CN103067166B - The stepped mixing encryption method and device of a kind of intelligent home system - Google Patents

The stepped mixing encryption method and device of a kind of intelligent home system Download PDF

Info

Publication number
CN103067166B
CN103067166B CN201110317834.1A CN201110317834A CN103067166B CN 103067166 B CN103067166 B CN 103067166B CN 201110317834 A CN201110317834 A CN 201110317834A CN 103067166 B CN103067166 B CN 103067166B
Authority
CN
China
Prior art keywords
subnet
mode
symmetric cryptography
encryption
intelligent terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110317834.1A
Other languages
Chinese (zh)
Other versions
CN103067166A (en
Inventor
喻子达
王袭
赵向阳
周林
韩文
安娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haier Group Corp
Haier Group Technology Research and Development Center
Original Assignee
Haier Group Corp
Haier Group Technology Research and Development Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haier Group Corp, Haier Group Technology Research and Development Center filed Critical Haier Group Corp
Priority to CN201110317834.1A priority Critical patent/CN103067166B/en
Priority to PCT/CN2011/085081 priority patent/WO2013056502A1/en
Publication of CN103067166A publication Critical patent/CN103067166A/en
Application granted granted Critical
Publication of CN103067166B publication Critical patent/CN103067166B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses the stepped mixing encryption method and device of a kind of intelligent home system, including:Same subnet is closed between lower each intelligent terminal, subnet closes and is set to encryption mechanism in cluster between intelligent terminal, close that lower each intelligent terminal, subnet close data transfer between intelligent terminal and mutual access is encrypted and decrypted by symmetric cryptography mode to same subnet;Between each subnet is closed, subnet close and encryption mechanism between cluster be set between family's primary gateway, between being closed to each subnet, subnet closes the data transfer between family's primary gateway and mutually accesses and be encrypted and decrypted by Identity based encryption mode.Using the present invention, fully meet the safety requirements of wired home system, this method can make full use of symmetric cryptography computing cost small, the advantages of enciphering rate is fast and Identity-based encryption deployment, the low advantage of operating cost, and installation, operating cost are reduced on the premise of security is ensured.

Description

The stepped mixing encryption method and device of a kind of intelligent home system
Technical field
The present invention relates to the stepped mixing encryption method and dress of Internet of Things field, more particularly to a kind of intelligent home system Put.
Background technology
Wired home based on Internet of Things is a multifunctional network system, using advanced computer, network service, from The advanced technologies such as dynamic control, by the various application subsystems related to family life, (such as safety-protection system, home wiring control, illumination are controlled System, entertainment systems, remote monitoring etc.) organically combine, centralized Control is realized by central control machine or home gateway.Various intelligence Terminal is communicated by wirelessly or non-wirelessly mode with home gateway, and the Intelligent mobile equipment such as smart mobile phone, notebook passes through WIFI modes access external the Internet;Remote control terminal (such as mobile phone, PC) can be realized to intelligence by telecommunication network or internet The remote control of energy household internal terminal.
Wherein ensure that the data confidentiality of wired home and the personal secrets of user data are the important of intelligent domestic system Problem.The simple encryption policy that accesses can not meet demand of the wired home to safety:It is simple access Password Policy be easy to by Crack, easily attacked by network hacker.Access password can be stolen or be cracked to malicious attacker, realize the remote control to terminal; The user or terminal device that it is legal that malicious attacker can disguise oneself as, steal, change the information and private data of validated user;Dislike Meaning attacker can even cause the threat (such as controlling natural gas, safety-protection system) of life by control terminal to user.
Classical cryptosystem is generally divided into three class modes:
(1) " ordinary cryptographic ", also known as " single key password ", " symmetric cryptography ".
(2) " public key cryptosystem ", also known as " conbined public or double key password ", " asymmetric cryptography ".
(3) Identity-based encryption (IBE).
First way:In symmetric encryption system, encryption and decryption use identical key.Because encryption and decryption key phase With, it is necessary to which the both sides of communication must select and preserve their common keys, each side, which must trust other side, to divulge a secret key Go out, can thus realize the confidentiality and integrity of data.The advantage of symmetric cryptographic algorithm is that computing cost is small, encryption speed Degree is fast, is the main algorithm encrypted currently used for information.However, being had the following disadvantages in symmetric encryption system:
(1) it is not suitable for catenet.For the network with n user, it is necessary to n (n-1)/2 key, in customer group In the case of not being very big, symmetric encryption system is effective.But for catenet, when customer group is very big, be distributed very wide When, the distribution and preservation of key are just into problem.
(2) key maintenance cost is high.Symmetric cryptography is limited in that it ensures between there are the trade both sides of communication The problem of key secure exchange.In addition, a certain communication terminal has several correspondences, he will safeguard several private keys.
(3) it cannot also differentiate communication terminal initiator or communication reciever because both sides key it is identical.
(4) it cannot be used for digital signature.Due to symmetric encryption system be simply possible to use in data carry out encryption and decryption processing there is provided The confidentiality of data, therefore digital signature cannot be used for lining encryption system.
The second way:Asymmetric encryption theoretically, as long as the private cipher key of user is not lost or is stolen, The information so encrypted between them can never be cracked.However, the limitation due to symmetric cryptography strategy in itself, has Following shortcoming:
(1) it is cumbersome.Recipient must get out public keys and private key simultaneously, and originator needs to know or Person can find out the public keys of recipient, in most cases, it means that originator, which must search for out a certificate, to be recognized Demonstrate,prove to retrieve the public keys of intended recipient.Also, only determined in recipient using the encryption method and possess available Key in the case of, could carry out public key encryption, and most people is all without public keys.
(2) enciphering rate is very slow.Due to carry out substantial amounts of mathematical operation, even if a small amount of information of encryption is also required to Devote a tremendous amount of time.
The third mode:Compared with conventional public-key is encrypted, Identity based encryption does not need any certificate, the public affairs of recipient Key is derived from his identity information altogether.Infrastructure required for IBE is more simply too much than conventional encryption methods, and this means that this is less Server and easier installation.The operating cost of IBE encryptions is only 1/5th of those public key cryptosysts, and IBE is used The productivity ratio at family those public keys user Gao Wubei.Key is provided with useful life, therefore need not be cancelled.In tradition In public key cryptosyst, key must be cancelled.Information decryption can be postponed in order to later decryption.Due to introducing the 3rd Square server, IBE encryptions have the disadvantage that:
(1) a centralized servers are needed, this also increases the centralization of the security risk of leakage, in addition IBE Imply some keys must create and preserve in the form of managing on behalf of another.
(2) escape way is needed to transmit private key between originator or recipient and IBE servers.
In summary, no matter symmetric cryptography, public key encryption are also based on the encryption of identity to existing encryption technology, there is each From shortcoming, be adapted to single application scenarios.But for function complexity, the intelligent home system of multiple network fusion, it is single One encryption mechanism can not meet demand for security.Therefore it is currently needed for a kind of encryption system designed for wired home feature Technical scheme.
The content of the invention
The technical problems to be solved by the invention are to provide the stepped mixing encryption method and dress of a kind of intelligent home system Put, solve the problem of current single encryption mechanism can not meet intelligent home system demand for security.
In order to solve the above problems, the invention provides a kind of stepped mixing encryption method of intelligent home system, including:
Same subnet closed between lower each intelligent terminal, be set to encryption equipment in cluster between subnet pass and intelligent terminal System, lower each intelligent terminal, subnet is closed to same subnet closes the data transfer between intelligent terminal and mutually accessing and pass through pair Cipher mode is claimed to be encrypted and decrypted;
Between each subnet is closed, subnet close and encryption mechanism between cluster be set between family's primary gateway, it is closed to each subnet Between, subnet close and family's primary gateway between data transfer and mutually access be encrypted by Identity based encryption mode and Decryption.
Further, the above method may also include:Symmetric cryptography mode of the symmetric cryptography mode including DES algorithms, The symmetric cryptography mode of 3DES algorithms, the symmetric cryptography mode of TDEA algorithms, the symmetric cryptography mode of Blowfish algorithms, RC5 The symmetric cryptography mode of algorithm or the symmetric cryptography mode of IDEA algorithms.
Further, the above method may also include:Each intelligent terminal, subnet under the pass to same subnet are closed and intelligence The step of data transfer and mutual access between energy terminal are encrypted and decrypted by symmetric cryptography mode, including:
Each intelligent terminal, subnet under being closed to same subnet close the data transfer between intelligent terminal and mutually access logical The symmetric cryptography mode for crossing RC5 algorithms is encrypted and decrypted, wherein, RC5 algorithms are joined by packet size parameter, cipher key size Number and encryption round number parameter are adjusted, and computing is carried out using XOR, the computing mode for adding and circulating.
Further, the above method may also include:It is described to each subnet close between, subnet close and family's primary gateway between The step of data transfer and mutual access are encrypted and decrypted by Identity based encryption mode, including:
Initialization system, security parameter needed for input, obtains systematic parameter and master key information;
According to the identity information of user, the corresponding private key information of generation user;
Public key information is used as by the identity information of user, the plaintext for needing to encrypt is encrypted, obtains corresponding close Text;By the corresponding private key information of the identity information of user, ciphertext is decrypted, corresponding plaintext is obtained.
Further, the above method may also include:The Identity based encryption mode includes:Non-interactive type key updating Identity-based encryption mode or Waters IBE modes.
Present invention also offers a kind of stepped mixing encryption device of intelligent home system, including:Stage unit is encrypted, it is right Claim ciphering unit and Identity based encryption unit, wherein,
The encryption stage unit, for closing same subnet between lower each intelligent terminal, subnet pass and intelligent terminal Between be set to encryption mechanism in cluster, between each subnet is closed, subnet closes and encryption equipment between cluster is set between family's primary gateway System;
The symmetric cryptography unit, for being closed to each intelligent terminal under same subnet pass, subnet between intelligent terminal Data transfer and mutually access be encrypted and decrypted by symmetric cryptography mode;
The Identity based encryption unit, for each subnet close between, subnet close and family's primary gateway between number It is encrypted and decrypted according to transmission and mutually access by Identity based encryption mode.
Further, said apparatus may also include:The symmetric cryptography mode that the symmetric cryptography unit is used includes The symmetric cryptography mode of DES algorithms, the symmetric cryptography mode of 3DES algorithms, the symmetric cryptography mode of TDEA algorithms, Blowfish The symmetric cryptography mode of the symmetric cryptography mode of algorithm, the symmetric cryptography mode of RC5 algorithms or IDEA algorithms.
Further, said apparatus may also include:The symmetric cryptography unit to same subnet close under each intelligent terminal, Subnet closes the data transfer between intelligent terminal and mutually accessed and is encrypted and decrypted by symmetric cryptography mode, refers to:
Each intelligent terminal, subnet under being closed to same subnet close the data transfer between intelligent terminal and mutually access logical The symmetric cryptography mode for crossing RC5 algorithms is encrypted and decrypted, wherein, RC5 algorithms are joined by packet size parameter, cipher key size Number and encryption round number parameter are adjusted, and computing is carried out using XOR, the computing mode for adding and circulating.
Further, said apparatus may also include:The Identity based encryption unit to each subnet close between, subnet close It is encrypted and decrypted with the data transfer between family primary gateway and mutually accessing by Identity based encryption mode, is Refer to:
The Identity based encryption unit is initialized, security parameter needed for input, obtains systematic parameter and master is close Key information;According to the identity information of user, the corresponding private key information of generation user;It is used as public key by the identity information of user to believe Breath, is encrypted to the plaintext for needing to encrypt, obtains corresponding ciphertext;Believed by the corresponding private key of the identity information of user Breath, is decrypted to ciphertext, obtains corresponding plaintext.
Further, said apparatus may also include:The identity-based that the Identity based encryption unit is used Cipher mode includes:The Identity-based encryption mode or WatersIBE modes of non-interactive type key updating.
Compared with prior art, using the present invention, the safety requirements of wired home system is fully met, this method can fill Divide small using symmetric cryptography computing cost, the advantages of enciphering rate is fast and Identity-based encryption deployment, the low advantage of operating cost, Installation, operating cost are reduced on the premise of security is ensured.
Brief description of the drawings
Fig. 1 is the flow chart of the stepped mixing encryption method of the intelligent home system of the present invention;
Fig. 2 is the structural representation of the stepped mixing encryption device of the intelligent home system of the present invention.
Embodiment
The stepped mixing encryption method of the wired home of the present invention, it is adaptable to the wired home system of hierarchy, mainly Design is:The encryption method is divided into cluster two grades of encryption mechanism between encryption mechanism and cluster:It is between each intelligent terminal and sub It is encryption stage in cluster between gateway and intelligent terminal, using asymmetric encryption mechanisms;Closed and family master with subnet between each subnet is closed It is encryption stage between cluster between gateway, using Identity based encryption mechanism.
The invention will be further described with reference to the accompanying drawings and detailed description.
As shown in figure 1, a kind of stepped mixing encryption method of intelligent home system of the present invention, including:
Step 110, same subnet closed between lower each intelligent terminal, be set between subnet pass and intelligent terminal in cluster Encryption mechanism, each intelligent terminal, subnet under being closed to same subnet close the data transfer between intelligent terminal and mutually accessed It is encrypted and decrypted by symmetric cryptography mode;
Step 120, by each subnet close between, subnet close and encryption mechanism between cluster be set between family's primary gateway, to each Subnet close between, subnet close and family's primary gateway between data transfer and mutually access entered by Identity based encryption mode Row encryption and decryption.
Part I:Encryption mechanism in cluster:
Data encryption is responsible for closing lower intelligent terminal to same subnet in cluster, between intelligent terminal and subnet pass are added Close, the present invention uses symmetric cryptography mode, and symmetric cryptography is a kind of encryption method of use one-key cryptosystem, same key The encryption and decryption of information can be used as simultaneously, this encryption method is referred to as symmetric cryptography, also referred to as secret key cryptography.Due to it Speed is fast, and symmetry encryption is generally used when message sender needs encryption mass data.
Symmetric encipherment algorithm includes DES algorithms, 3DES algorithms, TDEA algorithms, Blowfish algorithms, RC5 algorithms or IDEA Algorithm etc., this is not limited by the present invention.
Wherein, the present invention can use RC5 AESs, and RC5 AESs are applied to the microprocessor of different word lengths, removable Plant property is good;It can resist linear attack during the six wheel above;By adjust word length, key length and iteration wheel number can in security and Compromise is obtained in speed
RC5 block ciphers are the block ciphers of changeable parameters, and three variable parameters are:It is packet size, close Key size and encryption round number.Three kinds of computings have been used in this algorithm:XOR plus and circulation.The processing procedure of RC5 encrypting and decryptings It is as follows:
(1) key group is created
32 words of 2r+2 key correlation are used during RC5 algorithm for encryption, r represents the wheel number of encryption here.Create this The process of individual key group is extremely complex but is also direct, in the array L that key byte is copied to 32 words first, If desired, the last character can use zero padding.Then array S is initialized using Linear Congruential Generator mould 2:
For i=1 to 2 (r+1) -1;
Wherein for the RC5, P=0xb7e1, Q=0x9e37 of 16 words, 32 packets;
For 32 words and 64 RC5, P=0xb7e15163, Q=0x9e3779b9 being grouped;
It is grouped for 64 words and 128,
P=0xb7151628aed2a6b, Q=0x9e3779b97f4a7c15;
Finally L is mixed with S, mixed process is as follows:
I=j=0
A=B=0
Processing 3n times (n is the maximum in 2 (r+1) and c here, and wherein c represents the number of the key word of input)
(2) encryption
Proceeded by after careful key group is created to encryption of plaintext, during encryption, clear packets are divided into two first 32 words:A and B (in the case of assuming that processor byte order is little-endian, w=32, first plaintext byte Into A lowest byte, the 4th plaintext byte enters A highest byte, and the 5th plaintext byte enters B lowest byte, By that analogy), wherein operator<<<Ring shift left is represented, plus computing is mould.
The ciphertext of output is the content in register A and B
(3) decryption processing
Decryption is also easily, ciphertext block to be divided into two words:A and B (storage mode is as encryption), here Meet>>>It is ring shift right, it is also mould to subtract computing.
RC5 program, which is realized, includes following sections:Principal function, ring shift left and move to right function, produce sub-key letter Number, the function for producing preliminary examination key, the function for taking nearest odd number, encryption function, decryption function.
Part II:Encryption mechanism between cluster
Between cluster encrypt be responsible for sub- gateway, subnet close primary gateway between data be encrypted.
Encryption selects and improved existing Identity based encryption algorithm, base of the design suitable for intelligent domestic system between cluster In the encipherment scheme of identity.
Wherein, Identity based encryption scheme includes:Identity-based encryption mode (the IBE- of non-interactive type key updating ) or Waters IBE modes etc. NIKU.
Wherein, Identity based encryption conceptual design of the invention includes four parts:System initialization parameter generation algorithm, Private key generating algorithm, AES, decipherment algorithm.
(a) system initialization parameter generation algorithm.System initialization parameter generation algorithm is mainly generation and sets up system institute The open systematic parameter and secrecy system parameter needed.Algorithm input is security parameter, and output is systematic parameter and master key.
(b) private key generating algorithm.According to the identity information of user, the corresponding private key of generation user.
(c) AES.By the use of the identity information of user as public key, the plaintext for needing to encrypt is encrypted, obtained Corresponding ciphertext.
(d) decipherment algorithm.Using the corresponding private key of the identity information of user, ciphertext is decrypted, obtains corresponding In plain text.
The present invention uses Identity based encryption mechanism, specific to use Waters IBE modes, the encryption mechanism include with Under several steps:
(1) systematic parameter generation subscriber identity information is the Bit String that length is n, randomly selects a positive integer q, is chosen Two p ranks group G and G1, choose bilinear mapPKG randomly chooses G generation member g ∈ G, random selectionIt is assumed thatRandomly choose g2∈ G,Vectorial U=(u1, u2, u3, u4…un)∈Gn.Systematic parameter It is with master key:
(2) private key is generated.Known γ is an identity information, γiRepresent the of γPosition, andIt is all γi=1Set, random selection r ∈ Zq, then identity γ private key be:
(3) encrypt.Known-plaintext M ∈ G1With identity γ.Randomly choose t ∈ Zq, then using identity γ encrypt after ciphertext as:
(4) decrypt.Known ciphertext C=(C1, C2, C3) be encrypted cipher texts of the message M under identity γ, then ciphertext C is with private key dγ=(d1, d2) decrypt, the plaintext after decryption is
As shown in Fig. 2 present invention also offers a kind of stepped mixing encryption device of intelligent home system, including:Encryption Stage unit 201, symmetric cryptography unit 202 and Identity based encryption unit 203, wherein,
The encryption stage unit 201, for closing same subnet between lower each intelligent terminal, subnet closes whole with intelligence Encryption mechanism in cluster is set between end, between each subnet is closed, subnet closes and encryption between cluster is set between family's primary gateway Mechanism;
The symmetric cryptography unit 202, for same subnet is closed lower each intelligent terminal, subnet close and intelligent terminal it Between data transfer and mutually access be encrypted and decrypted by symmetric cryptography mode;
The Identity based encryption unit 203, for each subnet close between, subnet close and family's primary gateway between Data transfer and mutually access are encrypted and decrypted by Identity based encryption mode.
Symmetric cryptography mode of the symmetric cryptography mode that the symmetric cryptography unit 202 is used including DES algorithms, The symmetric cryptography mode of 3DES algorithms, the symmetric cryptography mode of TDEA algorithms, the symmetric cryptography mode of Blowfish algorithms, RC5 The symmetric cryptography mode of algorithm or the symmetric cryptography mode of IDEA algorithms.
The symmetric cryptography unit 202 is closed between intelligent terminal to each intelligent terminal under same subnet pass, subnet Data transfer and mutually access are encrypted and decrypted by symmetric cryptography mode, are referred to:
Each intelligent terminal, subnet under being closed to same subnet close the data transfer between intelligent terminal and mutually access logical The symmetric cryptography mode for crossing RC5 algorithms is encrypted and decrypted, wherein, RC5 algorithms are joined by packet size parameter, cipher key size Number and encryption round number parameter are adjusted, and computing is carried out using XOR, the computing mode for adding and circulating.
Each subnet of 203 pairs of the Identity based encryption unit close between, subnet close data between family's primary gateway Transmission and mutually access are encrypted and decrypted by Identity based encryption mode, are referred to:
The Identity based encryption unit 203 is initialized, security parameter needed for input, obtains systematic parameter and master Key information;According to the identity information of user, the corresponding private key information of generation user;Public key is used as by the identity information of user Information, is encrypted to the plaintext for needing to encrypt, obtains corresponding ciphertext;Believed by the corresponding private key of the identity information of user Breath, is decrypted to ciphertext, obtains corresponding plaintext.
The Identity based encryption mode that the Identity based encryption unit 203 is used includes:Non-interactive type is close Identity-based encryption mode or Waters IBE modes that key updates.
A kind of scheme of wired home stepped mixing encryption of the present invention, the program mainly has following key point:
(1) encryption, decryption technology are applied in wired home system, meet the safety requirements of wired home, solved The potential safety hazard existed.
(2) unique architecture of wired home is directed to, using classification, Hybrid Encryption decryption policy.
(3) make full use of symmetric cryptography speed fast, be used for the advantage and identity-based of the environment of mass data encryption The low advantage of deployment, operating cost, installation, operating cost are reduced on the premise of security is ensured.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto, It is any be familiar with the people of the technology disclosed herein technical scope in, the change or replacement that can be readily occurred in should all be covered Within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (8)

1. a kind of stepped mixing encryption method of intelligent home system, it is characterised in that including:
Same subnet closed between lower each intelligent terminal, be set to encryption mechanism in cluster between subnet pass and intelligent terminal, it is right Each intelligent terminal, subnet under same subnet pass, which close the data transfer between intelligent terminal and mutually accessed, passes through symmetric cryptography Mode is encrypted and decrypted;
Between each subnet is closed, subnet close and encryption mechanism between cluster be set between family's primary gateway, between being closed to each subnet, son Data transfer and mutually access between gateway and family's primary gateway are encrypted and decrypted by Identity based encryption mode;
The Identity based encryption mode includes:The Identity-based encryption mode or Waters IBE of non-interactive type key updating Mode.
2. the method as described in claim 1, it is characterised in that
The symmetric cryptography mode includes the symmetric cryptography mode, the symmetric cryptography mode of 3DES algorithms, TDEA algorithms of DES algorithms Symmetric cryptography mode, the symmetric cryptography mode of Blowfish algorithms, pair of the symmetric cryptography mode of RC5 algorithms or IDEA algorithms Claim cipher mode.
3. method as claimed in claim 2, it is characterised in that
Each intelligent terminal, subnet under the pass to same subnet close the data transfer between intelligent terminal and mutually access logical The step of symmetric cryptography mode is encrypted and decrypted is crossed, including:
Each intelligent terminal, subnet under being closed to same subnet, which close the data transfer between intelligent terminal and mutually accessed, to be passed through The symmetric cryptography mode of RC5 algorithms is encrypted and decrypted, wherein, RC5 algorithms pass through packet size parameter, cipher key size parameter It is adjusted with encryption round number parameter, computing is carried out using XOR, the computing mode for adding and circulating.
4. the method as described in claim 1, it is characterised in that
It is described to each subnet close between, subnet close and family's primary gateway between data transfer and mutually access pass through identity-based Cipher mode the step of be encrypted and decrypted, including:
Initialization system, security parameter needed for input, obtains systematic parameter and master key information;
According to the identity information of user, the corresponding private key information of generation user;
Public key information is used as by the identity information of user, the plaintext for needing to encrypt is encrypted, corresponding ciphertext is obtained;It is logical The corresponding private key information of the identity information of user is crossed, ciphertext is decrypted, corresponding plaintext is obtained.
5. a kind of stepped mixing encryption device of intelligent home system, it is characterised in that
Including:Stage unit, symmetric cryptography unit and Identity based encryption unit are encrypted, wherein,
The encryption stage unit, for closing same subnet between lower each intelligent terminal, between subnet pass and intelligent terminal Encryption mechanism in cluster is set to, between each subnet is closed, subnet closes and encryption mechanism between cluster is set between family's primary gateway;
The symmetric cryptography unit, for closing the number between intelligent terminal to each intelligent terminal under same subnet pass, subnet It is encrypted and decrypted according to transmission and mutually access by symmetric cryptography mode;
The Identity based encryption unit, for each subnet close between, subnet close and family's primary gateway between data pass Defeated and mutual access is encrypted and decrypted by Identity based encryption mode;
The Identity based encryption mode that the Identity based encryption unit is used includes:Non-interactive type key updating Identity-based encryption mode or Waters IBE modes.
6. device as claimed in claim 5, it is characterised in that
The symmetric cryptography mode that the symmetric cryptography unit is used includes the symmetric cryptography mode of DES algorithms, 3DES algorithms Symmetric cryptography mode, the symmetric cryptography mode of TDEA algorithms, the symmetric cryptography mode of Blowfish algorithms, pair of RC5 algorithms Claim the symmetric cryptography mode of cipher mode or IDEA algorithms.
7. device as claimed in claim 6, it is characterised in that
The symmetric cryptography unit closes the data transfer between intelligent terminal to each intelligent terminal under same subnet pass, subnet It is encrypted and decrypted, is referred to by symmetric cryptography mode with mutual access:
Each intelligent terminal, subnet under being closed to same subnet, which close the data transfer between intelligent terminal and mutually accessed, to be passed through The symmetric cryptography mode of RC5 algorithms is encrypted and decrypted, wherein, RC5 algorithms pass through packet size parameter, cipher key size parameter It is adjusted with encryption round number parameter, computing is carried out using XOR, the computing mode for adding and circulating.
8. device as claimed in claim 5, it is characterised in that
The Identity based encryption unit each subnet is closed between, subnet closes and the data transfer and phase between family primary gateway Mutually access and be encrypted and decrypted by Identity based encryption mode, referred to:
The Identity based encryption unit is initialized, security parameter needed for input, obtains systematic parameter and master key letter Breath;According to the identity information of user, the corresponding private key information of generation user;Public key information is used as by the identity information of user, The plaintext for needing to encrypt is encrypted, corresponding ciphertext is obtained;It is right by the corresponding private key information of the identity information of user Ciphertext is decrypted, and obtains corresponding plaintext.
CN201110317834.1A 2011-10-19 2011-10-19 The stepped mixing encryption method and device of a kind of intelligent home system Active CN103067166B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201110317834.1A CN103067166B (en) 2011-10-19 2011-10-19 The stepped mixing encryption method and device of a kind of intelligent home system
PCT/CN2011/085081 WO2013056502A1 (en) 2011-10-19 2011-12-30 Hierarchical hybrid encryption method and apparatus of smart home system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110317834.1A CN103067166B (en) 2011-10-19 2011-10-19 The stepped mixing encryption method and device of a kind of intelligent home system

Publications (2)

Publication Number Publication Date
CN103067166A CN103067166A (en) 2013-04-24
CN103067166B true CN103067166B (en) 2017-09-29

Family

ID=48109637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110317834.1A Active CN103067166B (en) 2011-10-19 2011-10-19 The stepped mixing encryption method and device of a kind of intelligent home system

Country Status (2)

Country Link
CN (1) CN103067166B (en)
WO (1) WO2013056502A1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105207969A (en) * 2014-06-10 2015-12-30 江苏大泰信息技术有限公司 Lightweight stream encryption method for Internet of Things in low-consumption environment
CN105897819A (en) * 2015-10-21 2016-08-24 乐卡汽车智能科技(北京)有限公司 Data communication method and system and gateway applied to in-vehicle network comprising multiple sub-networks
CN107786337A (en) * 2016-08-26 2018-03-09 中兴通讯股份有限公司 The encryption and decryption control method of intelligent domestic system, device, home equipment
CN109218016B (en) * 2017-07-06 2020-05-26 北京嘀嘀无限科技发展有限公司 Data transmission method and device, server, computer equipment and storage medium
CN109257165B (en) * 2017-07-12 2020-08-21 北京嘀嘀无限科技发展有限公司 Encryption and decryption method and encryption and decryption system for fine-grained mobile access
CN111600711A (en) * 2017-07-06 2020-08-28 北京嘀嘀无限科技发展有限公司 Encryption and decryption system and encryption and decryption method for fine-grained mobile access
US10693849B2 (en) 2017-11-15 2020-06-23 International Business Machines Corporation Sending message in multilayer system
CN109150902B (en) * 2018-09-25 2021-03-30 山东维平信息安全测评技术有限公司 Encryption device based on home gateway system and encryption method thereof
CN109688118A (en) * 2018-12-14 2019-04-26 东莞见达信息技术有限公司 Internet of things data safe transmission method and system, internet of things equipment and gateway
CN112836192B (en) * 2020-12-14 2023-10-31 航天信息股份有限公司 Portrait characteristic data issuing method and device
CN112583833A (en) * 2020-12-14 2021-03-30 珠海格力电器股份有限公司 Data encryption processing method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141348A (en) * 2007-09-20 2008-03-12 成都方程式电子有限公司 Intelligent domestic system and safety implementing method
CN101594271A (en) * 2008-05-27 2009-12-02 华为技术有限公司 Wireless self-organization network establishment and method of work and network of relation and equipment
CN101699873A (en) * 2009-10-21 2010-04-28 南京邮电大学 Classification security-based broadcast authentication design method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1180566C (en) * 2002-08-26 2004-12-15 联想(北京)有限公司 Method of realizing safe and reliable interconnection between network equipments
CN1917422A (en) * 2006-07-21 2007-02-21 北京理工大学 Implementation method for reducing amount of calculation for managing cipher key of MANET network
KR101490687B1 (en) * 2007-08-20 2015-02-06 삼성전자주식회사 Method and apparatus for sharing secret information between devices in home network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141348A (en) * 2007-09-20 2008-03-12 成都方程式电子有限公司 Intelligent domestic system and safety implementing method
CN101594271A (en) * 2008-05-27 2009-12-02 华为技术有限公司 Wireless self-organization network establishment and method of work and network of relation and equipment
CN101699873A (en) * 2009-10-21 2010-04-28 南京邮电大学 Classification security-based broadcast authentication design method

Also Published As

Publication number Publication date
CN103067166A (en) 2013-04-24
WO2013056502A1 (en) 2013-04-25

Similar Documents

Publication Publication Date Title
CN103067166B (en) The stepped mixing encryption method and device of a kind of intelligent home system
Ning et al. White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes
CN104363215B (en) A kind of encryption method and system based on attribute
Sahai et al. Worry-free encryption: functional encryption with public keys
CN106549753B (en) A kind of encryption method that the support ciphertext of identity-based compares
CN104320393B (en) The controllable efficient attribute base proxy re-encryption method of re-encryption
JPH06350598A (en) Mutual verification/ciphering key delivery system
CN104113408A (en) Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption
CN108123794A (en) The generation method and encryption method of whitepack key, apparatus and system
CN110933033B (en) Cross-domain access control method for multiple Internet of things domains in smart city environment
CN108040056A (en) Safety medical treatment big data system based on Internet of Things
Abusukhon et al. A novel network security algorithm based on private key encryption
CN107154845A (en) A kind of BGN types ciphertext decryption outsourcing scheme based on attribute
CN115426136B (en) Cross-domain access control method and system based on block chain
Toorani et al. A secure cryptosystem based on affine transformation
CN109450615A (en) A kind of efficient OPC UA client and server data transfer encryption method
CN101710879A (en) Novel identity-based privacy enhanced mail forwarding system
Mousavi et al. Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems)
JPH10210023A (en) Authentication method, cipher key sharing method, and communication system
Liu et al. A blockchain-based secure cloud files sharing scheme with fine-grained access control
Sekar et al. Comparative study of encryption algorithm over big data in cloud systems
CN106230840B (en) A kind of command identifying method of high security
CN104320249B (en) A kind of elastoresistance leakage encryption method of identity-based
Daddala et al. Design and implementation of a customized encryption algorithm for authentication and secure communication between devices
Chen et al. HAC: Enable high efficient access control for information-centric Internet of Things

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant