CN110266488A - Key generation method and encrypted transmission data method and system based on position grouping - Google Patents

Key generation method and encrypted transmission data method and system based on position grouping Download PDF

Info

Publication number
CN110266488A
CN110266488A CN201910635307.1A CN201910635307A CN110266488A CN 110266488 A CN110266488 A CN 110266488A CN 201910635307 A CN201910635307 A CN 201910635307A CN 110266488 A CN110266488 A CN 110266488A
Authority
CN
China
Prior art keywords
key
length
long
short
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910635307.1A
Other languages
Chinese (zh)
Other versions
CN110266488B (en
Inventor
徐江涛
贾骏
胡成博
张照辉
徐阳
刘子全
路永玲
张国江
张军
陶风波
杨景刚
刘洋
王真
吴斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Ying Ruiqi Science And Technology Ltd
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
Nanjing Ying Ruiqi Science And Technology Ltd
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Ying Ruiqi Science And Technology Ltd, State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd filed Critical Nanjing Ying Ruiqi Science And Technology Ltd
Priority to CN201910635307.1A priority Critical patent/CN110266488B/en
Publication of CN110266488A publication Critical patent/CN110266488A/en
Application granted granted Critical
Publication of CN110266488B publication Critical patent/CN110266488B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of key generation method based on position grouping and encrypted transmission data method and system, and wherein key generation method includes: 1, determines that long key used in communication, the long key length are N;Determine short key length K and position code length m, N > K > m;2, determine that position code book, the position code book include multiple and different position sequence and the corresponding number of each position sequence, each position sequence is to select K position to be arranged to make up from N number of position;3, the short key that length is K is generated at random, m are position code before short key, position sequence q corresponding with the m position code is numbered in inquiring position code book, K symbol in random short key is subjected to operation with the symbol on K position corresponding to position sequence q in long key, obtains the encryption key that length is N.This method can reduce data frame in the case where guaranteeing that cryptographic security requires and send communication overhead required for key length.

Description

Key generation method and encrypted transmission data method and system based on position grouping
Technical field
The invention belongs to technical field of cryptology, and in particular to a kind of generation method and system of key, and application should The method and system of key progress encrypted transmission data.
Background technique
Cryptography is the ancient and young knowledge of door, with the development of informationized society, work of the information in social development With more and more important with status, everyone life generates with information, storage, processing and transmitting it is inseparable, commercially, financial The problem of equal fields focus more on information security.The safety problem of information system, which has become, simultaneously influences social stability and country The strategic issues of safety.
The safety of encryption and the length of key are directly proportional, the better but too long key of the effect of longer key encryption The most of resource for sending data frame can be occupied, especially key becomes huge expense when transmission data frame is very short. Therefore the invention proposes the mode that short key and long key carry out position grouping, reduce the length that data frame sends key, The safety that ensure that encryption simultaneously reduces the complexity of key generation.
Summary of the invention
Goal of the invention: the present invention provides a kind of key generation methods, it is intended to guarantee to reduce number under cryptographic security requirement Communication overhead required for key length is sent according to frame.
Technical solution: one aspect of the present invention discloses a kind of key generation method based on position grouping, including walks as follows It is rapid:
(1) long key used in communicating is determined, the long key is the binary code metasequence that length is N;It determines short Key length K and position code length m, N > K > m;The short key is the binary code metasequence that length is K;
(2) determine that position code book, the position code book include that multiple and different position sequence and each position sequence are corresponding Number, each position sequence are that randomly selected K position arranges from N number of position;
Long password determined by position code book and step 1 forms original password sheet;
(3) binary code metasequence that length is K is generated at random as short key, and m are position code before short key;Inquiry Position sequence q corresponding with the m position code is numbered in the code book of position, by short key at random K symbol and long key Symbol on K position corresponding to middle position sequence q carries out operation, obtains the encryption key that length is N.
Long key is determined in step 1 and long key length is that N, short key length K and position code length m use fixed storage Mode or communication negotiation mode;
The determination of position code book is by the way of fixed storage or communication negotiation in step 2.
In step 3 by random short key K symbol on K position corresponding to position sequence q in long key Symbol carries out XOR operation and obtains encryption key.
Further include: timing or not timing update: in long key, short key length K and position code length m used in communicating It is one or more, the long key length be N.
Long key used in communicating can have multiple, and multiple long keys are numbered;Randomly select a long key To generate encryption key.
On the other hand, the invention discloses a kind of methods of encrypted transmission data, comprising:
Sender generates encryption key according to above-mentioned key generation method;
Encryption data and random short key, to transmission data encryption, are sent to recipient using encryption key by sender;
Recipient decomposites short key from reception data, parses position code, calculates position in the code book of used position The number of sequence, inquiring position sequence recover encryption key with used long key operation, use the key solution of recovery Close transmission data.
Another aspect, the invention also discloses the key generation systems based on position grouping, including key connected two-by-two Memory module, random short key production module, encryption key generation module;
The cipher key storage block is for determining and storing long key, short key length K, position code length m, position code This;
The random short key production module is used to generate the random short key that length is K;
The encryption key generation module uses above-mentioned key generation method, according to short key, long key and position code This generation encryption key.
Above-mentioned key generation system further includes timer, and cipher key storage block time according to set by timer is more It is one or more in new long key, short key length K and position code length m.
Another aspect, the invention also discloses a kind of systems of encrypted transmission data, including key production module, encryption mould Block, information sending module, information receiving module, key-parsing module, deciphering module;
The key production module generates encryption key according to above-mentioned key generation method;
The encrypting module is used for transmission data encryption;
The information sending module is for sending encryption data, random short key, long cipher key number;
The information receiving module is for receiving data;The key-parsing module is used for close according to length in data from receiving Key numbers to inquire used long key, parses short key and obtains position code, inquires used position sequence, recover and add Key;Deciphering module uses the key decrypted transport data restored.
The utility model has the advantages that the safety of existing key is directly proportional to the length of key, but too long key can occupy excessively Data frame resource.The present invention reduces the length of the key sent in data frame while the length that ensure that key, drop The low complexity of encrypting and decrypting;Only sending short key in a data frame reduces the length of data frame, reduces data frame Redundancy, while the length of key is not reduced using the position grouping of two keys, the present invention is not while reducing cipher round results The length for reducing data frame, especially suitable for short frame structure.
Detailed description of the invention
Fig. 1 is the flow chart of the key generation method based on position grouping disclosed in embodiment one;
Fig. 2 is the composition figure of the key generation system based on position grouping disclosed in embodiment one;
Fig. 3 is the flow chart of the method for encrypted transmission data disclosed in embodiment two;
Fig. 4 is the composition figure of the system of encrypted transmission data disclosed in embodiment two;
Fig. 5 is the flow chart of the key generation method based on position grouping disclosed in embodiment three.
Specific embodiment
With reference to the accompanying drawings and detailed description, the present invention is furture elucidated.
Embodiment one:
Present embodiment discloses the key generation method based on position grouping, flow chart is as shown in Figure 1, include following step It is rapid:
Step 1: determining long key used in communicating, the long key is the binary code metasequence that length is N;It determines Short key length K and position code length m, N > K > m;The short key is the binary code metasequence that length is K;
Step 2: determining that position code book, the position code book include that multiple and different position sequence and each position sequence are corresponding Number, each position sequence be from N number of position randomly selected K position arrange;
From N number of middle number of permutations for selecting K forThe number of position sequence is in the code book of positionPosition-order Element position in each of the column long key of element representation.
For the present embodiment with long key length N for 4, short key length K is 3, and position code length m comes for 2 for example, institute is true Fixed long key is 1010.3 numbers of permutations are selected from 4The present embodiment indicates position using decimal number The number of sequence, position code book are as shown in the table:
Number Position sequence
0 1,2,3
1 1,3,4
2 2,3,4
…… …….
23 3,2,4
Long password 1010 determined by position code book and step 1 forms original password sheet.
Under determining that long key and long key length have for the mode of N, short key length K and position code length m, position code book Two kinds of face:
The first, by the way of fixed storage: will be above-mentioned it needs to be determined that content be stored in execution key generation method Equipment in;
Second, by the way of communication negotiation: first will be above-mentioned it needs to be determined that content be stored in third party device, need When obtaining above content, information request message, third party device reply acquisition information are obtained by sending to third party device Response message, and to execute key generation method equipment send it is above-mentioned it needs to be determined that content.
Step 3: random to generate binary code metasequence that length is K as short key, m are position code before short key; Position sequence q corresponding with the m position code is numbered in inquiring position code book, by the K symbol and length in random short key Symbol in key on K position corresponding to position sequence q carries out operation, obtains the encryption key that length is N.According to m Position code can calculate unique corresponding position sequence number.There are many calculation methods, including direct value, by times Number amplification, remainder press rounding etc. after multiple reduces, and can select as the case may be.
It is numbered according to calculated position sequence, corresponding position sequence q is obtained from the code book of position,
The short key generated at random in the present embodiment is 011, and front two 01 is position code, is converted in the present embodiment It is numbered for decimal number to obtain position sequence, that is, the position sequence q number inquired is 1, and position sequence q is 1,3,4.It will be with This 3 symbols of the short key 011 of machine are that the symbol on 1,3,4 this 3 positions carries out operation with position in long key, obtain respectively Length is the encryption key of N.In the present invention, encryption key is generated using XOR operation, the encryption key finally obtained is 1001。
In this way, every time encryption when, by generate length be K short key, can obtain length be N encryption key, N > K。
Fig. 2 is the composition figure of the key generation system based on position grouping, including cipher key storage block connected two-by-two, with The short key production module of machine, encryption key generation module;Wherein cipher key storage block is for determining and storing long key, short key Length K, position code length m, position code book;Random short key production module is used to generate the random short key that length is K;Encryption Key production module is used to generate encryption key according to short key, long key and position code book.
Embodiment two:
Present embodiment discloses a kind of methods of encrypted transmission data, as shown in Figure 3, comprising:
Step 201, sender generate encryption key according to the key generation method in embodiment one;
Step 202, sender, to transmission data encryption, encryption data and random short key are sent to using encryption key Recipient;
Step 203, recipient decomposite short key from reception data, parse position code, calculate and generate encryption key institute The number of position sequence, inquiring position sequence recover encryption key in the position code book used, are decrypted using the key of recovery Transmit data.
In the present embodiment, data transmitted by sender include the short key and encryption data that length is K, and encryption actually makes Be length it is N key, thus reduces the key length sent in data frame while guaranteeing encryption key lengths.
Encrypted transmission data method in the present embodiment realizes that this is using the system of the encrypted transmission data in Fig. 4 System includes: the key production module positioned at sender, encrypting module, information sending module, and the information positioned at recipient receives mould Block, key-parsing module, deciphering module;Wherein the key production module of sender is according to the key generation method in embodiment one Generate encryption key;Encrypting module is used for transmission data encryption;Information sending module is for sending encryption data, random short close Key;
For receiving data, key-parsing module is used to from reception data decomposite short the information receiving module of recipient Key parses position code, calculates the number for generating position sequence in position code book used in encryption key, inquiring position sequence Column, recover encryption key;Deciphering module uses the key decrypted transport data restored.
In key production module and key-parsing module, requires to determine long key and long key length is N, short key Length K and position code length m, position code book, are the same as example 1, and it is following to determine that above content equally uses in the present embodiment Two ways:
The first, the mode of fixed storage: has been stored in advance above-mentioned need in key production module and key-parsing module The content to be determined;
Second, the mode of communication negotiation: first will be above-mentioned it needs to be determined that content be stored in third party device, it is raw in key When needing to obtain above content at module and/or key-parsing module, disappeared by sending acquisition information request to third party device Breath, third party device, which are replied, obtains information answer message, and sends above-mentioned need to key production module and/or key-parsing module The content to be determined.
Embodiment three:
The present embodiment is the extension of embodiment one, the key generation method based on position grouping, as shown in figure 5, including such as Lower step:
Step 301: determining that multiple and different long key and its number, the long key are the binary element that length is N Sequence;Determine short key length K and position code length m, N > K > m;The short key is the binary code metasequence that length is K;
Step 302: determining that position code book, the position code book include multiple and different position sequence and each position sequence pair The number answered, each position sequence are that randomly selected K position arranges from N number of position;;
Step 303: the binary code metasequence that random generation length is K is random from multiple long keys as short key One is chosen, m are position code before short key, number position sequence corresponding with the m position code in inquiring position code book Q, by K symbol and the symbol on K position corresponding to position sequence q in the long key of selected volume in random short key into Row operation obtains the encryption key that length is N.
Compared with embodiment one, the present embodiment is by using multiple long keys, the original of available long number of keys multiple Beginning code book;That is the length of further expansion key.
Example IV:
Present embodiment discloses a kind of methods of encrypted transmission data, comprising:
Step 401, sender generate encryption key according to the key generation method in embodiment three;
Step 402, sender using encryption key to transmission data encryption after, by encryption data, random short key and institute The long cipher key number of selection is sent to recipient together;
Step 403, recipient decomposite random short key and long cipher key number from reception data, parse short key and obtain Position code determines the long key of selection, the number of position sequence in position code book used in query generation encryption key, inquiry Used position sequence, recovers encryption key, uses the key decrypted transport data of recovery.
In the present invention use symmetric cryptography, i.e. encryption key is identical with decruption key, can use DES, RC4 or BlowFish algorithm.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The aforementioned description to specific exemplary embodiment of the invention is in order to illustrate and illustration purpose.These descriptions It is not wishing to limit the invention to disclosed precise forms, and it will be apparent that according to the above instruction, can much be changed And variation.The purpose of selecting and describing the exemplary embodiment is that explaining specific principle of the invention and its actually answering With so that those skilled in the art can be realized and utilize a variety of different exemplary implementation schemes of the invention and Various chooses and changes.The scope of the present invention is intended to be limited by claims and its equivalents.

Claims (10)

1. a kind of key generation method based on position grouping, which comprises the steps of:
(1) long key used in communicating is determined, the long key is the binary code metasequence that length is N;Determine short key Length K and position code length m, N > K > m;The short key is the binary code metasequence that length is K;
(2) position code book is determined, the position code book includes multiple and different position sequence and the corresponding number of each position sequence, Each position sequence is that randomly selected K position arranges from N number of position;
(3) binary code metasequence that length is K is generated at random as short key, and m are position code before short key;Inquiring position Position sequence q corresponding with the m position code is numbered in code book, by K symbol in random short key and position in long key The symbol set on K position corresponding to sequence q carries out operation, obtains the encryption key that length is N.
2. the key generation method according to claim 1 based on position grouping, which is characterized in that determine length in step 1 Key and long key length are N, short key length K and position code length m by the way of fixed storage or the side of communication negotiation Formula;
The determination of position code book is by the way of fixed storage or communication negotiation in step 2.
3. the key generation method according to claim 1 based on position grouping, which is characterized in that will be random in step 3 Symbol in K symbol and long key in short key on K position corresponding to position sequence q carries out XOR operation and is added Key.
4. the key generation method according to claim 1 based on position grouping, which is characterized in that further include: timing or Not timing updates: one or more in long key, short key length K and position code length m used in communicating, the length is close Key length is N.
5. the key generation method according to claim 1 based on position grouping, which is characterized in that long used in communication Key has multiple, and multiple long keys are numbered;A long key is randomly selected to generate encryption key.
6. a kind of method of encrypted transmission data characterized by comprising
According to claim 1, key generation method described in any one of -4 generates encryption key to sender;
Encryption data and random short key, to transmission data encryption, are sent to recipient using encryption key by sender;
Recipient decomposites short key from reception data, parses position code, calculates position sequence in the code book of used position Number, inquiring position sequence recovers encryption key, uses the key decrypted transport data of recovery.
7. a kind of method of encrypted transmission data characterized by comprising
Sender's key generation method according to claim 5 generates encryption key;
Sender using encryption key to transmission data encryption after, by encryption data, short key and used long cipher key number It is sent to recipient together;
Recipient inquires used long key according to long cipher key number, parses short key and obtains position code, inquiry is used Position sequence, recover encryption key, use the key decrypted transport data of recovery.
8. the key generation system based on position grouping, which is characterized in that including cipher key storage block connected two-by-two, random short Key production module, encryption key generation module;
The cipher key storage block is for determining and storing long key, short key length K, position code length m, position code book;
The random short key production module is used to generate the random short key that length is K;
The encryption key generation module use key generation method of any of claims 1-5, according to short key, Long key and position code book generate encryption key.
9. the key generation system according to claim 8 based on position grouping, which is characterized in that it further include timer, Cipher key storage block time according to set by timer updates in long key, short key length K and position code length m It is one or more.
10. a kind of system of encrypted transmission data, which is characterized in that send mould including key production module, encrypting module, information Block, information receiving module, key-parsing module, deciphering module;
The key production module key generation method according to any one of claims 1-5 generates encryption key;
The encrypting module is used for transmission data encryption;
The information sending module is for sending encryption data, random short key, long cipher key number;
The information receiving module is for receiving data;The key-parsing module is used for from receiving in data according to long key volume Number come long key used in inquiring, parse short key and obtain position code, inquire used in position sequence, it is close to recover encryption Key;Deciphering module uses the key decrypted transport data restored.
CN201910635307.1A 2019-07-15 2019-07-15 Key generation method based on position combination and data encryption transmission method and system Active CN110266488B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910635307.1A CN110266488B (en) 2019-07-15 2019-07-15 Key generation method based on position combination and data encryption transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910635307.1A CN110266488B (en) 2019-07-15 2019-07-15 Key generation method based on position combination and data encryption transmission method and system

Publications (2)

Publication Number Publication Date
CN110266488A true CN110266488A (en) 2019-09-20
CN110266488B CN110266488B (en) 2021-08-31

Family

ID=67926052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910635307.1A Active CN110266488B (en) 2019-07-15 2019-07-15 Key generation method based on position combination and data encryption transmission method and system

Country Status (1)

Country Link
CN (1) CN110266488B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030112970A1 (en) * 2001-08-26 2003-06-19 Arindam Mitra How to generate unbreakable key through any communication channel
CN102497270A (en) * 2011-12-24 2012-06-13 王勇 Encryption method of standardized document
CN103684761A (en) * 2013-12-25 2014-03-26 广西宝恒电子科技有限公司 Coding and decoding method
CN104966525A (en) * 2015-01-14 2015-10-07 腾讯科技(深圳)有限公司 File encryption method and apparatus, and file decryption method and apparatus
US20160337120A1 (en) * 2015-05-17 2016-11-17 Gideon Samid Equivoe-T: Transposition Equivocation Cryptography
US20170331624A1 (en) * 2016-05-13 2017-11-16 Gideon Samid Cyber Passport
WO2017200989A1 (en) * 2016-05-16 2017-11-23 Amgen Inc. Data encryption in medical devices with limited computational capability
CN109951268A (en) * 2019-02-18 2019-06-28 吉林大学珠海学院 The encrypting and decrypting method and device with bit map are changed based on position

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030112970A1 (en) * 2001-08-26 2003-06-19 Arindam Mitra How to generate unbreakable key through any communication channel
CN102497270A (en) * 2011-12-24 2012-06-13 王勇 Encryption method of standardized document
CN103684761A (en) * 2013-12-25 2014-03-26 广西宝恒电子科技有限公司 Coding and decoding method
CN104966525A (en) * 2015-01-14 2015-10-07 腾讯科技(深圳)有限公司 File encryption method and apparatus, and file decryption method and apparatus
US20160337120A1 (en) * 2015-05-17 2016-11-17 Gideon Samid Equivoe-T: Transposition Equivocation Cryptography
US20170331624A1 (en) * 2016-05-13 2017-11-16 Gideon Samid Cyber Passport
WO2017200989A1 (en) * 2016-05-16 2017-11-23 Amgen Inc. Data encryption in medical devices with limited computational capability
CN109951268A (en) * 2019-02-18 2019-06-28 吉林大学珠海学院 The encrypting and decrypting method and device with bit map are changed based on position

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
BIN CHEN ET AL.: ""Secret Key Generation Over Biased Physical Unclonable Functions With Polar Codes"", 《IEEE INTERNET OF THINGS JOURNAL》 *
周景贤等: "常数时间的轻量级RFID双向认证协议 ", 《北京邮电大学学报》 *
张孝甜等: "无线信道中的Polar码协商 ", 《信号处理》 *

Also Published As

Publication number Publication date
CN110266488B (en) 2021-08-31

Similar Documents

Publication Publication Date Title
CN102098157B (en) A kind of system and method based on be used for strengthening the security of client/server communications protocol without certificate Public Key Infrastructure
CN101753292B (en) Methods and devices for a chained encryption mode
CN113259329B (en) Method and device for data careless transmission, electronic equipment and storage medium
CN101202623B (en) Method of generating message authentication code, authentication/encryption and authentication/decryption methods
KR19990082665A (en) Common Key Communication Method
CN111510281A (en) Homomorphic encryption method and device
CN102333308A (en) Positional-information-based encrypted authentication method
US20230361993A1 (en) Redistribution of secret sharings
CN105763333A (en) Method and system for negotiating asymmetric key
CN113987583A (en) Method and system for hiding query
US11121855B2 (en) System and method for secure exchange
CN102903226B (en) Data transmission method for communication of intelligent electric meters
CN110225028A (en) A kind of distribution anti-counterfeiting system and its method
CN109923829B (en) Agreement on secret values
CN114374518B (en) PSI (program specific information) intersection information acquisition method and device with intersection counting function and storage medium
CN110266488A (en) Key generation method and encrypted transmission data method and system based on position grouping
CN114697054B (en) Data transmission method and device, electronic equipment and computer storage medium
CN113746642B (en) Method and system for communication between computers
CN113162765B (en) Trustable public key encryption system and method based on non-interactive key agreement
CN109861822A (en) A kind of method of controllable message transaction encryption in block catenary system
CN101882991A (en) Communication data stream encryption method based on block cipher
CN115426111A (en) Data encryption method and device, electronic equipment and storage medium
CN108200108B (en) Asymmetric encryption algorithm and application thereof
CN106850192A (en) A kind of method for optimizing mobile device data storehouse encryption efficiency
US20200169541A1 (en) Systems and methods for encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant