CN106127055A - The cipher conversion of a kind of automatization and encryption implementation method - Google Patents
The cipher conversion of a kind of automatization and encryption implementation method Download PDFInfo
- Publication number
- CN106127055A CN106127055A CN201610413738.XA CN201610413738A CN106127055A CN 106127055 A CN106127055 A CN 106127055A CN 201610413738 A CN201610413738 A CN 201610413738A CN 106127055 A CN106127055 A CN 106127055A
- Authority
- CN
- China
- Prior art keywords
- cipher
- message
- conversion
- module
- crypto
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Abstract
The present invention provides the cipher conversion of a kind of automatization and encryption implementation method, relates to safe and secret technical field.The present invention is mainly point-to-point communication; symmetric cryptographic algorithm storage talk secretly sensitive information such as this grade, message information to transmission/reception is used automatically to be talked secretly by crypto module conversion; use working key to be encrypted protection for the message data after conversion, then the ciphertext after protection is carried out information transmission and be saved in nonvolatile storage space.The present invention is possible not only to increase substantially the privacy degrees of communication message, and simplifies the workflow of operator, than tradition crypto-communication mode, possesses strong security, ageing high feature.
Description
Technical field
The present invention relates to safe and secret technical field, particularly relate to the cipher conversion of a kind of automatization and encryption implementation method.
Background technology
Tradition crypto-communication is by manual operations, and operating efficiency is low;Encryption strength is inadequate, and range is limited;Cipher kind
Various, use the cycle short, change frequently;Ageing equipment, fault rate is higher.Along with construction of military informatization scale constantly expands,
More and more higher to safety and ageing requirement, how to improve the confidentiality of crypto-communication, ageing and suitability etc. and become machine
Want department's problem demanding prompt solution.
Summary of the invention
In order to solve above technical problem, the present invention proposes the cipher conversion of a kind of automatization and encryption implementation method,
Conversion and the encryption automatically of crypto-communication message is realized, it is ensured that the safety of cipher key communication on domestic embedding assembly platform,
The problems such as crypto-communication security performance is weak, aging performance is low of solution.
System is mainly point-to-point communication, use symmetric cryptographic algorithm to the cipher sensitive information such as this grade of storage, to sending/
The message information received is talked secretly automatically by crypto module conversion, enters for the message data use working key after changing
Row encipherment protection, then carries out information transmission to the ciphertext after protection and is saved in nonvolatile storage space.
Support all history message informations storage function sent and receive, owing to being limited by memory space, if deposited
The history message of storage reaches the threshold value of default, and system will cover storage time the longest history message information automatically.Due to
The history message information of storage could be read after needing the deciphering of system working key, so when renewal work master key, former depositing
The history message of storage loses meaning, is emptied by the history message of storage the most simultaneously.
The auto-conversion function of cipher message information is to utilize upper level applications to call these clothes of cipher by software interface
Business module, the message information that will send comparison cipher is originally automatically converted into cipher numeral, then transfers to cryptographic service module pair
Cipher numeral is encrypted;For the message information received, upper level applications will be through password by software interface
Cipher numeral after service module deciphering gives cipher this service module, by it to cipher this conversion automatically of numeral comparison cipher
Become readable message information, thus complete auto-conversion function of talking secretly.
4, method according to claim 2, it is characterised in that
Cipher message information encryption function:
1) editor's input of message data, is carried out over the display;
2), application software call software interface and call cipher service module, automatically carrying out cipher conversion;
3), application software carries out strategy matching, acquirement password the Resources list according to circular relation;
4), application software password the Resources list is delivered in crypto module by crypto module software interface, crypto module will
Working key ciphertext is loaded into crypto-operation processing unit and carries out DecryptDecryption, the work after crypto module output DecryptDecryption from module stores district
Make key handles;
5), crypto module calls noise source chip, generation initial vector;
6), application software by message cipher carry out cover inspection, process data into symmetry algorithm packet integral multiple;
7), the message after working key handle, initial vector, cover is talked secretly defeated by crypto module software interface by application software
Enter crypto module;
8), the data message that software interface is inputted by crypto module is encrypted computing;
9), crypto module by after computing ciphertext data message export, by drive, software interface return to application software;
10), application program the ciphertext data received, initial vector, circular relation are carried out data encapsulation, then to encapsulation after
Data carry out character to numeral conversion;
11), application program by the numerical monitor after conversion over the display, if terminal cipher machine has been connected to radio station, will simultaneously
Numeral is transmitted by radio station, thus realizes message data ciphertext transfer function.
The present invention is based on domestic embedding assembly platform, and major function is to realize the quickly cipher of crypto-communication information automatically
Conversion and encryption, complete the electronic upgrading of cipher, be possible not only to increase substantially the secrecy journey of communication message
Degree, and simplify the workflow of operator, than tradition crypto-communication mode, possess strong security, ageing high
Feature.
Accompanying drawing explanation
Fig. 1 is domestic embedding assembly platform hardware system block diagram;
Fig. 2 is that communication message information encrypts schematic diagram.
Detailed description of the invention
Below present disclosure is carried out more detailed elaboration:
The present invention possesses conversion and the encryption function automatically of cipher message information.
The auto-conversion function of cipher message information is to utilize upper level applications to call these clothes of cipher by software interface
Business module, the message information that will send comparison cipher is originally automatically converted into cipher numeral, then transfers to cryptographic service module pair
Cipher numeral is encrypted;For the message information received, upper level applications will be through password by software interface
Cipher numeral after service module deciphering gives cipher this service module, by it to cipher this conversion automatically of numeral comparison cipher
Become readable message information, thus complete auto-conversion function of talking secretly.
Cipher message information encryption function:
1, editor's input of message data is carried out over the display;
2, application software calls software interface and calls cipher service module, automatically carries out cipher conversion;
3, application software carries out strategy matching according to circular relation, obtains password the Resources list;
4, password the Resources list is delivered in crypto module by application software by crypto module software interface, and crypto module is by work
Make key ciphertext to be loaded into crypto-operation processing unit from module stores district and carry out DecryptDecryption, the work after crypto module output DecryptDecryption
Key handles;
5, crypto module calls noise source chip, generates initial vector;
6, message cipher is carried out cover inspection by application software, processes data into the integral multiple of symmetry algorithm packet;
7, the message after working key handle, initial vector, cover is talked secretly defeated by crypto module software interface by application software
Enter crypto module;
8, the data message that software interface is inputted by crypto module is encrypted computing;
9, the ciphertext data message after computing is exported by crypto module, and by driving, software interface returns to application software;
10, the ciphertext data received, initial vector, circular relation are carried out data encapsulation by application program, then to encapsulation after
Data carry out character to numeral conversion;
11, application program is by the numerical monitor after conversion over the display, if terminal cipher machine has been connected to radio station, simultaneously by number
Word is transmitted by radio station, thus realizes message data ciphertext transfer function.
Claims (4)
1. automatization's cipher conversion and encryption implementation method, it is characterised in that this method is mainly point-to-point communication, uses
Symmetric cryptographic algorithm storage is talked secretly this sensitive information, to send/receive message information by crypto module carry out from
Dynamic cipher conversion, uses working key to be encrypted protection for the message data after conversion, then enters the ciphertext after protection
Row information transmission is saved in nonvolatile storage space;
If the history message of storage reaches the threshold value of default, system will cover storage time the longest history message automatically
Information.
Method the most according to claim 1, it is characterised in that
The present invention possesses conversion and the encryption function automatically of cipher message information.
Method the most according to claim 2, it is characterised in that
The auto-conversion function of cipher message information is to utilize upper level applications to call cipher this service mould by software interface
Block, the message information that will send comparison cipher is originally automatically converted into cipher numeral, then transfers to cryptographic service module to cipher
Numeral is encrypted;For the message information received, upper level applications will be through cryptographic service by software interface
Cipher numeral after module deciphering gives cipher this service module, it being originally automatically converted into cipher numeral comparison cipher can
Read message information, thus complete auto-conversion function of talking secretly.
Method the most according to claim 2, it is characterised in that
Cipher message information encryption function:
1) editor's input of message data, is carried out over the display;
2), application software call software interface and call cipher service module, automatically carrying out cipher conversion;
3), application software carries out strategy matching, acquirement password the Resources list according to circular relation;
4), application software password the Resources list is delivered in crypto module by crypto module software interface, crypto module will
Working key ciphertext is loaded into crypto-operation processing unit and carries out DecryptDecryption, the work after crypto module output DecryptDecryption from module stores district
Make key handles;
5), crypto module calls noise source chip, generation initial vector;
6), application software by message cipher carry out cover inspection, process data into symmetry algorithm packet integral multiple;
7), the message after working key handle, initial vector, cover is talked secretly defeated by crypto module software interface by application software
Enter crypto module;
8), the data message that software interface is inputted by crypto module is encrypted computing;
9), crypto module by after computing ciphertext data message export, by drive, software interface return to application software;
10), application program the ciphertext data received, initial vector, circular relation are carried out data encapsulation, then to encapsulation after
Data carry out character to numeral conversion;
11), application program by the numerical monitor after conversion over the display, if terminal cipher machine has been connected to radio station, will simultaneously
Numeral is transmitted by radio station, thus realizes message data ciphertext transfer function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610413738.XA CN106127055A (en) | 2016-06-14 | 2016-06-14 | The cipher conversion of a kind of automatization and encryption implementation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610413738.XA CN106127055A (en) | 2016-06-14 | 2016-06-14 | The cipher conversion of a kind of automatization and encryption implementation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106127055A true CN106127055A (en) | 2016-11-16 |
Family
ID=57270825
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610413738.XA Withdrawn CN106127055A (en) | 2016-06-14 | 2016-06-14 | The cipher conversion of a kind of automatization and encryption implementation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106127055A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109325354A (en) * | 2017-07-31 | 2019-02-12 | 阿里巴巴集团控股有限公司 | Storage, processing and the read method of data, data storage device and system |
-
2016
- 2016-06-14 CN CN201610413738.XA patent/CN106127055A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109325354A (en) * | 2017-07-31 | 2019-02-12 | 阿里巴巴集团控股有限公司 | Storage, processing and the read method of data, data storage device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102196425B (en) | Quantum-key-distribution-network-based mobile encryption system and communication method thereof | |
CN102412967B (en) | Data transmission system and method | |
CN1859081B (en) | Immediate news enciphering transmission method and system | |
CN105812332A (en) | Data protection method | |
CN107454590A (en) | A kind of data ciphering method, decryption method and wireless router | |
CN104092550A (en) | Password protection method, system and device | |
CN107590396B (en) | Data processing method and device, storage medium and electronic equipment | |
CN104484596A (en) | Method and terminal for creating password in multi-operation system | |
CN103458400A (en) | Key management method for voice encryption communication system | |
CN110138795B (en) | Multi-step mixed encryption and decryption method in communication process | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN106453246A (en) | Equipment identity information distribution method, device and system | |
CN105024807A (en) | Data processing method and system | |
CN113612608A (en) | Method and system for realizing cluster encryption of dual-mode interphone based on public network | |
CN102724205B (en) | A kind of method to the encryption of industrial circle communication process and data acquisition equipment | |
CN101895885A (en) | Method and system for protecting key file | |
CN102332077A (en) | Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof | |
CN104618397A (en) | Encryption method and system for instant messaging software | |
CN105262759B (en) | A kind of method and system of coded communication | |
CN103458401A (en) | Voice encryption communication system and voice encryption communication method | |
CN114697008A (en) | Communication system and method based on quantum security SIM card, quantum security SIM card and key service platform | |
CN106127055A (en) | The cipher conversion of a kind of automatization and encryption implementation method | |
CN107493287A (en) | Industry control network data security system | |
CN101753520A (en) | Method for providing encrypting and deciphering service for external equipment application by utilizing intelligent card | |
CN103235907B (en) | A kind of method and system using smart card device protection software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161116 |