CN109327306A - A kind of data transmission method and system based on fixed message length - Google Patents

A kind of data transmission method and system based on fixed message length Download PDF

Info

Publication number
CN109327306A
CN109327306A CN201811099243.XA CN201811099243A CN109327306A CN 109327306 A CN109327306 A CN 109327306A CN 201811099243 A CN201811099243 A CN 201811099243A CN 109327306 A CN109327306 A CN 109327306A
Authority
CN
China
Prior art keywords
message
memory
address
encryption
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811099243.XA
Other languages
Chinese (zh)
Inventor
甄庆凯
陈骐
胡齐
刘泳庆
肖书明
田原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINA INSTITUTE OF SPORTS SCIENCE
Original Assignee
CHINA INSTITUTE OF SPORTS SCIENCE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINA INSTITUTE OF SPORTS SCIENCE filed Critical CHINA INSTITUTE OF SPORTS SCIENCE
Priority to CN201811099243.XA priority Critical patent/CN109327306A/en
Publication of CN109327306A publication Critical patent/CN109327306A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The present invention discloses a kind of data transmission method and system based on fixed message length.Data transmission method provided by the invention and system have versatility, and the random process method that need to only change generation code key can generate different code keys.And, since code key addressed memory space of the invention can be set in advance, entire message sends and receives process without other calculating process, it need to only be sent with non-sequential address and non-sequential address receives, therefore, the present invention provides data transmission method and the transmission speed of system is fast, and efficiency of transmission is high.Entire transmission process does not increase additional message length, does not consume more bandwidth, CPU overhead is small.

Description

A kind of data transmission method and system based on fixed message length
Technical field
The present invention relates to field of data transmission, more particularly to a kind of data transmission method based on fixed message length and System.
Background technique
In the communications field, common network message format has TCP/IP/UDP etc., these message formats are fixed.People It usually requires to encrypt data to improve the safety of data in network transmission process.But it is existing it is asymmetric plus Close algorithm needs two keys to be encrypted and decrypted, and since ciphering process needs to generate a large amount of character strings, therefore decrypts speed Relatively slow, polar region affects greatly data transmission efficiency.Therefore, the certain pairs of more demanding local area network of data transmission bauds are answered With the communication system between environment, such as certain Intelligent hardware and PC machine, a kind of data transmission for capableing of quick encrypted transmission is needed Method and system.
Summary of the invention
The object of the present invention is to provide a kind of data transmission method and system based on fixed message length, the data are passed The versatility of transmission method and system is good, and transmission speed is fast, and efficiency of transmission is high.
To achieve the above object, the present invention provides following schemes:
A kind of encryption method based on fixed message length, the encryption method include:
Obtain the message length of clear text and the clear text;
Memory size and matched three memory headrooms of the message length are opened up, and three memory headrooms are distinguished It is denoted as: the first sequence address memory headroom, the first code key addressed memory space and the first data message memory headroom;
It is empty that the address of each bit of the clear text is successively sequentially stored in the first sequence address memory Between;
The address for the clear text upset at random is stored in the first code key addressed memory space;
The clear text is stored in first datagram according to the content of the first sequence address memory headroom Literary memory headroom;
The content of the first data message memory headroom is taken out according to the content in the first code key addressed memory space, Form encryption message data packet.
Optionally, the first sequence address memory headroom, the first code key addressed memory space and first number Memory size according to message memory headroom is the message length of the clear text.
Optionally, it is empty to be stored in the first code key addressed memory for the address of the clear text that will upset at random Between, it specifically includes:
The content in the first sequence address memory headroom is upset at random using random process method, obtain it is described to Encrypt the random address of message;
The random address is stored in the first code key addressed memory space.
A kind of encryption system based on fixed message length, the encryption system include:
Data acquisition module, for obtaining the message length of clear text and the clear text;
Memory opens up module, for opening up memory size and matched three memory headrooms of the message length, and by three A memory headroom is denoted as respectively: the first sequence address memory headroom, the first code key addressed memory space and the first datagram Literary memory headroom;
Sequence address memory module, for the address of each bit of the clear text to be successively sequentially stored in institute State the first sequence address memory headroom;
Code key address memory module, for the address for the clear text upset at random to be stored in first code key Addressed memory space;
Packet storage module, for being deposited the clear text according to the content of the first sequence address memory headroom Enter the first data message memory headroom;
Encrypting module, for being taken out in first data message according to the content in the first code key addressed memory space The content in space is deposited, encryption message data packet is formed.
A kind of decryption method based on fixed message length, the decryption method is for decrypting according to the encryption method The encryption message data packet of acquisition, the decryption method include:
Obtain the message length of encryption message data packet;
Memory size and matched three memory headrooms of the message length are opened up, and three memory headrooms are distinguished It is denoted as: the second sequence address memory headroom, the second code key addressed memory space and the second data message memory headroom;
The address of each bit of the corresponding former message data of the encryption message data packet is successively sequentially stored in institute State the second sequence address memory headroom;
The address for the former message data upset at random is stored in the second code key addressed memory space, wherein with Upset clear text at random in the random process method and ciphering process that the address that machine upsets the former message data uses The random process method that address uses is identical;
Receive the encryption message data packet, and according to the content in the second code key addressed memory space by the encryption Message data packet is stored in the second data message memory headroom;
The content of the second data message memory headroom is taken out according to the content of the second sequence address memory headroom, Form decryption message data packet.
Optionally, it is empty to be stored in the second code key addressed memory for the address of the former message data that will upset at random Between, it specifically includes:
The content in the second sequence address memory headroom is upset at random using the random process method, obtains institute State the random address of message to be decrypted;
The random address is stored in the second code key addressed memory space.
Optionally, the second sequence address memory headroom, the second code key addressed memory space and second number Memory size according to message memory headroom is the message length of the encryption message data packet.
A kind of decryption system based on fixed message length, the decryption system is for decrypting according to the encryption method The encryption message data packet of acquisition, the decryption system include:
Message length obtains module, for obtaining the message length of encryption message data packet;
Decryption memory opens up module, for opening up memory size and matched three memory headrooms of the message length, and Three memory headrooms are denoted as respectively: the second sequence address memory headroom, the second code key addressed memory space and the second number According to message memory headroom;
Sequence address memory module is decrypted, for by each ratio of the corresponding former message data of the encryption message data packet The address of special position is successively sequentially stored in the second sequence address memory headroom;
Secret code key address memory module, for the address for the former message data upset at random to be stored in described second Code key addressed memory space, wherein upset at random random process method that the address of the former message data uses with it is encrypted The random process method for upsetting the address use of clear text in journey at random is identical;
Packet storage module is decrypted, for receiving the encryption message data packet, and according in second code key address The encryption message data packet is stored in the second data message memory headroom by the content for depositing space;
Deciphering module, for being taken out in second data message according to the content of the second sequence address memory headroom The content in space is deposited, decryption message data packet is formed.
A kind of data transmission method based on fixed message length, the data transmission method include:
Transmitting terminal obtains message to be transmitted;
Transmitting terminal, to the message encryption to be transmitted, obtains encryption message data packet using the encryption method, and will The encryption message data packet is sent to receiving end;
Receiving end is decrypted the encryption message data packet using the decryption method, obtains decryption message data Packet.
A kind of data transmission system based on fixed message length, the data transmission system includes transmitting terminal and reception End, wherein
The transmitting terminal adds the message to be transmitted for obtaining message to be transmitted, and using the encryption method It is close, encryption message data packet is obtained, and the encryption message data packet is sent to receiving end;
The receiving end is used to that the encryption message data packet to be decrypted using the decryption method, is decrypted Message data packet.
The specific embodiment provided according to the present invention, the invention discloses following technical effects:
Data transmission method provided by the invention and system have versatility, need to only change the random process side for generating code key Method can generate different code keys.Moreover, because code key addressed memory space of the invention can be set in advance, it is entire to report Text sends and receives process without other calculating process, need to only be sent with non-sequential address and non-sequential address receives, therefore, The present invention provides data transmission method and the transmission speed of system is fast, and efficiency of transmission is high.Entire transmission process does not increase additionally Message length, do not consume more bandwidth, CPU overhead is small.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is a kind of flow chart of encryption method based on fixed message length provided in an embodiment of the present invention;
Fig. 2 is a kind of structural block diagram of encryption system based on fixed message length provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of decryption method based on fixed message length provided in an embodiment of the present invention;
Fig. 4 is a kind of structural block diagram of decryption system based on fixed message length provided in an embodiment of the present invention;
Fig. 5 is a kind of flow chart of data transmission method based on fixed message length provided in an embodiment of the present invention;
Fig. 6 is a kind of structural block diagram of data transmission system based on fixed message length provided in an embodiment of the present invention;
Fig. 7 is the data read-write operation schematic diagram in ciphering process provided in an embodiment of the present invention;
Fig. 8 is the data read-write operation schematic diagram in decrypting process provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The object of the present invention is to provide a kind of data transmission method and system based on fixed message length, the data are passed The versatility of transmission method and system is good, and transmission speed is fast, and efficiency of transmission is high.
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real Applying mode, the present invention is described in further detail.
Fig. 1 is a kind of flow chart of encryption method based on fixed message length provided in an embodiment of the present invention.Such as Fig. 1 institute Show, a kind of encryption method based on fixed message length, the encryption method includes:
Step 101: obtaining the message length of clear text and the clear text.
Step 102: opening up memory size and matched three memory headrooms of the message length, and by three memories Space is denoted as respectively: the first sequence address memory headroom, the first code key addressed memory space and the first data message memory headroom. In the present embodiment, the first sequence address memory headroom, the first code key addressed memory space and first datagram The memory size of literary memory headroom is the message length of the clear text.
Step 103: the address of each bit of the clear text is successively sequentially stored in described first sequentially Location memory headroom.In the present embodiment, the content of the first sequence address memory headroom is the message length with clear text Identical ordinal number.
Step 104: the address for the clear text upset at random is stored in the first code key addressed memory space.
The step 104: the address for the clear text upset at random is stored in the first code key addressed memory Space specifically includes:
The content in the first sequence address memory headroom is upset at random using random process method, obtain it is described to Encrypt the random address of message;
The random address is stored in the first code key addressed memory space.
Step 105: according to the content of the first sequence address memory headroom by clear text deposit described the One data message memory headroom.
Step 106: it is empty that the first data message memory being taken out according to the content in the first code key addressed memory space Between content, formed encryption message data packet.
Fig. 2 is a kind of structural block diagram of encryption system based on fixed message length provided in an embodiment of the present invention.Such as Fig. 2 Shown, a kind of based on the encryption system for fixing message length, the encryption system includes:
Data acquisition module 201, for obtaining the message length of clear text and the clear text;
Memory opens up module 202, for opening up memory size and matched three memory headrooms of the message length, and will Three memory headrooms are denoted as respectively: the first sequence address memory headroom, the first code key addressed memory space and the first data Message memory headroom;
Sequence address memory module 203, for successively sequentially depositing the address of each bit of the clear text Enter the first sequence address memory headroom;
Code key address memory module 204, for the address for the clear text upset at random to be stored in described first Code key addressed memory space;
Packet storage module 205, for according to the content of the first sequence address memory headroom by the secret report to be added Text is stored in the first data message memory headroom;
Encrypting module 206, for taking out first datagram according to the content in the first code key addressed memory space The content of literary memory headroom forms encryption message data packet.
Fig. 3 is a kind of flow chart of decryption method based on fixed message length provided in an embodiment of the present invention.Such as Fig. 3 institute Show, a kind of decryption method based on fixed message length, the decryption method is used to decrypt according to the encryption method acquisition Encryption message data packet, the decryption method includes:
Step 301: obtaining the message length of encryption message data packet.
Step 302: opening up memory size and matched three memory headrooms of the message length, and by three memories Space is denoted as respectively: the second sequence address memory headroom, the second code key addressed memory space and the second data message memory headroom. The second sequence address memory headroom, the second code key addressed memory space and the second data message memory headroom Memory size is the message length of the encryption message data packet.
Step 303: the address of each bit of the corresponding former message data of the encryption message data packet is successively suitable Sequence is stored in the second sequence address memory headroom.
Step 304: the address for the former message data upset at random is stored in the second code key addressed memory space, Wherein, upset at random random process method that the address of the former message data uses with upset at random in ciphering process it is to be encrypted The random process method that the address of message uses is identical.
Specifically, the step 304: with being stored in second code key by the address for the former message data upset at random Location memory headroom, specifically includes:
The content in the second sequence address memory headroom is upset at random using the random process method, obtains institute State the random address of message to be decrypted;
The random address is stored in the second code key addressed memory space.
Step 305: receiving the encryption message data packet, and will according to the content in the second code key addressed memory space The encryption message data packet is stored in the second data message memory headroom;
Step 306: it is empty that the second data message memory being taken out according to the content of the second sequence address memory headroom Between content, formed decryption message data packet.
Fig. 4 is a kind of structural block diagram of decryption system based on fixed message length provided in an embodiment of the present invention.Such as Fig. 4 Shown, a kind of decryption system based on fixed message length, the decryption system is used to decrypt what the encryption method obtained Message data packet is encrypted, the decryption system includes:
Message length obtains module 401, for obtaining the message length of encryption message data packet;
Decryption memory opens up module 402, for opening up memory size and matched three memory headrooms of the message length, And three memory headrooms are denoted as respectively: the second sequence address memory headroom, the second code key addressed memory space and second Data message memory headroom;
Sequence address memory module 403 is decrypted, for encrypting each of the corresponding former message data of message data packet for described The address of a bit is successively sequentially stored in the second sequence address memory headroom;
Secret code key address memory module 404, described in the address deposit for the former message data that will upset at random Second code key addressed memory space, wherein upset the random process method of the address use of the former message data at random and add The random process method for upsetting the address use of clear text during close at random is identical;
Packet storage module 405 is decrypted, for receiving the encryption message data packet, and according to second code key address The encryption message data packet is stored in the second data message memory headroom by the content of memory headroom;
Deciphering module 406, for taking out second datagram according to the content of the second sequence address memory headroom The content of literary memory headroom forms decryption message data packet.
Fig. 5 is a kind of flow chart of data transmission method based on fixed message length provided in an embodiment of the present invention.Such as Shown in Fig. 5, a kind of based on the data transmission method for fixing message length, the data transmission method includes:
Step 501: transmitting terminal obtains message to be transmitted, and is added using the encryption method to the message to be transmitted It is close, encryption message data packet is obtained, and the encryption message data packet is sent to receiving end.
Step 502: receiving end is decrypted the encryption message data packet using the decryption method, is decrypted Message data packet.
Fig. 6 is a kind of structural block diagram of data transmission system based on fixed message length provided in an embodiment of the present invention. As shown in fig. 6, a kind of data transmission system based on fixed message length, the data transmission system includes 601 He of transmitting terminal Receiving end 602, wherein
The transmitting terminal 601 uses the encryption method to the message to be transmitted for obtaining message to be transmitted Encryption obtains encryption message data packet, and the encryption message data packet is sent to receiving end.Data in ciphering process are read Write operation is as shown in Figure 7.
The receiving end 602 is used to that the encryption message data packet to be decrypted using the decryption method, obtains Decrypt message data packet.Data read-write operation in ciphering process is as shown in Figure 8.
Data transmission method provided by the invention and system, " random algorithm " that need to only change generation code key can generate Different code keys, versatility are good.Meanwhile because code key addressed memory space is pre-set, the transmission of entire message and Receive process are not necessarily to other calculating process, are only sent with non-sequential address and non-sequential address receives, data transmission efficiency is high. The present invention according to fixed message length opens up the memory headroom of the length scale to make code key in a computer, transmitting terminal and Receiving end is encrypted using the same cipher key pair information, is decrypted.It, only will be secret because of encryption and decryption processes all fours Key address and sequence address are used interchangeably, and whole process does not increase additional message length, do not consume more bandwidth, mistake Journey is simple, and CPU overhead is small.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For system disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part It is bright.
Used herein a specific example illustrates the principle and implementation of the invention, and above embodiments are said It is bright to be merely used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, foundation Thought of the invention, there will be changes in the specific implementation manner and application range.In conclusion the content of the present specification is not It is interpreted as limitation of the present invention.

Claims (10)

1. a kind of encryption method based on fixed message length, which is characterized in that the encryption method includes:
Obtain the message length of clear text and the clear text;
Memory size and matched three memory headrooms of the message length are opened up, and three memory headrooms are remembered respectively Are as follows: the first sequence address memory headroom, the first code key addressed memory space and the first data message memory headroom;
The address of each bit of the clear text is successively sequentially stored in the first sequence address memory headroom;
The address for the clear text upset at random is stored in the first code key addressed memory space;
The clear text is stored in first data message according to the content of the first sequence address memory headroom Deposit space;
The content of the first data message memory headroom is taken out according to the content in the first code key addressed memory space, is formed Encrypt message data packet.
2. encryption method according to claim 1, which is characterized in that the first sequence address memory headroom, described The memory size of one code key addressed memory space and the first data message memory headroom is the report of the clear text Literary length.
3. encryption method according to claim 1, which is characterized in that the clear text that will upset at random Address is stored in the first code key addressed memory space, specifically includes:
The content in the first sequence address memory headroom is upset at random using random process method, is obtained described to be encrypted The random address of message;
The random address is stored in the first code key addressed memory space.
4. a kind of encryption system based on fixed message length, which is characterized in that the encryption system includes:
Data acquisition module, for obtaining the message length of clear text and the clear text;
Memory opens up module, for opening up memory size and matched three memory headrooms of the message length, and by three institutes It states memory headroom to be denoted as respectively: in the first sequence address memory headroom, the first code key addressed memory space and the first data message Deposit space;
Sequence address memory module, for the address of each bit of the clear text to be successively sequentially stored in described One sequence address memory headroom;
Code key address memory module, for the address for the clear text upset at random to be stored in first code key address Memory headroom;
Packet storage module, for the clear text to be stored in institute according to the content of the first sequence address memory headroom State the first data message memory headroom;
Encrypting module, it is empty for taking out the first data message memory according to the content in the first code key addressed memory space Between content, formed encryption message data packet.
5. a kind of decryption method based on fixed message length, which is characterized in that the decryption method is for decrypting according to right It is required that the encryption message data packet that the described in any item encryption methods of 1-3 obtain, the decryption method include:
Obtain the message length of encryption message data packet;
Memory size and matched three memory headrooms of the message length are opened up, and three memory headrooms are remembered respectively Are as follows: the second sequence address memory headroom, the second code key addressed memory space and the second data message memory headroom;
The address of each bit of the corresponding former message data of the encryption message data packet is successively sequentially stored in described the Two sequence address memory headrooms;
The address for the former message data upset at random is stored in the second code key addressed memory space, wherein beat at random Upset the address of clear text in the random process method and ciphering process that disorderly the address of the former message data uses at random The random process method of use is identical;
Receive the encryption message data packet, and according to the content in the second code key addressed memory space by the encryption message Data packet is stored in the second data message memory headroom;
The content of the second data message memory headroom is taken out according to the content of the second sequence address memory headroom, is formed Decrypt message data packet.
6. decryption method according to claim 5, which is characterized in that the former message data that will upset at random Address is stored in the second code key addressed memory space, specifically includes:
The content in the second sequence address memory headroom is upset at random using the random process method, obtain it is described to Decrypt the random address of message;
The random address is stored in the second code key addressed memory space.
7. decryption method according to claim 5, which is characterized in that the second sequence address memory headroom, described The memory size of two code key addressed memory spaces and the second data message memory headroom is the encryption message data packet Message length.
8. a kind of decryption system based on fixed message length, which is characterized in that the decryption system is for decrypting according to right It is required that the encryption message data packet that the described in any item encryption methods of 1-3 obtain, the decryption system include:
Message length obtains module, for obtaining the message length of encryption message data packet;
Decryption memory opens up module, for opening up memory size and matched three memory headrooms of the message length, and by three A memory headroom is denoted as respectively: the second sequence address memory headroom, the second code key addressed memory space and the second datagram Literary memory headroom;
Sequence address memory module is decrypted, for by each bit of the corresponding former message data of the encryption message data packet Address be successively sequentially stored in the second sequence address memory headroom;
Secret code key address memory module, for the address for the former message data upset at random to be stored in second code key Addressed memory space, wherein in the random process method and ciphering process for upsetting the address use of the former message data at random The random process method for upsetting the address use of clear text at random is identical;
Packet storage module is decrypted, for receiving the encryption message data packet, and it is empty according to the second code key addressed memory Between content the encryption message data packet is stored in the second data message memory headroom;
Deciphering module, it is empty for taking out the second data message memory according to the content of the second sequence address memory headroom Between content, formed decryption message data packet.
9. a kind of data transmission method based on fixed message length, which is characterized in that the data transmission method includes:
Transmitting terminal obtains message to be transmitted;
Transmitting terminal, to the message encryption to be transmitted, obtains encryption report using the described in any item encryption methods of claim 1-3 Literary data packet, and the encryption message data packet is sent to receiving end;
Receiving end is decrypted the encryption message data packet using the described in any item decryption methods of claim 5-7, obtains Message data packet must be decrypted.
10. a kind of data transmission system based on fixed message length, which is characterized in that the data transmission system includes sending End and receiving end, wherein
The transmitting terminal uses the described in any item encryption methods of claim 1-3 to described for obtaining message to be transmitted Message encryption to be transmitted obtains encryption message data packet, and the encryption message data packet is sent to receiving end;
The receiving end is used to carry out the encryption message data packet using the described in any item decryption methods of claim 5-7 Decryption obtains decryption message data packet.
CN201811099243.XA 2018-09-20 2018-09-20 A kind of data transmission method and system based on fixed message length Pending CN109327306A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811099243.XA CN109327306A (en) 2018-09-20 2018-09-20 A kind of data transmission method and system based on fixed message length

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811099243.XA CN109327306A (en) 2018-09-20 2018-09-20 A kind of data transmission method and system based on fixed message length

Publications (1)

Publication Number Publication Date
CN109327306A true CN109327306A (en) 2019-02-12

Family

ID=65265082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811099243.XA Pending CN109327306A (en) 2018-09-20 2018-09-20 A kind of data transmission method and system based on fixed message length

Country Status (1)

Country Link
CN (1) CN109327306A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1331548A (en) * 2000-06-26 2002-01-16 张培忠 Symmetric TV image encryption/decryption device by line disturbance in whole frame
CN101587723A (en) * 2008-05-19 2009-11-25 中盾信安科技(北京)有限公司 A kind of anti-copy optical storage medium and manufacture method thereof
CN102647251A (en) * 2012-03-26 2012-08-22 北京星网锐捷网络技术有限公司 Data transmission method and system, sending terminal equipment as well as receiving terminal equipment
CN106991314A (en) * 2016-01-20 2017-07-28 阿里巴巴集团控股有限公司 A kind of date storage method and device
CN107332839A (en) * 2017-06-28 2017-11-07 杭州迪普科技股份有限公司 A kind of message transmitting method and device
CN107592200A (en) * 2016-07-08 2018-01-16 展讯通信(上海)有限公司 Data encryption, the method and device of decryption
CN107979600A (en) * 2017-11-29 2018-05-01 山东超越数控电子股份有限公司 One kind divides field encryption interchanger and its method of work

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1331548A (en) * 2000-06-26 2002-01-16 张培忠 Symmetric TV image encryption/decryption device by line disturbance in whole frame
CN101587723A (en) * 2008-05-19 2009-11-25 中盾信安科技(北京)有限公司 A kind of anti-copy optical storage medium and manufacture method thereof
CN102647251A (en) * 2012-03-26 2012-08-22 北京星网锐捷网络技术有限公司 Data transmission method and system, sending terminal equipment as well as receiving terminal equipment
CN106991314A (en) * 2016-01-20 2017-07-28 阿里巴巴集团控股有限公司 A kind of date storage method and device
CN107592200A (en) * 2016-07-08 2018-01-16 展讯通信(上海)有限公司 Data encryption, the method and device of decryption
CN107332839A (en) * 2017-06-28 2017-11-07 杭州迪普科技股份有限公司 A kind of message transmitting method and device
CN107979600A (en) * 2017-11-29 2018-05-01 山东超越数控电子股份有限公司 One kind divides field encryption interchanger and its method of work

Similar Documents

Publication Publication Date Title
US9246674B2 (en) Generation of cryptographic keys
US6289451B1 (en) System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection
CN107040369A (en) Data transmission method, apparatus and system
CN107483192B (en) Data transmission method and device based on quantum communication
MXPA06009235A (en) Method and apparatus for cryptographically processing data.
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN103248476B (en) The management method of data encryption key, system and terminal
US7925009B2 (en) Hybrid data encryption
CN112187448B (en) Data encryption method and system
CN106209356A (en) The privacy control method remotely controlled for Internet of Things and system
JP2009253650A (en) Transmission and reception system, transmission device, reception device, authentication device, user device, method executed by those, and program
CN109194701B (en) Data processing method and device
CN105208028A (en) Data transmission method and related device and equipment
CN102088352B (en) Data encryption transmission method and system for message-oriented middleware
CN110535641A (en) Key management method and device, computer equipment and storage medium
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN103152362A (en) Cloud-computing-based encrypted transmission method for large data files
Latif et al. A review on key management and lightweight cryptography for IoT
CN107534558A (en) For the method and data highway system of the information security for protecting the data via data bus transmission
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
CN103346878A (en) Secret communication method based on FPGA high-speed serial IO
Olumide et al. A hybrid encryption model for secure cloud computing
CN107493281A (en) encryption communication method and device
CN106656463A (en) Fixed-secret-key symmetric white box password encryption method, device and equipment
CN113746642B (en) Method and system for communication between computers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190212