CN109327306A - A kind of data transmission method and system based on fixed message length - Google Patents
A kind of data transmission method and system based on fixed message length Download PDFInfo
- Publication number
- CN109327306A CN109327306A CN201811099243.XA CN201811099243A CN109327306A CN 109327306 A CN109327306 A CN 109327306A CN 201811099243 A CN201811099243 A CN 201811099243A CN 109327306 A CN109327306 A CN 109327306A
- Authority
- CN
- China
- Prior art keywords
- message
- memory
- address
- encryption
- random
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Abstract
The present invention discloses a kind of data transmission method and system based on fixed message length.Data transmission method provided by the invention and system have versatility, and the random process method that need to only change generation code key can generate different code keys.And, since code key addressed memory space of the invention can be set in advance, entire message sends and receives process without other calculating process, it need to only be sent with non-sequential address and non-sequential address receives, therefore, the present invention provides data transmission method and the transmission speed of system is fast, and efficiency of transmission is high.Entire transmission process does not increase additional message length, does not consume more bandwidth, CPU overhead is small.
Description
Technical field
The present invention relates to field of data transmission, more particularly to a kind of data transmission method based on fixed message length and
System.
Background technique
In the communications field, common network message format has TCP/IP/UDP etc., these message formats are fixed.People
It usually requires to encrypt data to improve the safety of data in network transmission process.But it is existing it is asymmetric plus
Close algorithm needs two keys to be encrypted and decrypted, and since ciphering process needs to generate a large amount of character strings, therefore decrypts speed
Relatively slow, polar region affects greatly data transmission efficiency.Therefore, the certain pairs of more demanding local area network of data transmission bauds are answered
With the communication system between environment, such as certain Intelligent hardware and PC machine, a kind of data transmission for capableing of quick encrypted transmission is needed
Method and system.
Summary of the invention
The object of the present invention is to provide a kind of data transmission method and system based on fixed message length, the data are passed
The versatility of transmission method and system is good, and transmission speed is fast, and efficiency of transmission is high.
To achieve the above object, the present invention provides following schemes:
A kind of encryption method based on fixed message length, the encryption method include:
Obtain the message length of clear text and the clear text;
Memory size and matched three memory headrooms of the message length are opened up, and three memory headrooms are distinguished
It is denoted as: the first sequence address memory headroom, the first code key addressed memory space and the first data message memory headroom;
It is empty that the address of each bit of the clear text is successively sequentially stored in the first sequence address memory
Between;
The address for the clear text upset at random is stored in the first code key addressed memory space;
The clear text is stored in first datagram according to the content of the first sequence address memory headroom
Literary memory headroom;
The content of the first data message memory headroom is taken out according to the content in the first code key addressed memory space,
Form encryption message data packet.
Optionally, the first sequence address memory headroom, the first code key addressed memory space and first number
Memory size according to message memory headroom is the message length of the clear text.
Optionally, it is empty to be stored in the first code key addressed memory for the address of the clear text that will upset at random
Between, it specifically includes:
The content in the first sequence address memory headroom is upset at random using random process method, obtain it is described to
Encrypt the random address of message;
The random address is stored in the first code key addressed memory space.
A kind of encryption system based on fixed message length, the encryption system include:
Data acquisition module, for obtaining the message length of clear text and the clear text;
Memory opens up module, for opening up memory size and matched three memory headrooms of the message length, and by three
A memory headroom is denoted as respectively: the first sequence address memory headroom, the first code key addressed memory space and the first datagram
Literary memory headroom;
Sequence address memory module, for the address of each bit of the clear text to be successively sequentially stored in institute
State the first sequence address memory headroom;
Code key address memory module, for the address for the clear text upset at random to be stored in first code key
Addressed memory space;
Packet storage module, for being deposited the clear text according to the content of the first sequence address memory headroom
Enter the first data message memory headroom;
Encrypting module, for being taken out in first data message according to the content in the first code key addressed memory space
The content in space is deposited, encryption message data packet is formed.
A kind of decryption method based on fixed message length, the decryption method is for decrypting according to the encryption method
The encryption message data packet of acquisition, the decryption method include:
Obtain the message length of encryption message data packet;
Memory size and matched three memory headrooms of the message length are opened up, and three memory headrooms are distinguished
It is denoted as: the second sequence address memory headroom, the second code key addressed memory space and the second data message memory headroom;
The address of each bit of the corresponding former message data of the encryption message data packet is successively sequentially stored in institute
State the second sequence address memory headroom;
The address for the former message data upset at random is stored in the second code key addressed memory space, wherein with
Upset clear text at random in the random process method and ciphering process that the address that machine upsets the former message data uses
The random process method that address uses is identical;
Receive the encryption message data packet, and according to the content in the second code key addressed memory space by the encryption
Message data packet is stored in the second data message memory headroom;
The content of the second data message memory headroom is taken out according to the content of the second sequence address memory headroom,
Form decryption message data packet.
Optionally, it is empty to be stored in the second code key addressed memory for the address of the former message data that will upset at random
Between, it specifically includes:
The content in the second sequence address memory headroom is upset at random using the random process method, obtains institute
State the random address of message to be decrypted;
The random address is stored in the second code key addressed memory space.
Optionally, the second sequence address memory headroom, the second code key addressed memory space and second number
Memory size according to message memory headroom is the message length of the encryption message data packet.
A kind of decryption system based on fixed message length, the decryption system is for decrypting according to the encryption method
The encryption message data packet of acquisition, the decryption system include:
Message length obtains module, for obtaining the message length of encryption message data packet;
Decryption memory opens up module, for opening up memory size and matched three memory headrooms of the message length, and
Three memory headrooms are denoted as respectively: the second sequence address memory headroom, the second code key addressed memory space and the second number
According to message memory headroom;
Sequence address memory module is decrypted, for by each ratio of the corresponding former message data of the encryption message data packet
The address of special position is successively sequentially stored in the second sequence address memory headroom;
Secret code key address memory module, for the address for the former message data upset at random to be stored in described second
Code key addressed memory space, wherein upset at random random process method that the address of the former message data uses with it is encrypted
The random process method for upsetting the address use of clear text in journey at random is identical;
Packet storage module is decrypted, for receiving the encryption message data packet, and according in second code key address
The encryption message data packet is stored in the second data message memory headroom by the content for depositing space;
Deciphering module, for being taken out in second data message according to the content of the second sequence address memory headroom
The content in space is deposited, decryption message data packet is formed.
A kind of data transmission method based on fixed message length, the data transmission method include:
Transmitting terminal obtains message to be transmitted;
Transmitting terminal, to the message encryption to be transmitted, obtains encryption message data packet using the encryption method, and will
The encryption message data packet is sent to receiving end;
Receiving end is decrypted the encryption message data packet using the decryption method, obtains decryption message data
Packet.
A kind of data transmission system based on fixed message length, the data transmission system includes transmitting terminal and reception
End, wherein
The transmitting terminal adds the message to be transmitted for obtaining message to be transmitted, and using the encryption method
It is close, encryption message data packet is obtained, and the encryption message data packet is sent to receiving end;
The receiving end is used to that the encryption message data packet to be decrypted using the decryption method, is decrypted
Message data packet.
The specific embodiment provided according to the present invention, the invention discloses following technical effects:
Data transmission method provided by the invention and system have versatility, need to only change the random process side for generating code key
Method can generate different code keys.Moreover, because code key addressed memory space of the invention can be set in advance, it is entire to report
Text sends and receives process without other calculating process, need to only be sent with non-sequential address and non-sequential address receives, therefore,
The present invention provides data transmission method and the transmission speed of system is fast, and efficiency of transmission is high.Entire transmission process does not increase additionally
Message length, do not consume more bandwidth, CPU overhead is small.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is a kind of flow chart of encryption method based on fixed message length provided in an embodiment of the present invention;
Fig. 2 is a kind of structural block diagram of encryption system based on fixed message length provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of decryption method based on fixed message length provided in an embodiment of the present invention;
Fig. 4 is a kind of structural block diagram of decryption system based on fixed message length provided in an embodiment of the present invention;
Fig. 5 is a kind of flow chart of data transmission method based on fixed message length provided in an embodiment of the present invention;
Fig. 6 is a kind of structural block diagram of data transmission system based on fixed message length provided in an embodiment of the present invention;
Fig. 7 is the data read-write operation schematic diagram in ciphering process provided in an embodiment of the present invention;
Fig. 8 is the data read-write operation schematic diagram in decrypting process provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The object of the present invention is to provide a kind of data transmission method and system based on fixed message length, the data are passed
The versatility of transmission method and system is good, and transmission speed is fast, and efficiency of transmission is high.
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real
Applying mode, the present invention is described in further detail.
Fig. 1 is a kind of flow chart of encryption method based on fixed message length provided in an embodiment of the present invention.Such as Fig. 1 institute
Show, a kind of encryption method based on fixed message length, the encryption method includes:
Step 101: obtaining the message length of clear text and the clear text.
Step 102: opening up memory size and matched three memory headrooms of the message length, and by three memories
Space is denoted as respectively: the first sequence address memory headroom, the first code key addressed memory space and the first data message memory headroom.
In the present embodiment, the first sequence address memory headroom, the first code key addressed memory space and first datagram
The memory size of literary memory headroom is the message length of the clear text.
Step 103: the address of each bit of the clear text is successively sequentially stored in described first sequentially
Location memory headroom.In the present embodiment, the content of the first sequence address memory headroom is the message length with clear text
Identical ordinal number.
Step 104: the address for the clear text upset at random is stored in the first code key addressed memory space.
The step 104: the address for the clear text upset at random is stored in the first code key addressed memory
Space specifically includes:
The content in the first sequence address memory headroom is upset at random using random process method, obtain it is described to
Encrypt the random address of message;
The random address is stored in the first code key addressed memory space.
Step 105: according to the content of the first sequence address memory headroom by clear text deposit described the
One data message memory headroom.
Step 106: it is empty that the first data message memory being taken out according to the content in the first code key addressed memory space
Between content, formed encryption message data packet.
Fig. 2 is a kind of structural block diagram of encryption system based on fixed message length provided in an embodiment of the present invention.Such as Fig. 2
Shown, a kind of based on the encryption system for fixing message length, the encryption system includes:
Data acquisition module 201, for obtaining the message length of clear text and the clear text;
Memory opens up module 202, for opening up memory size and matched three memory headrooms of the message length, and will
Three memory headrooms are denoted as respectively: the first sequence address memory headroom, the first code key addressed memory space and the first data
Message memory headroom;
Sequence address memory module 203, for successively sequentially depositing the address of each bit of the clear text
Enter the first sequence address memory headroom;
Code key address memory module 204, for the address for the clear text upset at random to be stored in described first
Code key addressed memory space;
Packet storage module 205, for according to the content of the first sequence address memory headroom by the secret report to be added
Text is stored in the first data message memory headroom;
Encrypting module 206, for taking out first datagram according to the content in the first code key addressed memory space
The content of literary memory headroom forms encryption message data packet.
Fig. 3 is a kind of flow chart of decryption method based on fixed message length provided in an embodiment of the present invention.Such as Fig. 3 institute
Show, a kind of decryption method based on fixed message length, the decryption method is used to decrypt according to the encryption method acquisition
Encryption message data packet, the decryption method includes:
Step 301: obtaining the message length of encryption message data packet.
Step 302: opening up memory size and matched three memory headrooms of the message length, and by three memories
Space is denoted as respectively: the second sequence address memory headroom, the second code key addressed memory space and the second data message memory headroom.
The second sequence address memory headroom, the second code key addressed memory space and the second data message memory headroom
Memory size is the message length of the encryption message data packet.
Step 303: the address of each bit of the corresponding former message data of the encryption message data packet is successively suitable
Sequence is stored in the second sequence address memory headroom.
Step 304: the address for the former message data upset at random is stored in the second code key addressed memory space,
Wherein, upset at random random process method that the address of the former message data uses with upset at random in ciphering process it is to be encrypted
The random process method that the address of message uses is identical.
Specifically, the step 304: with being stored in second code key by the address for the former message data upset at random
Location memory headroom, specifically includes:
The content in the second sequence address memory headroom is upset at random using the random process method, obtains institute
State the random address of message to be decrypted;
The random address is stored in the second code key addressed memory space.
Step 305: receiving the encryption message data packet, and will according to the content in the second code key addressed memory space
The encryption message data packet is stored in the second data message memory headroom;
Step 306: it is empty that the second data message memory being taken out according to the content of the second sequence address memory headroom
Between content, formed decryption message data packet.
Fig. 4 is a kind of structural block diagram of decryption system based on fixed message length provided in an embodiment of the present invention.Such as Fig. 4
Shown, a kind of decryption system based on fixed message length, the decryption system is used to decrypt what the encryption method obtained
Message data packet is encrypted, the decryption system includes:
Message length obtains module 401, for obtaining the message length of encryption message data packet;
Decryption memory opens up module 402, for opening up memory size and matched three memory headrooms of the message length,
And three memory headrooms are denoted as respectively: the second sequence address memory headroom, the second code key addressed memory space and second
Data message memory headroom;
Sequence address memory module 403 is decrypted, for encrypting each of the corresponding former message data of message data packet for described
The address of a bit is successively sequentially stored in the second sequence address memory headroom;
Secret code key address memory module 404, described in the address deposit for the former message data that will upset at random
Second code key addressed memory space, wherein upset the random process method of the address use of the former message data at random and add
The random process method for upsetting the address use of clear text during close at random is identical;
Packet storage module 405 is decrypted, for receiving the encryption message data packet, and according to second code key address
The encryption message data packet is stored in the second data message memory headroom by the content of memory headroom;
Deciphering module 406, for taking out second datagram according to the content of the second sequence address memory headroom
The content of literary memory headroom forms decryption message data packet.
Fig. 5 is a kind of flow chart of data transmission method based on fixed message length provided in an embodiment of the present invention.Such as
Shown in Fig. 5, a kind of based on the data transmission method for fixing message length, the data transmission method includes:
Step 501: transmitting terminal obtains message to be transmitted, and is added using the encryption method to the message to be transmitted
It is close, encryption message data packet is obtained, and the encryption message data packet is sent to receiving end.
Step 502: receiving end is decrypted the encryption message data packet using the decryption method, is decrypted
Message data packet.
Fig. 6 is a kind of structural block diagram of data transmission system based on fixed message length provided in an embodiment of the present invention.
As shown in fig. 6, a kind of data transmission system based on fixed message length, the data transmission system includes 601 He of transmitting terminal
Receiving end 602, wherein
The transmitting terminal 601 uses the encryption method to the message to be transmitted for obtaining message to be transmitted
Encryption obtains encryption message data packet, and the encryption message data packet is sent to receiving end.Data in ciphering process are read
Write operation is as shown in Figure 7.
The receiving end 602 is used to that the encryption message data packet to be decrypted using the decryption method, obtains
Decrypt message data packet.Data read-write operation in ciphering process is as shown in Figure 8.
Data transmission method provided by the invention and system, " random algorithm " that need to only change generation code key can generate
Different code keys, versatility are good.Meanwhile because code key addressed memory space is pre-set, the transmission of entire message and
Receive process are not necessarily to other calculating process, are only sent with non-sequential address and non-sequential address receives, data transmission efficiency is high.
The present invention according to fixed message length opens up the memory headroom of the length scale to make code key in a computer, transmitting terminal and
Receiving end is encrypted using the same cipher key pair information, is decrypted.It, only will be secret because of encryption and decryption processes all fours
Key address and sequence address are used interchangeably, and whole process does not increase additional message length, do not consume more bandwidth, mistake
Journey is simple, and CPU overhead is small.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other
The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For system disclosed in embodiment
For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part
It is bright.
Used herein a specific example illustrates the principle and implementation of the invention, and above embodiments are said
It is bright to be merely used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, foundation
Thought of the invention, there will be changes in the specific implementation manner and application range.In conclusion the content of the present specification is not
It is interpreted as limitation of the present invention.
Claims (10)
1. a kind of encryption method based on fixed message length, which is characterized in that the encryption method includes:
Obtain the message length of clear text and the clear text;
Memory size and matched three memory headrooms of the message length are opened up, and three memory headrooms are remembered respectively
Are as follows: the first sequence address memory headroom, the first code key addressed memory space and the first data message memory headroom;
The address of each bit of the clear text is successively sequentially stored in the first sequence address memory headroom;
The address for the clear text upset at random is stored in the first code key addressed memory space;
The clear text is stored in first data message according to the content of the first sequence address memory headroom
Deposit space;
The content of the first data message memory headroom is taken out according to the content in the first code key addressed memory space, is formed
Encrypt message data packet.
2. encryption method according to claim 1, which is characterized in that the first sequence address memory headroom, described
The memory size of one code key addressed memory space and the first data message memory headroom is the report of the clear text
Literary length.
3. encryption method according to claim 1, which is characterized in that the clear text that will upset at random
Address is stored in the first code key addressed memory space, specifically includes:
The content in the first sequence address memory headroom is upset at random using random process method, is obtained described to be encrypted
The random address of message;
The random address is stored in the first code key addressed memory space.
4. a kind of encryption system based on fixed message length, which is characterized in that the encryption system includes:
Data acquisition module, for obtaining the message length of clear text and the clear text;
Memory opens up module, for opening up memory size and matched three memory headrooms of the message length, and by three institutes
It states memory headroom to be denoted as respectively: in the first sequence address memory headroom, the first code key addressed memory space and the first data message
Deposit space;
Sequence address memory module, for the address of each bit of the clear text to be successively sequentially stored in described
One sequence address memory headroom;
Code key address memory module, for the address for the clear text upset at random to be stored in first code key address
Memory headroom;
Packet storage module, for the clear text to be stored in institute according to the content of the first sequence address memory headroom
State the first data message memory headroom;
Encrypting module, it is empty for taking out the first data message memory according to the content in the first code key addressed memory space
Between content, formed encryption message data packet.
5. a kind of decryption method based on fixed message length, which is characterized in that the decryption method is for decrypting according to right
It is required that the encryption message data packet that the described in any item encryption methods of 1-3 obtain, the decryption method include:
Obtain the message length of encryption message data packet;
Memory size and matched three memory headrooms of the message length are opened up, and three memory headrooms are remembered respectively
Are as follows: the second sequence address memory headroom, the second code key addressed memory space and the second data message memory headroom;
The address of each bit of the corresponding former message data of the encryption message data packet is successively sequentially stored in described the
Two sequence address memory headrooms;
The address for the former message data upset at random is stored in the second code key addressed memory space, wherein beat at random
Upset the address of clear text in the random process method and ciphering process that disorderly the address of the former message data uses at random
The random process method of use is identical;
Receive the encryption message data packet, and according to the content in the second code key addressed memory space by the encryption message
Data packet is stored in the second data message memory headroom;
The content of the second data message memory headroom is taken out according to the content of the second sequence address memory headroom, is formed
Decrypt message data packet.
6. decryption method according to claim 5, which is characterized in that the former message data that will upset at random
Address is stored in the second code key addressed memory space, specifically includes:
The content in the second sequence address memory headroom is upset at random using the random process method, obtain it is described to
Decrypt the random address of message;
The random address is stored in the second code key addressed memory space.
7. decryption method according to claim 5, which is characterized in that the second sequence address memory headroom, described
The memory size of two code key addressed memory spaces and the second data message memory headroom is the encryption message data packet
Message length.
8. a kind of decryption system based on fixed message length, which is characterized in that the decryption system is for decrypting according to right
It is required that the encryption message data packet that the described in any item encryption methods of 1-3 obtain, the decryption system include:
Message length obtains module, for obtaining the message length of encryption message data packet;
Decryption memory opens up module, for opening up memory size and matched three memory headrooms of the message length, and by three
A memory headroom is denoted as respectively: the second sequence address memory headroom, the second code key addressed memory space and the second datagram
Literary memory headroom;
Sequence address memory module is decrypted, for by each bit of the corresponding former message data of the encryption message data packet
Address be successively sequentially stored in the second sequence address memory headroom;
Secret code key address memory module, for the address for the former message data upset at random to be stored in second code key
Addressed memory space, wherein in the random process method and ciphering process for upsetting the address use of the former message data at random
The random process method for upsetting the address use of clear text at random is identical;
Packet storage module is decrypted, for receiving the encryption message data packet, and it is empty according to the second code key addressed memory
Between content the encryption message data packet is stored in the second data message memory headroom;
Deciphering module, it is empty for taking out the second data message memory according to the content of the second sequence address memory headroom
Between content, formed decryption message data packet.
9. a kind of data transmission method based on fixed message length, which is characterized in that the data transmission method includes:
Transmitting terminal obtains message to be transmitted;
Transmitting terminal, to the message encryption to be transmitted, obtains encryption report using the described in any item encryption methods of claim 1-3
Literary data packet, and the encryption message data packet is sent to receiving end;
Receiving end is decrypted the encryption message data packet using the described in any item decryption methods of claim 5-7, obtains
Message data packet must be decrypted.
10. a kind of data transmission system based on fixed message length, which is characterized in that the data transmission system includes sending
End and receiving end, wherein
The transmitting terminal uses the described in any item encryption methods of claim 1-3 to described for obtaining message to be transmitted
Message encryption to be transmitted obtains encryption message data packet, and the encryption message data packet is sent to receiving end;
The receiving end is used to carry out the encryption message data packet using the described in any item decryption methods of claim 5-7
Decryption obtains decryption message data packet.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811099243.XA CN109327306A (en) | 2018-09-20 | 2018-09-20 | A kind of data transmission method and system based on fixed message length |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811099243.XA CN109327306A (en) | 2018-09-20 | 2018-09-20 | A kind of data transmission method and system based on fixed message length |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109327306A true CN109327306A (en) | 2019-02-12 |
Family
ID=65265082
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811099243.XA Pending CN109327306A (en) | 2018-09-20 | 2018-09-20 | A kind of data transmission method and system based on fixed message length |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109327306A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1331548A (en) * | 2000-06-26 | 2002-01-16 | 张培忠 | Symmetric TV image encryption/decryption device by line disturbance in whole frame |
CN101587723A (en) * | 2008-05-19 | 2009-11-25 | 中盾信安科技(北京)有限公司 | A kind of anti-copy optical storage medium and manufacture method thereof |
CN102647251A (en) * | 2012-03-26 | 2012-08-22 | 北京星网锐捷网络技术有限公司 | Data transmission method and system, sending terminal equipment as well as receiving terminal equipment |
CN106991314A (en) * | 2016-01-20 | 2017-07-28 | 阿里巴巴集团控股有限公司 | A kind of date storage method and device |
CN107332839A (en) * | 2017-06-28 | 2017-11-07 | 杭州迪普科技股份有限公司 | A kind of message transmitting method and device |
CN107592200A (en) * | 2016-07-08 | 2018-01-16 | 展讯通信(上海)有限公司 | Data encryption, the method and device of decryption |
CN107979600A (en) * | 2017-11-29 | 2018-05-01 | 山东超越数控电子股份有限公司 | One kind divides field encryption interchanger and its method of work |
-
2018
- 2018-09-20 CN CN201811099243.XA patent/CN109327306A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1331548A (en) * | 2000-06-26 | 2002-01-16 | 张培忠 | Symmetric TV image encryption/decryption device by line disturbance in whole frame |
CN101587723A (en) * | 2008-05-19 | 2009-11-25 | 中盾信安科技(北京)有限公司 | A kind of anti-copy optical storage medium and manufacture method thereof |
CN102647251A (en) * | 2012-03-26 | 2012-08-22 | 北京星网锐捷网络技术有限公司 | Data transmission method and system, sending terminal equipment as well as receiving terminal equipment |
CN106991314A (en) * | 2016-01-20 | 2017-07-28 | 阿里巴巴集团控股有限公司 | A kind of date storage method and device |
CN107592200A (en) * | 2016-07-08 | 2018-01-16 | 展讯通信(上海)有限公司 | Data encryption, the method and device of decryption |
CN107332839A (en) * | 2017-06-28 | 2017-11-07 | 杭州迪普科技股份有限公司 | A kind of message transmitting method and device |
CN107979600A (en) * | 2017-11-29 | 2018-05-01 | 山东超越数控电子股份有限公司 | One kind divides field encryption interchanger and its method of work |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9246674B2 (en) | Generation of cryptographic keys | |
US6289451B1 (en) | System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection | |
CN107040369A (en) | Data transmission method, apparatus and system | |
CN107483192B (en) | Data transmission method and device based on quantum communication | |
MXPA06009235A (en) | Method and apparatus for cryptographically processing data. | |
EP3476078B1 (en) | Systems and methods for authenticating communications using a single message exchange and symmetric key | |
CN103248476B (en) | The management method of data encryption key, system and terminal | |
US7925009B2 (en) | Hybrid data encryption | |
CN112187448B (en) | Data encryption method and system | |
CN106209356A (en) | The privacy control method remotely controlled for Internet of Things and system | |
JP2009253650A (en) | Transmission and reception system, transmission device, reception device, authentication device, user device, method executed by those, and program | |
CN109194701B (en) | Data processing method and device | |
CN105208028A (en) | Data transmission method and related device and equipment | |
CN102088352B (en) | Data encryption transmission method and system for message-oriented middleware | |
CN110535641A (en) | Key management method and device, computer equipment and storage medium | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN103152362A (en) | Cloud-computing-based encrypted transmission method for large data files | |
Latif et al. | A review on key management and lightweight cryptography for IoT | |
CN107534558A (en) | For the method and data highway system of the information security for protecting the data via data bus transmission | |
CN105262586B (en) | The method for distributing key and device of automobile burglar equipment | |
CN103346878A (en) | Secret communication method based on FPGA high-speed serial IO | |
Olumide et al. | A hybrid encryption model for secure cloud computing | |
CN107493281A (en) | encryption communication method and device | |
CN106656463A (en) | Fixed-secret-key symmetric white box password encryption method, device and equipment | |
CN113746642B (en) | Method and system for communication between computers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190212 |