chain asset account recovery method and device
CN105100085A (en) Information encryption and decryption methods and devices
CN113098675B (en) Binary data encryption system and method based on polynomial complete homomorphism
CN104917748A (en) Method and device for performing conversion and processing on password information
CN102394746B (en) Data transmission method of weighing system based on digital sensor
CN111404892A (en) Data supervision method and device and server
CN113343255A (en) Data interaction method based on privacy protection
CN110266488B (en) Key generation method based on position combination and data encryption transmission method and system
CN110995433A (en) Data encryption method and device, electronic equipment and computer readable storage medium
CN115426111A (en) Data encryption method and device, electronic equipment and storage medium
CN115632765A (en) Encryption method, decryption device, electronic equipment and storage medium
CN114884656A (en) Encryption, decryption and password sending method and device
CN114186998A (en) Privacy communication method based on block chain
CN113595728B (en) Space-time data file transmission method, device, storage medium and system
CN117057804B (en) Financial transaction data secure storage method and system based on hash sequence
CN111865991B (en) Dynamic encryption and decryption method for data encryption center

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant