CN106790207A - A kind of stream media information method for protecting and system - Google Patents

A kind of stream media information method for protecting and system Download PDF

Info

Publication number
CN106790207A
CN106790207A CN201710007536.XA CN201710007536A CN106790207A CN 106790207 A CN106790207 A CN 106790207A CN 201710007536 A CN201710007536 A CN 201710007536A CN 106790207 A CN106790207 A CN 106790207A
Authority
CN
China
Prior art keywords
password
operation control
word
stream media
control word
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710007536.XA
Other languages
Chinese (zh)
Other versions
CN106790207B (en
Inventor
吴亚凤
唐常芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710007536.XA priority Critical patent/CN106790207B/en
Publication of CN106790207A publication Critical patent/CN106790207A/en
Application granted granted Critical
Publication of CN106790207B publication Critical patent/CN106790207B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Abstract

A kind of stream media information method for protecting is disclosed, the method is symmetric encipherment algorithm, is included during encryption:(1) password is read in, and parses beginning flag, operation control word and password, if parsing error, exits and provide error information;If parsing is correct, step (2) is performed;(2) analytic value according to beginning flag removes align operation control word and password;(3) password to each control computing word control carries out marshalling calculating, and forms final password packet;(4) length being grouped according to each password, is grouped to plaintext to be encrypted, forms set of packets;(5) the cryptographic calculation rule specified according to the operation rule field of operation control word, is encrypted calculating, and ultimately generate ciphertext with corresponding password to plaintext to be encrypted.Also stream media information safe-guard system.

Description

A kind of stream media information method for protecting and system
Technical field
The present invention relates to the technical field of the information security in the fields such as video monitoring, video conference, more particularly to one kind Stream media information method for protecting, and stream media information safe-guard system.
Background technology
Our routine work and life are more and more applied to technologies such as video monitoring, video conferences, matchmaker is flowed The information security of the links such as transmission, storage, the broadcasting of body is more and more important.How efficiently and high intensity guarantee stream media information Become concern and research emphasis in the information security of links.
At present, encrypted based on conventional encryption techniques streaming media for what Streaming Media was generally used, these methods can be very The good high strength encrypting for realizing information, but generally existing encryption efficiency is relatively low, algorithm is complicated, real-time is low, encryption and decryption is set The problems such as received shipment calculation Capability Requirement is high.Details are as follows:
Cipher system is divided into two major classes by contemporary cryptology according to the difference of encryption key occupation mode:Symmetric cryptography body System and asymmetric cryptography system.
Symmetric encipherment algorithm:Symmetric cryptography employs symmetric cryptography coding techniques, and its feature is file encryption and decryption Decruption key is also used as using identical key, i.e. encryption key, this method is called symmetric cryptography calculation in cryptography Method.
● symmetry algorithm mainly has four kinds of encryption modes:
√ electronic codebook modes pattern Electronic Code Book (ECB):This pattern is to use earliest and most simple Pattern, the data of encryption are divided into some groups by it, and every group of size is identical with encryption key lengths, and then every group all with identical Key be encrypted.
√ cryptographic blocks chain pattern Cipher Block Chaining (CBC):The encryption of CBC patterns is also by plain text first It is divided into the block of regular length, then the ciphertext by an above cryptographic block output carries out XOR with the next Plaintext block to be encrypted Operation, result of calculation is encrypted with key again and obtains ciphertext.When first plaintext block encryption, because not encrypting above Ciphertext, so need an initialization vector.It is different with ECB modes, by annexation so that ciphertext with plain text no longer One-to-one relation, crack it is more difficult, as long as and overcoming simple ciphertext blocks of exchanging and being likely to be breached attacking for purpose Hit.
√ encrypts feedback model Cipher Feedback Mode (CFB):The encryption of application program to make Use stream encryption method, it is possible to use encryption feedback model.In such a mode, data are encrypted with smaller unit, such as can be 8, Block length (typically 64) of this length less than definition
√ output feedback modes Output Feedback Mode (OFB):Output feedback mode is similar to CFB, only difference It is not that ciphertext inserts ciphering process next stage in CFB, and in OFB, encryption is inserted in the input of initialization vector ciphering process Process next stage.
Rivest, shamir, adelman needs two keys:Public-key cryptography (publickey) and private cipher key (privatekey). Public-key cryptography and private cipher key are a pair, if be encrypted to data with public-key cryptography, only with corresponding private cipher key Can decryption;If be encrypted with private cipher key pair data, then could only be decrypted with corresponding public-key cryptography.Because encryption Two different keys are used with decryption, so this algorithm is called rivest, shamir, adelman.
Due to using two keys, its advantage is to be easy to protect in the security of key transmission to asymmetric cryptography system Barrier, and algorithm security is very high.But the algorithm based on asymmetric encryption is all extremely complex, in this data transfer of Streaming Media It is required that very strong real-time, the again very big application scenario of data volume is that unaccommodated (such algorithm requirement audio-video terminal sets Standby operational performance is very high, for example:A kind of method of real time media stream encryption transmission《Patent application publication No.:CN101552666》; For another example:DRM (Digital Rights Management digital copyright managements) cryptographic security of Microsoft generally acknowledges highest at present, But its algorithm is extremely complex, can only use on a desktop system, it is difficult to used in embedded system).
Therefore stream media information safety guarantee can only use symmetric encipherment algorithm, current most typical symmetric encipherment algorithm Have:DES algorithms, 3DES algorithms, TDEA algorithms, Blowfish algorithms, RC5 algorithms, IDEA algorithms.But these algorithms are relative to embedding Enter for the audio-video collection terminal and playback terminal of the small-sized of formula and miniaturization, still seem more complicated (such as in order to obtain Stronger security is obtained, they do not select ecb mode, CBC patterns is selected at least), and in order to ensure very strong safety Property, typically require selection length more than the password of 64, so just bigger (these of the operand needed for its encryption and decryption The operand of algorithm is all relevant with Password Length).
As can be seen here, for the AES of Streaming Media, its essential problem is exactly between security and high efficiency Contradiction, it is this technology problem to be solved to seek a kind of AES of efficient high safety.
In addition, at present on the market most of AESs for Streaming Media all it is relevant with the form of Streaming Media (usually Subpackage is carried out according to Streaming Media type), the purpose of do so reduces the complexity of algorithm while obtaining compared with strong security, but It is and sacrifices the versatility of algorithm, different types of Streaming Media type is needed using different algorithms, for example:Streaming Media adds Close and decryption method, encryption and decryption device (patent application publication number:CN104580236A).The characteristics of this technology is not differentiate between The type and form of Streaming Media, but they are regarded as indiscriminate " binary data stream ", and step-by-step is carried out to them enter Row processing.
The content of the invention
To overcome the defect of prior art, the technical problem to be solved in the present invention to there is provided a kind of stream media information safety Support method, it has versatility, goes for various stream media formats;Algorithm is simple, is adapted to minimize and micro- Type terminal is used;Under equal Password Length, Cipher Strength is better than presently disclosed complicated AES, but encryption and decryption resource AES of the consumption much smaller than equality strength.
The technical scheme is that:This stream media information method for protecting, the method is symmetric encipherment algorithm, plus Comprised the following steps when close:
(1) password is read in, and parses beginning flag, operation control word and password, if parsing error, exits and be given Error information;If parsing is correct, step (2) is performed;
(2) analytic value according to beginning flag removes align operation control word and password;
(3) password to each control computing word control carries out marshalling calculating, and forms final password packet;
(4) length being grouped according to each password, is grouped to plaintext to be encrypted, forms set of packets;
(5) the cryptographic calculation rule specified according to the operation rule field of operation control word, with corresponding password to be added Close plaintext is encrypted calculating, and ultimately generates ciphertext.
The present invention regards encrypted object as indiscriminate binary data stream sequence, therefore with versatility, Ke Yishi For various stream media formats;Its algorithm is simple, and required calculation resources are less, and unrelated with Password Length, therefore the algorithm can Used with being adapted to miniaturization and miniaturization terminal;And under equal Password Length, realize becoming the data encryption of length packet, So that Cipher Strength is better than presently disclosed complicated AES, but encryption and decryption resource consumption is calculated much smaller than the encryption of equality strength Method.
A kind of stream media information safe-guard system is additionally provided, the system includes:
Parsing module, it configures to read in password, and parses beginning flag, operation control word and password, if parsed Mistake, then exit and provide error information;If parsing is correct, alignment module is performed;
Alignment module, it configures to remove align operation control word and password according to the analytic value of beginning flag;Marshalling is calculated Module, its configuration carries out marshalling calculating come the password to each control computing word control, and forms final password packet;
Grouping module, its configuration carrys out the length being grouped according to each password, and plaintext to be encrypted is grouped, and is formed and divided Group collection;
Computations module, its cryptographic calculation rule for configuring to be specified according to the operation rule field of operation control word, Calculating is encrypted to plaintext to be encrypted with corresponding password, and ultimately generates ciphertext.
Brief description of the drawings
Fig. 1 show password composition structure of the invention.
Fig. 2 show the structure of beginning flag of the invention.
Fig. 3 show ring shift right operation rule.
Fig. 4 shows the result after ring shift right computing.
Fig. 5 shows ring shift left operation rule.
Fig. 6 shows that operation control word is constituted.
Fig. 7 shows the flow chart for reading in password and parsing.
Fig. 8 shows the flow chart of alignment operation control word and password array.
Fig. 9 shows the flow chart of password marshalling.
Figure 10 shows the flow chart of stream media information method for protecting of the invention.
Specific embodiment
As shown in Figure 10, this stream media information method for protecting, the method is symmetric encipherment algorithm, is included during encryption Following steps:
(1) password is read in, and parses beginning flag, operation control word and password, if parsing error, exits and be given Error information;If parsing is correct, step (2) is performed;
(2) analytic value according to beginning flag removes align operation control word and password;
(3) password to each control computing word control carries out marshalling calculating, and forms final password packet;
(4) length being grouped according to each password, is grouped to plaintext to be encrypted, forms set of packets;
(5) the cryptographic calculation rule specified according to the operation rule field of operation control word, with corresponding password to be added Close plaintext is encrypted calculating, and ultimately generates ciphertext.
The present invention regards encrypted object as indiscriminate binary data stream sequence, therefore with versatility, Ke Yishi For various stream media formats;Its algorithm is simple, and required calculation resources are less, and unrelated with Password Length, therefore the algorithm can Used with being adapted to miniaturization and miniaturization terminal;And under equal Password Length, realize becoming the data encryption of length packet, So that Cipher Strength is better than presently disclosed complicated AES, but encryption and decryption resource consumption is calculated much smaller than the encryption of equality strength Method.
In addition, as shown in fig. 7, the step (1) including it is following step by step:
(1.1) start;
(1.2) password is read in;
(1.3) judge whether password is odd length, be then to perform step (1.4), otherwise perform step (1.6);
(1.4) judge whether the front two of password first character section is legal, be then to perform step (1.5), otherwise perform step Suddenly (1.6);
(1.5) take out first character section and be stored in variable, subsequent byte is divided to two sections to be stored in array;Jump to step (1.7);
(1.6) report lost property to the authorities and lose;
(1.7) terminate.
In addition, as shown in figure 8, the step (2) including it is following step by step:
(2.1) start;
(2.2) whether the version flag field for judging beginning flag is 00, is then to perform step (2.3), otherwise performs step Suddenly (2.4);
(2.3) displacement mode field is taken out, operation control word and password array are changed in 00 representative in the way of ring shift right Order, 01 represents the order of array is changed in the way of ring shift left, and 10 represent the order that array is changed in the way of complementation, 11 representatives are not moved;Jump to step (2.5);
(2.4) report lost property to the authorities and lose;
(2.5) terminate.
In addition, as shown in figure 9, the step (3) including it is following step by step:
(3.1) start;
(3.2) Password Length k is read in;
(3.3) i=1 is made;
(3.4) judge that whether i, more than k, is then to perform step (3.7), otherwise perform step (3.5);
(3.5) value of cycle-index and jump position is read in;
(3.6) the corresponding password packet of the control word is spliced;Jump procedure (3.4);
(3.7) final password packet is spliced;
(3.8) terminate.
In addition, the operation control word is divided into three parts, by 2 jump positions of bit, the cycle-index and 2 of 4 bit The operation rule composition of individual byte.
In addition, the operation rule control in plain text and password between operation rule, operation rule include XOR, Negate XOR, even position XOR, strange position XOR.
In addition, the cycle-index controls the number of times that the cipher word is used in a password packet, the field Span is 0~7, and it is 1~8 time to represent the cipher word by access times.
In addition, the change of the length of jump position control packet, jump position controls the password field at which individual point Only it is only used once during group, the span of position of jumping is 0~7, subpackage correspond to the 0th~7 packet.
It will appreciated by the skilled person that all or part of step in realizing above-described embodiment method can be The hardware of correlation is instructed to complete by program, described program can be stored in a computer read/write memory medium, The program upon execution, including above-described embodiment method each step, and described storage medium can be:ROM/RAM, magnetic Dish, CD, storage card etc..Therefore, corresponding with the method for the present invention, the present invention is also simultaneously including a kind of stream media information peace Full safeguards system, the system is generally represented in the form of the functional module corresponding with each step of method.It is using the method System includes:
Parsing module, it configures to read in password, and parses beginning flag, operation control word and password, if parsed Mistake, then exit and provide error information;If parsing is correct, alignment module is performed;
Alignment module, it configures to remove align operation control word and password according to the analytic value of beginning flag;Marshalling is calculated Module, its configuration carries out marshalling calculating come the password to each control computing word control, and forms final password packet;
Grouping module, its configuration carrys out the length being grouped according to each password, and plaintext to be encrypted is grouped, and is formed and divided Group collection;
Computations module, its cryptographic calculation rule for configuring to be specified according to the operation rule field of operation control word, Calculating is encrypted to plaintext to be encrypted with corresponding password, and ultimately generates ciphertext.
The application motion is described in detail as follows:
Password constitutes structure
One complete password is made up of control bit and password position.
As shown in figure 1, control bit is by a computing for the beginning flag and multiple bytes (identical with password digit) of byte Control word is constituted.Beginning flag is used to control the corresponding relation of operation control word and password position;Operation control word control password position Algorithm.Password position is the key for being encrypted computing.
1) beginning flag
The length of beginning flag is a byte, and it is located at a first byte for complete password.
Beginning flag is used for the corresponding relation of " operation control word " and " password " between.
The value of beginning flag is according to binary rules, and its 8 bit bit functions are as follows:
In Fig. 2, wherein:
● version sign:It is the version identifier of AES, permanent at present is 00;
● displacement mode:Mark operation control word and password position between computational methods, can value 00,01,10,11, point Other implication is as follows:
√00:Ring shift right;
√01:Ring shift left;
√10:Complementation;
√11:Do not move.
● value:The value of the corresponding relation between operation control word and password position, its span is:0~15.In order to below Description is convenient, it is assumed that the value is m.
Specific shift operation rule is as follows:
● ring shift right:
" operation control word " is circulated in units of byte and is moved to right, it is mobile m times.
Result such as Fig. 3 after displacement.
Therefore, the corresponding relation between operation control word and password is exactly:
| MOD (n+1-m, n+1) | is corresponding with password 0 for √ operation control words;
| MOD (n+2-m, n+1) | is corresponding with password 1 for √ operation control words;
√…………
| MOD (n-1-m, n+1) | is corresponding with password n-1 for √ operation control words;
| MOD (n-m, n+1) | is corresponding with password n for √ operation control words.
● ring shift left:
Ring shift left is similar with ring shift right, and the direction for simply shifting is different, such as Fig. 5.
● complementation:
Complementation computing is that m values and Password Length digit are carried out into complementation computing, and operation result is set into operation control Corresponding relation between word and password.I.e.:Corresponding relation between operation control word and password is exactly:
| MOD (m, n+1) | is corresponding with password 0 for √ operation control words;
| MOD (m+1, n+1) | is corresponding with password 1 for √ operation control words;
√………………
| MOD (m+n-1, n+1) | is corresponding with password n-1 for √ operation control words;
| MOD (m+n, n+1) | is corresponding with password n for √ operation control words.
● do not move:
Not moving the corresponding relation referred between operation control word and password is:
√ operation controls word 0 is corresponding with password 0;
√ operation controls word 1 is corresponding with password 1;
√……
√ operation control word n are corresponding with password n.
2) operation control word
Each operation control word is divided into three parts, by the jump positions of 2 bit, the cycle-index of 4 bit and 2 words The operation rule composition of section.Such as Fig. 6.Wherein:
● operation rule controls the operation rule in plain text and between password;
● cycle-index controls access times of the password in a packet;
● the length of jump position control packet.
3) operation rule
Operation rule refers to the operation relation between operation control word and password, there is following four kinds of operation relations:
√00:XOR
√01:Negate XOR
√10:Even position XOR
√11:Strange position XOR
4) cycle-index
Cycle-index controls the number of times that the cipher word is used in a password packet.The span of the field is 0~7, it is 1~8 time to represent the cipher word by access times.In order to describe below conveniently, the value of the field is denoted as i.
For example:The value of the field be 010 (metric 2), represent the cipher word by access times be 3.
5) jump position
In order to realize becoming the data encryption of length packet, the concept of jump position is introduced.
Jump position control packet length change, jump position control the password field which be grouped when only made With once.
Because jump position only has 3 bit, therefore can only at most realize 8 variable-length packets.The span of jump position is 0 ~7, subpackage correspond to the 0th~7 packet.
6) operation control word citing
For the ease of the implication of accurate understanding operation control word, it is exemplified below:
● an operation control word, be:011,00,100, it is assumed that its corresponding password is a1.
Then corresponding eight are respectively:a1a1a1a1a1;a1a1a1a1a1;a1a1a1a1a1;a1; a1a1a1a1a1;a1a1a1a1a1;a1a1a1a1a1;a1a1a1a1a1.(rewriteeing the control action that word represents jump position)
● two operation control words, be:011,00,100;001,00,010, it is assumed that its corresponding password is a1 and a2.
Then corresponding eight are respectively:a1a1a1a1a1a2a2a2;a1a1a1a1a1a2a2a2; a1a1a1a1a1a2;a1a2a2a2;a1a1a1a1a1a2a2a2;a1a1a1a1a1a2a2a2;a1a1a1a1a1a2a2a2; a1a1a1a1a1a2a2a2.(rewriteeing the control action that word represents jump position)
7) AES
The first step:Password is read in, and parses beginning flag, operation control word and password, if parsing error, exits and add Close process, and provide error information;If parsing is correct, the calculating of second step is carried out.Such as Fig. 7.
Second step:Alignment operation control word and password.Parsing beginning flag, and the operation control word that aligns is gone according to its value With password.Such as Fig. 8.
3rd step:Password is organized into groups.Each control computing word is parsed, and the cipher word controlled it carries out marshalling meter Calculate, and form final password packet.Such as Fig. 9.
4th step:Plaintext to be encrypted is grouped.According to the length that each password is grouped, plaintext is grouped, Form set of packets.
5th step:The cryptographic calculation rule that " operation rule " field according to " operation control word " is specified, with corresponding close Code is encrypted calculating to plaintext, and ultimately generates ciphertext.
8) decipherment algorithm
Decipherment algorithm is the inverse process of ciphering process, and its algorithm and processing procedure are identicals.Simply in ciphering process It is that plaintext is processed, and generates ciphertext;It is that ciphertext is processed in decrypting process, and generates in plain text.Therefore herein No longer decrypting process is elaborated.
9) other
This algorithm is a kind of symmetric encipherment algorithm, therefore only one of which key, and keeping, storage to key, distribution were waited Journey, using the method as current other symmetric cryptographies.
The processes such as these keepings, storage, distribution to key are not in the range of the patent application.
Key point of the invention and thought to be protected are as follows:
1) thought of elongated code book pattern Variable Length Code Book (VLCB);
2) control bit, the partition strategy of control bit control AES and the thought of arithmetic logic are incorporated in password;
3) calculating logic in plain text and between ciphertext is also variable, and the thought controlled in itself by password;
4) computations algorithm proposed by the present invention.
The advantage of the invention is that:
1) compared with the AES of identical calculations amount, Cipher Strength is very high;
2) compared with the AES of identical Cipher Strength, the algorithm is simple, and computing cost is very small;
The positive effect of the present invention is:
1) encryption mode to classical symmetric encryption method extends, and enrich this field puts into practice method;
2) in proposing for control bit to incorporate password first, control bit controls the partition strategy and arithmetic logic of AES, So as to substantially increase Cipher Strength, before extending to password as pure " key " understanding;
3) AES can extensively using for it is Embedded it is small-sized and miniaturization audio-video collection terminal and broadcast Put terminal so that the audio/video information safe coefficient of this kind equipment is greatly improved.
The above, is only presently preferred embodiments of the present invention, not makees any formal limitation to the present invention, it is every according to Any simple modification, equivalent variations and the modification made to above example according to technical spirit of the invention, still belong to the present invention The protection domain of technical scheme.

Claims (9)

1. a kind of stream media information method for protecting, it is characterised in that:The method belongs to symmetric encipherment algorithm class, is wrapped during encryption Include following steps:
(1) password is read in, and parses beginning flag, operation control word and password, if parsing error, exits and provide reporting an error Information;If parsing is correct, step (2) is performed;
(2) analytic value according to beginning flag removes align operation control word and password;
(3) password to each control computing word control carries out marshalling calculating, and forms final password packet;
(4) length being grouped according to each password, is grouped to plaintext to be encrypted, forms set of packets;
(5) the cryptographic calculation rule specified according to the operation rule field of operation control word, with corresponding password to be encrypted Calculating is encrypted in plain text, and ultimately generates ciphertext.
2. stream media information method for protecting according to claim 1, it is characterised in that:The step (1) including with Under step by step:
(1.1) start;
(1.2) password is read in;
(1.3) judge whether password is odd length, be then to perform step (1.4), otherwise perform step (1.6);
(1.4) judge whether the front two of password first character section is legal, be then to perform step (1.5), otherwise perform step (1.6);
(1.5) take out first character section and be stored in variable, subsequent byte is divided to two sections to be stored in array;Jump to step (1.7);
(1.6) report lost property to the authorities and lose;
(1.7) terminate.
3. stream media information method for protecting according to claim 2, it is characterised in that:The step (2) including with Under step by step:
(2.1) start;
(2.2) whether the version flag field for judging beginning flag is 00, is then to perform step (2.3), otherwise performs step (2.4);
(2.3) displacement mode field is taken out, it is suitable with password array that operation control word is changed in 00 representative in the way of ring shift right Sequence, 01 represents the order that array is changed in the way of ring shift left, and 10 represent the order that array is changed in the way of complementation, 11 generations Table is not moved;Jump to step (2.5);
(2.4) report lost property to the authorities and lose;
(2.5) terminate.
4. stream media information method for protecting according to claim 3, it is characterised in that:The step (3) including with Under step by step:
(3.1) start;
(3.2) Password Length k is read in;
(3.3) i=1 is made;
(3.4) judge that whether i, more than k, is then to perform step (3.7), otherwise perform step (3.5);
(3.5) value of cycle-index and jump position is read in;
(3.6) the corresponding password packet of the control word is spliced;Jump procedure (3.4);
(3.7) final password packet is spliced;
(3.8) terminate.
5. stream media information method for protecting according to claim 1, it is characterised in that:The operation control word is divided into Three parts, are made up of the operation rule of 2 jump positions of bit, the cycle-index of 4 bit and 2 bytes.
6. stream media information method for protecting according to claim 5, it is characterised in that:The operation rule is controlled Operation rule in plain text and between password, operation rule includes XOR, negates XOR, even position XOR, strange position XOR.
7. stream media information method for protecting according to claim 6, it is characterised in that:The cycle-index is controlled The number of times that the cipher word is used in a password packet, the span of the field is 0~7, represents the cipher word quilt Access times are 1~8 time.
8. stream media information method for protecting according to claim 7, it is characterised in that:Jump position control packet Length change, jump position control the password field which packet when be only only used once, jump position value model It is 0~7 to enclose, and subpackage correspond to the 0th~7 packet.
9. a kind of stream media information safe-guard system, it is characterised in that:The system includes:
Parsing module, it configures to read in password, and parses beginning flag, operation control word and password, if parsing error, Exit and provide error information;If parsing is correct, alignment module is performed;
Alignment module, it configures to remove align operation control word and password according to the analytic value of beginning flag;
Marshalling computing module, its configuration carries out marshalling calculating come the password to each control computing word control, and forms final Password is grouped;
Grouping module, its configuration carrys out the length being grouped according to each password, and plaintext to be encrypted is grouped, and forms packet Collection;
Computations module, its configuration uses phase come the cryptographic calculation rule specified according to the operation rule field of operation control word The password answered is encrypted calculating to plaintext to be encrypted, and ultimately generates ciphertext.
CN201710007536.XA 2017-01-05 2017-01-05 Streaming media information security guarantee method and system Active CN106790207B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710007536.XA CN106790207B (en) 2017-01-05 2017-01-05 Streaming media information security guarantee method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710007536.XA CN106790207B (en) 2017-01-05 2017-01-05 Streaming media information security guarantee method and system

Publications (2)

Publication Number Publication Date
CN106790207A true CN106790207A (en) 2017-05-31
CN106790207B CN106790207B (en) 2020-03-17

Family

ID=58950315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710007536.XA Active CN106790207B (en) 2017-01-05 2017-01-05 Streaming media information security guarantee method and system

Country Status (1)

Country Link
CN (1) CN106790207B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110751909A (en) * 2019-10-31 2020-02-04 云谷(固安)科技有限公司 Display panel and display device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010012323A1 (en) * 2000-02-08 2001-08-09 Klaus Gaedke Method and apparatus for bitrate control in a video or audio encoder
CN1560823A (en) * 2004-02-19 2005-01-05 李春林 Data encipher and decipher system based on dynamic variable-length code

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010012323A1 (en) * 2000-02-08 2001-08-09 Klaus Gaedke Method and apparatus for bitrate control in a video or audio encoder
CN1560823A (en) * 2004-02-19 2005-01-05 李春林 Data encipher and decipher system based on dynamic variable-length code

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨志云: ""利用随机数序列加密视频变长码字的新方法"", 《华中科技大学学报》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110751909A (en) * 2019-10-31 2020-02-04 云谷(固安)科技有限公司 Display panel and display device

Also Published As

Publication number Publication date
CN106790207B (en) 2020-03-17

Similar Documents

Publication Publication Date Title
US10581590B2 (en) Flexible architecture and instruction for advanced encryption standard (AES)
JP3901909B2 (en) ENCRYPTION DEVICE AND RECORDING MEDIUM CONTAINING PROGRAM
US9584310B2 (en) Protecting a white-box implementation against attacks
US10097342B2 (en) Encoding values by pseudo-random mask
Karthigaikumar et al. Simulation of image encryption using AES algorithm
RU2502201C2 (en) Encryption/decryption device, encryption/decryption method, information processing device and computer programme
US20060023875A1 (en) Enhanced stream cipher combining function
RU2603550C2 (en) Data processing device, data processing method, and program
JPH1075240A (en) Method for protecting data transmission and device for ciphering or deciphering data
EP2406916A1 (en) White-box cryptographic system with input dependent encodings
EP3125462A1 (en) Balanced encoding of intermediate values within a white-box implementation
EP2922235B1 (en) Security module for secure function execution on untrusted platform
JP2011512562A (en) Random encryption and decryption method for access and communication data
Saha et al. White-box cryptography based data encryption-decryption scheme for iot environment
CN106790207A (en) A kind of stream media information method for protecting and system
EP2940919B1 (en) Realizing authorization via incorrect functional behavior of a white-box implementation
US10360820B2 (en) Instrumentation privacy apparatus and method
WO2009081975A1 (en) Encryption device, decryption device, encryption method, decryption method, and program
Gujar Image Encryption using AES Algorithm based on FPGA

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant