CN107070646A - The safe and reliable network transfer method hidden based on password - Google Patents

The safe and reliable network transfer method hidden based on password Download PDF

Info

Publication number
CN107070646A
CN107070646A CN201710034724.1A CN201710034724A CN107070646A CN 107070646 A CN107070646 A CN 107070646A CN 201710034724 A CN201710034724 A CN 201710034724A CN 107070646 A CN107070646 A CN 107070646A
Authority
CN
China
Prior art keywords
mrow
mfrac
msub
formula
cryptopart
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710034724.1A
Other languages
Chinese (zh)
Other versions
CN107070646B (en
Inventor
朱文忠
李晓峰
徐志鸽
俞维佳
蒋特
许志聘
朱龙泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN201710034724.1A priority Critical patent/CN107070646B/en
Publication of CN107070646A publication Critical patent/CN107070646A/en
Application granted granted Critical
Publication of CN107070646B publication Critical patent/CN107070646B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A kind of safe and reliable network transfer method hidden based on password, using dynamic password, is realized that the password of " one-time pad " hides transmission, comprised the following steps:(1) file transmitting terminal is performed;(2) file transmitting terminal;(3) file reception end.

Description

The safe and reliable network transfer method hidden based on password
Technical field
The invention belongs to network information security encrypted transmission field, and in particular to it is a kind of based on password hide it is safe and reliable Network transfer method.
Background technology
In fast changing information environment, effective utilization of mapping information and information technology can make topographic support more In time, accurately, in advance, lifting overall support capability is significant.Real time implementation and spatialization geography information obtain system It is the major progress of geographic information data obtaining means.It is some in emergency circumstances, only pass through it is reliable quickly information transfer Passage, can just ensure information security and be sent to recipient, it is formulated processing solution early.By to the information transmission technology Research, the technology and method for being conducive to our positive Informations to gather, handle, transmit, control and use, to promote information The raising of technical guarantee efficiency, benefit and efficiency.
There are a large amount of defects in current existing encryption technology, can carry out known-plaintext by collecting a large amount of ciphertexts and original text and attack Hit, or pass through the defect of the public-key cryptography progress chosen -plain attact in asymmetric encryption.
The content of the invention
Cause the problem of information, destruction there is provided one kind based on close the invention solves the problems that static password is easily cracked by third party The hiding safe and reliable network transfer method of code.
A kind of safe and reliable network transfer method hidden based on password of the present invention, the technical scheme used is:
Using dynamic password, realize that the password of " one-time pad " hides transmission, the password of " one-time pad ", which is hidden, to be passed Transmission method, comprises the following steps:
(1), file transmitting terminal is performed
(1.1), start with from the security for solving password, the reliable file of Framework Secure;
(1.2), building a random fixed length character using random algorithm is used for the password of this file encryption, and encrypts text Part;
(1.3), set up and be connected with recipient, by the use of connection setup time as random parameter, setting code is hidden in text Position in part;
(1.4) transmission after, being hidden in password in the specified location of file;
(2) file transmitting terminal
(2.1) time of connection, is set up according to client and receiving terminal, the one hour value hour of its time and minute are worth Min is used as random parameter;
(2.2), password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, and password is intersegmental Determined every blank, cryptopart size size;
(2.3), cryptopart starting point begin utilizes hour and min, according to sphere formula is referred to, as α, β, i1、i2Foot Enough hours can reach paraxial approximate condition:
Paraxial approximate condition α=sin α=tan α, i1=sini1 (1)
β=sin β=tan β, i2=sin i2 (2)
Law of refraction n1·sin i1=n2·sin i2 (3)
By (1) (2), (3) three formula obtain paraxial approximate formula (4):
Paraxial approximate n1·i1=n2·i2 (4)
Parameter alpha, β, θ are carried out again approximate:
Parameter is brought into law of refraction formula to obtain
n1·α+n2β=(n1-n2)·θ (8)
(2.4) 1/u, is substituted with hour, min substitutes 1/v, the numerical value of n1, n2 to be previously set:
Change get in return formula into:
It is with each parameter definition in coherent reference refraction at spherical surface formula in above formula:n1For the refractive index of air, n2For ball The refractive index of body medium, i1For incident ray and the angle of sphere-contact point normal, i2For refracted light and sphere-contact point normal Angle, α is the angle of incident ray and horizontal plane, and β is the angle of refracted light and horizontal plane, and θ is sphere-contact point normal With the angle of horizontal plane, P points were the horizontal plane in the center of circle and the intersection point of sphere, and h is distance of the contact point to horizontal plane, and δ is A points Projection and the distance of P points on center of circle horizontal line is crossed, μ are the distance between OP, and r is the radius of ball, and v is the distance between IP;
(2.5), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula is represented The number of file bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
(2.6), cryptopart size size determines the character number that each cryptopart possesses, and blank is in formula (11) The value arrived, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time. Artificial capacitor discharge and recharge formula is obtained
(2.7), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (14)
And password is hidden according to gained formula.
(3) file reception end
(3.1) time of connection is set up according to client and receiving terminal, by the one hour value hour of its time and minute value min It is used as random parameter;
(3.2) receiving terminal receives the encryption file of under cover password;
(3.3) password hidden hereof is parsed;
(3.4) password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, and password is intersegmental Determined every blank, cryptopart size size;
(3.5) cryptopart starting point begin utilizes hour and min, works as α, β, i with reference to sphere formula1、i2When sufficiently small Paraxial approximate condition can be reached:
Paraxial approximate condition α=sin α=tan α, i1=sin i1 (15)
β=sin β=tan β, i2=sin i2 (16)
Law of refraction n1·sin i1=n2·sin i2 (17)
By (15) (16), (17) three formula obtain paraxial approximate formula (18):
Paraxial approximate n1·i1=n2·i2 (18)
Parameter alpha, β, θ are carried out again approximate:
Parameter is brought into law of refraction formula to obtain:
n1·α+n2β=(n1-n2)·θ (22)
Substitute 1/u with hour, min substitutes 1/v, and n1, n2 are the numerical value that has been previously set, become get in return formula into:
(3.6), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula is represented The number of file bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
(3.7), cryptopart size size determines the character number that each cryptopart possesses, and blank is in formula (25) The value arrived, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time, Artificial capacitor discharge and recharge formula is obtained:
(3.8), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (28)
And password is parsed according to gained formula.
It is an advantage of the invention that:By imitating the technology of quantum cryptography, password " mobilism " is hidden in confidential data; Every time during transmission, because the password of encryption is all changing at random so that the difficulty that confidential data is cracked is greatly increased; " one-time pad " dynamic password is designed, and effectively increases the security of cryptographic algorithm.
Brief description of the drawings
Fig. 1 is document transmission process schematic diagram of the invention
Fig. 2 hides the schematic diagram of password for the present invention in encryption file
Fig. 3 parses the schematic diagram of password for the present invention in encryption file
Fig. 4 is the schematic diagram of refraction at spherical surface formula
Embodiment
The invention will be further described below in conjunction with the accompanying drawings.
Fig. 1 represents that client is established with server and is connected that being sent to host B from host A sends message, can pass through main frame A->Server->This paths of host B set up connection, and each main frame need not be intercepted to port again, and only need to service Device is intercepted.
Because message all passes through server, so server end saves the fileinfo of dealing.When user needs to receive During file, server end can provide according to the numbering of user and receive list, encrypted transmission file destination.
(1), file transmitting terminal is performed
(1.1), start with from the security for solving password, the reliable file of Framework Secure;
(1.2), building a random fixed length character using random algorithm is used for the password of this file encryption, and encrypts text Part;
(1.3), set up and be connected with recipient, by the use of connection setup time as random parameter, setting code is hidden in text Position in part;
(1.4) transmission after, being hidden in password in the specified location of file;
Fig. 2 is the dynamic password embedded mode figure based on water word watermark, the safety of the present invention hidden based on password Reliable network transmission method, the dynamic password insertion based on water word watermark, using dynamic password, carries out the password of " one-time pad " Transmission is hidden, following steps are specifically included:
(1), building a random fixed length character using random algorithm is used for the password of this file encryption, and encrypts file
(2) time of connection, is set up according to client and receiving terminal, by the one hour value hour of its time and minute value min It is used as random parameter
(2) file transmitting terminal
(2.1) time of connection, is set up according to client and receiving terminal, the one hour value hour of its time and minute are worth Min is used as random parameter;
(2.2), password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, and password is intersegmental Determined every blank, cryptopart size size;
(2.3), cryptopart starting point begin utilizes hour and min, according to sphere formula is referred to, as α, β, i1、i2Foot Enough hours can reach paraxial approximate condition:
Paraxial approximate condition α=sin α=tan α, i1=sin i1 (1)
β=sin β=tan β, i2=sin i2 (2)
Law of refraction n1·sin i1=n2·sin i2 (3)
By (1) (2), (3) three formula obtain paraxial approximate formula (4):
Paraxial approximate n1·i1=n2·i2 (4)
Parameter alpha, β, θ are carried out again approximate:
Parameter is brought into law of refraction formula to obtain
n1·α+n2β=(n1-n2)·θ (8)
(2.4) 1/u, is substituted with hour, min substitutes 1/v, the numerical value of n1, n2 to be previously set:
Change get in return formula into:
It is with each parameter definition in coherent reference refraction at spherical surface formula in above formula:n1For the refractive index of air, n2For ball The refractive index of body medium, i1For incident ray and the angle of sphere-contact point normal, i2For refracted light and sphere-contact point normal Angle, α is the angle of incident ray and horizontal plane, and β is the angle of refracted light and horizontal plane, and θ is sphere-contact point normal With the angle of horizontal plane, P points were the horizontal plane in the center of circle and the intersection point of sphere, and h is distance of the contact point to horizontal plane, and δ is A points Projection and the distance of P points on center of circle horizontal line is crossed, μ are the distance between OP, and r is the radius of ball, and v is the distance between IP;
(2.5), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula is represented The number of file bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
(2.6), cryptopart size size determines the character number that each cryptopart possesses, and blank is in formula (11) The value arrived, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time. Artificial capacitor discharge and recharge formula is obtained
(2.7), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (14)
And password is hidden according to gained formula.
Fig. 3 is the schematic diagram of the cipher decoding based on water word watermark, the cipher decoding method master based on water word watermark Comprise the following steps:
(3) file reception end
(3.1) time of connection is set up according to client and receiving terminal, by the one hour value hour of its time and minute value min It is used as random parameter;
(3.2) receiving terminal receives the encryption file of under cover password;
(3.3) password hidden hereof is parsed;
(3.4) password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, and password is intersegmental Determined every blank, cryptopart size size;
(3.5) cryptopart starting point begin utilizes hour and min, works as α, β, i with reference to sphere formula1、i2When sufficiently small Paraxial approximate condition can be reached:
Paraxial approximate condition α=sin α=tan α, i1=sin i1 (15)
β=sin β=tan β, i2=sin i2 (16)
Law of refraction n1·sin i1=n2·sin i2 (17)
By (15) (16), (17) three formula obtain paraxial approximate formula (18):
Paraxial approximate n1·i1=n2·i2 (18)
Parameter alpha, β, θ are carried out again approximate:
Parameter is brought into law of refraction formula to obtain:
n1·α+n2β=(n1-n2)·θ (22)
Substitute 1/u with hour, min substitutes 1/v, and n1, n2 are the numerical value that has been previously set, become get in return formula into:
(3.6), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula is represented The number of file bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
(3.7), cryptopart size size determines the character number that each cryptopart possesses, and blank is in formula (25) The value arrived, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time, Artificial capacitor discharge and recharge formula is obtained:
(3.8), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (28)
And password is parsed according to gained formula.
Fig. 4 is to refer to sphere formula
It is with reference to each parameter definition in sphere formula:n1For the refractive index of air, n2For the refractive index of spheroid medium, i1For incident ray and the angle of sphere-contact point normal, i2For refracted light and the angle of sphere-contact point normal, α is incidence The angle of light and horizontal plane, β is the angle of refracted light and horizontal plane, and θ is the angle of sphere-contact point normal and horizontal plane, P points were the horizontal plane in the center of circle and the intersection point of sphere, and h is distance of the contact point to horizontal plane, and δ is that A points are crossing center of circle horizontal line Upper projection and the distance of P points, μ are the distance between OP, and r is the radius of ball, and v is the distance between IP.

Claims (1)

1. a kind of safe and reliable network transfer method hidden based on password, using dynamic password, realizes the close of " one-time pad " Code hides transmission, comprises the following steps:
(1), file transmitting terminal is performed;
(1.1), start with from the security for solving password, the reliable file of Framework Secure;
(1.2), building a random fixed length character using random algorithm is used for the password of this file encryption, and encrypts file;
(1.3), set up and be connected with recipient, by the use of connection setup time as random parameter, setting code is hidden hereof Position;
(1.4) transmission after, being hidden in password in the specified location of file;
(2) file transmitting terminal;
(2.1) time of connection, is set up according to client and receiving terminal, the one hour value hour of its time and minute value min is made For random parameter;
(2.2), password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, cryptopart interval Blank, cryptopart size size are determined;
(2.3), cryptopart starting point begin utilizes hour and min, according to sphere formula is referred to, as α, β, i1、i2It is sufficiently small When can reach paraxial approximate condition:
Paraxial approximate condition α=sin α=tan α, i1=sin i1 (1)
β=sin β=tan β, i2=sin i2 (2)
Law of refraction n1·sin i1=n2·sin i2 (3)
By (1) (2), (3) three formula obtain paraxial approximate formula (4):
Paraxial approximate n1·i1=n2·i2 (4)
Parameter alpha, β, θ are carried out again approximate:
<mrow> <mi>&amp;alpha;</mi> <mo>=</mo> <mfrac> <mi>h</mi> <mrow> <mi>u</mi> <mo>+</mo> <mi>&amp;sigma;</mi> </mrow> </mfrac> <mo>&amp;ap;</mo> <mfrac> <mi>h</mi> <mi>u</mi> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>5</mn> <mo>)</mo> </mrow> </mrow>
<mrow> <mi>&amp;beta;</mi> <mo>=</mo> <mfrac> <mi>h</mi> <mrow> <mi>v</mi> <mo>-</mo> <mi>&amp;sigma;</mi> </mrow> </mfrac> <mo>&amp;ap;</mo> <mfrac> <mi>h</mi> <mi>v</mi> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>6</mn> <mo>)</mo> </mrow> </mrow>
<mrow> <mi>&amp;theta;</mi> <mo>=</mo> <mfrac> <mi>h</mi> <mrow> <mi>r</mi> <mo>-</mo> <mi>&amp;sigma;</mi> </mrow> </mfrac> <mo>&amp;ap;</mo> <mfrac> <mi>h</mi> <mi>r</mi> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>7</mn> <mo>)</mo> </mrow> </mrow>
Parameter is brought into law of refraction formula to obtain
n1·α+n2β=(n1-n2)·θ (8)
(2.4) 1/u, is substituted with hour, min substitutes 1/v, the numerical value of n1, n2 to be previously set:
Change get in return formula into:
It is with each parameter definition in coherent reference refraction at spherical surface formula in above formula:n1For the refractive index of air, n2It is situated between for spheroid The refractive index of matter, i1For incident ray and the angle of sphere-contact point normal, i2For refracted light and the folder of sphere-contact point normal Angle, α is the angle of incident ray and horizontal plane, and β is the angle of refracted light and horizontal plane, and θ is sphere-contact point normal and water The angle of plane, P points were the horizontal plane in the center of circle and the intersection point of sphere, and h is distance of the contact point to horizontal plane, and δ is A points in mistake Projection and the distance of P points on the horizontal line of the center of circle, μ are the distance between OP, and r is the radius of ball, and v is the distance between IP;
(2.5), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula represents file The number of bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
<mrow> <msub> <mi>V</mi> <mi>t</mi> </msub> <mo>=</mo> <mi>m</mi> <mi>i</mi> <mi>n</mi> <mo>+</mo> <mo>|</mo> <mrow> <mi>p</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <mi>t</mi> <mi>c</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>t</mi> <mo>-</mo> <mi>m</mi> <mi>i</mi> <mi>n</mi> </mrow> <mo>|</mo> <mo>&amp;CenterDot;</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <msup> <mi>e</mi> <mrow> <mo>-</mo> <mfrac> <mi>t</mi> <mrow> <mi>R</mi> <mo>&amp;CenterDot;</mo> <mi>C</mi> </mrow> </mfrac> </mrow> </msup> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>10</mn> <mo>)</mo> </mrow> </mrow>
<mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>k</mi> <mo>=</mo> <mi>R</mi> <mi>C</mi> <mo>&amp;CenterDot;</mo> <msub> <mi>L</mi> <mi>n</mi> </msub> <mfrac> <mrow> <mo>|</mo> <mrow> <mi>p</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <mi>t</mi> <mi>c</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>t</mi> <mo>-</mo> <mi>min</mi> </mrow> <mo>|</mo> </mrow> <mrow> <mo>|</mo> <mrow> <mi>p</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <mi>t</mi> <mi>c</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>t</mi> <mo>-</mo> <msub> <mi>V</mi> <mi>t</mi> </msub> </mrow> <mo>|</mo> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>11</mn> <mo>)</mo> </mrow> </mrow>
(2.6), cryptopart size size determines the character number that each cryptopart possesses, and blank is to obtain in formula (11) Value, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time.Simulation Capacitor charge and discharge formula is obtained
<mrow> <msub> <mi>V</mi> <mi>t</mi> </msub> <mo>=</mo> <mi>m</mi> <mi>i</mi> <mi>n</mi> <mo>+</mo> <mo>|</mo> <mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>k</mi> <mo>-</mo> <mi>p</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <mi>t</mi> <mi>c</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>t</mi> </mrow> <mo>|</mo> <mo>&amp;CenterDot;</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <msup> <mi>e</mi> <mrow> <mo>-</mo> <mfrac> <mi>t</mi> <mrow> <mi>R</mi> <mo>&amp;CenterDot;</mo> <mi>C</mi> </mrow> </mfrac> </mrow> </msup> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>12</mn> <mo>)</mo> </mrow> </mrow>
<mrow> <mi>s</mi> <mi>i</mi> <mi>z</mi> <mi>e</mi> <mo>=</mo> <mi>R</mi> <mi>C</mi> <mo>&amp;CenterDot;</mo> <msub> <mi>L</mi> <mi>n</mi> </msub> <mfrac> <mrow> <mo>|</mo> <mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>k</mi> <mo>-</mo> <mi>p</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <mi>t</mi> <mi>c</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>t</mi> </mrow> <mo>|</mo> </mrow> <mrow> <mo>|</mo> <mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>k</mi> <mo>-</mo> <msub> <mi>V</mi> <mi>t</mi> </msub> </mrow> <mo>|</mo> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>13</mn> <mo>)</mo> </mrow> </mrow>
(2.7), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (14)
And password is hidden according to gained formula.
(3) file reception end;
(3.1) time of connection is set up according to client and receiving terminal, using the one hour value hour of its time and minute value min as Random parameter;
(3.2) receiving terminal receives the encryption file of under cover password;
(3.3) password hidden hereof is parsed;
(3.4) password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, cryptopart interval Blank, cryptopart size size are determined;
(3.5) cryptopart starting point begin utilizes hour and min, works as α, β, i with reference to sphere formula1、i2Can be with when sufficiently small Reach paraxial approximate condition:
Paraxial approximate condition α=sin α=tan α, i1=sin i1 (15)
β=sin β=tan β, i2=sin i2 (16)
Law of refraction n1·sin i1=n2·sini2 (17)
By (15) (16), (17) three formula obtain paraxial approximate formula (18):
Paraxial approximate n1·i1=n2·i2 (18)
Parameter alpha, β, θ are carried out again approximate:
<mrow> <mi>&amp;alpha;</mi> <mo>=</mo> <mfrac> <mi>h</mi> <mrow> <mi>u</mi> <mo>+</mo> <mi>&amp;sigma;</mi> </mrow> </mfrac> <mo>&amp;ap;</mo> <mfrac> <mi>h</mi> <mi>u</mi> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>19</mn> <mo>)</mo> </mrow> </mrow>
<mrow> <mi>&amp;beta;</mi> <mo>=</mo> <mfrac> <mi>h</mi> <mrow> <mi>v</mi> <mo>-</mo> <mi>&amp;sigma;</mi> </mrow> </mfrac> <mo>&amp;ap;</mo> <mfrac> <mi>h</mi> <mi>v</mi> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>20</mn> <mo>)</mo> </mrow> </mrow>
<mrow> <mi>&amp;theta;</mi> <mo>=</mo> <mfrac> <mi>h</mi> <mrow> <mi>r</mi> <mo>-</mo> <mi>&amp;sigma;</mi> </mrow> </mfrac> <mo>&amp;ap;</mo> <mfrac> <mi>h</mi> <mi>r</mi> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>21</mn> <mo>)</mo> </mrow> </mrow>
Parameter is brought into law of refraction formula to obtain:
n1·α+n2β=(n1-n2)·θ (22)
Substitute 1/u with hour, min substitutes 1/v, and n1, n2 are the numerical value that has been previously set, become get in return formula into:
<mrow> <msub> <mi>n</mi> <mn>1</mn> </msub> <mo>&amp;CenterDot;</mo> <mi>h</mi> <mi>o</mi> <mi>u</mi> <mi>r</mi> <mo>+</mo> <msub> <mi>n</mi> <mn>2</mn> </msub> <mo>&amp;CenterDot;</mo> <mi>m</mi> <mi>i</mi> <mi>n</mi> <mo>=</mo> <mfrac> <mrow> <msub> <mi>n</mi> <mn>2</mn> </msub> <mo>-</mo> <msub> <mi>n</mi> <mn>1</mn> </msub> </mrow> <mi>r</mi> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>23</mn> <mo>)</mo> </mrow> </mrow>
(3.6), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula represents file The number of bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
<mrow> <msub> <mi>V</mi> <mi>t</mi> </msub> <mo>=</mo> <mi>m</mi> <mi>i</mi> <mi>n</mi> <mo>+</mo> <mo>|</mo> <mrow> <mi>p</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <mi>t</mi> <mi>c</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>t</mi> <mo>-</mo> <mi>m</mi> <mi>i</mi> <mi>n</mi> </mrow> <mo>|</mo> <mo>&amp;CenterDot;</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <msup> <mi>e</mi> <mrow> <mo>-</mo> <mfrac> <mi>t</mi> <mrow> <mi>R</mi> <mo>&amp;CenterDot;</mo> <mi>C</mi> </mrow> </mfrac> </mrow> </msup> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>24</mn> <mo>)</mo> </mrow> </mrow>
<mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>k</mi> <mo>=</mo> <mi>R</mi> <mi>C</mi> <mo>&amp;CenterDot;</mo> <msub> <mi>L</mi> <mi>n</mi> </msub> <mfrac> <mrow> <mo>|</mo> <mrow> <mi>p</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <mi>t</mi> <mi>c</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>t</mi> <mo>-</mo> <mi>min</mi> </mrow> <mo>|</mo> </mrow> <mrow> <mo>|</mo> <mrow> <mi>p</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <mi>t</mi> <mi>c</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>t</mi> <mo>-</mo> <msub> <mi>V</mi> <mi>t</mi> </msub> </mrow> <mo>|</mo> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>25</mn> <mo>)</mo> </mrow> </mrow>
(3.7), cryptopart size size determines the character number that each cryptopart possesses, and blank is to obtain in formula (25) Value, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time, simulation Capacitor charge and discharge formula is obtained:
<mrow> <msub> <mi>V</mi> <mi>t</mi> </msub> <mo>=</mo> <mi>m</mi> <mi>i</mi> <mi>n</mi> <mo>+</mo> <mo>|</mo> <mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>k</mi> <mo>-</mo> <mi>p</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <mi>t</mi> <mi>c</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>t</mi> </mrow> <mo>|</mo> <mo>&amp;CenterDot;</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <msup> <mi>e</mi> <mrow> <mo>-</mo> <mfrac> <mi>t</mi> <mrow> <mi>R</mi> <mo>&amp;CenterDot;</mo> <mi>C</mi> </mrow> </mfrac> </mrow> </msup> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>26</mn> <mo>)</mo> </mrow> </mrow>
<mrow> <mi>s</mi> <mi>i</mi> <mi>z</mi> <mi>e</mi> <mo>=</mo> <mi>R</mi> <mi>C</mi> <mo>&amp;CenterDot;</mo> <msub> <mi>L</mi> <mi>n</mi> </msub> <mfrac> <mrow> <mo>|</mo> <mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>k</mi> <mo>-</mo> <mi>p</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <mi>t</mi> <mi>c</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>t</mi> </mrow> <mo>|</mo> </mrow> <mrow> <mo>|</mo> <mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>k</mi> <mo>-</mo> <msub> <mi>V</mi> <mi>t</mi> </msub> </mrow> <mo>|</mo> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>27</mn> <mo>)</mo> </mrow> </mrow>
(3.8), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (28)
And password is parsed according to gained formula.
CN201710034724.1A 2017-01-17 2017-01-17 Safe and reliable network transmission method based on password hiding Active CN107070646B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710034724.1A CN107070646B (en) 2017-01-17 2017-01-17 Safe and reliable network transmission method based on password hiding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710034724.1A CN107070646B (en) 2017-01-17 2017-01-17 Safe and reliable network transmission method based on password hiding

Publications (2)

Publication Number Publication Date
CN107070646A true CN107070646A (en) 2017-08-18
CN107070646B CN107070646B (en) 2020-01-14

Family

ID=59598573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710034724.1A Active CN107070646B (en) 2017-01-17 2017-01-17 Safe and reliable network transmission method based on password hiding

Country Status (1)

Country Link
CN (1) CN107070646B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282484A (en) * 2018-01-30 2018-07-13 平安普惠企业管理有限公司 Password acquisition methods, device, computer equipment and storage medium
CN110677421A (en) * 2019-09-30 2020-01-10 贵州航天云网科技有限公司 Remote operation and maintenance and data exchange method oriented to equipment industrial control safety

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030099372A1 (en) * 2001-11-28 2003-05-29 Wendt Peter D. Method and apparatus to detect watermark that are resistant to arbitrary deformations
CN101156173A (en) * 2005-04-14 2008-04-02 皇家飞利浦电子股份有限公司 Watermarking of an image motion signal
CN101976428A (en) * 2010-07-30 2011-02-16 南开大学 Binary image fragile watermark embedding and extraction method based on topology structure
US20140237050A1 (en) * 2012-12-12 2014-08-21 Tencent Technology (Shenzhen) Company Limited Method for hiding activity group member identification information, server and terminal
CN105471811A (en) * 2014-06-19 2016-04-06 北京搜狗科技发展有限公司 Privacy space processing method and privacy space processing device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030099372A1 (en) * 2001-11-28 2003-05-29 Wendt Peter D. Method and apparatus to detect watermark that are resistant to arbitrary deformations
CN101156173A (en) * 2005-04-14 2008-04-02 皇家飞利浦电子股份有限公司 Watermarking of an image motion signal
CN101976428A (en) * 2010-07-30 2011-02-16 南开大学 Binary image fragile watermark embedding and extraction method based on topology structure
US20140237050A1 (en) * 2012-12-12 2014-08-21 Tencent Technology (Shenzhen) Company Limited Method for hiding activity group member identification information, server and terminal
CN105471811A (en) * 2014-06-19 2016-04-06 北京搜狗科技发展有限公司 Privacy space processing method and privacy space processing device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282484A (en) * 2018-01-30 2018-07-13 平安普惠企业管理有限公司 Password acquisition methods, device, computer equipment and storage medium
CN110677421A (en) * 2019-09-30 2020-01-10 贵州航天云网科技有限公司 Remote operation and maintenance and data exchange method oriented to equipment industrial control safety
CN110677421B (en) * 2019-09-30 2020-07-14 贵州航天云网科技有限公司 Remote operation and maintenance and data exchange method oriented to equipment industrial control safety

Also Published As

Publication number Publication date
CN107070646B (en) 2020-01-14

Similar Documents

Publication Publication Date Title
CN103440444B (en) The signing method of electronic contract
CN103177220B (en) Based on the method for carrying out personal information encryption in the logistics system of Quick Response Code
CN109194479B (en) Measuring equipment-independent quantum key distribution method based on single photon multiple degrees of freedom
Wang et al. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum
CN103024743B (en) The credible and secure cut-in method of a kind of WLAN
CN107787568A (en) Random cipher code book cryptography
CN111245608B (en) Measuring equipment-independent quantum key distribution method based on three degrees of freedom of single photon
GB2569530A (en) Quantum protection of telemetry tracking and command links
CN107070646A (en) The safe and reliable network transfer method hidden based on password
CN107147631A (en) For the data safety communication system and method in Internet of Things
CN105792190A (en) Data encryption, decryption and transmission method in communication system
CN107690079A (en) Privacy of user guard method in live platform
CN105142136A (en) Method for preventing counterfeit base attack
CN101656728B (en) Secure transmission method using time-varying incidental information flow as key information
CN110505049A (en) A kind of text information transmission method, apparatus and system
CN103595619A (en) Method, device and system for adding friend
CN104270380A (en) End-to-end encryption method and system based on mobile network and communication client side
WO2020244145A1 (en) Quantum wireless network communication system
CN104717072A (en) Remote-sensing image authentication method based on perceptual hash and elliptic curve
CN104734846B (en) Quantum-key distribution control device and method
CN103825725A (en) Efficient random physical layer secrete key generation method based on vector quantization
CN106375327B (en) A kind of proxy signature key of anti-malicious attack obscures electronic voting system and method
CN103634292A (en) Method and system for communication information transmission
CN102612035A (en) Energy-efficient identity authentication method in multi-level clustering wireless sensor network
CN103701683A (en) Method, device and system for acquiring friend information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant