CN111191253A - Data encryption combination method - Google Patents

Data encryption combination method Download PDF

Info

Publication number
CN111191253A
CN111191253A CN201910411228.2A CN201910411228A CN111191253A CN 111191253 A CN111191253 A CN 111191253A CN 201910411228 A CN201910411228 A CN 201910411228A CN 111191253 A CN111191253 A CN 111191253A
Authority
CN
China
Prior art keywords
encryption
level
data
original data
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910411228.2A
Other languages
Chinese (zh)
Other versions
CN111191253B (en
Inventor
薛宁静
杨战海
牛永洁
杨东风
曹军梅
姜宁
杨晓雁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RONGZHITONG TECHNOLOGY (BEIJING) Co.,Ltd.
China Electric Power Research Institute Co Ltd CEPRI
Yanan University
Original Assignee
Yanan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yanan University filed Critical Yanan University
Priority to CN201910411228.2A priority Critical patent/CN111191253B/en
Publication of CN111191253A publication Critical patent/CN111191253A/en
Application granted granted Critical
Publication of CN111191253B publication Critical patent/CN111191253B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a data encryption combination method, which comprises the following steps: s1: performing hierarchical encryption on the original data based on the encryption level; s2: and carrying out data combination storage on the encrypted original data. The invention can carry out hierarchical selection of encryption modes, thereby improving the encryption efficiency to the maximum extent; the data after encryption processing is combined based on the encryption grade, and then the encrypted data is processed subsequently, so that the system efficiency is greatly improved.

Description

Data encryption combination method
[ technical field ] A method for producing a semiconductor device
The invention belongs to the field of data encryption, and particularly relates to a data encryption combination method.
[ background of the invention ]
During the transmission and storage process, the data is directly encrypted by the data using or transmitting terminal (such as personal computer, server, etc.). The advantages are that: the data terminal generally has very strong computing power and high encryption efficiency. The disadvantages are that: 1. once a device is infected with a trojan or virus program, encryption algorithms and keys may be exposed, resulting in data encryption failure. In the network transmission process, if the key needs to be transmitted at the same time, the data and the key may be intercepted by others, resulting in data leakage. If a separate external device is used to encrypt and decrypt the data. The encryption and decryption device is separated from the data using device, and if the encryption and decryption device is not acquired by others, the security of encryption is very high. However, if a complex encryption algorithm is adopted or the amount of encrypted data is large, a high-performance encryption and decryption device is required, the cost is high, the size of an independent device is inevitably large, flexibility and portability cannot be realized, and in addition, if a portable encryption and decryption device needs to be manufactured, the balance between the efficiency and the energy consumption is difficult to be considered. Based on the problems, a new data encryption combination method is needed, and the invention can perform hierarchical selection of encryption modes, thereby improving the encryption efficiency to the maximum extent; the data after encryption processing is combined based on the encryption grade, and then the encrypted data is processed subsequently, so that the system efficiency is greatly improved.
[ summary of the invention ]
In order to solve the above problems in the prior art, the present invention provides a data encryption combination method, which includes the following steps:
s1: performing hierarchical encryption on the original data based on the encryption level;
s2: and carrying out data combination storage on the encrypted original data.
Further, the step S1 is specifically: and if the encryption level is less than the first encryption level, performing hierarchical encryption on the original data based on the encryption level.
Further, the performing hierarchical encryption on the original data based on the encryption level specifically includes: carrying out nonlinear division on the first encryption grade to obtain a second encryption grade and a third encryption grade; if the encryption level is less than or equal to a second encryption level, processing by adopting a first encryption mode; if the encryption level is greater than the second encryption level and less than or equal to a third encryption level, processing by adopting a second encryption mode; and if the encryption level is higher than the third encryption level, processing by adopting a third encryption mode.
Further, the performing nonlinear division on the encryption level to obtain a second encryption level and a third encryption level specifically includes: obtaining the first encryption level FTrd based on a formula
Figure BDA0002062871100000021
Calculating the second encryption level STrd; based on the formula
Figure BDA0002062871100000022
The third encryption level TTrd is calculated.
Further, the first encryption mode comprises a first key step, a second encryption mode and a third encryption mode; the second processing policy includes a second critical step and a third encryption mode.
Further, the step S2 is specifically: and carrying out data combination on the encrypted original data, and storing the combined data in an encryption cache.
Further, the data combination of the encrypted original data specifically includes: determining the security level of the encrypted original data, grouping the original data based on the security level, merging and splitting the groups based on the size of the groups, sequencing the split groups, and combining all the groups according to the sequencing order to form combined data.
Further, the determining the security level of the encrypted original data specifically includes: obtaining a security level IMU (inertial measurement Unit) of a user corresponding to the original data, obtaining an encryption level DFL (distributed feedback) of the original data and a time PTS (time stamp) of the original data after encryption, and calculating a security level IMD (in-mold decoration) of the original data based on the following formula;
IMD=IMU×DFL/PTS (4)。
further, the merging and splitting of the packets based on the size of the packets specifically includes: acquiring the size of each packet one by one, splitting the packet to form a plurality of packets with the size of the first size threshold and a single packet if the size of the packet is larger than the first size threshold, and setting the security level of the split packet to be equal to the security level of the packet before splitting; if the size of the packet is less than the second size threshold, the packet and other packets are merged to form a packet having a size less than the first size threshold.
The beneficial effects of the invention include: the hierarchical selection of the encryption mode can be carried out, so that the encryption efficiency is improved to the maximum extent; the data after encryption processing is combined based on the encryption grade, and then the encrypted data is processed subsequently, so that the system efficiency is greatly improved.
[ description of the drawings ]
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, and are not to be considered limiting of the invention, in which:
fig. 1 is a flow chart of a data encryption combining method of the present invention.
[ detailed description ] embodiments
The present invention will now be described in detail with reference to the drawings and specific embodiments, wherein the exemplary embodiments and descriptions are provided only for the purpose of illustrating the present invention and are not to be construed as limiting the present invention.
A data encryption combination method applied in the present invention is explained in detail, the method includes the following steps:
s1: carrying out encryption grade evaluation on the original data, specifically comprising the following steps: acquiring attribute information of the original data, and determining an encryption level based on the attribute of the original data;
for example: if the attribute of the original data is the highest secret, correspondingly setting the encryption level as the highest level;
s2: performing hierarchical encryption on the original data based on the encryption level; specifically, the method comprises the following steps: if the encryption level is greater than or equal to a first encryption level, the original data is not processed, and the original data is directly returned; otherwise, if the encryption level is less than the first encryption level, performing hierarchical encryption on the original data based on the encryption level;
the hierarchical encryption is performed on the original data based on the encryption level, which specifically comprises the following steps: carrying out nonlinear division on the first encryption grade to obtain a second encryption grade and a third encryption grade; if the encryption level is less than or equal to a second encryption level, processing by adopting a first encryption mode; if the encryption level is greater than the second encryption level and less than or equal to a third encryption level, processing by adopting a second encryption mode; if the encryption level is higher than a third encryption level, processing by adopting a third encryption mode;
the non-linear division of the encryption grade to obtain a second encryption grade and a third encryption grade specifically comprises: obtaining the first encryption level FTrd based on a formula
Figure BDA0002062871100000041
Calculating the second encryption level STrd; based on the formula
Figure BDA0002062871100000042
Calculating the third encryption level TTrd; by adopting the method, the simple encryption mode is adopted for the original data in the larger encryption grade interval, and the complex encryption mode is adopted for the high-grade original data in the smaller encryption grade interval;
preferably: the first, second and third encryption modes are stored in a local cache; the encryption mode is stored in an encryption mode; the encryption mode is dynamically modified based on the current security requirement, so that the modifiability and the real-time property of security processing are improved;
preferably: the first encryption mode comprises a first key step, a second encryption mode and a third encryption mode; the second processing strategy comprises a second key step and a third encryption mode;
preferably: the third encryption mode comprises clearing obviously contradictory data in the original data;
preferably: the first critical step is more complex than the second critical step;
s3: carrying out data combination storage on the encrypted original data; specifically, the method comprises the following steps: carrying out data combination on the encrypted original data, and storing the combined data in an encryption cache;
the data combination of the encrypted original data specifically includes: determining the security level of encrypted original data, grouping the original data based on the security level, merging and splitting the groups based on the size of the groups, sequencing the split groups, and combining all the groups according to a sequencing sequence to form combined data;
the determining the security level of the encrypted original data specifically includes: obtaining a security level IMU (inertial measurement Unit) of a user corresponding to the original data, obtaining an encryption level DFL (distributed feedback) of the original data and a time PTS (time stamp) of the original data after encryption, and calculating a security level IMD (in-mold decoration) of the original data based on the following formula;
IMD=IMU×DFL/PTS (4);
grouping original data based on the security level, grouping the original data according to a security level gradient, and setting a label for the grouping, wherein the content of the label is the security level; preferably: the security level gradient is to divide the security level into a plurality of gradients according to a fixed security level interval and divide the original data into corresponding groups according to the security level;
the merging and splitting of the packets based on the packet sizes specifically includes: acquiring the size of each packet one by one, splitting the packet to form a plurality of packets with the size of the first size threshold and a single packet if the size of the packet is larger than the first size threshold, and setting the security level of the split packet to be equal to the security level of the packet before splitting; if the size of the packet is less than a second size threshold, merging the packet with other packets to form a packet having a size less than a first size threshold;
the grouping and other groupings are merged, specifically, only when the difference value of the security levels between two groupings is smaller than the threshold value of the difference value of the security levels, the two groupings are merged; resetting the security level for the merged packet; the reset privacy level is equal to the greater of the privacy levels of the two packets;
the sorting of the split packets specifically includes: sorting the packets in descending order of the privacy level;
the data are sorted according to the security level and divided into the groups meeting the size of the subsequent processing requirement, so that the subsequent processing is facilitated; the original data can be selectively protected from the beginning according to encryption and data protection conditions;
the storing of the original data of the combined data in the encryption cache specifically includes: calculating the security level of the combined data, selecting an encryption cache partition matched with the security level, and storing the combined data in the selected encryption cache partition;
the calculating the security level of the combined data specifically comprises: setting the security level equal to the sum of all grouped security levels in the combined data and dividing the sum by the number of the groups;
preferably: the encryption cache is a local cache;
the above description is only a preferred embodiment of the present invention, and all equivalent changes or modifications of the structure, characteristics and principles described in the present invention are included in the scope of the present invention.

Claims (9)

1. A data encryption combination method, characterized in that the method comprises the steps of:
s1: performing hierarchical encryption on the original data based on the encryption level;
s2: and carrying out data combination storage on the encrypted original data.
2. The data encryption combination method according to claim 1, wherein the step S1 specifically includes: and if the encryption level is less than the first encryption level, performing hierarchical encryption on the original data based on the encryption level.
3. The data encryption combination method according to claim 2, wherein the hierarchical encryption is performed on the original data based on the encryption level, specifically: carrying out nonlinear division on the first encryption grade to obtain a second encryption grade and a third encryption grade; if the encryption level is less than or equal to a second encryption level, processing by adopting a first encryption mode; if the encryption level is greater than the second encryption level and less than or equal to a third encryption level, processing by adopting a second encryption mode; and if the encryption level is higher than the third encryption level, processing by adopting a third encryption mode.
4. The data encryption combination method according to claim 3, wherein the non-linear division of the encryption levels to obtain a second encryption level and a third encryption level is specifically: obtaining the first encryption level FTrd based on a formula
Figure FDA0002062871090000011
Calculating the second encryption level STrd; based on the formula
Figure FDA0002062871090000012
The third encryption level TTrd is calculated.
5. The data encryption combination method according to claim 4, wherein the first encryption mode comprises a first key step and second and third encryption modes; the second processing policy includes a second critical step and a third encryption mode.
6. The data encryption combination method according to claim 5, wherein the step S2 specifically includes: and carrying out data combination on the encrypted original data, and storing the combined data in an encryption cache.
7. The data encryption combination method according to claim 6, wherein the data combination of the encrypted original data is specifically: determining the security level of the encrypted original data, grouping the original data based on the security level, merging and splitting the groups based on the size of the groups, sequencing the split groups, and combining all the groups according to the sequencing order to form combined data.
8. The data encryption combination method according to claim 7, wherein the determining the security level of the encrypted original data is specifically: obtaining a security level IMU (inertial measurement Unit) of a user corresponding to the original data, obtaining an encryption level DFL (distributed feedback) of the original data and a time PTS (time stamp) of the original data after encryption, and calculating a security level IMD (in-mold decoration) of the original data based on the following formula;
IMD=IMU×DFL/PTS (4)。
9. the data encryption combination method according to claim 8, wherein the merging and splitting of the packets is performed based on the size of the packets, specifically: acquiring the size of each packet one by one, splitting the packet to form a plurality of packets with the size of the first size threshold and a single packet if the size of the packet is larger than the first size threshold, and setting the security level of the split packet to be equal to the security level of the packet before splitting; if the size of the packet is less than the second size threshold, the packet and other packets are merged to form a packet having a size less than the first size threshold.
CN201910411228.2A 2019-05-17 2019-05-17 Data encryption combination method Active CN111191253B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910411228.2A CN111191253B (en) 2019-05-17 2019-05-17 Data encryption combination method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910411228.2A CN111191253B (en) 2019-05-17 2019-05-17 Data encryption combination method

Publications (2)

Publication Number Publication Date
CN111191253A true CN111191253A (en) 2020-05-22
CN111191253B CN111191253B (en) 2021-02-12

Family

ID=70707104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910411228.2A Active CN111191253B (en) 2019-05-17 2019-05-17 Data encryption combination method

Country Status (1)

Country Link
CN (1) CN111191253B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115801321A (en) * 2022-10-20 2023-03-14 北京海泰方圆科技股份有限公司 Data combination encryption method and device
CN116484407A (en) * 2023-04-23 2023-07-25 深圳市天下房仓科技有限公司 Data security protection method and device, electronic equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102347836A (en) * 2010-04-30 2012-02-08 龚华清 Electronic document protected view system and method
US20140059344A1 (en) * 2012-08-21 2014-02-27 Appsense Limited File protection using session-based digital rights management
CN104254858A (en) * 2011-10-31 2014-12-31 国际商业机器公司 Protecting sensitive data in a transmission
CN106789972A (en) * 2016-12-06 2017-05-31 郑州云海信息技术有限公司 Secret protection and secure access implementation based on distributed heterogeneous mass data
CN107003815A (en) * 2014-12-09 2017-08-01 国际商业机器公司 The automatic management of confidential data in cloud environment
CN107508796A (en) * 2017-07-28 2017-12-22 北京明朝万达科技股份有限公司 A kind of data communications method and device
CN107566414A (en) * 2017-10-24 2018-01-09 黄挺冠 A kind of data encryption cloud system
CN109361507A (en) * 2018-10-11 2019-02-19 杭州华澜微电子股份有限公司 A kind of data ciphering method and encryption equipment
CN110796233A (en) * 2019-10-17 2020-02-14 北京航空航天大学 Self-adaptive compression method of deep residual convolution neural network based on transfer learning

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102347836A (en) * 2010-04-30 2012-02-08 龚华清 Electronic document protected view system and method
CN104254858A (en) * 2011-10-31 2014-12-31 国际商业机器公司 Protecting sensitive data in a transmission
US20140059344A1 (en) * 2012-08-21 2014-02-27 Appsense Limited File protection using session-based digital rights management
CN107003815A (en) * 2014-12-09 2017-08-01 国际商业机器公司 The automatic management of confidential data in cloud environment
CN106789972A (en) * 2016-12-06 2017-05-31 郑州云海信息技术有限公司 Secret protection and secure access implementation based on distributed heterogeneous mass data
CN107508796A (en) * 2017-07-28 2017-12-22 北京明朝万达科技股份有限公司 A kind of data communications method and device
CN107566414A (en) * 2017-10-24 2018-01-09 黄挺冠 A kind of data encryption cloud system
CN109361507A (en) * 2018-10-11 2019-02-19 杭州华澜微电子股份有限公司 A kind of data ciphering method and encryption equipment
CN110796233A (en) * 2019-10-17 2020-02-14 北京航空航天大学 Self-adaptive compression method of deep residual convolution neural network based on transfer learning

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115801321A (en) * 2022-10-20 2023-03-14 北京海泰方圆科技股份有限公司 Data combination encryption method and device
CN115801321B (en) * 2022-10-20 2023-11-14 北京海泰方圆科技股份有限公司 Data combination encryption method and device
CN116484407A (en) * 2023-04-23 2023-07-25 深圳市天下房仓科技有限公司 Data security protection method and device, electronic equipment and storage medium
CN116484407B (en) * 2023-04-23 2024-03-22 深圳市天下房仓科技有限公司 Data security protection method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111191253B (en) 2021-02-12

Similar Documents

Publication Publication Date Title
CN107145791B (en) K-means clustering method and system with privacy protection function
Attasena et al. Secret sharing for cloud data security: a survey
CN106972927B (en) Encryption method and system for different security levels
KR102202473B1 (en) Systems and methods for dynamic data storage
US20170308580A1 (en) Data Aggregation/Analysis System and Method Therefor
US20160344553A1 (en) Storing and retrieving ciphertext in data storage
CN112100679B (en) Data processing method and device based on privacy protection and server
Alharam et al. The effects of cyber-security on healthcare industry
CN111191253B (en) Data encryption combination method
CN112073444B (en) Data set processing method and device and server
KR20140011534A (en) Generating and verifying the alternative data in a specified format
US11133930B2 (en) Security credentials
CN108170753B (en) Key-Value database encryption and security query method in common cloud
Babu et al. Higher dimensional chaos for Audio encryption
CN111475690B (en) Character string matching method and device, data detection method and server
WO2021129470A1 (en) Polynomial-based system and method for fully homomorphic encryption of binary data
CN107852324A (en) For encrypting the method and encryption node of message
Achenbach et al. Mimosecco: A middleware for secure cloud storage
Zhang et al. Encrypted and compressed key-value store with pattern-analysis security in cloud systems
CN101364868B (en) Pseudo-noise code generator based on broad sense information field and generating method thereof
Morawiecki et al. Parallel authenticated encryption with the duplex construction
Abdulraheem Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems.
Al-Attab et al. Lightweight effective encryption algorithm for securing data in cloud computing
Arora et al. Performance analysis of cryptography algorithms
Kim et al. Gpu-accelerated password cracking of pdf files

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200911

Address after: Room 2047, 2 / F, building 1, No.6 Hangfeng Road, Fengtai District, Beijing 100070

Applicant after: Beijing Xinyuan Zhicheng Technology Development Co., Ltd

Address before: 716000, 580, holy land road, Baota District, Shaanxi, Yanan

Applicant before: University YANAN

TA01 Transfer of patent application right
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201104

Address after: 716000, 580, holy land road, Baota District, Shaanxi, Yanan

Applicant after: University YANAN

Applicant after: CHINA ELECTRIC POWER RESEARCH INSTITUTE Co.,Ltd.

Address before: Room 2047, 2 / F, building 1, No.6 Hangfeng Road, Fengtai District, Beijing 100070

Applicant before: Beijing Xinyuan Zhicheng Technology Development Co., Ltd

CB03 Change of inventor or designer information

Inventor after: Guan Mingyao

Inventor after: Wang Yuke

Inventor after: Xue Ningjing

Inventor after: Yang Zhanhai

Inventor after: Niu Yongjie

Inventor after: Yang Dongfeng

Inventor after: Cao Junmei

Inventor after: Jiang Ning

Inventor after: Yang Xiaoyan

Inventor before: Xue Ningjing

Inventor before: Yang Zhanhai

Inventor before: Niu Yongjie

Inventor before: Yang Dongfeng

Inventor before: Cao Junmei

Inventor before: Jiang Ning

Inventor before: Yang Xiaoyan

CB03 Change of inventor or designer information
TA01 Transfer of patent application right

Effective date of registration: 20210105

Address after: 100085 Room 806, building 2, No.1 shangdiqi street, Haidian District, Beijing

Applicant after: RONGZHITONG TECHNOLOGY (BEIJING) Co.,Ltd.

Applicant after: University YANAN

Applicant after: CHINA ELECTRIC POWER RESEARCH INSTITUTE Co.,Ltd.

Address before: 716000, 580, holy land road, Baota District, Shaanxi, Yanan

Applicant before: University YANAN

Applicant before: CHINA ELECTRIC POWER RESEARCH INSTITUTE Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant