CN108494555A - Information encryption and decryption method and information encryption, decryption device - Google Patents

Information encryption and decryption method and information encryption, decryption device Download PDF

Info

Publication number
CN108494555A
CN108494555A CN201810162140.7A CN201810162140A CN108494555A CN 108494555 A CN108494555 A CN 108494555A CN 201810162140 A CN201810162140 A CN 201810162140A CN 108494555 A CN108494555 A CN 108494555A
Authority
CN
China
Prior art keywords
information
node
hop count
decryption
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810162140.7A
Other languages
Chinese (zh)
Other versions
CN108494555B (en
Inventor
何宗江
贾志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hong Guishun
Original Assignee
Shenzhen Hcen Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hcen Technology Co Ltd filed Critical Shenzhen Hcen Technology Co Ltd
Priority to CN201810162140.7A priority Critical patent/CN108494555B/en
Publication of CN108494555A publication Critical patent/CN108494555A/en
Application granted granted Critical
Publication of CN108494555B publication Critical patent/CN108494555B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of information ciphering method, this method includes:Routing information is sent to server and asks encrypted public key;Receive public key of the server according to hop count and the generation of destination node marking information in the routing information;The information area using the public key to sent information frame is encrypted.The present invention also provides a kind of information decryption methods to decrypt the encrypted information frame of the encryption method, in addition also provides corresponding information encryption equipment and information decryption device.Information encryption and decryption method and information provided by the invention encryption, decryption device can solve in ultraviolet light wireless network that there are the encryption and decryption problems for when insecure user, how accomplishing information communication between secured user.

Description

Information encryption and decryption method and information encryption, decryption device
Technical field
The present invention relates to wireless communication technology field more particularly to the encryption of a kind of information encryption and decryption method and information, solutions Close equipment.
Background technology
Ultraviolet communication is to be divided into sighting distance in the way of a kind of Novel Communication that atmospheric scattering is transmitted into row information and non-regard Away from two kinds of communication modes.Line-of-sight requirement transmitter and receiver is aligned, between the two cannot be with the presence of barrier.Under non line of sight mode, Ultraviolet light reaches receiving terminal by the scattering of atmospheric molecule and particle, and receiving terminal receives the ultraviolet photon of certain amount, so that it may To realize non line-of-sight communication.
Non line of sight ultraviolet communication has many advantages, such as strong antijamming capability, good confidentiality and comprehensive communication, can be used for Military field carries out jungle operation as a kind of novel military channels, such as applied to small-scale troop.However, working as Within the scope of the same ultra-violet optical communication system, when also having enemy to be likewise equipped with ultraviolet optical transmit-receive device, direct communication then has can It can information leakage.It is existing application within a wireless communication network encryption technology it is very more, but be mostly static state it is easy crack, or It is algorithm complexity, the encryption and decryption time is long.
Invention content
In view of this, a kind of information encryption and decryption method of present invention proposition and information encryption, decryption device, by using The public key of hop count and destination node in routing information carries out dynamic encryption;Hop count information is obtained when decryption, then utilizes target The private key of node is decrypted, therefore can solve how to use in safety there are when insecure user in ultraviolet light wireless network Accomplish the encryption and decryption problem of information communication between family.
First, to achieve the above object, the present invention proposes a kind of information ciphering method, and the method comprising the steps of:
Routing information is sent to server and asks encrypted public key;The server is received according in the routing information The public key that hop count and destination node marking information generate;The information area using the public key to sent information frame is added It is close.
Optionally, described information frame includes the first relay node information, and the first relay node information is the road The identification information of relay node included by diameter information.
Optionally, described information frame includes hop count device, and the hop count device is primary in the forwarding of described information frame It is automatic later to add 1.
Optionally, the server according in the routing information hop count and destination node marking information generate The process of public key can correspond to table according to preset hop count-public key to generate public key, wherein the hop count-public key corresponds to table packet Correspondence containing each hop count and a public key of each node in network.
Optionally, the method further includes step:Encrypted described information frame is sent;At preset first Between when being not received by the confirmation message corresponding to described information frame in threshold value, described information frame is retransmitted.
Optionally, the method further includes step:It is not received by preset sending times threshold value corresponding to described When the confirmation message of information frame, it is transmitted the planning again in path, the transmission request is then repeated, receives public key, carries out The step of encryption and transmission information frame.
In addition, to achieve the above object, the present invention also provides a kind of encryptions of information, including memory, processor and storage On the memory and the information encipheror that can run on the processor, described information encipheror is by the processing It is realized such as the step of above-mentioned information ciphering method when device executes.
The present invention also provides a kind of information decryption methods corresponding with described information encryption method, and the method comprising the steps of:
Encrypted information frame is received, the first relay node information of described information frame is obtained;By own node mark and institute The node identification information stated in the first relay node information is compared;When own node mark is included in the first relaying section When in point information, the hop count of the hop count device of described information frame is obtained;It is preset what own node stored according to the hop count Hop count-private key correspond to and search corresponding private key in table;The information area of described information frame is decrypted using the private key.
Optionally, the method further includes step:When own node mark is not contained in the first relay node letter When in breath, described information frame is forwarded.
Optionally, the information area that described information frame is decrypted using the private key is specifically included:When successful decryption, return Multiple confirmation message is no longer forwarded described information frame to source node;When fail decryption when, described information frame is carried out Forwarding.
In addition, to achieve the above object, the present invention also provides a kind of information decryption device, including memory, processor and It is stored in the information decryption program that can be run on the memory and on the processor, described information decryption program is described It is realized such as the step of above-mentioned information decryption method when processor executes.
Compared to the prior art, information encryption and decryption method proposed by the invention and information encryption, decryption device, lead to It crosses and carries out dynamic encryption using the public key of hop count and destination node in routing information;Hop count information is obtained when decryption, it is then sharp Be decrypted, therefore can be solved in ultraviolet light wireless network there are when insecure user with the private key of destination node, how Accomplish the encryption and decryption problem of information communication between secured user.
Description of the drawings
Fig. 1 is each one optional application environment schematic diagram of embodiment of the present invention;
Fig. 2 is the schematic diagram of one optional hardware structure of encryption device of the present invention;
Fig. 3 is the schematic diagram of one optional hardware structure of decryption device of the present invention;
Fig. 4 is the program module schematic diagram of one embodiment of information encipheror of the present invention;
Fig. 5 is the program module schematic diagram of one embodiment of information decryption program of the present invention;
Fig. 6 is the flow diagram of one embodiment of information ciphering method of the present invention;
Fig. 7 is the flow diagram of one embodiment of information decryption method of the present invention.
Reference numeral:
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work The every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot It is interpreted as indicating or implying its relative importance or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims Protection domain within.
As shown in fig.1, being each one optional application environment schematic diagram of embodiment of the present invention.
Present invention can apply to include but are not limited to ultraviolet light cordless communication network.In the present embodiment, the ring of application Border be include ultraviolet light wireless network, which includes multiple node devices, and each node device is simultaneously Encryption device and decryption device, can be used for as server.The node device can be mobile phone, notebook electricity Brain, digit broadcasting receiver, PDA (personal digital assistant), PAD (tablet computer), navigation device, car-mounted device or mobile base The fixed terminal of the movable equipment, and such as server and base-station stood etc. etc..In the present embodiment, it is set with encryption Standby 5, decryption device 6 illustrates for server M.The server M is stored with the jump for corresponding to all nodes in the network Number-public key corresponds to table.
As shown in fig.2, being the schematic diagram of the optional hardware structure of encryption device 5 one described in Fig. 1.In the present embodiment, The encryption device 5 may include, but be not limited only to, and the first storage of connection can be in communication with each other by wired mode or wireless mode Device 11, first processor 12, the first transmitting terminal 13 and the first receiving terminal 14.It should be pointed out that Fig. 2 is illustrated only with component The encryption device 5 of 11-14, it should be understood that being not required for implementing all components shown, the implementation that can be substituted is more Or less component.
Wherein, the first memory 11 includes at least a type of readable storage medium storing program for executing, the readable storage medium storing program for executing Including flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), quiet State random access storage device (SRAM), electrically erasable programmable read-only memory (EEPROM), can be compiled read-only memory (ROM) Journey read-only memory (PROM), magnetic storage, disk, CD etc..In some embodiments, the first memory 11 can be with It is the internal storage unit of the encryption device 5, such as the hard disk or memory of the encryption device 5.In further embodiments, The first memory 11 can also be to be equipped on the External memory equipment of the encryption device 5, such as the encryption device 5 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Certainly, the first memory 11 can also both include the storage inside list of the encryption device 5 Member also includes its External memory equipment.In the present embodiment, the first memory 11 is installed on the encryption commonly used in storage The operating system and types of applications software of equipment 5, for example, information encipheror 200 program code etc..In addition, described first deposits Reservoir 11 can be also used for temporarily storing the Various types of data that has exported or will export.
The first processor 12 can be central processing unit (Central in some embodiments ProcessingUnit, CPU), controller, microcontroller, microprocessor or other data processing chips.The first processor 12 commonly used in controlling the overall operation of the encryption device 5, for example, execute with the mobile terminal carry out data interaction or Communicate relevant control and processing etc..In the present embodiment, the first processor 12 is for running in the first memory 11 The program code of storage or processing data, such as operation described information encipheror 200 etc..
First transmitting terminal 13 includes but not limited to include:Electric signal is modulated into the modulation unit of optical signal, is encrypted Unit, signal gain or amplifying unit.First transmitting terminal 13 is commonly used in the encryption device 5 needing the letter sent Breath carries out coded modulation, and is launched in the form of optical signal.
First receiving terminal 14 includes but not limited to include:Signal gain or amplifying unit, by optical signal modulation at The demodulating unit of electric signal, decryption unit.First receiving terminal 14, which is commonly used in the light for sending other node devices, to be believed It number is demodulated and decoded to obtain raw information.
In the present embodiment, when being installed in the encryption device 5 and having run information encipheror 200, work as described information When encipheror 200 is run, the encryption device 5 can be by being sent to server M by routing information, and acquisition is believed by the path Then the public key corresponding to hop count and destination node marking information that breath includes is used for encryption information frame.In this way, realizing that dynamic adds Close purpose ensures the safety of network communication.
As shown in fig.3, being the schematic diagram of the optional hardware structure of decryption device 6 one described in Fig. 1.In the present embodiment, The decryption device 6 may include, but be not limited only to, and the second storage of connection can be in communication with each other by wired mode or wireless mode Device 21, second processor 22, the second transmitting terminal 23 and the second receiving terminal 24.It should be pointed out that Fig. 3 is illustrated only with component The decryption device 6 of 21-24, it should be understood that being not required for implementing all components shown, the implementation that can be substituted is more Or less component.Decryption device 6 is similar to 5 hardware structure of encryption device, therefore, at the second memory 21, second Device 22, the second transmitting terminal 23 and the second receiving terminal 24 is managed accordingly to handle with the first memory of the encryption device 5 11, first Device 12, the first transmitting terminal 13 and the first receiving terminal 14 can realize similar function.
In the present embodiment, when being installed in the decryption device 6 and having run information decryption program 300, work as described information When decryption program 300 is run, the decryption device 6 can obtain the jump in the information frame after receiving encrypted information frame Then hop count in counter searches corresponding private key, then profit according in the hop count and hop count-private key table of itself storage It is decrypted with private key.It is solved in this way, realize the encryption device 5 carrying out the information frame that dynamic encryption is crossed using hop count It is close.
So far, oneself is through describing the application environment of the embodiment of the present invention and the hardware configuration of relevant device and function in detail. In the following, above application environment and relevant device will be based on, each embodiment of the present invention is proposed.
First, the present invention proposes a kind of information encipheror 200.
As shown in fig.4, being the Program modual graph of 200 1 embodiment of information encipheror of the present invention.
In the present embodiment, described information encipheror 200 includes a series of calculating being stored on first memory 11 The letter of various embodiments of the present invention may be implemented when the computer program instructions are executed by first processor 12 in machine program instruction The operation of encryption for information.In some embodiments, the specific operation realized based on the computer program instructions each section, it is described Information encipheror 200 can be divided into one or more modules.For example, in Fig. 4, described information encipheror 200 can To be divided into the first sending module 201, the first receiving module 202 and encrypting module 203.Wherein:
First sending module 201 asks encrypted public key for routing information to be sent to server.
Specifically, after the path transmitted is planned in encryption device 5, first sending module 201 is by the path Information is sent to server M to ask corresponding encrypted public key.In the present embodiment, the routing information includes destination node The information of identification information and the relay node passed through from source node to destination node.
First receiving module 202, for receiving the server according to the hop count and target in the routing information The public key that node identification information generates.
Specifically, after the routing information is sent to server M by first sending module 201, server M is first First the identification information of the destination node in routing information and all relay node numbers (i.e. hop count) are extracted, then by basis Preset hop count-public key corresponds to public key of the table search corresponding to the identification information and the hop count of the destination node, wherein institute It states hop count-public key and corresponds to the relation table that each hop count that table includes each node in network corresponds to a public key.In the present embodiment In, the correspondence table of directly default hop count-public key is to save the time that server generates public key.In other embodiments, One public key can be generated by a preset public key generating function according to different destination node marking information and hop count, Certainly, the decrypting process next described can also generate a private key by a default private key generating function.Then it services The public key is returned back to encryption device 5 by device M.First receiving module 202 of encryption device 5 then receives the public key.
The encrypting module 203 is encrypted for the information area using the public key to sent information frame.
First sending module 201 is additionally operable to send 203 encrypted information frame of the encrypting module. Include the first relay node information and hop count device, the first relay node letter in the present embodiment, in described information frame Breath is the identification information of the relay node included by the routing information, and the hop count device is primary in the forwarding of described information frame It is automatic later to add 1.When first sending module 201 is not received by preset first time threshold corresponding to the letter When ceasing the confirmation message of frame, described information frame is retransmitted.And it is not received by preset sending times threshold value pair Should be when the confirmation message of described information frame, the encryption device 5 can also re-start the planning of transmission path, then repeat The step of transmission for each module stated asks, receives public key, is encrypted and sends information frame.
By above procedure module 201-203, information encipheror 200 proposed by the invention can be by believing path Breath is sent to server M, obtains by the routing information public key corresponding to the hop count for including and destination node marking information, then For encryption information frame.In this way, realizing the purpose of dynamic encryption, ensure the safety of network communication.
As shown in fig.5, being the Program modual graph of 300 1 embodiment of information decryption program of the present invention.
In the present embodiment, described information decryption program 300 includes a series of calculating being stored on second memory 21 The letter of various embodiments of the present invention may be implemented when the computer program instructions are executed by second processor 22 in machine program instruction The operation of encryption for information.In some embodiments, the specific operation realized based on the computer program instructions each section, it is described Information decryption program 300 can be divided into one or more modules.For example, in Figure 5, described information decryption program 300 can To be divided into the second receiving module 301, judgment module 302, deciphering module 303 and the second sending module 304.Wherein:
Second receiving module 301 obtains the first relay node of described information frame for receiving encrypted information frame Information.
Specifically, encrypted information frame is wirelessly transmitted to the space in coverage area by encryption device 5.So Afterwards, the second receiving module 301 of the decryption device 6 will receive the encrypted information frame, then obtain described information The first relay node information in frame.
The judgment module 302, for identifying and the node identification in the first relay node information own node Information is compared, to judge whether own node identification information is included in first relay node of described information frame In information.
Specifically, the institute that the routing information is passed through is contained in the first relay node information of described information frame There is the identification information of node.Described information frame is received in the second receiving module 301 and obtains the first relay node letter After breath, the judgment module 302 is by the institute in the nodal information of itself of the decryption device 6 and the first relay node information There is node identification information to be compared, to judge that own node identification information is included in the first relay node information In.When the own node information is included in the first relay node information, then the decryption device 6 is the path Node in information, and it is likely to be destination node, therefore the judgment module 302 also will continue to obtain and be jumped in described information frame The hop count of counter.
The deciphering module 303, preset hop count-private key for being stored in own node according to the hop count correspond to table It is middle to search corresponding private key, then utilize the information area of private key decryption described information frame.
Specifically, when the judgment module 302 judges that the own node identification information of the described information frame is included in Continue the hop count of hop count device in acquisition described information frame when in the first relay node information.The deciphering module 303 Then corresponding private key can be searched in preset hop count-private key corresponds to table according to the hop count, the hop count-private key corresponds to table and is The distinctive each hop count about the node of 6 own node of the decryption device corresponds to the correspondence table of a private key.The solution After close module 303 finds the private key, the information area of described information frame is decrypted using the private key.Certainly, if institute State decryption device 6 be the routing information on relay node when, the private key decryption cannot succeed;When the decryption device 6 is When destination node, decryption can succeed.
Second sending module 304, for carrying out described information frame when the deciphering module 303 is decrypted not successfully Forwarding.
Specifically, when the decryption device 6 is the relay node on the routing information, not destination node, therefore, The deciphering module 303 of the decryption device 6 using the private key of hop count and own node to the information area of described information frame into It cannot be successful when row decryption.At this point, the second sending module 304 of the decryption device 6 will turn described information frame Hair.
In addition, when to judge that the own node mark of the decryption device 6 is not contained in described for the judgment module 302 When in the first relay node information of information frame, second sending module 304 can also forward described information frame.
By above procedure module 301-304, information decryption program 300 proposed by the invention can receive After encrypted information frame, the hop count in the hop count device in the information frame is obtained, then according to the hop count and itself storage Hop count-private key table in search corresponding private key, recycle private key to be decrypted.The encryption device 5 is utilized in this way, realizing Hop count carries out the information frame that dynamic encryption is crossed and is decrypted.
In addition, the present invention also proposes a kind of information ciphering method.
As shown in fig.6, being the flow diagram of one embodiment of information ciphering method of the present invention.In the present embodiment, root According to different demands, the execution sequence of the step in flow chart shown in fig. 6 can change, and certain steps can be omitted.
Routing information is sent to server and asks encrypted public key by step S500.
After encryption device 5 plans the path transmitted, the routing information is then sent to server M to ask Corresponding encrypted public key.In the present embodiment, the routing information include destination node identification information and from source node to The information for the relay node that destination node is passed through.
Step S502, receive the server according in the routing information hop count and destination node marking information generate Public key.
Specifically, after the routing information being sent to server M, server M is first by the target in routing information The identification information of node and all relay node numbers (i.e. hop count) extract, and then will be corresponded to according to preset hop count-public key Table search corresponds to the public key of the identification information and the hop count of the destination node of the routing information, wherein the hop count-public affairs Key corresponds to the relation table that each hop count that table includes each node in network corresponds to a public key.In the present embodiment, directly pre- If the correspondence table of hop count-public key is to save the time that server generates public key.It in other embodiments, can also be according to not Same destination node marking information and hop count generates a public key, certainly, next by a preset public key generating function The decrypting process of description can also generate a private key by a default private key generating function.Then the public key is replied again To encryption device 5, encryption device 5 then receives the public key.
Step S504, the information area using the public key to sent information frame are encrypted, then will be encrypted Information frame is sent.
Specifically, the encryption device 5 sends encrypted information frame.In the present embodiment, described information frame In include the first relay node information and hop count device, the relay node information be included by the routing information in After the identification information of node, the hop count device is automatic after the forwarding of described information frame is primary to add 1.When preset first When being not received by the confirmation message corresponding to described information frame in time threshold, described information frame is retransmitted.And When being not received by the confirmation message corresponding to described information frame in preset sending times threshold value, the encryption device 5 can also The planning of transmission path is re-started, above-mentioned transmission request is then repeated, receives public key, is encrypted and sends information frame Step.
S500-S504 through the above steps, information ciphering method proposed by the invention can be by sending out routing information It send to server M, obtains by the routing information public key corresponding to the hop count for including and destination node marking information, be then used for Encryption information frame.In this way, realizing the purpose of dynamic encryption, ensure the safety of network communication.
In addition, corresponding to described information encryption method, the present invention also proposes a kind of information decryption method.
As shown in fig.7, being the flow diagram of one embodiment of information decryption method of the present invention.In the present embodiment, root According to different demands, the execution sequence of the step in flow chart shown in Fig. 7 can change, and certain steps can be omitted.The solution Decryption method is used to decrypt using the encrypted information frame of above-mentioned encryption method.
Step S600 receives encrypted information frame, obtains the first relay node information of described information frame.
Specifically, encrypted information frame is wirelessly transmitted to the space in coverage area by encryption device 5, so Afterwards, the decryption device 6 will receive the encrypted information frame, then obtain the first relay node in described information frame Information.
Own node is identified and is compared with the node identification information in the first relay node information by step S602 It is right, judge whether own node identification information is included in the first relay node information of described information frame.When itself When whether node identification information is included in the first relay node information of described information frame, step S604 is carried out;Otherwise Carry out step S608.
Specifically, the institute that the routing information is passed through is contained in the first relay node information of described information frame There is the identification information of node.It, then will be described after receiving described information frame and obtaining the first relay node information The nodal information of itself of decryption device 6 is compared with all node identification informations in the first relay node information, from And judge whether own node identification information is included in the first relay node information.
Step S604 obtains the hop count in the hop count device of described information frame.
Specifically, when the own node information is included in the first relay node information, then the decryption is set Standby 6 be the node on the routing information, and is likely to be destination node, therefore also will continue to obtain hop count in described information frame The hop count of counter.
Step S606, the preset hop count-private key stored in own node according to the hop count are corresponded to search in table and be corresponded to Private key, then using the private key decryption described information frame the information area.When successful decryption, flow terminates;Otherwise it carries out Step S608.
Specifically, when judge the described information frame own node identification information be included in first relay node Continue the hop count of hop count device in acquisition described information frame when in information.Then further according to the hop count in preset jump Number-private key corresponds to and searches corresponding private key in table, and it is that 6 own node of the decryption device is peculiar that the hop count-private key, which corresponds to table, Each hop count about the node correspond to a private key correspondence table.Then using the private key found to described information frame The information area be decrypted.Certainly, if the decryption device 6 is the relay node on the routing information, the private key solution It is close to succeed;When the decryption device 6 is destination node, decryption can succeed.
Described information frame is forwarded by step S608.
S600-S608 through the above steps, information decryption method proposed by the invention can receive encryption Information frame after, obtain the hop count in the hop count device in the information frame, then according to the hop count and itself storage jump Corresponding private key is searched in number-private key table, and private key is recycled to be decrypted.The encryption device 5 is utilized into hop count in this way, realizing The information frame that dynamic encryption is crossed is carried out to be decrypted.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (11)

1. a kind of information ciphering method, the node device being applied in wireless network, which is characterized in that the method includes steps Suddenly:
Routing information is sent to server and asks encrypted public key;
Receive public key of the server according to hop count and the generation of destination node marking information in the routing information;
The information area using the public key to sent information frame is encrypted.
2. information ciphering method as described in claim 1, which is characterized in that described information frame includes the first relay node letter Breath, the first relay node information are the identification information of the relay node included by the routing information.
3. information ciphering method as claimed in claim 1 or 2, which is characterized in that described information frame includes hop count device, The hop count device is automatic after the forwarding of described information frame is primary to add 1.
4. information ciphering method as described in claim 1, which is characterized in that the server is according to the routing information In hop count and destination node marking information generate public key process can be according to preset hop count-public key correspond to table generate Public key, wherein the hop count-public key corresponds to the corresponding pass that table includes each hop count of each node and a public key in network System.
5. information ciphering method as described in claim 1, which is characterized in that the method further includes step:
Encrypted described information frame is sent;
When being not received by the confirmation message corresponding to described information frame in preset first time threshold, by described information frame It is retransmitted.
6. information ciphering method as claimed in claim 4, which is characterized in that the method further includes step:
When being not received by the confirmation message corresponding to described information frame in preset sending times threshold value, it is transmitted path Planning again, then repetitive requests public key, receive public key, the step of being encrypted using public key.
7. a kind of information decryption method, the node device being applied in wireless network, which is characterized in that the method includes steps Suddenly:
Encrypted information frame is received, the first relay node information of described information frame is obtained;
Own node is identified and is compared with the node identification information in the first relay node information;
When own node mark is included in the first relay node information, the hop count device of described information frame is obtained Hop count;
Preset hop count-the private key stored in own node according to the hop count searches corresponding private key in corresponding to table;
The information area of described information frame is decrypted using the private key.
8. information decryption method as claimed in claim 6, which is characterized in that the method further includes step:
When own node mark is not contained in the first relay node information, described information frame is forwarded.
9. information decryption method as claimed in claim 6, which is characterized in that described to decrypt described information frame using the private key The information area specifically include:
When successful decryption, confirmation message is replied to source node, no longer described information frame is forwarded;
When fail decryption when, described information frame is forwarded.
10. a kind of information encryption equipment, be applied to wireless network, which is characterized in that described information encryption device include memory, Processor and it is stored in the information encipheror that can be run on the memory and on the processor, described information encrypts journey The step of information ciphering method as described in any one of claim 1-5 is realized when sequence is executed by the processor.
11. a kind of information decryption device, be applied to wireless network, which is characterized in that described information decryption device include memory, Processor and it is stored in the information decryption program that can be run on the memory and on the processor, described information decrypts journey The step of information decryption method as described in any one of claim 6-8 is realized when sequence is executed by the processor.
CN201810162140.7A 2018-02-27 2018-02-27 Information encryption and decryption method and information encryption and decryption equipment Active CN108494555B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810162140.7A CN108494555B (en) 2018-02-27 2018-02-27 Information encryption and decryption method and information encryption and decryption equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810162140.7A CN108494555B (en) 2018-02-27 2018-02-27 Information encryption and decryption method and information encryption and decryption equipment

Publications (2)

Publication Number Publication Date
CN108494555A true CN108494555A (en) 2018-09-04
CN108494555B CN108494555B (en) 2024-05-24

Family

ID=63340696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810162140.7A Active CN108494555B (en) 2018-02-27 2018-02-27 Information encryption and decryption method and information encryption and decryption equipment

Country Status (1)

Country Link
CN (1) CN108494555B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113507434A (en) * 2021-05-28 2021-10-15 清华大学 Data security transmission method, node and system in communication network

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070062632A (en) * 2005-12-13 2007-06-18 (주)스트림온 Mobile message and file security implementation by cryptography
JP2010087610A (en) * 2008-09-29 2010-04-15 Panasonic Corp Data transmitting device, data receiving device, data transmitting and receiving system, data transmitting and receiving method, and data transmitting and receiving program
CN102098318A (en) * 2011-03-23 2011-06-15 电子科技大学 Method for performing end-to-end anonymity safety communication of hop network
WO2011153507A2 (en) * 2010-06-04 2011-12-08 Board Of Regents Wireless communication methods, systems, and computer program products
CN103001875A (en) * 2013-01-07 2013-03-27 山东量子科学技术研究院有限公司 Quantum cryptography network dynamic routing method
US20130324165A1 (en) * 2011-06-29 2013-12-05 International Business Machines Corporation Information Communication Terminal and Location Estimation
CN103987034A (en) * 2014-04-30 2014-08-13 南京邮电大学 Privacy protection method of soldier information in field battle environment
CN104579964A (en) * 2013-01-07 2015-04-29 山东量子科学技术研究院有限公司 Dynamic route architecture system for quantum cryptography network
CN105245326A (en) * 2015-09-10 2016-01-13 电子科技大学 Intelligent power grid safety communication method based on combination cipher
CN105357113A (en) * 2015-10-26 2016-02-24 南京邮电大学 Construction method of anonymous communication path based on rerouting
CN105871929A (en) * 2016-06-21 2016-08-17 重庆邮电大学 Wireless sensor network anonymity communication method
CN107172056A (en) * 2017-05-31 2017-09-15 福建中金在线信息科技有限公司 A kind of channel safety determines method, device, system, client and server

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070062632A (en) * 2005-12-13 2007-06-18 (주)스트림온 Mobile message and file security implementation by cryptography
JP2010087610A (en) * 2008-09-29 2010-04-15 Panasonic Corp Data transmitting device, data receiving device, data transmitting and receiving system, data transmitting and receiving method, and data transmitting and receiving program
WO2011153507A2 (en) * 2010-06-04 2011-12-08 Board Of Regents Wireless communication methods, systems, and computer program products
CN102098318A (en) * 2011-03-23 2011-06-15 电子科技大学 Method for performing end-to-end anonymity safety communication of hop network
US20130324165A1 (en) * 2011-06-29 2013-12-05 International Business Machines Corporation Information Communication Terminal and Location Estimation
CN103001875A (en) * 2013-01-07 2013-03-27 山东量子科学技术研究院有限公司 Quantum cryptography network dynamic routing method
CN104579964A (en) * 2013-01-07 2015-04-29 山东量子科学技术研究院有限公司 Dynamic route architecture system for quantum cryptography network
CN103987034A (en) * 2014-04-30 2014-08-13 南京邮电大学 Privacy protection method of soldier information in field battle environment
CN105245326A (en) * 2015-09-10 2016-01-13 电子科技大学 Intelligent power grid safety communication method based on combination cipher
CN105357113A (en) * 2015-10-26 2016-02-24 南京邮电大学 Construction method of anonymous communication path based on rerouting
CN105871929A (en) * 2016-06-21 2016-08-17 重庆邮电大学 Wireless sensor network anonymity communication method
CN107172056A (en) * 2017-05-31 2017-09-15 福建中金在线信息科技有限公司 A kind of channel safety determines method, device, system, client and server

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
XU ZHANG, ZHI-HONG QIAN: "An Efficient Hop Count Routing Protocol for Wireless Ad Hoc Networks", INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 12 March 2015 (2015-03-12) *
李林;刘毅;杨骏;: "无线传感器网络密钥分配方案改进与仿真研究", 计算机仿真, no. 05, 15 May 2011 (2011-05-15) *
杜欣军, 葛建华, 王莹: "一种增强AODV路由协议安全性的方案", 西安电子科技大学学报, no. 06, 25 December 2002 (2002-12-25) *
柯熙政;陈锦妮;: "紫外光无线传感器网络节能的研究与仿真", 激光技术, no. 02, 25 March 2013 (2013-03-25) *
王博;黄传河;杨文忠;王桐;: "一种基于TPM增强的ARAN安全路由协议", 计算机科学, no. 11, 15 November 2010 (2010-11-15) *
王新生;孙链;王丽芹;杨连敏;: "一种ad hoc多路径安全路由算法", 计算机研究与发展, no. 1, 15 January 2008 (2008-01-15) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113507434A (en) * 2021-05-28 2021-10-15 清华大学 Data security transmission method, node and system in communication network

Also Published As

Publication number Publication date
CN108494555B (en) 2024-05-24

Similar Documents

Publication Publication Date Title
US8832441B2 (en) Mobile terminal, data communication method, and computer program
US10826707B2 (en) Privacy preserving tag
CN103797830B (en) For to the system and method for encoding with one group of exchange sharing temporary key data
CN106161359B (en) It authenticates the method and device of user, register the method and device of wearable device
CN110971415A (en) Space-ground integrated space information network anonymous access authentication method and system
CN105101183B (en) The method and system that privacy content on mobile terminal is protected
JP4987939B2 (en) Manual RFID security method according to security mode
CN104683109B (en) RFID Verification Systems and authentication method based on location privacy cloud
CN104145467A (en) Policy for secure packet transmission using required node paths and cryptographic signatures
CN105516103A (en) Method, device and system for binding intelligent household electrical appliances
US10003459B2 (en) Information processing device, wireless communication system, information processing method, and program
US8032753B2 (en) Server and system for transmitting certificate stored in fixed terminal to mobile terminal and method using the same
CN104244237A (en) Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
CN115244896B (en) Trusted service set identifier for identifying wireless networks
CN101895396A (en) Mobile terminal and encryption method thereof
CN105933886A (en) ESIM number writing method, security system, ESIM number server and terminal
CN103988465A (en) Method and apparatus for implementing key stream hierarchy
KR100856408B1 (en) Apparatus and method for transmitting data
CN101917700B (en) Method for using service application and user identification module
CN108494555A (en) Information encryption and decryption method and information encryption, decryption device
CN108476400A (en) The processing method of profile, apparatus and system
CN115868189A (en) Method, vehicle, terminal and system for establishing vehicle safety communication
US9992196B2 (en) Information processing device, wireless communication system, information processing method, and program
KR100655579B1 (en) System and method of location management for providing service based location in mobile
US12082303B2 (en) Method and apparatus for moving profiles with different versions during device change

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220211

Address after: 518000 room 1616, duhuixuan, shijihui Plaza, 3018 Shennan Middle Road, Futian District, Shenzhen, Guangdong Province

Applicant after: Shenzhen Atlian Technology Co.,Ltd.

Address before: 518108 17ef, main building of chegongmiao Lvjing square, Shennan Avenue, Shatoujiao street, Futian District, Shenzhen, Guangdong Province

Applicant before: SHENZHEN HCEN TECHNOLOGY Co.,Ltd.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240422

Address after: 515000 No. 99, Dongfeng 1st Road, Chendian Town, Chaonan District, Shantou City, Guangdong Province

Applicant after: Hong Guishun

Country or region after: China

Address before: 518000 room 1616, duhuixuan, shijihui Plaza, 3018 Shennan Middle Road, Futian District, Shenzhen, Guangdong Province

Applicant before: Shenzhen Atlian Technology Co.,Ltd.

Country or region before: China

GR01 Patent grant
GR01 Patent grant