CN112994887A - Communication encryption method and system suitable for power Internet of things terminal - Google Patents

Communication encryption method and system suitable for power Internet of things terminal Download PDF

Info

Publication number
CN112994887A
CN112994887A CN201911292005.5A CN201911292005A CN112994887A CN 112994887 A CN112994887 A CN 112994887A CN 201911292005 A CN201911292005 A CN 201911292005A CN 112994887 A CN112994887 A CN 112994887A
Authority
CN
China
Prior art keywords
sequence
key
terminal
chaotic
chaotic system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911292005.5A
Other languages
Chinese (zh)
Other versions
CN112994887B (en
Inventor
马跃
葛俊
李信
尚芳剑
彭柏
来骥
王艺霏
闫忠平
张少军
王东升
娄竞
李贤�
陈重韬
孟德
李硕
管嘉珩
常海娇
张实君
杨睿
那琼澜
李坚
任启
孙涛
刘金锁
李洋
张立武
丁忠林
何莉媛
黄武奇
徐玉杰
陈刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nari Information and Communication Technology Co
Information and Telecommunication Branch of State Grid Jibei Electric Power Co Ltd
Original Assignee
Nari Information and Communication Technology Co
Information and Telecommunication Branch of State Grid Jibei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nari Information and Communication Technology Co, Information and Telecommunication Branch of State Grid Jibei Electric Power Co Ltd filed Critical Nari Information and Communication Technology Co
Priority to CN201911292005.5A priority Critical patent/CN112994887B/en
Publication of CN112994887A publication Critical patent/CN112994887A/en
Application granted granted Critical
Publication of CN112994887B publication Critical patent/CN112994887B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The invention discloses a communication encryption method and a communication encryption system applicable to a power Internet of things terminal in the technical field of power Internet of things communication, wherein the power terminal executes the following steps: constructing a conditional symmetric chaotic system, and discretizing by adopting an Euler algorithm; inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence; intercepting and binarizing the key sequence to obtain a binarized key sequence; carrying out XOR on the binarization key sequence and a plaintext data sequence acquired by the terminal to obtain a ciphertext; sending the ciphertext to the intelligent terminal; and the intelligent terminal acquires the binary key sequence by adopting the same method, and performs exclusive OR on the binary key sequence and the ciphertext to obtain the decrypted original data. The method has higher reliability and reduces the resource consumption of the terminal equipment in the encryption algorithm.

Description

Communication encryption method and system suitable for power Internet of things terminal
Technical Field
The invention belongs to the technical field of power internet of things communication, and particularly relates to a communication encryption method and system suitable for a power internet of things terminal.
Background
In order to solve the problems that the real-time processing performance of the terminal is poor due to insufficient communication bandwidth caused by the increase of terminal equipment, an intelligent terminal is introduced and is used for carrying out data processing such as edge calculation on the terminal equipment. And communication safety problems can be caused when the terminal equipment communicates with the intelligent terminal. The general encryption methods include hardware encryption and software encryption, where the hardware encryption is to add an encryption chip to the device to achieve the encryption effect, which increases the cost of the device. There are many ways of software encryption, and some conventional methods such as DES encryption will perform 16 rounds of round-robin encryption, and there is a certain correlation between the 16 rounds of keys, which reduces the confidentiality of the password. Many people also use chaotic Logistic mapping for Internet of things encryption, the encryption method is simple, the performance requirement on encryption master control is not high, but the Logistic mapping is one-dimensional mapping, the state change of a chaotic key is less, and the chaotic key is easy to predict.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides the communication encryption method and the communication encryption system suitable for the power internet of things terminal, the chaotic system with symmetrical conditions is selected, the reliability is higher, and the resource consumption of the terminal equipment in an encryption algorithm is reduced.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows: a communication encryption method suitable for a power Internet of things terminal, wherein the power terminal uploads encrypted information to an intelligent terminal, and the method is executed by the power terminal and comprises the following steps:
constructing a conditional symmetric chaotic system, and discretizing by adopting an Euler algorithm;
inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence;
intercepting and binarizing the key sequence to obtain a binarized key series;
carrying out XOR on the binarization key sequence and a plaintext data sequence acquired by the terminal to obtain a ciphertext;
and sending the ciphertext to the intelligent terminal.
A communication encryption method suitable for an electric power Internet of things terminal is characterized in that the electric power terminal uploads encryption information to an intelligent terminal, and the method is executed by the intelligent terminal and comprises the following steps:
constructing a conditional symmetric chaotic system, and discretizing by adopting an Euler algorithm;
inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence;
intercepting and binarizing the key sequence to obtain a binarized key series;
and carrying out exclusive OR on the binary key sequence and the ciphertext to obtain decrypted original data.
The equation of the chaotic system is as follows:
Figure BDA0002319362510000021
wherein x represents a transverse axis variable of the three-dimensional chaotic system, y represents a longitudinal axis variable of the three-dimensional chaotic system, z represents a height axis variable of the three-dimensional chaotic system,
Figure BDA0002319362510000022
meaning that the derivative is taken on the variable x,
Figure BDA0002319362510000023
meaning that the derivative is taken on the variable y,
Figure BDA0002319362510000024
represents the derivation of the variable z;
the equation after the Euler algorithm is adopted for dispersion is as follows:
Figure BDA0002319362510000025
wherein, T is a positive integer and represents the state position of the sequence, x (T) represents the discrete variable of the transverse axis of the three-dimensional chaotic system, and x (T +1) is the next state of x (T); y (T) represents a discrete variable of a vertical axis of the three-dimensional chaotic system, and y (T +1) is the next state of y (T); z (T) represents a discrete variable of the height axis of the three-dimensional chaotic system, and z (T +1) is the next state of z (T).
The chaotic system is characterized in that: when the chaotic system is given different initial values at different moments, the chaotic system can generate attractors with symmetrical conditions, wherein the symmetry comprises but is not limited to axial symmetry, rotational symmetry and point symmetry.
The key sequence is as follows:
Figure BDA0002319362510000031
where S (3T-2), S (3T-1), S (3T) denote consecutive key sequences, and S (3T) equals z (T), S (3T-1) equals y (T), S (3T-3) equals x (T), the key sequences are composed of discrete chaotic sequence permutations of x (T), y (T), z (T), as S (1) ═ x (1), S (2) ═ y (1), S (3) ═ z (1), S (4) ═ x (2), S (5) ═ y (2), S (6) ═ z (2) … …, and so on in sequence.
The interception and binarization processing mode is as follows: the truncated and binarized key sequence bs (t) is in the form of an integer 4 bits after the decimal point of the key sequence s (t).
One intelligent terminal can access a plurality of power terminals.
A communication encryption system suitable for a power Internet of things terminal comprises: a memory for storing instructions and a processor for operating in accordance with the instructions to perform the steps of the aforementioned method.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the aforementioned method.
Compared with the prior art, the invention has the following beneficial effects:
(1) the chaotic system with symmetrical conditions is adopted, so that the chaotic system has higher reliability, reduces the resource consumption of terminal equipment on an encryption algorithm, and is suitable for equipment with poorer computing capabilities such as an ammeter, a concentrator, a TTU (time to live) and the like;
(2) the invention only needs to calculate the key once during decryption, and for terminal devices of the same type, the keys are the same, thereby greatly shortening the decryption time of multiple devices.
Drawings
Fig. 1 is a phase rail diagram of an X-Y plane of a conditional symmetric chaotic system constructed by a communication encryption method suitable for a terminal of an internet of things of electric power according to an embodiment of the invention;
fig. 2 is a phase rail diagram of an X-Z plane of a conditional symmetric chaotic system constructed by a communication encryption method suitable for a terminal of the power internet of things according to an embodiment of the invention;
fig. 3 is a schematic process diagram of encryption of a power terminal and decryption of an intelligent terminal according to a communication encryption method for a power internet of things terminal provided by an embodiment of the invention;
fig. 4 is a flowchart of encryption by a communication encryption method suitable for a power internet of things terminal according to an embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
Constructing a conditional symmetric chaotic system, discretizing the system by adopting an Euler algorithm, and generating a key sequence of data communication in power system terminal equipment; the conditional symmetric chaotic system equation is as follows:
Figure BDA0002319362510000041
wherein x represents a transverse axis variable of the three-dimensional chaotic system, y represents a longitudinal axis variable of the three-dimensional chaotic system, z represents a height axis variable of the three-dimensional chaotic system,
Figure BDA0002319362510000042
meaning that the derivative is taken on the variable x,
Figure BDA0002319362510000043
meaning that the derivative is taken on the variable y,
Figure BDA0002319362510000051
represents the derivation of the variable z;
the equation after the Euler algorithm is adopted for dispersion is as follows:
Figure BDA0002319362510000052
wherein, T is a positive integer and represents the state position of the sequence, x (T) represents the discrete variable of the transverse axis of the three-dimensional chaotic system, and x (T +1) is the next state of x (T); y (T) represents a discrete variable of a vertical axis of the three-dimensional chaotic system, and y (T +1) is the next state of y (T); z (T) represents a discrete variable of a height axis of the three-dimensional chaotic system, z (T +1) is the next state of z (T), and the selected discretization interval is 0.001. When the chaotic system is given different initial values at different moments, the chaotic system can generate attractors with symmetrical conditions, wherein the symmetry comprises but is not limited to axial symmetry, rotational symmetry and point symmetry. In programs of the power terminal and the intelligent terminal, the discretized chaotic system equation is directly used.
As shown in fig. 1 and 2, when the initial value of the chaotic system is selected to be (3, 1, 0.5), the chaotic attractor is represented in a state of a solid line in the figure; when the initial value of the selected chaotic system is (-3, 1, 0.5), the chaotic attractor is in a state of a dotted line in the graph; the two chaotic attractors have different state expression forms under the condition of different initial values, and the two chaotic attractors are in central rotational symmetry around a certain point in coordinates.
Inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence, wherein the key sequence is as follows:
Figure BDA0002319362510000053
where S (3T-2), S (3T-1), S (3T) denote consecutive key sequences, and S (3T) equals z (T), S (3T-1) equals y (T), S (3T-3) equals x (T), the key sequences are composed of discrete chaotic sequence permutations of x (T), y (T), z (T), as S (1) ═ x (1), S (2) ═ y (1), S (3) ═ z (1), S (4) ═ x (2), S (5) ═ y (2), S (6) ═ z (2) … …, and so on in sequence.
Intercepting and binarizing the key sequence, and then performing exclusive OR on the binarized key sequence and a plaintext data sequence acquired by the terminal to obtain a ciphertext; the interception and binarization processing mode is as follows: the key sequence s (t) is formed by arranging and combining chaotic sequences, so that s (t) is a floating point number type, and considering that the processing precision of most controllers (such as MCU and ARM) for single-precision floating point numbers is 7 bits after the decimal point, the intercepted and binarized key number sequence bs (t) is in an integer form taking 4 bits after the decimal point s (t). Such as: taking S (1) ═ 3.1415926, the first 4 bits of the fractional part of S (1) are taken to be 0.1415, then 0.1415 is multiplied by 10000 to become 1415, and BS (1) is 1415. The plaintext data sequence is generally data collected from the power terminal by a sensor, and is therefore generally binarized data. And carrying out exclusive OR on the data acquired in the terminal equipment and the key sequence BS (T) after binarization to obtain a ciphertext. The intelligent terminal is a data processing device, is a pivot positioned between a field communication network and a wide area communication network in the top-level design of the ubiquitous power Internet of things, is used for connecting a service terminal and a platform layer, and mainly realizes 'unified access, edge intelligence, multidimensional perception, unified modeling, safety protection and resource arrangement'. The intelligent terminal has multiple functions, wherein edge calculation and data transmission and storage are mainly realized, and generally one intelligent terminal is connected with a plurality of power terminals in a downward mode.
And sending the ciphertext to an intelligent terminal of upper data processing equipment of the terminal, calculating a key sequence by adopting the method after the intelligent terminal receives the ciphertext, and then carrying out XOR on the binary key sequence and the ciphertext sequence to obtain the decrypted original data.
As shown in fig. 3, is a block diagram of the encryption and decryption process of the present invention. The encryption of data is mainly completed by the power terminal, the decryption is completed by the intelligent terminal, and the encrypted ciphertext is sent to the intelligent terminal through a channel. Encryption is completed by carrying out exclusive or on a plaintext and an intercepted binary key sequence; decryption is the reverse process of encryption, the method is the same as the encryption mode, and original data are obtained after decryption.
As shown in fig. 4, it is a program flow chart of the encryption process of the present invention, and the steps are as follows:
1) inputting an initial key as an initial value of the chaotic system, and bringing the initial key into a discretized conditional symmetric chaotic equation;
2) calculating the chaos sequence (x (T), y (T), z (T)) by iteration through the initial key;
3) arranging and combining the chaotic sequences, and converting the chaotic sequences into a key sequence according to a formula (3);
4) intercepting and binarizing the key sequence S (T) to form a binarized key sequence BS (T); the treatment method comprises the following steps: the key sequence S (T) is formed by arranging and combining chaotic sequences, so that S (T) is a floating point number type, and considering that the processing precision of most controllers (such as MCU and ARM) for single-precision floating point numbers is 7 bits after a decimal point, the intercepted and binarized key sequence BS (T) is in an integer form of taking 4 bits after the decimal point of S (T); such as: taking 3.1415926 as S (1), taking 0.1415 as the first 4 bits of the fractional part of S (1), and then multiplying 0.1415 by 10000 to obtain 1415, wherein BS (1) is 1415;
5) and judging whether the data acquisition of the power terminal is finished, and if not, performing XOR on the binary key sequence and the plaintext data sequence acquired by the terminal to obtain a ciphertext. If the data acquisition is finished, the encryption is finished;
6) and if the program is not ended in the step 5), sending the ciphertext to the intelligent terminal. The calculation and encryption of the key sequence is started again.
Based on the method, the invention also provides a communication encryption system suitable for the power internet of things terminal, which comprises the following steps: a memory for storing instructions and a processor for operating in accordance with the instructions to perform the steps of the aforementioned method.
Based on the above method, the present invention also provides a computer readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the aforementioned method.
The method is suitable for some equipment with general computing capability in the power Internet of things terminal, such as an ammeter, a concentrator, a TTU (distribution transformer monitoring terminal) and the like; compared with the traditional method or other chaotic encryption methods, the encryption method has higher reliability, and can occupy less CPU resources compared with the traditional chaotic encryption method. In the encryption method, the selected chaotic system is a three-dimensional system, and each iteration of the discrete chaotic system is performed, 3 secret keys are generated, so that 3 groups of plaintext data can be encrypted; and the chaotic system equation only has a multiplication term y in the first term2Different from a general chaotic system, the chaotic system has more than 2 multiplication terms, which simplifies the resource consumption of a CPU on an encryption algorithm. The invention can decrypt a plurality of terminal devices of the same type which work simultaneously and are hung under the intelligent terminal at the same time. The key is calculated only once during decryption, and for terminal devices of the same type, the keys are the same, so that the decryption time of multiple devices is greatly shortened.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (9)

1. A communication encryption method suitable for an electric power Internet of things terminal is characterized in that the electric power terminal uploads encryption information to an intelligent terminal, and the method is executed by the electric power terminal and comprises the following steps:
constructing a conditional symmetric chaotic system, and discretizing by adopting an Euler algorithm;
inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence;
intercepting and binarizing the key sequence to obtain a binarized key series;
carrying out XOR on the binarization key sequence and a plaintext data sequence acquired by the terminal to obtain a ciphertext;
and sending the ciphertext to the intelligent terminal.
2. A communication encryption method suitable for an electric power Internet of things terminal is characterized in that the electric power terminal uploads encryption information to an intelligent terminal, and the method is executed by the intelligent terminal and comprises the following steps:
constructing a conditional symmetric chaotic system, and discretizing by adopting an Euler algorithm;
inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence;
intercepting and binarizing the key sequence to obtain a binarized key series;
and carrying out exclusive OR on the binary key sequence and the ciphertext to obtain decrypted original data.
3. The communication encryption method suitable for the power internet of things terminal as claimed in claim 1 or 2, wherein the equation of the chaotic system is as follows:
Figure FDA0002319362500000011
wherein x represents a transverse axis variable of the three-dimensional chaotic system, y represents a longitudinal axis variable of the three-dimensional chaotic system, z represents a height axis variable of the three-dimensional chaotic system,
Figure FDA0002319362500000012
meaning that the derivative is taken on the variable x,
Figure FDA0002319362500000013
meaning that the derivative is taken on the variable y,
Figure FDA0002319362500000021
represents the derivation of the variable z;
the equation after the Euler algorithm is adopted for dispersion is as follows:
Figure FDA0002319362500000022
wherein, T is a positive integer and represents the state position of the sequence, x (T) represents the discrete variable of the transverse axis of the three-dimensional chaotic system, and x (T +1) is the next state of x (T); y (T) represents a discrete variable of a vertical axis of the three-dimensional chaotic system, and y (T +1) is the next state of y (T); z (T) represents a discrete variable of the height axis of the three-dimensional chaotic system, and z (T +1) is the next state of z (T).
4. The communication encryption method suitable for the power internet of things terminal as claimed in claim 1 or 2, wherein the chaotic system is characterized in that: when the chaotic system is given different initial values at different moments, the chaotic system can generate attractors with symmetrical conditions, wherein the symmetry comprises but is not limited to axial symmetry, rotational symmetry and point symmetry.
5. The communication encryption method suitable for the power internet of things terminal as claimed in claim 1 or 2, wherein the key sequence is as follows:
Figure FDA0002319362500000023
where S (3T-2), S (3T-1), S (3T) denote consecutive key sequences, and S (3T) equals z (T), S (3T-1) equals y (T), S (3T-3) equals x (T), the key sequences are composed of discrete chaotic sequence permutations of x (T), y (T), z (T), as S (1) ═ x (1), S (2) ═ y (1), S (3) ═ z (1), S (4) ═ x (2), S (5) ═ y (2), S (6) ═ z (2) … …, and so on in sequence.
6. The communication encryption method suitable for the power internet of things terminal as claimed in claim 1 or 2, wherein the intercepting and binarization processing mode is as follows: the truncated and binarized key sequence bs (t) is in the form of an integer 4 bits after the decimal point of the key sequence s (t).
7. The communication encryption method suitable for the terminals of the internet of things of electric power according to claim 1 or 2, wherein one intelligent terminal can be connected to a plurality of electric power terminals.
8. The utility model provides a communication encryption system suitable for electric power thing networking terminal, characterized by includes: a memory for storing instructions and a processor for operating in accordance with the instructions to perform the steps of the method of claim 1 or 2.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method as claimed in claim 1 or 2.
CN201911292005.5A 2019-12-16 2019-12-16 Communication encryption method and system suitable for power Internet of things terminal Active CN112994887B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911292005.5A CN112994887B (en) 2019-12-16 2019-12-16 Communication encryption method and system suitable for power Internet of things terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911292005.5A CN112994887B (en) 2019-12-16 2019-12-16 Communication encryption method and system suitable for power Internet of things terminal

Publications (2)

Publication Number Publication Date
CN112994887A true CN112994887A (en) 2021-06-18
CN112994887B CN112994887B (en) 2023-01-31

Family

ID=76343124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911292005.5A Active CN112994887B (en) 2019-12-16 2019-12-16 Communication encryption method and system suitable for power Internet of things terminal

Country Status (1)

Country Link
CN (1) CN112994887B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113795023A (en) * 2021-09-26 2021-12-14 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and block encryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001285279A (en) * 2000-03-29 2001-10-12 Murata Mach Ltd Encryption communication method and encryption communication system
JP2002252610A (en) * 2001-02-22 2002-09-06 C4 Technology Inc Encryption device and decryption device, and public key encryption system and public key decryption system
CN103236921A (en) * 2013-04-11 2013-08-07 成都秦川科技发展有限公司 Information security management module of intelligent ammeter of internet of things
CN106375079A (en) * 2016-09-22 2017-02-01 华侨大学 Chaotic encryption method for voice information
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001285279A (en) * 2000-03-29 2001-10-12 Murata Mach Ltd Encryption communication method and encryption communication system
JP2002252610A (en) * 2001-02-22 2002-09-06 C4 Technology Inc Encryption device and decryption device, and public key encryption system and public key decryption system
CN103236921A (en) * 2013-04-11 2013-08-07 成都秦川科技发展有限公司 Information security management module of intelligent ammeter of internet of things
CN106375079A (en) * 2016-09-22 2017-02-01 华侨大学 Chaotic encryption method for voice information
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113795023A (en) * 2021-09-26 2021-12-14 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and block encryption
CN113795023B (en) * 2021-09-26 2024-03-19 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and packet encryption

Also Published As

Publication number Publication date
CN112994887B (en) 2023-01-31

Similar Documents

Publication Publication Date Title
CN107819569B (en) The encryption method and terminal device of log-on message
CN107145791B (en) K-means clustering method and system with privacy protection function
CN104486316B (en) A kind of quantum key graduation offer method for improving electric power data transmission security
CN109474583B (en) Data security management system
CN112035695B (en) Spatial data encryption method suitable for mobile terminal
CN110650116B (en) Multi-type multi-dimensional data aggregation method for security smart power grid
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
CN114218322B (en) Data display method, device, equipment and medium based on ciphertext transmission
CN110620660A (en) Key distribution method for data communication based on block chain
CN114125831B (en) 5G smart grid user side data acquisition method and system based on proxy re-encryption
CN112994887B (en) Communication encryption method and system suitable for power Internet of things terminal
Zhan et al. Efficient function queryable and privacy preserving data aggregation scheme in smart grid
CN115664629A (en) Homomorphic encryption-based data privacy protection method for intelligent Internet of things platform
EP3570488A1 (en) Online/offline signature system and method based on multivariate cryptography
CN110266484B (en) Data encryption method, device, equipment and medium
CN109697613B (en) Security authentication method and system for network transaction in block chain
CN117056961A (en) Privacy information retrieval method and computer readable storage medium
CN114372595B (en) Automatic inspection system and method for power grid dispatching control running state
Almuseelem Energy-Efficient and Security-Aware Task Offloading for Multi-Tier Edge-Cloud Computing Systems
CN113938270A (en) Data encryption method and device capable of flexibly reducing complexity
CN114362997A (en) Data transmission method and device for intelligent equipment of transformer substation, intelligent equipment and medium
CN112507366A (en) Method and system for efficient data aggregation of multidimensional data in smart power grid
Deng et al. A security multi-dimensional range query protocol based on left 0-1 encoding in two-tiered wireless sensor networks
CN108235798A (en) A kind of public private key pair acquisition methods, system and POS terminal
Wang et al. An SM9-based secondary authentication framework for 5G technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant