CN1330353A - Information encryption method and system - Google Patents

Information encryption method and system Download PDF

Info

Publication number
CN1330353A
CN1330353A CN 00109666 CN00109666A CN1330353A CN 1330353 A CN1330353 A CN 1330353A CN 00109666 CN00109666 CN 00109666 CN 00109666 A CN00109666 A CN 00109666A CN 1330353 A CN1330353 A CN 1330353A
Authority
CN
China
Prior art keywords
encryption
decryption
key
information
decipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 00109666
Other languages
Chinese (zh)
Inventor
张勤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HUANUO INFORMATION TECHN Co Ltd
Original Assignee
BEIJING HUANUO INFORMATION TECHN Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HUANUO INFORMATION TECHN Co Ltd filed Critical BEIJING HUANUO INFORMATION TECHN Co Ltd
Priority to CN 00109666 priority Critical patent/CN1330353A/en
Publication of CN1330353A publication Critical patent/CN1330353A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

An encription method for real-time synchronous transmission of image and sound over broadband multimedia network is disclosed, which features that different encryption and decryption algorithms are used for different information and different encryption and decryption algorithms are combined. Its advantages are high reliability, flexible delay and high system efficiency.

Description

The encryption method of information and system
The present invention relates to a kind of encryption method and system of information, particularly a kind of information transmission system that is applied to image, sound etc. is carried out real-time synchronous transmission is the encryption method and the system of multimedia wideband network for example.
In recent years, broadband network based on cable television network obtains develop rapidly and has vast potential for future development, it not only can improve message transmission rate greatly and transmission capacity is big, can support multiple services such as Digital Television, data broadcasting, video request program, videophone and online value-added service, satisfied the demand of users aspect the broadband high-speed communication, meanwhile to the higher requirement of the also corresponding proposition of encryption system.The present invention is mainly used in the multimedia wideband network that can carry out real-time synchronous transmission to image, sound etc., as shown in Figure 1.The information source here can be satellite television, adopt the program of different compression methods compressions, also can be multiple services such as video request program/quasi-video request program (VOD/NVOD), the Internet access.Information source becomes the transport stream that takies different frequency range through multiplexer, encrypt through encryption equipment then, become radiofrequency signal through the modulator up-conversion again, following transmission mode can be divided into 2 kinds, a kind of is to enter home gateway by two-way HFC net, and functions such as deciphering, demodulation, decompression all realize in home gateway.Home gateway is sent to televisor, home PC etc. as required.Another kind of transmission mode is delivered a letter breath by unidirectional HFC net under being, the information of uploading is passed through common telephone network.The information of uploading is given the loop receiver, carries out analysis and Control to controller then and passes to different subsystems.
Employed encryption system is based on maintaining secrecy of encryption method in above-mentioned network, fixing cryptographic services can only be provided, embodiment as shown in Figure 2, the data X of transmission is through encryption equipment, configuring cipher key K, (X K) makes X by expressly becoming ciphertext Y, passes through decipher again after finishing transmission by encryption function H, configuration decryption key k, be reduced to expressly X by decryption function h, wherein: ciphertext Y=H (X, K); Expressly X=h (Y, k), encryption function H equates with decryption function h, i.e. H=k, K can equate with k also can not wait, i.e. K=k, perhaps K ≠ k.
In the encryption system of existing broadband, H is a kind of fixing encryption mapping method, be immutable, usually adopt following method, as: the digital encryption standard DES (DataEncryption Standard) that the U.S. adopts, Marurer randomization password, the PIKE cryptographic algorithm, the Gifford cryptographic algorithm, stream cipher arithmetic and RC-5 algorithm by the quick software and hardware realization of the RC-4 of RSA company proposition, IDEA IDEA (International DataEncryption Algorithm), non-packet dedicated cryptographic algorithm SAFER-K64 (Secure AndFast Encryption Routine), the GOST cryptographic algorithm that the former Soviet states Bureau of Standards adopts, the SEAL (Software Encryption Algorithm) that IBM proposes, the CRAB algorithm of RSA lab design, the MP-T cipher system, the ELGamal cipher system, the ECC elliptic curve cryptosystem that Canada Certicom company proposes comprises IEEE P1363 and ANSI X9 standard, the McEliece cipher system, the Rabin cipher system, Williams cipher system or the like.The H function can only carry out a small amount of remainder adjustment under individual cases.The encryption system of more than telling about has deficiency in the following aspects:
(1) encryption method that a certain system is adopted is fixed, and when system changes, can't change corresponding encryption method, lacks dirigibility;
(2) length of the key K in the real-time encrypted system in broadband is fixed, and is cracked easily, uses inconvenient;
(3) because the encryption method that adopts is fixed,, be difficult for improving with the upgrading of system so reliability is fixed;
(4) have fixing time-delay, i.e. the certain time delay of this process need of Chuan Shu data encrypting and deciphering because the encryption method that adopts fixes, so can't satisfy that different system or system finish different task to the different requirements of time delay.Particularly for the system that need carry out real-time synchronous transmission to image, sound etc., existing encryption method will can't meet the demands because of ductility at that time;
(5) have fixing complexity, promptly,, cracked easily and lack dirigibility so the complicacy of this process of encryption and decryption is also fixed because the encryption method that adopts is fixed;
(6) different system adopts different encryption methods, encryption equipment and decipher between therefore different systems do not match, as shown in Figure 3, the decipher of system 2 can't be decrypted the encryption equipment of system 1, between system 1 and system 2, must change demoder during communication as need, thereby cause the waste of time, personnel and material.
Purpose of the present invention is just in order to overcome above deficiency, a kind of information transmission system that is applied to image, sound etc. is carried out real-time the synchronous transmission for example encryption method and the system of multimedia wideband network are provided, can improve the degree of reliability of encrypting, be applicable to the system that information is carried out synchronous transmission, and can solve the problem that to communicate by letter because encryption equipment does not match with decipher between different system.
In encryption method of the present invention; the Systems Operator can change elementary cell in real time; mode with series and parallel or two dimension, three-dimensional and multi-dimensional matrix on the basis of elementary cell constructs more complicated encryption system; realize the compound use of elementary cell encryption method; and adopt in real time and control; the method provides 2 repair and maintenance to protect factor in original system: the interweaving property that encrypt (1), the synchronism of (2) encryption and decryption makes it have higher reliability.
The present invention has the following advantages:
(1) the present invention can make the user use different systems or use the user of different system can direct dialogue;
(2) different encryption systems is interweaved use makes system have higher security;
(3) can adopt corresponding encryption method according to the demand of different task, thereby improve the arithmetic speed of system;
(4) can adopt corresponding encryption method according to the requirement to complexity of system, thereby improve the operational efficiency of system;
(5) the compound use of employing encryption method, thereby the security that improves system;
Owing to have above advantage, thereby reduce the cost of system;
In encryption method of the present invention, according to the different mining of cryptographic tasks with different cryptographic algorithm, according to same information or program are adopted different cryptographic algorithm in the different periods, use different several situations such as cryptographic algorithm according to ciphering process, on the basis of basic ciphering unit, construct complexity and the encryption system of tool dirigibility with series, parallel or alternate manner, can increase reliability, the security of encryption system, improve operational efficiency, reduce cost.
Below also the present invention is further illustrated in conjunction with the embodiments by accompanying drawing.
Fig. 1 is the synoptic diagram of the encryption system that adopts in the existing multimedia wideband network;
Fig. 2 is the theory diagram of existing encryption system;
Fig. 3 is in existing 2 communication systems because encryption equipment, decipher is not complementary and the synoptic diagram that can not communicate by letter;
Fig. 4 is the theory diagram of encryption method of the present invention;
Fig. 5 is the synoptic diagram that encryption method of the present invention is applied to broadband transmission network;
Fig. 6 is an example in the encryption method of the present invention that various cryptographic algorithm are multiplexing;
Fig. 7 is another example in the encryption method of the present invention that various cryptographic algorithm are multiplexing.
Emphasis of the present invention is at structure variable in time function H and configuring cipher key K, H is for encrypting the mapping method set in the present invention, be H=f (X, K, t), so native system can be according to the difference of required encrypted content, or in the different periods, adopt different algorithms to realize encryption and decryption and dispose corresponding key.For example, the information of price comparison costliness or program are used the algorithm construction function H of more complicated, can adopt simple algorithm to realize encrypting for general information or program; Another kind of situation can be used different algorithms at times to the information or the program of price comparison costliness, disposes different key K; The third situation, the different algorithm of different phase employing to ciphering process uses a kind of algorithm as producing key K, and transmission security key K uses another kind of algorithm.
The theory diagram of encryption system of the present invention is made up of four parts such as information source, key generator, encryption equipment, transmission channel, deciphers as shown in Figure 4.Fig. 5 represents that encryption system of the present invention is used for an example of broadband transmission network, and wherein, hardware components comprises information source, key generator, encryption equipment, transmission channel, decipher, control center.The H function of encryption equipment, decipher is combined by different cryptographic algorithm, forms to encrypt the mapping method set.In this embodiment, mainly enumerate 3 kinds of cryptographic algorithm commonly used: IDEA algorithm, RSA Algorithm, the DES algorithm, adopt mode in parallel to make up, these algorithms all are disclosed, and any disclosed algorithm all can carry out independent assortment and the not strict present embodiment that is limited to.The ciphering process that this encryption system is implemented is as follows:
(1) produces information transmitted by information source, also claim expressly;
(2) control the selection cryptographic algorithm by control center according to information feature, the DES algorithm is mainly used in the encryption of general information in the present embodiment, the IDEA algorithm can fast encrypt, and RSA Algorithm is a kind of security public key encryption algorithm preferably, can be used for the information encryption of comparison secret, as encryption to key;
(3) the algorithm configuration key K of being selected according to control center by key generator is sent into encryption equipment, decipher simultaneously;
(4) expressly finishing ciphering process by encryption equipment becomes ciphertext;
(5) ciphertext is transmitted by transmission channel;
(6) ciphertext is finished decrypting process by decipher and is become expressly.
In the present embodiment, key generator sends to key K, decryption key k in encryption equipment, the decipher simultaneously, makes encryption and decryption finish synchronously in real time.The transmission course of key can be undertaken by following 3 kinds of modes:
(1) key can be transferred in encryption equipment, the decipher by IC-card;
(2) can be placed on key in the secret envelope, transmit by the normal transmission channel;
(3) can adopt a kind of transmit leg and the take over party generation method of the key of agreement in advance, in encryption equipment and decipher, produce automatically simultaneously, realize in real time encryption and decryption synchronously.
(4) the encryption mapping function set H in the encryption equipment gathered h with the deciphering mapping function in the decipher and can equate also can not wait this moment, i.e. H=h, perhaps H ≠ h, key K can equal k simultaneously, also can be not equal to k, i.e. K=k, perhaps K ≠ k, the enforcement of not overslaugh present embodiment.
In the present embodiment, because control the selection cryptographic algorithm according to information feature by control center, send into encryption equipment, decipher simultaneously by the algorithm configuration key K that key generator is selected according to control center, so compare with the system of the fixing encryption method of in the past employing, advantage with flexible replacing encryption method, even between the different systems, by adopting method of the present invention, also can direct communication.And when system upgrade, also very strong adaptability can be arranged.
The algorithm of encryption equipment, decipher can also have 2 kinds of array modes in addition in the present embodiment, and respectively as Fig. 6, shown in Figure 7, these 2 kinds of array modes just form more complicated cryptographic algorithm, and total system is implemented encryption and decryption process did not influence.
More than be that example is illustrated with the multimedia wideband network, be noted that application of the present invention is not limited only to multimedia wideband network, every system that relates to information encryption all can use method and system of the present invention.

Claims (10)

1. method of information being carried out encryption and decryption, it is characterized in that,, adopt different encryption and decryption algorithms by for the different information contents, and dissimilar cryptographic algorithm or decipherment algorithm made up, come information transmitted is encrypted or deciphered.
2. the method for encryption and decryption according to claim 1 is characterized in that, described method can realize by following steps:
(1) produces information transmitted promptly expressly by information source;
(2) control selection cryptographic algorithm and decipherment algorithm according to information feature;
(3) by algorithm configuration key K, the decryption key k of key generator, send into encryption equipment, decipher simultaneously respectively according to selection in above-mentioned steps (2);
(4) will be expressly after ciphering process by encryption equipment becomes ciphertext and ciphertext transmitted by transmission channel, according to key the decrypting process of ciphertext by decipher become expressly.
3. the method for encryption and decryption according to claim 1 and 2 is characterized in that, described encryption, decrypting process are finished in real time synchronously.
4. the method for encryption and decryption according to claim 1 is characterized in that, uses different algorithms in the different period of information transmission.
5. the method for encryption and decryption according to claim 2 is characterized in that, the encryption function H in the encryption equipment equates with the decryption function h in the decipher, i.e. H=h.
6. the method for encryption and decryption according to claim 2 is characterized in that, encryption function H and the decryption function h in the decipher in the encryption equipment are unequal, i.e. H ≠ h.
7. the method for encryption and decryption according to claim 2 is characterized in that, key K equals decryption key k, i.e. K=k.
8. the method for encryption and decryption according to claim 2 is characterized in that, key K is not equal to decryption key k, i.e. K ≠ k.
9. the encryption and decryption system of an information, be applied to information be carried out system for transmitting by transmission channel, comprise: information source, produce the key generator of key, encryption equipment that information is encrypted, with the decipher that information encrypted is decrypted, it is characterized in that
Encryption function in the described encryption equipment is combined by different cryptographic algorithm;
Decryption function in the described decipher is combined by different decipherment algorithms;
Described encryption and decryption system also comprises control center, is used for selecting to determine the cryptographic algorithm of encryption equipment and the decipherment algorithm in the decipher.
10. encryption according to claim 9 and encryption system, it is characterized in that, algorithm configuration key K, decryption key k that described key generator is selected according to control center send into encryption equipment, decipher simultaneously respectively, and described encryption, decrypting process are finished in real time synchronously.
CN 00109666 2000-06-20 2000-06-20 Information encryption method and system Pending CN1330353A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 00109666 CN1330353A (en) 2000-06-20 2000-06-20 Information encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 00109666 CN1330353A (en) 2000-06-20 2000-06-20 Information encryption method and system

Publications (1)

Publication Number Publication Date
CN1330353A true CN1330353A (en) 2002-01-09

Family

ID=4579777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 00109666 Pending CN1330353A (en) 2000-06-20 2000-06-20 Information encryption method and system

Country Status (1)

Country Link
CN (1) CN1330353A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100438388C (en) * 2002-12-16 2008-11-26 中国电子科技集团公司第三十研究所 Time-sharing gap encrypting-diencrypting technology suitable for group path channels
CN101059957B (en) * 2007-05-24 2011-06-22 华中科技大学 An audio coding selective cryptographic method
CN102158863A (en) * 2011-02-18 2011-08-17 惠州Tcl移动通信有限公司 System and method for authenticating JAVA-based mobile terminal, server and terminal
CN1926800B (en) * 2003-10-20 2011-11-16 伊索普株式会社 Information encryption transmission/reception method
CN102523087A (en) * 2011-12-14 2012-06-27 百度在线网络技术(北京)有限公司 Method and equipment for carrying out encrypting treatment on self-execution network information
CN1985463B (en) * 2004-07-09 2012-08-08 诺基亚公司 Managing traffic keys during a multi-media session
CN106850220A (en) * 2017-02-22 2017-06-13 腾讯科技(深圳)有限公司 Data ciphering method, data decryption method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100438388C (en) * 2002-12-16 2008-11-26 中国电子科技集团公司第三十研究所 Time-sharing gap encrypting-diencrypting technology suitable for group path channels
CN1926800B (en) * 2003-10-20 2011-11-16 伊索普株式会社 Information encryption transmission/reception method
CN1985463B (en) * 2004-07-09 2012-08-08 诺基亚公司 Managing traffic keys during a multi-media session
CN101059957B (en) * 2007-05-24 2011-06-22 华中科技大学 An audio coding selective cryptographic method
CN102158863A (en) * 2011-02-18 2011-08-17 惠州Tcl移动通信有限公司 System and method for authenticating JAVA-based mobile terminal, server and terminal
CN102523087A (en) * 2011-12-14 2012-06-27 百度在线网络技术(北京)有限公司 Method and equipment for carrying out encrypting treatment on self-execution network information
CN102523087B (en) * 2011-12-14 2015-02-11 百度在线网络技术(北京)有限公司 Method and equipment for carrying out encrypting treatment on self-execution network information
CN106850220A (en) * 2017-02-22 2017-06-13 腾讯科技(深圳)有限公司 Data ciphering method, data decryption method and device

Similar Documents

Publication Publication Date Title
JP4907518B2 (en) Method and system for generating transcodable encrypted content
US5907619A (en) Secure compressed imaging
US8781967B2 (en) Watermarking in an encrypted domain
EP0709760B1 (en) Data copyright management system
CN1186731C (en) Method and apparatus for protecting copyright data in computer system
EP3195519B1 (en) Encoder, decoder and methods employing partial data encryption
JP2004504765A (en) Secure packet-based data broadcasting architecture
CN1273490A (en) Cipher method and device for limitting inserting transfered program content
JP2003324418A (en) Image processor, data process apparatus and method therefor
JP5437073B2 (en) Method and apparatus for managing keys and method and apparatus for acquiring keys
KR20070022089A (en) Methods and systems for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content
JP2002510164A (en) Method and apparatus for communicating a secret message to selected members
Raju et al. Fast and secure real-time video encryption
CN1330353A (en) Information encryption method and system
Mabruri Data security system of text messaging based on android mobile devices using advanced encrytion standard dynamic s-box
US20020064278A1 (en) High speed RSA public key cryptographic apparatus and method
JP4838809B2 (en) Method for transmitting a message between a transmitter and at least one receiver, and a system for implementing this method
US7483535B2 (en) Transmission of generalized scalable bit-streams
Aly et al. A light-weight encrypting for real time video transmission
CN1355654A (en) Encryption system for cable TV network
JP4667235B2 (en) Data distribution / reception system and data distribution / reception method
Lindskog et al. A content-independent scalable encryption model
JP3202544B2 (en) Encryption communication device and encryption device
Huang et al. Research of H. 264 video transmission encryption technology based on blowfish algorithm
Kadam et al. Video frame encryption algorithm using AES

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication