CN106790207A - A kind of stream media information method for protecting and system - Google Patents
A kind of stream media information method for protecting and system Download PDFInfo
- Publication number
- CN106790207A CN106790207A CN201710007536.XA CN201710007536A CN106790207A CN 106790207 A CN106790207 A CN 106790207A CN 201710007536 A CN201710007536 A CN 201710007536A CN 106790207 A CN106790207 A CN 106790207A
- Authority
- CN
- China
- Prior art keywords
- password
- operation control
- word
- stream media
- control word
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Abstract
A kind of stream media information method for protecting is disclosed, the method is symmetric encipherment algorithm, is included during encryption:(1) password is read in, and parses beginning flag, operation control word and password, if parsing error, exits and provide error information;If parsing is correct, step (2) is performed;(2) analytic value according to beginning flag removes align operation control word and password;(3) password to each control computing word control carries out marshalling calculating, and forms final password packet;(4) length being grouped according to each password, is grouped to plaintext to be encrypted, forms set of packets;(5) the cryptographic calculation rule specified according to the operation rule field of operation control word, is encrypted calculating, and ultimately generate ciphertext with corresponding password to plaintext to be encrypted.Also stream media information safe-guard system.
Description
Technical field
The present invention relates to the technical field of the information security in the fields such as video monitoring, video conference, more particularly to one kind
Stream media information method for protecting, and stream media information safe-guard system.
Background technology
Our routine work and life are more and more applied to technologies such as video monitoring, video conferences, matchmaker is flowed
The information security of the links such as transmission, storage, the broadcasting of body is more and more important.How efficiently and high intensity guarantee stream media information
Become concern and research emphasis in the information security of links.
At present, encrypted based on conventional encryption techniques streaming media for what Streaming Media was generally used, these methods can be very
The good high strength encrypting for realizing information, but generally existing encryption efficiency is relatively low, algorithm is complicated, real-time is low, encryption and decryption is set
The problems such as received shipment calculation Capability Requirement is high.Details are as follows:
Cipher system is divided into two major classes by contemporary cryptology according to the difference of encryption key occupation mode:Symmetric cryptography body
System and asymmetric cryptography system.
Symmetric encipherment algorithm:Symmetric cryptography employs symmetric cryptography coding techniques, and its feature is file encryption and decryption
Decruption key is also used as using identical key, i.e. encryption key, this method is called symmetric cryptography calculation in cryptography
Method.
● symmetry algorithm mainly has four kinds of encryption modes:
√ electronic codebook modes pattern Electronic Code Book (ECB):This pattern is to use earliest and most simple
Pattern, the data of encryption are divided into some groups by it, and every group of size is identical with encryption key lengths, and then every group all with identical
Key be encrypted.
√ cryptographic blocks chain pattern Cipher Block Chaining (CBC):The encryption of CBC patterns is also by plain text first
It is divided into the block of regular length, then the ciphertext by an above cryptographic block output carries out XOR with the next Plaintext block to be encrypted
Operation, result of calculation is encrypted with key again and obtains ciphertext.When first plaintext block encryption, because not encrypting above
Ciphertext, so need an initialization vector.It is different with ECB modes, by annexation so that ciphertext with plain text no longer
One-to-one relation, crack it is more difficult, as long as and overcoming simple ciphertext blocks of exchanging and being likely to be breached attacking for purpose
Hit.
√ encrypts feedback model Cipher Feedback Mode (CFB):The encryption of application program to make
Use stream encryption method, it is possible to use encryption feedback model.In such a mode, data are encrypted with smaller unit, such as can be 8,
Block length (typically 64) of this length less than definition
√ output feedback modes Output Feedback Mode (OFB):Output feedback mode is similar to CFB, only difference
It is not that ciphertext inserts ciphering process next stage in CFB, and in OFB, encryption is inserted in the input of initialization vector ciphering process
Process next stage.
Rivest, shamir, adelman needs two keys:Public-key cryptography (publickey) and private cipher key (privatekey).
Public-key cryptography and private cipher key are a pair, if be encrypted to data with public-key cryptography, only with corresponding private cipher key
Can decryption;If be encrypted with private cipher key pair data, then could only be decrypted with corresponding public-key cryptography.Because encryption
Two different keys are used with decryption, so this algorithm is called rivest, shamir, adelman.
Due to using two keys, its advantage is to be easy to protect in the security of key transmission to asymmetric cryptography system
Barrier, and algorithm security is very high.But the algorithm based on asymmetric encryption is all extremely complex, in this data transfer of Streaming Media
It is required that very strong real-time, the again very big application scenario of data volume is that unaccommodated (such algorithm requirement audio-video terminal sets
Standby operational performance is very high, for example:A kind of method of real time media stream encryption transmission《Patent application publication No.:CN101552666》;
For another example:DRM (Digital Rights Management digital copyright managements) cryptographic security of Microsoft generally acknowledges highest at present,
But its algorithm is extremely complex, can only use on a desktop system, it is difficult to used in embedded system).
Therefore stream media information safety guarantee can only use symmetric encipherment algorithm, current most typical symmetric encipherment algorithm
Have:DES algorithms, 3DES algorithms, TDEA algorithms, Blowfish algorithms, RC5 algorithms, IDEA algorithms.But these algorithms are relative to embedding
Enter for the audio-video collection terminal and playback terminal of the small-sized of formula and miniaturization, still seem more complicated (such as in order to obtain
Stronger security is obtained, they do not select ecb mode, CBC patterns is selected at least), and in order to ensure very strong safety
Property, typically require selection length more than the password of 64, so just bigger (these of the operand needed for its encryption and decryption
The operand of algorithm is all relevant with Password Length).
As can be seen here, for the AES of Streaming Media, its essential problem is exactly between security and high efficiency
Contradiction, it is this technology problem to be solved to seek a kind of AES of efficient high safety.
In addition, at present on the market most of AESs for Streaming Media all it is relevant with the form of Streaming Media (usually
Subpackage is carried out according to Streaming Media type), the purpose of do so reduces the complexity of algorithm while obtaining compared with strong security, but
It is and sacrifices the versatility of algorithm, different types of Streaming Media type is needed using different algorithms, for example:Streaming Media adds
Close and decryption method, encryption and decryption device (patent application publication number:CN104580236A).The characteristics of this technology is not differentiate between
The type and form of Streaming Media, but they are regarded as indiscriminate " binary data stream ", and step-by-step is carried out to them enter
Row processing.
The content of the invention
To overcome the defect of prior art, the technical problem to be solved in the present invention to there is provided a kind of stream media information safety
Support method, it has versatility, goes for various stream media formats;Algorithm is simple, is adapted to minimize and micro-
Type terminal is used;Under equal Password Length, Cipher Strength is better than presently disclosed complicated AES, but encryption and decryption resource
AES of the consumption much smaller than equality strength.
The technical scheme is that:This stream media information method for protecting, the method is symmetric encipherment algorithm, plus
Comprised the following steps when close:
(1) password is read in, and parses beginning flag, operation control word and password, if parsing error, exits and be given
Error information;If parsing is correct, step (2) is performed;
(2) analytic value according to beginning flag removes align operation control word and password;
(3) password to each control computing word control carries out marshalling calculating, and forms final password packet;
(4) length being grouped according to each password, is grouped to plaintext to be encrypted, forms set of packets;
(5) the cryptographic calculation rule specified according to the operation rule field of operation control word, with corresponding password to be added
Close plaintext is encrypted calculating, and ultimately generates ciphertext.
The present invention regards encrypted object as indiscriminate binary data stream sequence, therefore with versatility, Ke Yishi
For various stream media formats;Its algorithm is simple, and required calculation resources are less, and unrelated with Password Length, therefore the algorithm can
Used with being adapted to miniaturization and miniaturization terminal;And under equal Password Length, realize becoming the data encryption of length packet,
So that Cipher Strength is better than presently disclosed complicated AES, but encryption and decryption resource consumption is calculated much smaller than the encryption of equality strength
Method.
A kind of stream media information safe-guard system is additionally provided, the system includes:
Parsing module, it configures to read in password, and parses beginning flag, operation control word and password, if parsed
Mistake, then exit and provide error information;If parsing is correct, alignment module is performed;
Alignment module, it configures to remove align operation control word and password according to the analytic value of beginning flag;Marshalling is calculated
Module, its configuration carries out marshalling calculating come the password to each control computing word control, and forms final password packet;
Grouping module, its configuration carrys out the length being grouped according to each password, and plaintext to be encrypted is grouped, and is formed and divided
Group collection;
Computations module, its cryptographic calculation rule for configuring to be specified according to the operation rule field of operation control word,
Calculating is encrypted to plaintext to be encrypted with corresponding password, and ultimately generates ciphertext.
Brief description of the drawings
Fig. 1 show password composition structure of the invention.
Fig. 2 show the structure of beginning flag of the invention.
Fig. 3 show ring shift right operation rule.
Fig. 4 shows the result after ring shift right computing.
Fig. 5 shows ring shift left operation rule.
Fig. 6 shows that operation control word is constituted.
Fig. 7 shows the flow chart for reading in password and parsing.
Fig. 8 shows the flow chart of alignment operation control word and password array.
Fig. 9 shows the flow chart of password marshalling.
Figure 10 shows the flow chart of stream media information method for protecting of the invention.
Specific embodiment
As shown in Figure 10, this stream media information method for protecting, the method is symmetric encipherment algorithm, is included during encryption
Following steps:
(1) password is read in, and parses beginning flag, operation control word and password, if parsing error, exits and be given
Error information;If parsing is correct, step (2) is performed;
(2) analytic value according to beginning flag removes align operation control word and password;
(3) password to each control computing word control carries out marshalling calculating, and forms final password packet;
(4) length being grouped according to each password, is grouped to plaintext to be encrypted, forms set of packets;
(5) the cryptographic calculation rule specified according to the operation rule field of operation control word, with corresponding password to be added
Close plaintext is encrypted calculating, and ultimately generates ciphertext.
The present invention regards encrypted object as indiscriminate binary data stream sequence, therefore with versatility, Ke Yishi
For various stream media formats;Its algorithm is simple, and required calculation resources are less, and unrelated with Password Length, therefore the algorithm can
Used with being adapted to miniaturization and miniaturization terminal;And under equal Password Length, realize becoming the data encryption of length packet,
So that Cipher Strength is better than presently disclosed complicated AES, but encryption and decryption resource consumption is calculated much smaller than the encryption of equality strength
Method.
In addition, as shown in fig. 7, the step (1) including it is following step by step:
(1.1) start;
(1.2) password is read in;
(1.3) judge whether password is odd length, be then to perform step (1.4), otherwise perform step (1.6);
(1.4) judge whether the front two of password first character section is legal, be then to perform step (1.5), otherwise perform step
Suddenly (1.6);
(1.5) take out first character section and be stored in variable, subsequent byte is divided to two sections to be stored in array;Jump to step (1.7);
(1.6) report lost property to the authorities and lose;
(1.7) terminate.
In addition, as shown in figure 8, the step (2) including it is following step by step:
(2.1) start;
(2.2) whether the version flag field for judging beginning flag is 00, is then to perform step (2.3), otherwise performs step
Suddenly (2.4);
(2.3) displacement mode field is taken out, operation control word and password array are changed in 00 representative in the way of ring shift right
Order, 01 represents the order of array is changed in the way of ring shift left, and 10 represent the order that array is changed in the way of complementation,
11 representatives are not moved;Jump to step (2.5);
(2.4) report lost property to the authorities and lose;
(2.5) terminate.
In addition, as shown in figure 9, the step (3) including it is following step by step:
(3.1) start;
(3.2) Password Length k is read in;
(3.3) i=1 is made;
(3.4) judge that whether i, more than k, is then to perform step (3.7), otherwise perform step (3.5);
(3.5) value of cycle-index and jump position is read in;
(3.6) the corresponding password packet of the control word is spliced;Jump procedure (3.4);
(3.7) final password packet is spliced;
(3.8) terminate.
In addition, the operation control word is divided into three parts, by 2 jump positions of bit, the cycle-index and 2 of 4 bit
The operation rule composition of individual byte.
In addition, the operation rule control in plain text and password between operation rule, operation rule include XOR,
Negate XOR, even position XOR, strange position XOR.
In addition, the cycle-index controls the number of times that the cipher word is used in a password packet, the field
Span is 0~7, and it is 1~8 time to represent the cipher word by access times.
In addition, the change of the length of jump position control packet, jump position controls the password field at which individual point
Only it is only used once during group, the span of position of jumping is 0~7, subpackage correspond to the 0th~7 packet.
It will appreciated by the skilled person that all or part of step in realizing above-described embodiment method can be
The hardware of correlation is instructed to complete by program, described program can be stored in a computer read/write memory medium,
The program upon execution, including above-described embodiment method each step, and described storage medium can be:ROM/RAM, magnetic
Dish, CD, storage card etc..Therefore, corresponding with the method for the present invention, the present invention is also simultaneously including a kind of stream media information peace
Full safeguards system, the system is generally represented in the form of the functional module corresponding with each step of method.It is using the method
System includes:
Parsing module, it configures to read in password, and parses beginning flag, operation control word and password, if parsed
Mistake, then exit and provide error information;If parsing is correct, alignment module is performed;
Alignment module, it configures to remove align operation control word and password according to the analytic value of beginning flag;Marshalling is calculated
Module, its configuration carries out marshalling calculating come the password to each control computing word control, and forms final password packet;
Grouping module, its configuration carrys out the length being grouped according to each password, and plaintext to be encrypted is grouped, and is formed and divided
Group collection;
Computations module, its cryptographic calculation rule for configuring to be specified according to the operation rule field of operation control word,
Calculating is encrypted to plaintext to be encrypted with corresponding password, and ultimately generates ciphertext.
The application motion is described in detail as follows:
Password constitutes structure
One complete password is made up of control bit and password position.
As shown in figure 1, control bit is by a computing for the beginning flag and multiple bytes (identical with password digit) of byte
Control word is constituted.Beginning flag is used to control the corresponding relation of operation control word and password position;Operation control word control password position
Algorithm.Password position is the key for being encrypted computing.
1) beginning flag
The length of beginning flag is a byte, and it is located at a first byte for complete password.
Beginning flag is used for the corresponding relation of " operation control word " and " password " between.
The value of beginning flag is according to binary rules, and its 8 bit bit functions are as follows:
In Fig. 2, wherein:
● version sign:It is the version identifier of AES, permanent at present is 00;
● displacement mode:Mark operation control word and password position between computational methods, can value 00,01,10,11, point
Other implication is as follows:
√00:Ring shift right;
√01:Ring shift left;
√10:Complementation;
√11:Do not move.
● value:The value of the corresponding relation between operation control word and password position, its span is:0~15.In order to below
Description is convenient, it is assumed that the value is m.
Specific shift operation rule is as follows:
● ring shift right:
" operation control word " is circulated in units of byte and is moved to right, it is mobile m times.
Result such as Fig. 3 after displacement.
Therefore, the corresponding relation between operation control word and password is exactly:
| MOD (n+1-m, n+1) | is corresponding with password 0 for √ operation control words;
| MOD (n+2-m, n+1) | is corresponding with password 1 for √ operation control words;
√…………
| MOD (n-1-m, n+1) | is corresponding with password n-1 for √ operation control words;
| MOD (n-m, n+1) | is corresponding with password n for √ operation control words.
● ring shift left:
Ring shift left is similar with ring shift right, and the direction for simply shifting is different, such as Fig. 5.
● complementation:
Complementation computing is that m values and Password Length digit are carried out into complementation computing, and operation result is set into operation control
Corresponding relation between word and password.I.e.:Corresponding relation between operation control word and password is exactly:
| MOD (m, n+1) | is corresponding with password 0 for √ operation control words;
| MOD (m+1, n+1) | is corresponding with password 1 for √ operation control words;
√………………
| MOD (m+n-1, n+1) | is corresponding with password n-1 for √ operation control words;
| MOD (m+n, n+1) | is corresponding with password n for √ operation control words.
● do not move:
Not moving the corresponding relation referred between operation control word and password is:
√ operation controls word 0 is corresponding with password 0;
√ operation controls word 1 is corresponding with password 1;
√……
√ operation control word n are corresponding with password n.
2) operation control word
Each operation control word is divided into three parts, by the jump positions of 2 bit, the cycle-index of 4 bit and 2 words
The operation rule composition of section.Such as Fig. 6.Wherein:
● operation rule controls the operation rule in plain text and between password;
● cycle-index controls access times of the password in a packet;
● the length of jump position control packet.
3) operation rule
Operation rule refers to the operation relation between operation control word and password, there is following four kinds of operation relations:
√00:XOR
√01:Negate XOR
√10:Even position XOR
√11:Strange position XOR
4) cycle-index
Cycle-index controls the number of times that the cipher word is used in a password packet.The span of the field is
0~7, it is 1~8 time to represent the cipher word by access times.In order to describe below conveniently, the value of the field is denoted as i.
For example:The value of the field be 010 (metric 2), represent the cipher word by access times be 3.
5) jump position
In order to realize becoming the data encryption of length packet, the concept of jump position is introduced.
Jump position control packet length change, jump position control the password field which be grouped when only made
With once.
Because jump position only has 3 bit, therefore can only at most realize 8 variable-length packets.The span of jump position is 0
~7, subpackage correspond to the 0th~7 packet.
6) operation control word citing
For the ease of the implication of accurate understanding operation control word, it is exemplified below:
● an operation control word, be:011,00,100, it is assumed that its corresponding password is a1.
Then corresponding eight are respectively:a1a1a1a1a1;a1a1a1a1a1;a1a1a1a1a1;a1;
a1a1a1a1a1;a1a1a1a1a1;a1a1a1a1a1;a1a1a1a1a1.(rewriteeing the control action that word represents jump position)
● two operation control words, be:011,00,100;001,00,010, it is assumed that its corresponding password is a1 and a2.
Then corresponding eight are respectively:a1a1a1a1a1a2a2a2;a1a1a1a1a1a2a2a2;
a1a1a1a1a1a2;a1a2a2a2;a1a1a1a1a1a2a2a2;a1a1a1a1a1a2a2a2;a1a1a1a1a1a2a2a2;
a1a1a1a1a1a2a2a2.(rewriteeing the control action that word represents jump position)
7) AES
The first step:Password is read in, and parses beginning flag, operation control word and password, if parsing error, exits and add
Close process, and provide error information;If parsing is correct, the calculating of second step is carried out.Such as Fig. 7.
Second step:Alignment operation control word and password.Parsing beginning flag, and the operation control word that aligns is gone according to its value
With password.Such as Fig. 8.
3rd step:Password is organized into groups.Each control computing word is parsed, and the cipher word controlled it carries out marshalling meter
Calculate, and form final password packet.Such as Fig. 9.
4th step:Plaintext to be encrypted is grouped.According to the length that each password is grouped, plaintext is grouped,
Form set of packets.
5th step:The cryptographic calculation rule that " operation rule " field according to " operation control word " is specified, with corresponding close
Code is encrypted calculating to plaintext, and ultimately generates ciphertext.
8) decipherment algorithm
Decipherment algorithm is the inverse process of ciphering process, and its algorithm and processing procedure are identicals.Simply in ciphering process
It is that plaintext is processed, and generates ciphertext;It is that ciphertext is processed in decrypting process, and generates in plain text.Therefore herein
No longer decrypting process is elaborated.
9) other
This algorithm is a kind of symmetric encipherment algorithm, therefore only one of which key, and keeping, storage to key, distribution were waited
Journey, using the method as current other symmetric cryptographies.
The processes such as these keepings, storage, distribution to key are not in the range of the patent application.
Key point of the invention and thought to be protected are as follows:
1) thought of elongated code book pattern Variable Length Code Book (VLCB);
2) control bit, the partition strategy of control bit control AES and the thought of arithmetic logic are incorporated in password;
3) calculating logic in plain text and between ciphertext is also variable, and the thought controlled in itself by password;
4) computations algorithm proposed by the present invention.
The advantage of the invention is that:
1) compared with the AES of identical calculations amount, Cipher Strength is very high;
2) compared with the AES of identical Cipher Strength, the algorithm is simple, and computing cost is very small;
The positive effect of the present invention is:
1) encryption mode to classical symmetric encryption method extends, and enrich this field puts into practice method;
2) in proposing for control bit to incorporate password first, control bit controls the partition strategy and arithmetic logic of AES,
So as to substantially increase Cipher Strength, before extending to password as pure " key " understanding;
3) AES can extensively using for it is Embedded it is small-sized and miniaturization audio-video collection terminal and broadcast
Put terminal so that the audio/video information safe coefficient of this kind equipment is greatly improved.
The above, is only presently preferred embodiments of the present invention, not makees any formal limitation to the present invention, it is every according to
Any simple modification, equivalent variations and the modification made to above example according to technical spirit of the invention, still belong to the present invention
The protection domain of technical scheme.
Claims (9)
1. a kind of stream media information method for protecting, it is characterised in that:The method belongs to symmetric encipherment algorithm class, is wrapped during encryption
Include following steps:
(1) password is read in, and parses beginning flag, operation control word and password, if parsing error, exits and provide reporting an error
Information;If parsing is correct, step (2) is performed;
(2) analytic value according to beginning flag removes align operation control word and password;
(3) password to each control computing word control carries out marshalling calculating, and forms final password packet;
(4) length being grouped according to each password, is grouped to plaintext to be encrypted, forms set of packets;
(5) the cryptographic calculation rule specified according to the operation rule field of operation control word, with corresponding password to be encrypted
Calculating is encrypted in plain text, and ultimately generates ciphertext.
2. stream media information method for protecting according to claim 1, it is characterised in that:The step (1) including with
Under step by step:
(1.1) start;
(1.2) password is read in;
(1.3) judge whether password is odd length, be then to perform step (1.4), otherwise perform step (1.6);
(1.4) judge whether the front two of password first character section is legal, be then to perform step (1.5), otherwise perform step
(1.6);
(1.5) take out first character section and be stored in variable, subsequent byte is divided to two sections to be stored in array;Jump to step (1.7);
(1.6) report lost property to the authorities and lose;
(1.7) terminate.
3. stream media information method for protecting according to claim 2, it is characterised in that:The step (2) including with
Under step by step:
(2.1) start;
(2.2) whether the version flag field for judging beginning flag is 00, is then to perform step (2.3), otherwise performs step
(2.4);
(2.3) displacement mode field is taken out, it is suitable with password array that operation control word is changed in 00 representative in the way of ring shift right
Sequence, 01 represents the order that array is changed in the way of ring shift left, and 10 represent the order that array is changed in the way of complementation, 11 generations
Table is not moved;Jump to step (2.5);
(2.4) report lost property to the authorities and lose;
(2.5) terminate.
4. stream media information method for protecting according to claim 3, it is characterised in that:The step (3) including with
Under step by step:
(3.1) start;
(3.2) Password Length k is read in;
(3.3) i=1 is made;
(3.4) judge that whether i, more than k, is then to perform step (3.7), otherwise perform step (3.5);
(3.5) value of cycle-index and jump position is read in;
(3.6) the corresponding password packet of the control word is spliced;Jump procedure (3.4);
(3.7) final password packet is spliced;
(3.8) terminate.
5. stream media information method for protecting according to claim 1, it is characterised in that:The operation control word is divided into
Three parts, are made up of the operation rule of 2 jump positions of bit, the cycle-index of 4 bit and 2 bytes.
6. stream media information method for protecting according to claim 5, it is characterised in that:The operation rule is controlled
Operation rule in plain text and between password, operation rule includes XOR, negates XOR, even position XOR, strange position
XOR.
7. stream media information method for protecting according to claim 6, it is characterised in that:The cycle-index is controlled
The number of times that the cipher word is used in a password packet, the span of the field is 0~7, represents the cipher word quilt
Access times are 1~8 time.
8. stream media information method for protecting according to claim 7, it is characterised in that:Jump position control packet
Length change, jump position control the password field which packet when be only only used once, jump position value model
It is 0~7 to enclose, and subpackage correspond to the 0th~7 packet.
9. a kind of stream media information safe-guard system, it is characterised in that:The system includes:
Parsing module, it configures to read in password, and parses beginning flag, operation control word and password, if parsing error,
Exit and provide error information;If parsing is correct, alignment module is performed;
Alignment module, it configures to remove align operation control word and password according to the analytic value of beginning flag;
Marshalling computing module, its configuration carries out marshalling calculating come the password to each control computing word control, and forms final
Password is grouped;
Grouping module, its configuration carrys out the length being grouped according to each password, and plaintext to be encrypted is grouped, and forms packet
Collection;
Computations module, its configuration uses phase come the cryptographic calculation rule specified according to the operation rule field of operation control word
The password answered is encrypted calculating to plaintext to be encrypted, and ultimately generates ciphertext.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710007536.XA CN106790207B (en) | 2017-01-05 | 2017-01-05 | Streaming media information security guarantee method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710007536.XA CN106790207B (en) | 2017-01-05 | 2017-01-05 | Streaming media information security guarantee method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106790207A true CN106790207A (en) | 2017-05-31 |
CN106790207B CN106790207B (en) | 2020-03-17 |
Family
ID=58950315
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710007536.XA Active CN106790207B (en) | 2017-01-05 | 2017-01-05 | Streaming media information security guarantee method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106790207B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110751909A (en) * | 2019-10-31 | 2020-02-04 | 云谷(固安)科技有限公司 | Display panel and display device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010012323A1 (en) * | 2000-02-08 | 2001-08-09 | Klaus Gaedke | Method and apparatus for bitrate control in a video or audio encoder |
CN1560823A (en) * | 2004-02-19 | 2005-01-05 | 李春林 | Data encipher and decipher system based on dynamic variable-length code |
-
2017
- 2017-01-05 CN CN201710007536.XA patent/CN106790207B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010012323A1 (en) * | 2000-02-08 | 2001-08-09 | Klaus Gaedke | Method and apparatus for bitrate control in a video or audio encoder |
CN1560823A (en) * | 2004-02-19 | 2005-01-05 | 李春林 | Data encipher and decipher system based on dynamic variable-length code |
Non-Patent Citations (1)
Title |
---|
杨志云: ""利用随机数序列加密视频变长码字的新方法"", 《华中科技大学学报》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110751909A (en) * | 2019-10-31 | 2020-02-04 | 云谷(固安)科技有限公司 | Display panel and display device |
Also Published As
Publication number | Publication date |
---|---|
CN106790207B (en) | 2020-03-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10581590B2 (en) | Flexible architecture and instruction for advanced encryption standard (AES) | |
JP3901909B2 (en) | ENCRYPTION DEVICE AND RECORDING MEDIUM CONTAINING PROGRAM | |
US9584310B2 (en) | Protecting a white-box implementation against attacks | |
US10097342B2 (en) | Encoding values by pseudo-random mask | |
Karthigaikumar et al. | Simulation of image encryption using AES algorithm | |
RU2502201C2 (en) | Encryption/decryption device, encryption/decryption method, information processing device and computer programme | |
US20060023875A1 (en) | Enhanced stream cipher combining function | |
RU2603550C2 (en) | Data processing device, data processing method, and program | |
JPH1075240A (en) | Method for protecting data transmission and device for ciphering or deciphering data | |
EP2406916A1 (en) | White-box cryptographic system with input dependent encodings | |
EP3125462A1 (en) | Balanced encoding of intermediate values within a white-box implementation | |
EP2922235B1 (en) | Security module for secure function execution on untrusted platform | |
JP2011512562A (en) | Random encryption and decryption method for access and communication data | |
Saha et al. | White-box cryptography based data encryption-decryption scheme for iot environment | |
CN106790207A (en) | A kind of stream media information method for protecting and system | |
EP2940919B1 (en) | Realizing authorization via incorrect functional behavior of a white-box implementation | |
US10360820B2 (en) | Instrumentation privacy apparatus and method | |
WO2009081975A1 (en) | Encryption device, decryption device, encryption method, decryption method, and program | |
Gujar | Image Encryption using AES Algorithm based on FPGA |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |