CN107070646A - The safe and reliable network transfer method hidden based on password - Google Patents
The safe and reliable network transfer method hidden based on password Download PDFInfo
- Publication number
- CN107070646A CN107070646A CN201710034724.1A CN201710034724A CN107070646A CN 107070646 A CN107070646 A CN 107070646A CN 201710034724 A CN201710034724 A CN 201710034724A CN 107070646 A CN107070646 A CN 107070646A
- Authority
- CN
- China
- Prior art keywords
- mrow
- mfrac
- msub
- formula
- cryptopart
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A kind of safe and reliable network transfer method hidden based on password, using dynamic password, is realized that the password of " one-time pad " hides transmission, comprised the following steps:(1) file transmitting terminal is performed;(2) file transmitting terminal;(3) file reception end.
Description
Technical field
The invention belongs to network information security encrypted transmission field, and in particular to it is a kind of based on password hide it is safe and reliable
Network transfer method.
Background technology
In fast changing information environment, effective utilization of mapping information and information technology can make topographic support more
In time, accurately, in advance, lifting overall support capability is significant.Real time implementation and spatialization geography information obtain system
It is the major progress of geographic information data obtaining means.It is some in emergency circumstances, only pass through it is reliable quickly information transfer
Passage, can just ensure information security and be sent to recipient, it is formulated processing solution early.By to the information transmission technology
Research, the technology and method for being conducive to our positive Informations to gather, handle, transmit, control and use, to promote information
The raising of technical guarantee efficiency, benefit and efficiency.
There are a large amount of defects in current existing encryption technology, can carry out known-plaintext by collecting a large amount of ciphertexts and original text and attack
Hit, or pass through the defect of the public-key cryptography progress chosen -plain attact in asymmetric encryption.
The content of the invention
Cause the problem of information, destruction there is provided one kind based on close the invention solves the problems that static password is easily cracked by third party
The hiding safe and reliable network transfer method of code.
A kind of safe and reliable network transfer method hidden based on password of the present invention, the technical scheme used is:
Using dynamic password, realize that the password of " one-time pad " hides transmission, the password of " one-time pad ", which is hidden, to be passed
Transmission method, comprises the following steps:
(1), file transmitting terminal is performed
(1.1), start with from the security for solving password, the reliable file of Framework Secure;
(1.2), building a random fixed length character using random algorithm is used for the password of this file encryption, and encrypts text
Part;
(1.3), set up and be connected with recipient, by the use of connection setup time as random parameter, setting code is hidden in text
Position in part;
(1.4) transmission after, being hidden in password in the specified location of file;
(2) file transmitting terminal
(2.1) time of connection, is set up according to client and receiving terminal, the one hour value hour of its time and minute are worth
Min is used as random parameter;
(2.2), password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, and password is intersegmental
Determined every blank, cryptopart size size;
(2.3), cryptopart starting point begin utilizes hour and min, according to sphere formula is referred to, as α, β, i1、i2Foot
Enough hours can reach paraxial approximate condition:
Paraxial approximate condition α=sin α=tan α, i1=sini1 (1)
β=sin β=tan β, i2=sin i2 (2)
Law of refraction n1·sin i1=n2·sin i2 (3)
By (1) (2), (3) three formula obtain paraxial approximate formula (4):
Paraxial approximate n1·i1=n2·i2 (4)
Parameter alpha, β, θ are carried out again approximate:
Parameter is brought into law of refraction formula to obtain
n1·α+n2β=(n1-n2)·θ (8)
(2.4) 1/u, is substituted with hour, min substitutes 1/v, the numerical value of n1, n2 to be previously set:
Change get in return formula into:
It is with each parameter definition in coherent reference refraction at spherical surface formula in above formula:n1For the refractive index of air, n2For ball
The refractive index of body medium, i1For incident ray and the angle of sphere-contact point normal, i2For refracted light and sphere-contact point normal
Angle, α is the angle of incident ray and horizontal plane, and β is the angle of refracted light and horizontal plane, and θ is sphere-contact point normal
With the angle of horizontal plane, P points were the horizontal plane in the center of circle and the intersection point of sphere, and h is distance of the contact point to horizontal plane, and δ is A points
Projection and the distance of P points on center of circle horizontal line is crossed, μ are the distance between OP, and r is the radius of ball, and v is the distance between IP;
(2.5), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula is represented
The number of file bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
(2.6), cryptopart size size determines the character number that each cryptopart possesses, and blank is in formula (11)
The value arrived, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time.
Artificial capacitor discharge and recharge formula is obtained
(2.7), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (14)
And password is hidden according to gained formula.
(3) file reception end
(3.1) time of connection is set up according to client and receiving terminal, by the one hour value hour of its time and minute value min
It is used as random parameter;
(3.2) receiving terminal receives the encryption file of under cover password;
(3.3) password hidden hereof is parsed;
(3.4) password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, and password is intersegmental
Determined every blank, cryptopart size size;
(3.5) cryptopart starting point begin utilizes hour and min, works as α, β, i with reference to sphere formula1、i2When sufficiently small
Paraxial approximate condition can be reached:
Paraxial approximate condition α=sin α=tan α, i1=sin i1 (15)
β=sin β=tan β, i2=sin i2 (16)
Law of refraction n1·sin i1=n2·sin i2 (17)
By (15) (16), (17) three formula obtain paraxial approximate formula (18):
Paraxial approximate n1·i1=n2·i2 (18)
Parameter alpha, β, θ are carried out again approximate:
Parameter is brought into law of refraction formula to obtain:
n1·α+n2β=(n1-n2)·θ (22)
Substitute 1/u with hour, min substitutes 1/v, and n1, n2 are the numerical value that has been previously set, become get in return formula into:
(3.6), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula is represented
The number of file bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
(3.7), cryptopart size size determines the character number that each cryptopart possesses, and blank is in formula (25)
The value arrived, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time,
Artificial capacitor discharge and recharge formula is obtained:
(3.8), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (28)
And password is parsed according to gained formula.
It is an advantage of the invention that:By imitating the technology of quantum cryptography, password " mobilism " is hidden in confidential data;
Every time during transmission, because the password of encryption is all changing at random so that the difficulty that confidential data is cracked is greatly increased;
" one-time pad " dynamic password is designed, and effectively increases the security of cryptographic algorithm.
Brief description of the drawings
Fig. 1 is document transmission process schematic diagram of the invention
Fig. 2 hides the schematic diagram of password for the present invention in encryption file
Fig. 3 parses the schematic diagram of password for the present invention in encryption file
Fig. 4 is the schematic diagram of refraction at spherical surface formula
Embodiment
The invention will be further described below in conjunction with the accompanying drawings.
Fig. 1 represents that client is established with server and is connected that being sent to host B from host A sends message, can pass through main frame
A->Server->This paths of host B set up connection, and each main frame need not be intercepted to port again, and only need to service
Device is intercepted.
Because message all passes through server, so server end saves the fileinfo of dealing.When user needs to receive
During file, server end can provide according to the numbering of user and receive list, encrypted transmission file destination.
(1), file transmitting terminal is performed
(1.1), start with from the security for solving password, the reliable file of Framework Secure;
(1.2), building a random fixed length character using random algorithm is used for the password of this file encryption, and encrypts text
Part;
(1.3), set up and be connected with recipient, by the use of connection setup time as random parameter, setting code is hidden in text
Position in part;
(1.4) transmission after, being hidden in password in the specified location of file;
Fig. 2 is the dynamic password embedded mode figure based on water word watermark, the safety of the present invention hidden based on password
Reliable network transmission method, the dynamic password insertion based on water word watermark, using dynamic password, carries out the password of " one-time pad "
Transmission is hidden, following steps are specifically included:
(1), building a random fixed length character using random algorithm is used for the password of this file encryption, and encrypts file
(2) time of connection, is set up according to client and receiving terminal, by the one hour value hour of its time and minute value min
It is used as random parameter
(2) file transmitting terminal
(2.1) time of connection, is set up according to client and receiving terminal, the one hour value hour of its time and minute are worth
Min is used as random parameter;
(2.2), password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, and password is intersegmental
Determined every blank, cryptopart size size;
(2.3), cryptopart starting point begin utilizes hour and min, according to sphere formula is referred to, as α, β, i1、i2Foot
Enough hours can reach paraxial approximate condition:
Paraxial approximate condition α=sin α=tan α, i1=sin i1 (1)
β=sin β=tan β, i2=sin i2 (2)
Law of refraction n1·sin i1=n2·sin i2 (3)
By (1) (2), (3) three formula obtain paraxial approximate formula (4):
Paraxial approximate n1·i1=n2·i2 (4)
Parameter alpha, β, θ are carried out again approximate:
Parameter is brought into law of refraction formula to obtain
n1·α+n2β=(n1-n2)·θ (8)
(2.4) 1/u, is substituted with hour, min substitutes 1/v, the numerical value of n1, n2 to be previously set:
Change get in return formula into:
It is with each parameter definition in coherent reference refraction at spherical surface formula in above formula:n1For the refractive index of air, n2For ball
The refractive index of body medium, i1For incident ray and the angle of sphere-contact point normal, i2For refracted light and sphere-contact point normal
Angle, α is the angle of incident ray and horizontal plane, and β is the angle of refracted light and horizontal plane, and θ is sphere-contact point normal
With the angle of horizontal plane, P points were the horizontal plane in the center of circle and the intersection point of sphere, and h is distance of the contact point to horizontal plane, and δ is A points
Projection and the distance of P points on center of circle horizontal line is crossed, μ are the distance between OP, and r is the radius of ball, and v is the distance between IP;
(2.5), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula is represented
The number of file bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
(2.6), cryptopart size size determines the character number that each cryptopart possesses, and blank is in formula (11)
The value arrived, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time.
Artificial capacitor discharge and recharge formula is obtained
(2.7), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (14)
And password is hidden according to gained formula.
Fig. 3 is the schematic diagram of the cipher decoding based on water word watermark, the cipher decoding method master based on water word watermark
Comprise the following steps:
(3) file reception end
(3.1) time of connection is set up according to client and receiving terminal, by the one hour value hour of its time and minute value min
It is used as random parameter;
(3.2) receiving terminal receives the encryption file of under cover password;
(3.3) password hidden hereof is parsed;
(3.4) password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, and password is intersegmental
Determined every blank, cryptopart size size;
(3.5) cryptopart starting point begin utilizes hour and min, works as α, β, i with reference to sphere formula1、i2When sufficiently small
Paraxial approximate condition can be reached:
Paraxial approximate condition α=sin α=tan α, i1=sin i1 (15)
β=sin β=tan β, i2=sin i2 (16)
Law of refraction n1·sin i1=n2·sin i2 (17)
By (15) (16), (17) three formula obtain paraxial approximate formula (18):
Paraxial approximate n1·i1=n2·i2 (18)
Parameter alpha, β, θ are carried out again approximate:
Parameter is brought into law of refraction formula to obtain:
n1·α+n2β=(n1-n2)·θ (22)
Substitute 1/u with hour, min substitutes 1/v, and n1, n2 are the numerical value that has been previously set, become get in return formula into:
(3.6), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula is represented
The number of file bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
(3.7), cryptopart size size determines the character number that each cryptopart possesses, and blank is in formula (25)
The value arrived, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time,
Artificial capacitor discharge and recharge formula is obtained:
(3.8), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (28)
And password is parsed according to gained formula.
Fig. 4 is to refer to sphere formula
It is with reference to each parameter definition in sphere formula:n1For the refractive index of air, n2For the refractive index of spheroid medium,
i1For incident ray and the angle of sphere-contact point normal, i2For refracted light and the angle of sphere-contact point normal, α is incidence
The angle of light and horizontal plane, β is the angle of refracted light and horizontal plane, and θ is the angle of sphere-contact point normal and horizontal plane,
P points were the horizontal plane in the center of circle and the intersection point of sphere, and h is distance of the contact point to horizontal plane, and δ is that A points are crossing center of circle horizontal line
Upper projection and the distance of P points, μ are the distance between OP, and r is the radius of ball, and v is the distance between IP.
Claims (1)
1. a kind of safe and reliable network transfer method hidden based on password, using dynamic password, realizes the close of " one-time pad "
Code hides transmission, comprises the following steps:
(1), file transmitting terminal is performed;
(1.1), start with from the security for solving password, the reliable file of Framework Secure;
(1.2), building a random fixed length character using random algorithm is used for the password of this file encryption, and encrypts file;
(1.3), set up and be connected with recipient, by the use of connection setup time as random parameter, setting code is hidden hereof
Position;
(1.4) transmission after, being hidden in password in the specified location of file;
(2) file transmitting terminal;
(2.1) time of connection, is set up according to client and receiving terminal, the one hour value hour of its time and minute value min is made
For random parameter;
(2.2), password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, cryptopart interval
Blank, cryptopart size size are determined;
(2.3), cryptopart starting point begin utilizes hour and min, according to sphere formula is referred to, as α, β, i1、i2It is sufficiently small
When can reach paraxial approximate condition:
Paraxial approximate condition α=sin α=tan α, i1=sin i1 (1)
β=sin β=tan β, i2=sin i2 (2)
Law of refraction n1·sin i1=n2·sin i2 (3)
By (1) (2), (3) three formula obtain paraxial approximate formula (4):
Paraxial approximate n1·i1=n2·i2 (4)
Parameter alpha, β, θ are carried out again approximate:
<mrow>
<mi>&alpha;</mi>
<mo>=</mo>
<mfrac>
<mi>h</mi>
<mrow>
<mi>u</mi>
<mo>+</mo>
<mi>&sigma;</mi>
</mrow>
</mfrac>
<mo>&ap;</mo>
<mfrac>
<mi>h</mi>
<mi>u</mi>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>5</mn>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<mi>&beta;</mi>
<mo>=</mo>
<mfrac>
<mi>h</mi>
<mrow>
<mi>v</mi>
<mo>-</mo>
<mi>&sigma;</mi>
</mrow>
</mfrac>
<mo>&ap;</mo>
<mfrac>
<mi>h</mi>
<mi>v</mi>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>6</mn>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<mi>&theta;</mi>
<mo>=</mo>
<mfrac>
<mi>h</mi>
<mrow>
<mi>r</mi>
<mo>-</mo>
<mi>&sigma;</mi>
</mrow>
</mfrac>
<mo>&ap;</mo>
<mfrac>
<mi>h</mi>
<mi>r</mi>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>7</mn>
<mo>)</mo>
</mrow>
</mrow>
Parameter is brought into law of refraction formula to obtain
n1·α+n2β=(n1-n2)·θ (8)
(2.4) 1/u, is substituted with hour, min substitutes 1/v, the numerical value of n1, n2 to be previously set:
Change get in return formula into:
It is with each parameter definition in coherent reference refraction at spherical surface formula in above formula:n1For the refractive index of air, n2It is situated between for spheroid
The refractive index of matter, i1For incident ray and the angle of sphere-contact point normal, i2For refracted light and the folder of sphere-contact point normal
Angle, α is the angle of incident ray and horizontal plane, and β is the angle of refracted light and horizontal plane, and θ is sphere-contact point normal and water
The angle of plane, P points were the horizontal plane in the center of circle and the intersection point of sphere, and h is distance of the contact point to horizontal plane, and δ is A points in mistake
Projection and the distance of P points on the horizontal line of the center of circle, μ are the distance between OP, and r is the radius of ball, and v is the distance between IP;
(2.5), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula represents file
The number of bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
<mrow>
<msub>
<mi>V</mi>
<mi>t</mi>
</msub>
<mo>=</mo>
<mi>m</mi>
<mi>i</mi>
<mi>n</mi>
<mo>+</mo>
<mo>|</mo>
<mrow>
<mi>p</mi>
<mi>a</mi>
<mi>c</mi>
<mi>k</mi>
<mi>e</mi>
<mi>t</mi>
<mi>c</mi>
<mi>o</mi>
<mi>u</mi>
<mi>n</mi>
<mi>t</mi>
<mo>-</mo>
<mi>m</mi>
<mi>i</mi>
<mi>n</mi>
</mrow>
<mo>|</mo>
<mo>&CenterDot;</mo>
<mrow>
<mo>(</mo>
<mn>1</mn>
<mo>-</mo>
<msup>
<mi>e</mi>
<mrow>
<mo>-</mo>
<mfrac>
<mi>t</mi>
<mrow>
<mi>R</mi>
<mo>&CenterDot;</mo>
<mi>C</mi>
</mrow>
</mfrac>
</mrow>
</msup>
<mo>)</mo>
</mrow>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>10</mn>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<mi>b</mi>
<mi>l</mi>
<mi>a</mi>
<mi>n</mi>
<mi>k</mi>
<mo>=</mo>
<mi>R</mi>
<mi>C</mi>
<mo>&CenterDot;</mo>
<msub>
<mi>L</mi>
<mi>n</mi>
</msub>
<mfrac>
<mrow>
<mo>|</mo>
<mrow>
<mi>p</mi>
<mi>a</mi>
<mi>c</mi>
<mi>k</mi>
<mi>e</mi>
<mi>t</mi>
<mi>c</mi>
<mi>o</mi>
<mi>u</mi>
<mi>n</mi>
<mi>t</mi>
<mo>-</mo>
<mi>min</mi>
</mrow>
<mo>|</mo>
</mrow>
<mrow>
<mo>|</mo>
<mrow>
<mi>p</mi>
<mi>a</mi>
<mi>c</mi>
<mi>k</mi>
<mi>e</mi>
<mi>t</mi>
<mi>c</mi>
<mi>o</mi>
<mi>u</mi>
<mi>n</mi>
<mi>t</mi>
<mo>-</mo>
<msub>
<mi>V</mi>
<mi>t</mi>
</msub>
</mrow>
<mo>|</mo>
</mrow>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>11</mn>
<mo>)</mo>
</mrow>
</mrow>
(2.6), cryptopart size size determines the character number that each cryptopart possesses, and blank is to obtain in formula (11)
Value, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time.Simulation
Capacitor charge and discharge formula is obtained
<mrow>
<msub>
<mi>V</mi>
<mi>t</mi>
</msub>
<mo>=</mo>
<mi>m</mi>
<mi>i</mi>
<mi>n</mi>
<mo>+</mo>
<mo>|</mo>
<mrow>
<mi>b</mi>
<mi>l</mi>
<mi>a</mi>
<mi>n</mi>
<mi>k</mi>
<mo>-</mo>
<mi>p</mi>
<mi>a</mi>
<mi>c</mi>
<mi>k</mi>
<mi>e</mi>
<mi>t</mi>
<mi>c</mi>
<mi>o</mi>
<mi>u</mi>
<mi>n</mi>
<mi>t</mi>
</mrow>
<mo>|</mo>
<mo>&CenterDot;</mo>
<mrow>
<mo>(</mo>
<mn>1</mn>
<mo>-</mo>
<msup>
<mi>e</mi>
<mrow>
<mo>-</mo>
<mfrac>
<mi>t</mi>
<mrow>
<mi>R</mi>
<mo>&CenterDot;</mo>
<mi>C</mi>
</mrow>
</mfrac>
</mrow>
</msup>
<mo>)</mo>
</mrow>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>12</mn>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<mi>s</mi>
<mi>i</mi>
<mi>z</mi>
<mi>e</mi>
<mo>=</mo>
<mi>R</mi>
<mi>C</mi>
<mo>&CenterDot;</mo>
<msub>
<mi>L</mi>
<mi>n</mi>
</msub>
<mfrac>
<mrow>
<mo>|</mo>
<mrow>
<mi>b</mi>
<mi>l</mi>
<mi>a</mi>
<mi>n</mi>
<mi>k</mi>
<mo>-</mo>
<mi>p</mi>
<mi>a</mi>
<mi>c</mi>
<mi>k</mi>
<mi>e</mi>
<mi>t</mi>
<mi>c</mi>
<mi>o</mi>
<mi>u</mi>
<mi>n</mi>
<mi>t</mi>
</mrow>
<mo>|</mo>
</mrow>
<mrow>
<mo>|</mo>
<mrow>
<mi>b</mi>
<mi>l</mi>
<mi>a</mi>
<mi>n</mi>
<mi>k</mi>
<mo>-</mo>
<msub>
<mi>V</mi>
<mi>t</mi>
</msub>
</mrow>
<mo>|</mo>
</mrow>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>13</mn>
<mo>)</mo>
</mrow>
</mrow>
(2.7), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (14)
And password is hidden according to gained formula.
(3) file reception end;
(3.1) time of connection is set up according to client and receiving terminal, using the one hour value hour of its time and minute value min as
Random parameter;
(3.2) receiving terminal receives the encryption file of under cover password;
(3.3) password hidden hereof is parsed;
(3.4) password stowed position is determined by array local, and local arrays are by cryptopart starting point begin, cryptopart interval
Blank, cryptopart size size are determined;
(3.5) cryptopart starting point begin utilizes hour and min, works as α, β, i with reference to sphere formula1、i2Can be with when sufficiently small
Reach paraxial approximate condition:
Paraxial approximate condition α=sin α=tan α, i1=sin i1 (15)
β=sin β=tan β, i2=sin i2 (16)
Law of refraction n1·sin i1=n2·sini2 (17)
By (15) (16), (17) three formula obtain paraxial approximate formula (18):
Paraxial approximate n1·i1=n2·i2 (18)
Parameter alpha, β, θ are carried out again approximate:
<mrow>
<mi>&alpha;</mi>
<mo>=</mo>
<mfrac>
<mi>h</mi>
<mrow>
<mi>u</mi>
<mo>+</mo>
<mi>&sigma;</mi>
</mrow>
</mfrac>
<mo>&ap;</mo>
<mfrac>
<mi>h</mi>
<mi>u</mi>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>19</mn>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<mi>&beta;</mi>
<mo>=</mo>
<mfrac>
<mi>h</mi>
<mrow>
<mi>v</mi>
<mo>-</mo>
<mi>&sigma;</mi>
</mrow>
</mfrac>
<mo>&ap;</mo>
<mfrac>
<mi>h</mi>
<mi>v</mi>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>20</mn>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<mi>&theta;</mi>
<mo>=</mo>
<mfrac>
<mi>h</mi>
<mrow>
<mi>r</mi>
<mo>-</mo>
<mi>&sigma;</mi>
</mrow>
</mfrac>
<mo>&ap;</mo>
<mfrac>
<mi>h</mi>
<mi>r</mi>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>21</mn>
<mo>)</mo>
</mrow>
</mrow>
Parameter is brought into law of refraction formula to obtain:
n1·α+n2β=(n1-n2)·θ (22)
Substitute 1/u with hour, min substitutes 1/v, and n1, n2 are the numerical value that has been previously set, become get in return formula into:
<mrow>
<msub>
<mi>n</mi>
<mn>1</mn>
</msub>
<mo>&CenterDot;</mo>
<mi>h</mi>
<mi>o</mi>
<mi>u</mi>
<mi>r</mi>
<mo>+</mo>
<msub>
<mi>n</mi>
<mn>2</mn>
</msub>
<mo>&CenterDot;</mo>
<mi>m</mi>
<mi>i</mi>
<mi>n</mi>
<mo>=</mo>
<mfrac>
<mrow>
<msub>
<mi>n</mi>
<mn>2</mn>
</msub>
<mo>-</mo>
<msub>
<mi>n</mi>
<mn>1</mn>
</msub>
</mrow>
<mi>r</mi>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>23</mn>
<mo>)</mo>
</mrow>
</mrow>
(3.6), cryptopart interval blank determines the distance between each cryptopart, and the packercount in following formula represents file
The number of bag, min is minute, R, C, VtTo set the parameter of initial value, t is the time, and artificial capacitor discharge and recharge formula is obtained:
<mrow>
<msub>
<mi>V</mi>
<mi>t</mi>
</msub>
<mo>=</mo>
<mi>m</mi>
<mi>i</mi>
<mi>n</mi>
<mo>+</mo>
<mo>|</mo>
<mrow>
<mi>p</mi>
<mi>a</mi>
<mi>c</mi>
<mi>k</mi>
<mi>e</mi>
<mi>t</mi>
<mi>c</mi>
<mi>o</mi>
<mi>u</mi>
<mi>n</mi>
<mi>t</mi>
<mo>-</mo>
<mi>m</mi>
<mi>i</mi>
<mi>n</mi>
</mrow>
<mo>|</mo>
<mo>&CenterDot;</mo>
<mrow>
<mo>(</mo>
<mn>1</mn>
<mo>-</mo>
<msup>
<mi>e</mi>
<mrow>
<mo>-</mo>
<mfrac>
<mi>t</mi>
<mrow>
<mi>R</mi>
<mo>&CenterDot;</mo>
<mi>C</mi>
</mrow>
</mfrac>
</mrow>
</msup>
<mo>)</mo>
</mrow>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>24</mn>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<mi>b</mi>
<mi>l</mi>
<mi>a</mi>
<mi>n</mi>
<mi>k</mi>
<mo>=</mo>
<mi>R</mi>
<mi>C</mi>
<mo>&CenterDot;</mo>
<msub>
<mi>L</mi>
<mi>n</mi>
</msub>
<mfrac>
<mrow>
<mo>|</mo>
<mrow>
<mi>p</mi>
<mi>a</mi>
<mi>c</mi>
<mi>k</mi>
<mi>e</mi>
<mi>t</mi>
<mi>c</mi>
<mi>o</mi>
<mi>u</mi>
<mi>n</mi>
<mi>t</mi>
<mo>-</mo>
<mi>min</mi>
</mrow>
<mo>|</mo>
</mrow>
<mrow>
<mo>|</mo>
<mrow>
<mi>p</mi>
<mi>a</mi>
<mi>c</mi>
<mi>k</mi>
<mi>e</mi>
<mi>t</mi>
<mi>c</mi>
<mi>o</mi>
<mi>u</mi>
<mi>n</mi>
<mi>t</mi>
<mo>-</mo>
<msub>
<mi>V</mi>
<mi>t</mi>
</msub>
</mrow>
<mo>|</mo>
</mrow>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>25</mn>
<mo>)</mo>
</mrow>
</mrow>
(3.7), cryptopart size size determines the character number that each cryptopart possesses, and blank is to obtain in formula (25)
Value, packercount represents the number of file bag, and min is minute, R, C, VtTo set the parameter of initial value, t is the time, simulation
Capacitor charge and discharge formula is obtained:
<mrow>
<msub>
<mi>V</mi>
<mi>t</mi>
</msub>
<mo>=</mo>
<mi>m</mi>
<mi>i</mi>
<mi>n</mi>
<mo>+</mo>
<mo>|</mo>
<mrow>
<mi>b</mi>
<mi>l</mi>
<mi>a</mi>
<mi>n</mi>
<mi>k</mi>
<mo>-</mo>
<mi>p</mi>
<mi>a</mi>
<mi>c</mi>
<mi>k</mi>
<mi>e</mi>
<mi>t</mi>
<mi>c</mi>
<mi>o</mi>
<mi>u</mi>
<mi>n</mi>
<mi>t</mi>
</mrow>
<mo>|</mo>
<mo>&CenterDot;</mo>
<mrow>
<mo>(</mo>
<mn>1</mn>
<mo>-</mo>
<msup>
<mi>e</mi>
<mrow>
<mo>-</mo>
<mfrac>
<mi>t</mi>
<mrow>
<mi>R</mi>
<mo>&CenterDot;</mo>
<mi>C</mi>
</mrow>
</mfrac>
</mrow>
</msup>
<mo>)</mo>
</mrow>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>26</mn>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<mi>s</mi>
<mi>i</mi>
<mi>z</mi>
<mi>e</mi>
<mo>=</mo>
<mi>R</mi>
<mi>C</mi>
<mo>&CenterDot;</mo>
<msub>
<mi>L</mi>
<mi>n</mi>
</msub>
<mfrac>
<mrow>
<mo>|</mo>
<mrow>
<mi>b</mi>
<mi>l</mi>
<mi>a</mi>
<mi>n</mi>
<mi>k</mi>
<mo>-</mo>
<mi>p</mi>
<mi>a</mi>
<mi>c</mi>
<mi>k</mi>
<mi>e</mi>
<mi>t</mi>
<mi>c</mi>
<mi>o</mi>
<mi>u</mi>
<mi>n</mi>
<mi>t</mi>
</mrow>
<mo>|</mo>
</mrow>
<mrow>
<mo>|</mo>
<mrow>
<mi>b</mi>
<mi>l</mi>
<mi>a</mi>
<mi>n</mi>
<mi>k</mi>
<mo>-</mo>
<msub>
<mi>V</mi>
<mi>t</mi>
</msub>
</mrow>
<mo>|</mo>
</mrow>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>27</mn>
<mo>)</mo>
</mrow>
</mrow>
(3.8), according to above-mentioned determination local arrays
Local=begin+n* (blank+size) (28)
And password is parsed according to gained formula.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710034724.1A CN107070646B (en) | 2017-01-17 | 2017-01-17 | Safe and reliable network transmission method based on password hiding |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710034724.1A CN107070646B (en) | 2017-01-17 | 2017-01-17 | Safe and reliable network transmission method based on password hiding |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107070646A true CN107070646A (en) | 2017-08-18 |
CN107070646B CN107070646B (en) | 2020-01-14 |
Family
ID=59598573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710034724.1A Active CN107070646B (en) | 2017-01-17 | 2017-01-17 | Safe and reliable network transmission method based on password hiding |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107070646B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108282484A (en) * | 2018-01-30 | 2018-07-13 | 平安普惠企业管理有限公司 | Password acquisition methods, device, computer equipment and storage medium |
CN110677421A (en) * | 2019-09-30 | 2020-01-10 | 贵州航天云网科技有限公司 | Remote operation and maintenance and data exchange method oriented to equipment industrial control safety |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030099372A1 (en) * | 2001-11-28 | 2003-05-29 | Wendt Peter D. | Method and apparatus to detect watermark that are resistant to arbitrary deformations |
CN101156173A (en) * | 2005-04-14 | 2008-04-02 | 皇家飞利浦电子股份有限公司 | Watermarking of an image motion signal |
CN101976428A (en) * | 2010-07-30 | 2011-02-16 | 南开大学 | Binary image fragile watermark embedding and extraction method based on topology structure |
US20140237050A1 (en) * | 2012-12-12 | 2014-08-21 | Tencent Technology (Shenzhen) Company Limited | Method for hiding activity group member identification information, server and terminal |
CN105471811A (en) * | 2014-06-19 | 2016-04-06 | 北京搜狗科技发展有限公司 | Privacy space processing method and privacy space processing device |
-
2017
- 2017-01-17 CN CN201710034724.1A patent/CN107070646B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030099372A1 (en) * | 2001-11-28 | 2003-05-29 | Wendt Peter D. | Method and apparatus to detect watermark that are resistant to arbitrary deformations |
CN101156173A (en) * | 2005-04-14 | 2008-04-02 | 皇家飞利浦电子股份有限公司 | Watermarking of an image motion signal |
CN101976428A (en) * | 2010-07-30 | 2011-02-16 | 南开大学 | Binary image fragile watermark embedding and extraction method based on topology structure |
US20140237050A1 (en) * | 2012-12-12 | 2014-08-21 | Tencent Technology (Shenzhen) Company Limited | Method for hiding activity group member identification information, server and terminal |
CN105471811A (en) * | 2014-06-19 | 2016-04-06 | 北京搜狗科技发展有限公司 | Privacy space processing method and privacy space processing device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108282484A (en) * | 2018-01-30 | 2018-07-13 | 平安普惠企业管理有限公司 | Password acquisition methods, device, computer equipment and storage medium |
CN110677421A (en) * | 2019-09-30 | 2020-01-10 | 贵州航天云网科技有限公司 | Remote operation and maintenance and data exchange method oriented to equipment industrial control safety |
CN110677421B (en) * | 2019-09-30 | 2020-07-14 | 贵州航天云网科技有限公司 | Remote operation and maintenance and data exchange method oriented to equipment industrial control safety |
Also Published As
Publication number | Publication date |
---|---|
CN107070646B (en) | 2020-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103440444B (en) | The signing method of electronic contract | |
CN103177220B (en) | Based on the method for carrying out personal information encryption in the logistics system of Quick Response Code | |
CN109194479B (en) | Measuring equipment-independent quantum key distribution method based on single photon multiple degrees of freedom | |
Wang et al. | Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum | |
CN103024743B (en) | The credible and secure cut-in method of a kind of WLAN | |
CN107787568A (en) | Random cipher code book cryptography | |
CN111245608B (en) | Measuring equipment-independent quantum key distribution method based on three degrees of freedom of single photon | |
GB2569530A (en) | Quantum protection of telemetry tracking and command links | |
CN107070646A (en) | The safe and reliable network transfer method hidden based on password | |
CN107147631A (en) | For the data safety communication system and method in Internet of Things | |
CN105792190A (en) | Data encryption, decryption and transmission method in communication system | |
CN107690079A (en) | Privacy of user guard method in live platform | |
CN105142136A (en) | Method for preventing counterfeit base attack | |
CN101656728B (en) | Secure transmission method using time-varying incidental information flow as key information | |
CN110505049A (en) | A kind of text information transmission method, apparatus and system | |
CN103595619A (en) | Method, device and system for adding friend | |
CN104270380A (en) | End-to-end encryption method and system based on mobile network and communication client side | |
WO2020244145A1 (en) | Quantum wireless network communication system | |
CN104717072A (en) | Remote-sensing image authentication method based on perceptual hash and elliptic curve | |
CN104734846B (en) | Quantum-key distribution control device and method | |
CN103825725A (en) | Efficient random physical layer secrete key generation method based on vector quantization | |
CN106375327B (en) | A kind of proxy signature key of anti-malicious attack obscures electronic voting system and method | |
CN103634292A (en) | Method and system for communication information transmission | |
CN102612035A (en) | Energy-efficient identity authentication method in multi-level clustering wireless sensor network | |
CN103701683A (en) | Method, device and system for acquiring friend information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |