CN114301664A - Communication encryption method, communication decryption device, and non-volatile storage medium - Google Patents

Communication encryption method, communication decryption device, and non-volatile storage medium Download PDF

Info

Publication number
CN114301664A
CN114301664A CN202111617026.7A CN202111617026A CN114301664A CN 114301664 A CN114301664 A CN 114301664A CN 202111617026 A CN202111617026 A CN 202111617026A CN 114301664 A CN114301664 A CN 114301664A
Authority
CN
China
Prior art keywords
communication
bandwidth frequency
transmission data
target bandwidth
encrypted transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111617026.7A
Other languages
Chinese (zh)
Inventor
孙科
王乾
蒋艳军
赵轶新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111617026.7A priority Critical patent/CN114301664A/en
Publication of CN114301664A publication Critical patent/CN114301664A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a communication encryption method, a communication decryption device and a nonvolatile storage medium. Wherein, the method comprises the following steps: acquiring a target bandwidth frequency of a communication sending end; encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data; and sending the target bandwidth frequency and the encrypted transmission data to a communication receiving end. The invention solves the technical problem of unsafe communication caused by easy leakage of the secret key in the communication process.

Description

Communication encryption method, communication decryption device, and non-volatile storage medium
Technical Field
The present invention relates to the field of communication security, and in particular, to a communication encryption method, a communication decryption apparatus, and a non-volatile storage medium.
Background
With the rapid development of the internet, people using the internet are explosively expanded, the network brings convenience to people and brings hidden dangers, once the transmitted data is stolen when a user communicates by using the network, the consequences can be imagined, how to ensure the safe transmission of confidential information and how to effectively identify the identities of two parties in a transaction are one of the problems facing the network security, and the data encryption technology is the most important means for ensuring the information security, so that the data security protection value is realized for preventing sensitive data from being leaked, and therefore, the development of a data encryption algorithm has important significance for protecting the sensitive data. In the related art, the communication key for encrypting the communication content is usually a fixed key and cannot be dynamically changed at any time, so that the possibility of being broken may occur, and the communication security problem may occur.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a communication encryption method, a communication decryption device and a nonvolatile storage medium, which are used for at least solving the technical problem of communication insecurity caused by easy leakage of a secret key in a communication process.
According to an aspect of an embodiment of the present invention, there is provided a communication encryption method, including: acquiring a target bandwidth frequency of a communication sending end; encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data; and sending the target bandwidth frequency and the encrypted transmission data to the communication receiving end.
Optionally, the acquiring a target bandwidth frequency of a communication sending end includes: acquiring a preset bandwidth frequency and an average bandwidth frequency of the communication sending end, wherein the target bandwidth frequency comprises the average bandwidth frequency; comparing the predetermined bandwidth frequency with the average bandwidth frequency to obtain a comparison result, and obtaining one of an uplink bandwidth frequency and a downlink bandwidth frequency of the communication sending end according to the comparison result, wherein the target bandwidth frequency comprises the uplink bandwidth frequency and the downlink bandwidth frequency.
Optionally, obtaining the first bandwidth frequency of the communication sending end according to the comparison result includes: acquiring the uplink bandwidth frequency of the communication sending end under the condition that the preset bandwidth frequency is greater than the average bandwidth frequency; and acquiring the downlink bandwidth frequency of the communication sending end under the condition that the preset bandwidth frequency is smaller than the average bandwidth frequency.
Optionally, encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data includes: acquiring a preset encryption constant; and encrypting the encryption constant, the target bandwidth frequency and the communication content to obtain the encrypted transmission data.
Optionally, encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data includes: respectively carrying out modulus taking on the target bandwidth frequency and the communication content to obtain a plurality of groups of modulus values; and converting the plurality of groups of module values into the encrypted transmission data in a character string format.
According to another aspect of the embodiments of the present invention, there is also provided a communication decryption method, including: receiving target bandwidth frequency and encrypted transmission data sent by a communication sending end; based on the target bandwidth frequency, decrypting a part corresponding to the target bandwidth frequency in the encrypted transmission data to obtain a communication key; and decrypting the encrypted transmission data by using the communication key to obtain communication content.
Optionally, in a case that the encrypted transmission data is further generated according to a predetermined encryption constant, the decrypting, based on the target bandwidth frequency, a portion of the encrypted transmission data corresponding to the target bandwidth frequency to obtain a communication key includes: and based on the target bandwidth frequency and the encryption constant, decrypting a part corresponding to the target bandwidth frequency and the encryption constant in the encrypted transmission data to obtain the communication key.
According to another aspect of the embodiments of the present invention, there is also provided a communication encryption apparatus, including: the acquisition module is used for acquiring the target bandwidth frequency of the communication sending end; the encryption module is used for encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data; and the sending module is used for sending the target bandwidth frequency and the encrypted transmission data to the communication receiving end.
According to still another aspect of the embodiments of the present invention, there is also provided a communication decryption apparatus including: the receiving module is used for receiving the target bandwidth frequency and the encrypted transmission data sent by the communication sending end; the first decryption module is used for decrypting a part corresponding to the target bandwidth frequency in the encrypted transmission data based on the target bandwidth frequency to obtain a communication key; and the second decryption module is used for decrypting the encrypted transmission data by using the communication key to obtain communication content.
According to still another aspect of the embodiments of the present invention, there is provided a non-volatile storage medium, where the non-volatile storage medium includes a stored program, and when the program runs, a device in which the non-volatile storage medium is located is controlled to execute any one of the communication encryption methods or any one of the communication decryption methods.
According to still another aspect of the embodiments of the present invention, there is further provided a processor, configured to execute a program, where the program executes to perform any one of the communication encryption method and the communication decryption method.
In the embodiment of the invention, the communication content is encrypted according to the bandwidth frequency of the communication sending end, the target bandwidth frequency and the communication content are encrypted by acquiring the target bandwidth frequency of the communication sending end to obtain encrypted transmission data, and the target bandwidth frequency and the encrypted transmission data are sent to the communication receiving end, so that the aim of encrypting by adopting different keys in each communication is fulfilled, the technical effect of improving the safety and reliability of communication encryption is realized, and the technical problem of unsafe communication caused by easy leakage of the keys in the communication process is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 shows a hardware configuration block diagram of a computer terminal for implementing a communication encryption method and a communication decryption method;
fig. 2 is a schematic flow chart of a communication encryption method provided according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a communication decryption method according to an embodiment of the present invention;
FIG. 4 is a block flow diagram of a bandwidth frequency based encrypted communication provided in accordance with an alternative embodiment of the present invention;
FIG. 5 is a schematic diagram of bandwidth frequency based encrypted communications provided in accordance with an alternative embodiment of the present invention;
fig. 6 is a block diagram of a communication encryption apparatus according to an embodiment of the present invention;
fig. 7 is a block diagram of a communication decrypting apparatus provided according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In accordance with an embodiment of the present invention, there is provided a communication encryption method embodiment, it is noted that the steps illustrated in the flowchart of the figure may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
The method provided by the first embodiment of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Fig. 1 shows a hardware configuration block diagram of a computer terminal for implementing a communication encryption method and a communication decryption method. As shown in fig. 1, the computer terminal 10 may include one or more processors (shown as 102a, 102b, … …, 102 n) which may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, or the like, a memory 104 for storing data. Besides, the method can also comprise the following steps: a display, an input/output interface (I/O interface), a Universal Serial BUS (USB) port (which may be included as one of the ports of the BUS), a network interface, a power source, and/or a camera. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the electronic device. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors and/or other data processing circuitry described above may be referred to generally herein as "data processing circuitry". The data processing circuitry may be embodied in whole or in part in software, hardware, firmware, or any combination thereof. Further, the data processing circuit may be a single stand-alone processing module, or incorporated in whole or in part into any of the other elements in the computer terminal 10. As referred to in the embodiments of the application, the data processing circuit acts as a processor control (e.g. selection of a variable resistance termination path connected to the interface).
The memory 104 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the communication encryption method and the communication decryption method in the embodiment of the present invention, and the processor executes various functional applications and data processing by executing the software programs and modules stored in the memory 104, that is, implements the communication encryption method and the communication decryption method of the application program. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with the user interface of the computer terminal 10.
Fig. 2 is a schematic flowchart of a communication encryption method according to an embodiment of the present invention, and as shown in fig. 2, the method includes the following steps:
step S202, obtaining the target bandwidth frequency of the communication sending end.
In this step, the target bandwidth frequency may be a value that fluctuates at any time, rather than a fixed bandwidth frequency value. The communication sending end can be provided with a three-party interface for receiving the communication content of the communication sending end and monitoring the target bandwidth frequency of the communication sending end.
Step S204, the target bandwidth frequency and the communication content are encrypted to obtain encrypted transmission data.
In this step, the target bandwidth frequency and the communication content are encrypted by the same encryption method, and the ciphertext of the target bandwidth frequency and the ciphertext of the communication content can be obtained respectively, and then the two ciphertexts are combined to obtain encrypted transmission data.
Step S206, the target bandwidth frequency and the encrypted transmission data are sent to a communication receiving end.
In this step, the target bandwidth frequency is sent to the communication receiving end, which can help the communication receiving end to solve the communication key and the communication receiving end to decrypt the encrypted transmission data after taking the key, so as to obtain the communication content that the communication sending end wants to transmit. Optionally, the communication receiving end may first determine the encrypted target bandwidth frequency from the encrypted transmission data according to a pre-agreed encrypted transmission data format, then perform inverse operation of encryption based on the encrypted target bandwidth frequency to solve the key, and after the communication receiving end takes the key, the communication receiving end may decrypt the encrypted transmission data to obtain the communication content.
Through the steps, the purpose of encrypting by adopting different keys in each communication is achieved, so that the technical effects of improving the safety and reliability of communication encryption are achieved, and the technical problem that the communication is unsafe due to the fact that the keys are easy to leak in the communication process is solved. Because the target bandwidth frequency is fluctuant, the keys used by the two communication parties each time when encrypting the communication content are different, the communication content is difficult to obtain by the outside through a brute force cracking method, and the communication safety is guaranteed.
As an alternative embodiment, the target bandwidth frequency and the communication content are encrypted to obtain encrypted transmission data, and a predetermined encryption constant may be first obtained; and then encrypting the encryption constant, the target bandwidth frequency and the communication content to obtain encrypted transmission data.
Alternatively, the encryption constant may be predetermined by the communication transmitting end and the communication receiving end, for example, a universal constant may be used as the encryption constant. The communication sending end can firstly calculate the encryption constant and the target bandwidth frequency, and then encrypt the encryption constant and the target bandwidth frequency by adopting an encryption algorithm. And during communication, only the target bandwidth frequency is transmitted to the communication receiving end, and the encryption constant is not transmitted. Since the communication receiving end knows the agreed encryption constant in advance, the communication receiving end can obtain the key through inverse operation, but the communication content intercepted by the interceptor does not include the encryption constant, so the key cannot be cracked. In the embodiment, the complicated encryption constant is selected, so that the cracking difficulty can be improved, and the communication safety can be improved.
As an alternative embodiment, the target bandwidth frequency and the communication content are encrypted to obtain encrypted transmission data, and the following method is used: respectively carrying out modulus taking on the target bandwidth frequency and the communication content to obtain a plurality of groups of modulus values; and converting the plurality of groups of module values into encrypted transmission data in a character string format. Optionally, in the process of converting the multiple sets of modulus values into the encrypted transmission data in the String format, the multiple sets of modulus values may be multiplied by the target bandwidth frequency to convert into a byte array, then the byte array is converted into a String, and the formed String is transmitted as an encryption result, that is, the encrypted transmission data, so as to further improve the security of communication.
As an alternative embodiment, the following steps may be adopted to obtain the target bandwidth frequency of the communication sending end: acquiring a preset bandwidth frequency and an average bandwidth frequency of a communication sending end, wherein a target bandwidth frequency comprises the average bandwidth frequency; and comparing the preset bandwidth frequency with the average bandwidth frequency to obtain a comparison result, and acquiring one of the uplink bandwidth frequency and the downlink bandwidth frequency of the communication sending end according to the comparison result, wherein the target bandwidth frequency comprises the uplink bandwidth frequency and the downlink bandwidth frequency. As an optional embodiment, according to the comparison result, a first bandwidth frequency of the communication sending end is obtained, and the uplink bandwidth frequency of the communication sending end may be obtained under the condition that the predetermined bandwidth frequency is greater than the average bandwidth frequency; and under the condition that the preset bandwidth frequency is less than the average bandwidth frequency, acquiring the downlink bandwidth frequency of the communication sending end.
In this optional embodiment, the average bandwidth frequency may be an average value of a current uplink bandwidth frequency and a current downlink bandwidth frequency of the communication sending end, or may be an average value of bandwidths of the communication sending end in a predetermined time period. The target bandwidth frequency may be an uplink bandwidth frequency of the communication transmitting end, or a downlink bandwidth frequency of the communication transmitting end, and one of the uplink bandwidth frequency and the downlink bandwidth frequency is specifically selected for encryption during each communication. The predetermined bandwidth frequency can be a pre-agreed user-defined bandwidth frequency, and when the predetermined bandwidth frequency is greater than the average bandwidth frequency, the uplink bandwidth frequency and the communication content are encrypted together to obtain encrypted transmission data; and when the preset bandwidth frequency is smaller than the average bandwidth frequency, the downlink bandwidth frequency and the communication content are encrypted together to obtain encrypted transmission data. The judgment rule may be predetermined and only grasped by the communication transmitting end and the communication receiving end, optionally, the communication transmitting end may transmit the uplink bandwidth frequency, the downlink bandwidth frequency, and the average bandwidth frequency to the communication receiving end, and the communication receiving end determines whether the uplink bandwidth frequency adopted by the communication transmitting end is encrypted or the downlink bandwidth frequency is encrypted based on the grasped predetermined bandwidth frequency, and solves the secret key back according to the result. The method can further improve the cracking difficulty of attackers and ensure the safety of communication.
Fig. 3 is a schematic flowchart of a communication decryption method according to an embodiment of the present invention, as shown in fig. 3, the method includes the following steps:
step S302, receiving the target bandwidth frequency and the encrypted transmission data sent by the communication sending end.
In this step, the target bandwidth frequency may be a bandwidth frequency of the communication transmitting end, and a value that fluctuates at any time may be set with a three-party interface at the communication transmitting end, so as to receive the communication content of the communication transmitting end and monitor the target bandwidth frequency of the communication transmitting end.
And step S304, based on the target bandwidth frequency, decrypting the part corresponding to the target bandwidth frequency in the encrypted transmission data to obtain the communication key.
In this step, the communication receiving end may determine a portion corresponding to the target bandwidth frequency from the encrypted transmission data based on a composition format of the encrypted transmission data agreed with the communication transmitting end, that is, a ciphertext obtained by encrypting the target bandwidth frequency by the communication transmitting end, and then perform an inverse operation of the encryption based on the ciphertext and the received target bandwidth frequency to obtain the communication key.
Step S306, the encrypted transmission data is decrypted by using the communication key, and communication content is obtained. And decrypting the part corresponding to the communication content in the encrypted transmission data by using the communication key to obtain the communication content.
Through the steps, the purpose of encrypting by adopting different keys in each communication is achieved, so that the technical effects of improving the safety and reliability of communication encryption are achieved, and the technical problem that the communication is unsafe due to the fact that the keys are easy to leak in the communication process is solved.
As an alternative embodiment, in a case where the encrypted transmission data is further generated according to a predetermined encryption constant, decrypting a portion of the encrypted transmission data corresponding to the target bandwidth frequency based on the target bandwidth frequency to obtain the communication key includes: and based on the target bandwidth frequency and the encryption constant, decrypting the part, corresponding to the target bandwidth frequency and the encryption constant, in the encrypted transmission data to obtain the communication key.
In an alternative embodiment, the encryption constant may be a complex constant predetermined by the communication sender and the communication receiver, such as a universal constant, and the constant does not need to be transmitted through a channel. After receiving the encrypted transmission data and the target bandwidth frequency, the communication receiving end processes the encryption constant and the target bandwidth frequency based on the same operation as that of the communication transmitting end, for example, adds or multiplies the encryption constant and the target bandwidth frequency, then obtains a part corresponding to the operation result from the encrypted transmission data, and performs an inverse operation of encryption according to the operation result to obtain a communication key.
Fig. 4 is a block flow diagram of encrypted communication based on bandwidth frequency provided according to an alternative embodiment of the present invention, fig. 5 is a schematic diagram of encrypted communication based on bandwidth frequency provided according to an alternative embodiment of the present invention, and as shown in fig. 4 and fig. 5, encrypted communication based on bandwidth frequency may include the following flows:
step 1, obtaining a plaintext to be encrypted, namely communication content, adding a UUID (universally unique identifier) of a communication sending end to a first character of the plaintext as a unique identifier, and encrypting the plaintext to be encrypted and a bandwidth frequency obtained by real-time monitoring to obtain encrypted transmission data.
And 2, acquiring uplink, downlink and average bandwidth frequencies of the bandwidth of the communication transmitting end, and matching different encryption algorithms through different bandwidth transmission frequencies.
And 2.1, when the preset bandwidth frequency is smaller than the current average bandwidth frequency, the communication sending end respectively performs modular operation on the universal gravitation constant, the downlink bandwidth frequency, the average bandwidth frequency, the current bandwidth frequency and the plaintext.
And 2.2, when the preset bandwidth frequency is greater than the current average bandwidth frequency, the communication sending end respectively performs modular operation on the universal gravitation constant, the uplink bandwidth frequency, the average bandwidth frequency, the current bandwidth frequency and the plaintext.
And 3, multiplying the obtained modulus value by the corresponding bandwidth frequency to convert the modulus value into a byte array, and converting the byte array into String to form a new character String which is the encrypted transmission data.
And 4, sending the encrypted transmission data, the uplink, the downlink and the average bandwidth frequency to a communication receiving end.
And 5, the communication receiving end acquires the encrypted transmission data, the uplink frequency, the downlink frequency and the average bandwidth frequency through the unique identifier, then performs modular reverse operation processing through the acquired bandwidth frequency and the universal gravitation constant to generate a communication key, and then identifies the character string to be decrypted through the communication key to obtain a plaintext to finish decryption.
According to an embodiment of the present invention, there is also provided a communication encryption apparatus for implementing the communication encryption method, and fig. 6 is a block diagram of a structure of the communication encryption apparatus according to the embodiment of the present invention, as shown in fig. 6, the communication encryption apparatus includes: an acquisition module 62, an encryption module 64, and a transmission module 66, which will be described below.
An obtaining module 62, configured to obtain a target bandwidth frequency of a communication sending end;
an encryption module 64, configured to encrypt the target bandwidth frequency and the communication content to obtain encrypted transmission data;
and the sending module 66 is used for sending the target bandwidth frequency and the encrypted transmission data to the communication receiving end.
It should be noted here that the acquiring module 62, the encrypting module 64 and the sending module 66 correspond to steps S202 to S206 in the embodiment, and the three modules are the same as the example and the application scenario realized by the corresponding steps, but are not limited to the disclosure in the embodiment. It should be noted that the above modules as a part of the apparatus may be operated in the computer terminal 10 provided in the embodiment.
According to an embodiment of the present invention, there is also provided a communication decryption apparatus for implementing the communication decryption method, and fig. 7 is a block diagram of a structure of the communication decryption apparatus according to the embodiment of the present invention, as shown in fig. 7, the communication decryption apparatus includes: a receiving module 72, a first decryption module 74 and a second decryption module 76, which will be described below.
A receiving module 72, configured to receive the target bandwidth frequency and the encrypted transmission data sent by the communication sending end;
a first decryption module 74, configured to decrypt, based on the target bandwidth frequency, a portion of the encrypted transmission data corresponding to the target bandwidth frequency to obtain a communication key;
and a second decryption module 76 for decrypting the encrypted transmission data using the communication key to obtain the communication content.
It should be noted that the receiving module 72, the first decryption module 74 and the second decryption module 76 correspond to steps S302 to S306 in the embodiment, and the three modules are the same as the corresponding steps in the implementation example and application scenarios, but are not limited to the disclosure in the embodiment. It should be noted that the above modules as a part of the apparatus may be operated in the computer terminal 10 provided in the embodiment.
An embodiment of the present invention may provide a computer device, and optionally, in this embodiment, the computer device may be located in at least one network device of a plurality of network devices of a computer network. The computer device includes a memory and a processor.
The memory may be configured to store software programs and modules, such as program instructions/modules corresponding to the communication encryption method, the communication decryption method, and the apparatus in the embodiments of the present invention, and the processor executes various functional applications and data processing by running the software programs and modules stored in the memory, so as to implement the communication encryption method and the communication decryption method. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory may further include memory located remotely from the processor, and these remote memories may be connected to the computer terminal through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The processor can call the information and application program stored in the memory through the transmission device to execute the following steps: acquiring a target bandwidth frequency of a communication sending end; encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data; and sending the target bandwidth frequency and the encrypted transmission data to a communication receiving end.
The processor can also call the information stored in the memory and the application program through the transmission device to execute the following steps: receiving target bandwidth frequency and encrypted transmission data sent by a communication sending end; based on the target bandwidth frequency, decrypting the part, corresponding to the target bandwidth frequency, in the encrypted transmission data to obtain a communication key; and decrypting the encrypted transmission data by using the communication key to obtain the communication content.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a non-volatile storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
Embodiments of the present invention also provide a non-volatile storage medium. Optionally, in this embodiment, the nonvolatile storage medium may be configured to store program codes executed by the communication encryption method and the communication decryption method provided in embodiment 1.
Optionally, in this embodiment, the nonvolatile storage medium may be located in any one of computer terminals in a computer terminal group in a computer network, or in any one of mobile terminals in a mobile terminal group.
Optionally, in this embodiment, the non-volatile storage medium is configured to store program code for performing the following steps: acquiring a target bandwidth frequency of a communication sending end; encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data; and sending the target bandwidth frequency and the encrypted transmission data to a communication receiving end.
Optionally, in this embodiment, the non-volatile storage medium is configured to store program code for performing the following steps: receiving target bandwidth frequency and encrypted transmission data sent by a communication sending end; based on the target bandwidth frequency, decrypting the part, corresponding to the target bandwidth frequency, in the encrypted transmission data to obtain a communication key; and decrypting the encrypted transmission data by using the communication key to obtain the communication content.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, a division of a unit may be a division of a logic function, and an actual implementation may have another division, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or may not be executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a non-volatile memory storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A method for encrypting communications, comprising:
acquiring a target bandwidth frequency of a communication sending end;
encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data;
and sending the target bandwidth frequency and the encrypted transmission data to the communication receiving end.
2. The method of claim 1, wherein the obtaining the target bandwidth frequency of the communication transmitting end comprises:
acquiring a preset bandwidth frequency and an average bandwidth frequency of the communication sending end, wherein the target bandwidth frequency comprises the average bandwidth frequency;
comparing the predetermined bandwidth frequency with the average bandwidth frequency to obtain a comparison result, and obtaining one of an uplink bandwidth frequency and a downlink bandwidth frequency of the communication sending end according to the comparison result, wherein the target bandwidth frequency comprises the uplink bandwidth frequency and the downlink bandwidth frequency.
3. The method according to claim 2, wherein obtaining the first bandwidth frequency of the communication transmitting end according to the comparison result comprises:
acquiring the uplink bandwidth frequency of the communication sending end under the condition that the preset bandwidth frequency is greater than the average bandwidth frequency;
and acquiring the downlink bandwidth frequency of the communication sending end under the condition that the preset bandwidth frequency is smaller than the average bandwidth frequency.
4. The method of claim 2, wherein encrypting the target bandwidth frequency and communication content to obtain encrypted transmission data comprises:
acquiring a preset encryption constant;
and encrypting the encryption constant, the target bandwidth frequency and the communication content to obtain the encrypted transmission data.
5. The method of claim 1, wherein encrypting the target bandwidth frequency and communication content to obtain encrypted transmission data comprises:
respectively carrying out modulus taking on the target bandwidth frequency and the communication content to obtain a plurality of groups of modulus values;
and converting the plurality of groups of module values into the encrypted transmission data in a character string format.
6. A communication decryption method, comprising:
receiving target bandwidth frequency and encrypted transmission data sent by a communication sending end;
based on the target bandwidth frequency, decrypting a part corresponding to the target bandwidth frequency in the encrypted transmission data to obtain a communication key;
and decrypting the encrypted transmission data by using the communication key to obtain communication content.
7. The method according to claim 6, wherein, in a case where the encrypted transmission data is further generated according to a predetermined encryption constant, the decrypting a portion of the encrypted transmission data corresponding to the target bandwidth frequency based on the target bandwidth frequency to obtain a communication key includes:
and based on the target bandwidth frequency and the encryption constant, decrypting a part corresponding to the target bandwidth frequency and the encryption constant in the encrypted transmission data to obtain the communication key.
8. A communication encryption apparatus, comprising:
the acquisition module is used for acquiring the target bandwidth frequency of the communication sending end;
the encryption module is used for encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data;
and the sending module is used for sending the target bandwidth frequency and the encrypted transmission data to the communication receiving end.
9. A communication decrypting apparatus, characterized by comprising:
the receiving module is used for receiving the target bandwidth frequency and the encrypted transmission data sent by the communication sending end;
the first decryption module is used for decrypting a part corresponding to the target bandwidth frequency in the encrypted transmission data based on the target bandwidth frequency to obtain a communication key;
and the second decryption module is used for decrypting the encrypted transmission data by using the communication key to obtain communication content.
10. A non-volatile storage medium, comprising a stored program, wherein when the program is executed, a device in which the non-volatile storage medium is installed is controlled to execute the communication encryption method according to any one of claims 1 to 5 or the communication decryption method according to any one of claims 6 to 7.
CN202111617026.7A 2021-12-27 2021-12-27 Communication encryption method, communication decryption device, and non-volatile storage medium Pending CN114301664A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111617026.7A CN114301664A (en) 2021-12-27 2021-12-27 Communication encryption method, communication decryption device, and non-volatile storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111617026.7A CN114301664A (en) 2021-12-27 2021-12-27 Communication encryption method, communication decryption device, and non-volatile storage medium

Publications (1)

Publication Number Publication Date
CN114301664A true CN114301664A (en) 2022-04-08

Family

ID=80969902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111617026.7A Pending CN114301664A (en) 2021-12-27 2021-12-27 Communication encryption method, communication decryption device, and non-volatile storage medium

Country Status (1)

Country Link
CN (1) CN114301664A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110085665A1 (en) * 2009-10-13 2011-04-14 Ajou University Industry Cooperation Foundation Method For Generating Dynamic Group Key
EP2458777A1 (en) * 2010-11-30 2012-05-30 Irdeto B.V. Deriving one or more cryptographic keys of a sequence of keys
CN104040367A (en) * 2011-08-03 2014-09-10 英维斯塔克有限公司 Methods And System For Multi-path Mitigation In Tracking Objects Using Reduced Attenuation RF Technology
CN106452743A (en) * 2016-09-26 2017-02-22 深圳市紫光同创电子有限公司 Communication secret key acquisition method and apparatus and a communication message decryption method and apparatus
CN108039950A (en) * 2017-12-21 2018-05-15 鸿秦(北京)科技有限公司 A kind of solid state hard disk secure authentication method based on NFC
CN110519039A (en) * 2019-07-29 2019-11-29 北京多思安全芯片科技有限公司 A kind of Homomorphic processing of data
CN112583590A (en) * 2020-12-14 2021-03-30 联芸科技(杭州)有限公司 Information issuing method and system based on group shared key
CN113676485A (en) * 2021-08-27 2021-11-19 中国电信股份有限公司 Virtual reality interaction method and device, storage medium and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110085665A1 (en) * 2009-10-13 2011-04-14 Ajou University Industry Cooperation Foundation Method For Generating Dynamic Group Key
EP2458777A1 (en) * 2010-11-30 2012-05-30 Irdeto B.V. Deriving one or more cryptographic keys of a sequence of keys
CN104040367A (en) * 2011-08-03 2014-09-10 英维斯塔克有限公司 Methods And System For Multi-path Mitigation In Tracking Objects Using Reduced Attenuation RF Technology
CN106452743A (en) * 2016-09-26 2017-02-22 深圳市紫光同创电子有限公司 Communication secret key acquisition method and apparatus and a communication message decryption method and apparatus
CN108039950A (en) * 2017-12-21 2018-05-15 鸿秦(北京)科技有限公司 A kind of solid state hard disk secure authentication method based on NFC
CN110519039A (en) * 2019-07-29 2019-11-29 北京多思安全芯片科技有限公司 A kind of Homomorphic processing of data
CN112583590A (en) * 2020-12-14 2021-03-30 联芸科技(杭州)有限公司 Information issuing method and system based on group shared key
CN113676485A (en) * 2021-08-27 2021-11-19 中国电信股份有限公司 Virtual reality interaction method and device, storage medium and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张曦;杜兴民;朱礼亚;: "基于Gabor谱方法的跳频信号时频分析", 数据采集与处理, no. 02 *

Similar Documents

Publication Publication Date Title
US10785019B2 (en) Data transmission method and apparatus
Yau et al. Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems
Steiner et al. Refinement and extension of encrypted key exchange
US9703979B1 (en) Methods and computer program products for encryption key generation and management
CA2646861C (en) Methods and systems for secure channel initialization transaction security based on a low entropy shared secret
AU2019202163B1 (en) Provisioning a secure connection using a pre-shared key
CN108347419A (en) Data transmission method and device
EP3324572A1 (en) Information transmission method and mobile device
CN104219041A (en) Data transmission encryption method applicable for mobile internet
CN112104454B (en) Data secure transmission method and system
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
JP2020532177A (en) Computer-implemented systems and methods for advanced data security, high-speed encryption, and transmission
US9473471B2 (en) Method, apparatus and system for performing proxy transformation
CN110912683B (en) Password storage method and device and password verification method and device
Avestro et al. Hybrid Algorithm Combining Modified Diffie Hellman and RSA
CN106972928B (en) Bastion machine private key management method, device and system
CN109936448A (en) A kind of data transmission method and device
KR101793528B1 (en) Certificateless public key encryption system and receiving terminal
CN110505059B (en) Direct key generation method and device for point-to-point communication of PC5 interface
CN114301664A (en) Communication encryption method, communication decryption device, and non-volatile storage medium
CN111212068B (en) Method for encrypting and decrypting characters by input method
CN104363584B (en) A kind of method, apparatus and terminal of short message Encrypt and Decrypt
CN113507468A (en) Encryption method, decryption method and authorization method based on block chain technology
WO2020237349A1 (en) Methods and devices for optimal information-theoretically secure encryption key management
CA2988628C (en) Methods and computer program products for encryption key generation and management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination