CN116805913A - Military high-safety encryption communication device and communication method thereof - Google Patents

Military high-safety encryption communication device and communication method thereof Download PDF

Info

Publication number
CN116805913A
CN116805913A CN202311064933.2A CN202311064933A CN116805913A CN 116805913 A CN116805913 A CN 116805913A CN 202311064933 A CN202311064933 A CN 202311064933A CN 116805913 A CN116805913 A CN 116805913A
Authority
CN
China
Prior art keywords
random number
equipment
communication
transmitting
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311064933.2A
Other languages
Chinese (zh)
Other versions
CN116805913B (en
Inventor
冯占军
兰玉雄
何鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lingya Chengdu Science And Technology Co ltd
Original Assignee
Lingya Chengdu Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lingya Chengdu Science And Technology Co ltd filed Critical Lingya Chengdu Science And Technology Co ltd
Priority to CN202311064933.2A priority Critical patent/CN116805913B/en
Publication of CN116805913A publication Critical patent/CN116805913A/en
Application granted granted Critical
Publication of CN116805913B publication Critical patent/CN116805913B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a military high-safety encryption communication device and a communication method thereof, relating to the technical field of communication, wherein the device comprises: the device comprises an acquisition module, a construction module and a sending module. The application can construct a first transmission path only comprising the transmission equipment and the receiving equipment, dynamically constructs a second transmission path comprising other communication equipment according to equipment levels of the transmission equipment and the receiving equipment and cluster security coefficients of clusters where the equipment and the receiving equipment are located, and transmits data through the second transmission path to assist in decrypting the data transmitted by the first transmission path, thereby improving the safety and transmission efficiency of communication data and solving the problem that military communication methods in the prior art are easy to crack and attack because of usually being based on fixed encryption algorithms and keys.

Description

Military high-safety encryption communication device and communication method thereof
Technical Field
The application relates to the technical field of communication, in particular to a military high-security encryption communication device and a military high-security encryption communication method.
Background
With the rapid development of communication countermeasure technology, security of information in military communication has become a non-negligible problem. The future battlefield is a digital battlefield, the information making right becomes a new high point for the competition of the two parties after the sea making right and the air making right, the communication is an important component of the information making right, and the environment of serious scout theft and electronic interference is faced. Whether the communication system and the communication network have good anti-interception capability is a primary condition for obtaining the winning of the communication electronic warfare.
However, the conventional military communication method is often based on a fixed encryption algorithm and a secret key, and is easy to crack and attack, and an attacker can steal communication content or tamper data by means of analyzing the encryption algorithm, acquiring the secret key and the like, so that a military high-security encryption communication device and a communication method thereof are needed to solve the problems.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a military high-safety encryption communication device and a military high-safety encryption communication method, and solves the problems that the military communication method in the prior art is always based on a fixed encryption algorithm and a secret key and is easy to crack and attack.
In order to achieve the above purpose, the application adopts the following technical scheme:
in one aspect, a military high security encryption communication device comprises:
the acquisition module is used for acquiring equipment levels of the sending equipment and the receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are located;
the construction module is used for constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment;
the transmission module is used for acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; and acquiring data to be transmitted of the transmitting device, encrypting the data to be transmitted, the device number sequence and the random number sequence by using random numbers, wherein the random numbers comprise a first random number and a second random number, transmitting the encrypted data to the receiving device through a first transmitting path, and sequentially encrypting the second random number through a second transmitting path and transmitting the encrypted data to the receiving device.
Preferably, the acquiring module is specifically configured to:
acquiring equipment information of communication equipment in a cluster, wherein the equipment information comprises average communication duration, average sink duration and calibrated equipment grade;
and determining the cluster security coefficient according to the equipment information.
Preferably, the formula for determining the number of devices in the second transmission path according to the device level and the cluster security coefficient is:
in the method, in the process of the application,for the transmitting device->For receiving the device->For the security factor of the cluster, +.>、/>Is a constant value, and is used for the treatment of the skin,Ffor the number of devices in the second transmission path, is->Is the device class of the transmitting device,/->Is the device class of the receiving device.
Preferably, the formula for determining the cluster security coefficient according to the device information is:
in the method, in the process of the application,cluster safety factor,/->For the sink coefficient of the ith device, < +.>For the communication coefficient of the ith device, +.>For the device class of the ith device, +.>For the communication duration of the ith communication device, < +.>A preset communication duration for the ith communication device,/-for the ith communication device>For the sink duration of the ith communication device, < >>For the repair duration of the ith communication device, < >>The communication coefficient for the ith device, A, B, C, D, E is constant, x is the transmitting device, y is the receiving device,mis a removal transmitting devicexReceiving apparatusyTotal number of remaining devices in the rear cluster.
Preferably, the sending module is specifically configured to:
acquiring data to be transmitted, a first random number and a second random number;
and encrypting the equipment number sequence and the random number sequence by using a first random number, and encrypting the data to be transmitted by using the first random number and the second random number.
Preferably, the first random number is a random number generated by the receiving device, the second random number is a random number generated by the sending device, and the method for obtaining the first random number includes:
the method comprises the steps that a receiving device generates a group of random numbers, encrypts the random numbers by using a private key to obtain an encrypted first random number, and sends the encrypted first random number to the receiving device;
the sending device decrypts the encrypted first random number by using the public key to obtain the first random number.
Preferably, the method further comprises:
the receiving module is used for decrypting the encrypted data sent by the first sending path by using the first random number to obtain a device number sequence and a random number sequence, determining an encryption sequence according to the device number sequence, determining an encryption algorithm according to the random number sequence, decrypting the encrypted second random number sent by the second sending path according to the encryption sequence and the encryption algorithm to obtain a second random number, and decrypting the encrypted data sent by the first path by using the first random number and the second random number to obtain target data.
In another aspect, a method of high security encrypted communication for military use, comprises:
acquiring equipment levels of transmitting equipment and receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are positioned;
constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment;
acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; and acquiring data to be transmitted of the transmitting device, encrypting the data to be transmitted, the device number sequence and the random number sequence by using random numbers, wherein the random numbers comprise a first random number and a second random number, transmitting the encrypted data to the receiving device through a first transmitting path, and sequentially encrypting the second random number through a second transmitting path and transmitting the encrypted data to the receiving device.
The beneficial effects of the application are as follows:
1) Path construction taking into account the security coefficients of the device class and the cluster: according to the equipment levels and cluster safety coefficients of the sending equipment and the receiving equipment, the number of the equipment in the second sending path is determined, the second sending path is dynamically constructed, the path can be flexibly adjusted according to the conditions of the communication equipment, and the safety and the transmission efficiency of communication data are improved.
2) Random encryption algorithm selection: each communication device on the second transmission path independently generates a random number, determines an encryption algorithm according to the random number, increases the randomness and security of the encryption algorithm,
3) Communication security and confidentiality are improved: by constructing the first transmission path and the second transmission path and randomly selecting the encryption algorithm, the safety and confidentiality of communication are further enhanced, so that an attacker is difficult to guess and analyze the selection rule of the encryption algorithm.
4) Transmission efficiency and flexibility are improved: according to the dynamic adjustment of the equipment level, the cluster security coefficient and the equipment number, the efficiency of data transmission is optimized, and meanwhile, the system has flexibility and expansibility and can adapt to the communication requirements of different scenes.
In summary, the application improves the safety and transmission efficiency of communication data by selecting the random encryption algorithm, considering the path construction of the equipment level and the cluster security coefficient, dynamically adjusting the number of communication equipment, and the like.
Drawings
Fig. 1 is a schematic structural diagram of a military high-security encryption communication device according to an embodiment of the present application
Fig. 2 is a schematic structural diagram of a military high-security encryption communication method according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application is provided to facilitate understanding of the present application by those skilled in the art, but it should be understood that the present application is not limited to the scope of the embodiments, and all the applications which make use of the inventive concept are protected by the spirit and scope of the present application as defined and defined in the appended claims to those skilled in the art.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a military high security encryption communication device according to an embodiment of the present application, where the device includes:
the acquisition module is used for acquiring equipment levels of the sending equipment and the receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are located;
in order to increase the complexity of the encryption algorithm and further increase the security of the data, a cluster is configured comprising a plurality of communication devices, which may be military devices or civil devices or other devices, it is noted that these devices are each provided with a corresponding device class and device number when configured as a cluster and that only the military device may act as a transmitting device and a receiving device, while the other devices act as auxiliary communication devices.
In an embodiment of the present application, the obtaining module is specifically configured to: acquiring equipment information of communication equipment in a cluster, wherein the communication equipment is non-transmitting equipment and non-receiving equipment in the cluster, and the equipment information comprises average communication duration, average fall duration and calibrated equipment grade; and determining the cluster security coefficient according to the equipment information.
In the embodiment of the application, the formula for determining the cluster security coefficient according to the equipment information is as follows:
in the method, in the process of the application,cluster safety factor,/->For the sink coefficient of the ith device, < +.>For the communication coefficient of the ith device, +.>For the device class of the ith device, +.>For the communication duration of the ith communication device, < +.>A preset communication duration for the ith communication device,/-for the ith communication device>For the sink duration of the ith communication device, < >>For the repair duration of the ith communication device, < >>The communication coefficient for the ith device, A, B, C, D, E is constant, x is the transmitting device, y is the receiving device,mis a removal transmitting devicexReceiving apparatusyTotal number of remaining devices in the rear cluster.
Specifically, the larger the sinking coefficient is, the lower the reliability of the communication equipment is, the larger the communication coefficient is, the higher the communication pressure of the communication equipment is, the cluster safety coefficient is adjusted according to the communication condition and the sinking condition of the communication equipment in the cluster, and the number of the communication equipment on the transmission path is conveniently and subsequently determined according to the cluster safety coefficient.
In the embodiment of the present application, the formula for determining the number of devices in the second transmission path according to the device class and the cluster security coefficient is:
in the method, in the process of the application,for the transmitting device->For receiving the device->For the security factor of the cluster, +.>、/>Is a constant value, and is used for the treatment of the skin,Ffor the number of devices in the second transmission path, is->Is the device class of the transmitting device,/->Is the device class of the receiving device.
Specifically, the larger the device level gap between the transmission devices, the more communication devices that need to be selected, and the smaller the device level gap, the fewer communication devices that need to be selected. The larger the cluster safety coefficient is, the higher the cluster safety is, at this time, the safety of data transmission can be ensured only by selecting fewer communication devices, the data transmission time, the power consumption and the like can be reduced, and if the lower the cluster safety coefficient is, the lower the cluster safety is, at this time, more communication devices are required to be selected to ensure the safety of data transmission.
The construction module is used for constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment;
in order to further improve communication safety, the embodiment of the application respectively constructs the first transmission path and the second transmission path, and the second transmission path comprehensively considers the random construction of the information of the cluster, the transmission equipment and the receiving equipment, so that the equipment communication is safer and more reliable due to the randomness of the information, and a new idea is provided for subsequent data transmission and encryption and decryption.
The transmission module is used for acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; and acquiring data to be transmitted of the transmitting device, encrypting the data to be transmitted, the device number sequence and the random number sequence by using random numbers, wherein the random numbers comprise a first random number and a second random number, transmitting the encrypted data to the receiving device through a first transmitting path, and sequentially encrypting the second random number through a second transmitting path and transmitting the encrypted data to the receiving device.
The method for determining the encryption algorithm of the communication equipment by the random number sequence comprises the following steps: the communication devices on the second transmission path are selected as devices, each communication device needs to randomly generate a random number through a pseudo-random number generator, a true random number generator or a mixed random number generator, if the random number is one of the encryption algorithm serial numbers, the encryption algorithm corresponding to the encryption algorithm serial number is directly used as the encryption algorithm of the communication device in the data transmission process, wherein the encryption algorithm serial number and the encryption algorithm are stored in an encryption algorithm table in an associated mode, if the random number is not one of the encryption algorithm serial numbers, the total number of the encryption algorithms is calculated and divided, and the encryption algorithm is determined according to the rest numbers.
According to the application, by using the pseudo-random number generator, the true random number generator or the mixed random number generator, each communication device can generate a random number, and the high randomness method can improve the randomness and the safety of the encryption algorithm, so that an attacker is difficult to guess and analyze the selection rule of the encryption algorithm; in addition, each communication device independently generates a random number, and determines an encryption algorithm according to the random number generated by the communication device, so that the encryption algorithms adopted by different communication devices on the same communication link are different, the difficulty of an attacker attack is increased, and even if the random number of some devices is acquired by the attacker, other devices can still keep safety.
In the embodiment of the present application, the sending module is specifically configured to: acquiring data to be transmitted, a first random number and a second random number; encrypting the equipment number sequence and the random number sequence by using a first random number, and encrypting the data to be transmitted by using the first random number and the second random number; the first random number is a random number generated by the receiving device, and the second random number is a random number generated by the transmitting device.
In the embodiment of the application, the method for acquiring the first random number comprises the following steps: the method comprises the steps that a receiving device generates a group of random numbers, encrypts the random numbers by using a private key to obtain an encrypted first random number, and sends the encrypted first random number to the receiving device; the sending device decrypts the encrypted first random number by using the public key to obtain the first random number. Of course, the method by which the receiving device obtains the first random number includes, but is not limited to, encrypting this based on the public key and the private key.
In an embodiment, the method for encrypting the data to be sent by using the first random number and the second random number is as follows: splitting the data to be sent to obtain first data to be sent and second data to be sent; encrypting the first data to be sent by using a first random number, and encrypting the second data to be sent by using the second random number, wherein the method for splitting the data to be sent comprises but is not limited to interval extraction, cutting and the like.
In another embodiment, the method for encrypting the data to be transmitted by using the first random number and the second random number is as follows: and encrypting the first random number by using the second random number to obtain an encrypted random number, and encrypting the data to be transmitted by using the encrypted random number.
In another embodiment, the method for encrypting the data to be transmitted by using the first random number and the second random number is as follows: and encrypting the second random number by using the first random number to obtain an encrypted random number, and encrypting the data to be transmitted by using the encrypted random number.
In an embodiment of the present application, the method further includes: the receiving module is used for decrypting the encrypted data sent by the first sending path by using the first random number to obtain a device number sequence and a random number sequence, determining an encryption sequence according to the device number sequence, determining an encryption algorithm according to the random number sequence, decrypting the encrypted second random number sent by the second sending path according to the encryption sequence and the encryption algorithm to obtain a second random number, and decrypting the encrypted data sent by the first path by using the first random number and the second random number to obtain target data.
Because the first transmission path is a direct communication link from the transmitting device to the receiving device, the second transmission path is an indirect communication link from the transmitting device to the receiving device, and a plurality of communication nodes exist on the indirect communication link, if the data to be transmitted is directly split and then transmitted to the receiving device after being sequentially encrypted through the second transmission path, the transmission time is long, the transmission power is low, and the equipment is easy to break down.
In summary, the method and the device can construct the first transmission path only comprising the transmitting equipment and the receiving equipment, dynamically construct the second transmission path comprising other communication equipment according to the equipment levels of the transmitting equipment and the receiving equipment and the cluster security coefficient of the cluster where the transmitting equipment and the receiving equipment are located, and transmit data through the second transmission path to assist in decrypting the data transmitted by the first transmission path, thereby improving the safety and the transmission efficiency of the communication data, and solving the problem that the military communication method in the prior art is easy to crack and attack due to the fixed encryption algorithm and the secret key.
Referring to fig. 2, fig. 2 is a flowchart of a military high security encryption communication method according to an embodiment of the present application, including: acquiring equipment levels of transmitting equipment and receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are positioned; constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment; acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; and acquiring data to be transmitted of the transmitting device, encrypting the data to be transmitted, the device number sequence and the random number sequence by using random numbers, wherein the random numbers comprise a first random number and a second random number, transmitting the encrypted data to the receiving device through a first transmitting path, and sequentially encrypting the second random number through a second transmitting path and transmitting the encrypted data to the receiving device.
It should be understood that, for the same inventive concept, the working principles of each step in the embodiments of the present application may refer to the embodiments described above, and details are not repeated in the embodiments of the present application.
It will be apparent to those skilled in the art that while preferred embodiments of the present application have been described, additional variations and modifications may be made to these embodiments once the basic inventive concepts are known to those skilled in the art. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application. It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (8)

1. A military high security encryption communication apparatus comprising:
the acquisition module is used for acquiring equipment levels of the sending equipment and the receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are located;
the construction module is used for constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment;
the transmission module is used for acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; and acquiring data to be transmitted of the transmitting device, encrypting the data to be transmitted, the device number sequence and the random number sequence by using random numbers, wherein the random numbers comprise a first random number and a second random number, transmitting the encrypted data to the receiving device through a first transmitting path, and sequentially encrypting the second random number through a second transmitting path and transmitting the encrypted data to the receiving device.
2. The high security encryption communication device of claim 1, wherein the acquisition module is specifically configured to:
acquiring equipment information of communication equipment in a cluster, wherein the equipment information comprises communication duration, sink duration and equipment grade, and the communication equipment is non-transmitting equipment and non-receiving equipment in the cluster;
and determining the cluster security coefficient according to the equipment information.
3. The military high security encryption communication set of claim 2, wherein the formula for determining the number of devices in the second transmission path based on the device class and the cluster security factor is:
in the method, in the process of the application,for the transmitting device->For receiving the device->For the security factor of the cluster, +.>、/>Is a constant value, and is used for the treatment of the skin,Ffor the number of devices in the second transmission path, is->Is the device class of the transmitting device,/->Is the device class of the receiving device.
4. The high security encryption communication device of claim 2, wherein the formula for determining the cluster security factor from the device information is:
in the method, in the process of the application,cluster safety factor,/->For the sink coefficient of the ith device, < +.>For the communication coefficient of the ith device, +.>Device class for the ith device,/>For the communication duration of the ith communication device, < +.>A preset communication duration for the ith communication device,/-for the ith communication device>For the sink duration of the ith communication device, < >>For the repair duration of the ith communication device, < >>The communication coefficient for the ith device, A, B, C, D, E is constant, x is the transmitting device, y is the receiving device,mis a removal transmitting devicexReceiving apparatusyTotal number of remaining devices in the rear cluster.
5. The military high security encryption communication set of claim 1, wherein the transmitting module is specifically configured to:
acquiring data to be transmitted, a first random number and a second random number;
and encrypting the equipment number sequence and the random number sequence by using a first random number, and encrypting the data to be transmitted by using the first random number and the second random number.
6. The high security cryptographic communication apparatus for military use according to claim 5, wherein said first random number is a random number generated by said receiving device, said second random number is a random number generated by said transmitting device, and wherein said method of obtaining said first random number comprises:
the method comprises the steps that a receiving device generates a group of random numbers, encrypts the random numbers by using a private key to obtain an encrypted first random number, and sends the encrypted first random number to the receiving device;
the sending device decrypts the encrypted first random number by using the public key to obtain the first random number.
7. The military high security encryption communication set of claim 5, further comprising:
the receiving module is used for decrypting the encrypted data sent by the first sending path by using the first random number to obtain a device number sequence and a random number sequence, determining an encryption sequence according to the device number sequence, determining an encryption algorithm according to the random number sequence, decrypting the encrypted second random number sent by the second sending path according to the encryption sequence and the encryption algorithm to obtain a second random number, and decrypting the encrypted data sent by the first path by using the first random number and the second random number to obtain target data.
8. A military high security encryption communication method, comprising:
acquiring equipment levels of transmitting equipment and receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are positioned;
constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment;
acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; and acquiring data to be transmitted of the transmitting device, encrypting the data to be transmitted, the device number sequence and the random number sequence by using random numbers, wherein the random numbers comprise a first random number and a second random number, transmitting the encrypted data to the receiving device through a first transmitting path, and sequentially encrypting the second random number through a second transmitting path and transmitting the encrypted data to the receiving device.
CN202311064933.2A 2023-08-23 2023-08-23 Military high-safety encryption communication device and communication method thereof Active CN116805913B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311064933.2A CN116805913B (en) 2023-08-23 2023-08-23 Military high-safety encryption communication device and communication method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311064933.2A CN116805913B (en) 2023-08-23 2023-08-23 Military high-safety encryption communication device and communication method thereof

Publications (2)

Publication Number Publication Date
CN116805913A true CN116805913A (en) 2023-09-26
CN116805913B CN116805913B (en) 2023-11-07

Family

ID=88079715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311064933.2A Active CN116805913B (en) 2023-08-23 2023-08-23 Military high-safety encryption communication device and communication method thereof

Country Status (1)

Country Link
CN (1) CN116805913B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241760A (en) * 2018-09-28 2019-01-18 北京北信源信息安全技术有限公司 Data ciphering method, decryption method, encryption device and decryption device
US20190123897A1 (en) * 2017-10-19 2019-04-25 Bank Of America Corporation Method and apparatus for perfect forward secrecy using deterministic hierarchy
CN110620792A (en) * 2019-10-24 2019-12-27 福建星网视易信息系统有限公司 Communication encryption method, communication device, system, and computer-readable storage medium
CN110830587A (en) * 2019-11-14 2020-02-21 腾讯科技(深圳)有限公司 Data transmission method, device, equipment and storage medium
CN111278008A (en) * 2020-01-13 2020-06-12 山东大学 Safety communication method and system for military unmanned aerial vehicle group keyless management center
CN113922961A (en) * 2021-11-11 2022-01-11 成都合盛智联科技有限公司 Data encryption and decryption transmission method in intelligent security community platform data issuing and gathering
US20220094690A1 (en) * 2021-12-02 2022-03-24 Intel Corporation Trusted and connected multi-domain node clusters
CN114244508A (en) * 2021-12-15 2022-03-25 平安科技(深圳)有限公司 Data encryption method, device, equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190123897A1 (en) * 2017-10-19 2019-04-25 Bank Of America Corporation Method and apparatus for perfect forward secrecy using deterministic hierarchy
CN109241760A (en) * 2018-09-28 2019-01-18 北京北信源信息安全技术有限公司 Data ciphering method, decryption method, encryption device and decryption device
CN110620792A (en) * 2019-10-24 2019-12-27 福建星网视易信息系统有限公司 Communication encryption method, communication device, system, and computer-readable storage medium
CN110830587A (en) * 2019-11-14 2020-02-21 腾讯科技(深圳)有限公司 Data transmission method, device, equipment and storage medium
CN111278008A (en) * 2020-01-13 2020-06-12 山东大学 Safety communication method and system for military unmanned aerial vehicle group keyless management center
CN113922961A (en) * 2021-11-11 2022-01-11 成都合盛智联科技有限公司 Data encryption and decryption transmission method in intelligent security community platform data issuing and gathering
US20220094690A1 (en) * 2021-12-02 2022-03-24 Intel Corporation Trusted and connected multi-domain node clusters
CN114244508A (en) * 2021-12-15 2022-03-25 平安科技(深圳)有限公司 Data encryption method, device, equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘军: "集群网络密钥管理方案研究综述", 网络与信息安全学报 *
汪艳丽: "无线超短波语音数字化集群加密系统研究", 电信技术 *

Also Published As

Publication number Publication date
CN116805913B (en) 2023-11-07

Similar Documents

Publication Publication Date Title
Pujari et al. A hybridized model for image encryption through genetic algorithm and DNA sequence
US7831051B2 (en) Secure communication between a hardware device and a computer
US8942371B2 (en) Method and system for a symmetric block cipher using a plurality of symmetric algorithms
CN1659821A (en) Method for secure data exchange between two devices
CN102904713A (en) Key exchange method for secret key encryption communication system
CN106453318A (en) Data transmission system and method based on security module
CN112367342B (en) Encryption transmission method and system for distributed photovoltaic operation and maintenance data
CN114493593B (en) Multi-block chain hidden communication method
CN104378196A (en) Method and device for safely executing encryption and decryption algorithm
CN110855667B (en) Block chain encryption method, device and system
CN110677236A (en) OFDM encryption method based on composite chaotic system and XOR operation
CN112165443A (en) Multi-key information encryption and decryption method and device and storage medium
WO2007044042A2 (en) Encryption methods and apparatus
KR101765207B1 (en) System for securing traffic signal and method for using the same
CN111600661B (en) Three-dimensional encryption OFDM optical system based on real-time updated chaotic key distribution
Bangera et al. Multilayer security using RSA cryptography and dual audio steganography
CN116805913B (en) Military high-safety encryption communication device and communication method thereof
CN115333845B (en) Privacy data verification method based on subset
CN111464549A (en) Computer network information security event processing method
CN115150076A (en) Encryption system and method based on quantum random number
CN114745105A (en) Quantum walking and AES (advanced encryption standard) improved image encryption method
RU2007129927A (en) COMMUNICATION SYSTEM AND METHOD OF COMMUNICATION
CN112069487A (en) Intelligent equipment network communication safety implementation method based on Internet of things
CN112765686A (en) Power consumption attack prevention framework and method for algorithm key in chip
Adedeji et al. Improved image encryption for real-time application over wireless communication networks using hybrid cryptography technique

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant