CN111130755B - Matrix double encryption method based on signature - Google Patents

Matrix double encryption method based on signature Download PDF

Info

Publication number
CN111130755B
CN111130755B CN201911394658.4A CN201911394658A CN111130755B CN 111130755 B CN111130755 B CN 111130755B CN 201911394658 A CN201911394658 A CN 201911394658A CN 111130755 B CN111130755 B CN 111130755B
Authority
CN
China
Prior art keywords
matrix
key
data
signature
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911394658.4A
Other languages
Chinese (zh)
Other versions
CN111130755A (en
Inventor
杨兴荣
胡勇
杨兴海
廖毅
朱恒
刘洋
邓孔祥
王芳
王龙
漆国强
刘冬洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shijihengtong Technology Co ltd
Original Assignee
Shijihengtong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shijihengtong Technology Co ltd filed Critical Shijihengtong Technology Co ltd
Priority to CN201911394658.4A priority Critical patent/CN111130755B/en
Publication of CN111130755A publication Critical patent/CN111130755A/en
Application granted granted Critical
Publication of CN111130755B publication Critical patent/CN111130755B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/16Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization

Abstract

The invention discloses a matrix double encryption method based on signature, which comprises a data encryption method and a data decryption method; the encryption process is used in a data transmission stage, and the decryption process is used in a data completion stage; encrypting data by a secret key, and then converting the secret key into a signature matrix by a convention matrix to achieve the aim of data encryption transmission; after the server side receives the signature data and the encrypted data, the server side can decrypt the original data through the signature data; the invention ensures the safety of data in the data transmission process and greatly reduces the possibility of information leakage.

Description

Matrix double encryption method based on signature
Technical Field
The invention belongs to the field of information security, and particularly relates to a matrix double encryption method based on signature.
Background
With the rapid development of the internet, the application range of the internet is continuously expanded, and the idea of adding the internet is also permeated into various fields. However, the information is developed at a high speed like a double-edged sword, so that convenience is brought, meanwhile, the possibility of information leakage is also brought, and the information security is ensured to be more and more valued by enterprises. Ensuring the reliability of encrypted data during data transmission is an effective method for solving the information security problem.
Disclosure of Invention
The invention aims to: the invention provides a signature-based matrix double encryption method which ensures data security and greatly reduces information leakage.
The technical scheme is as follows: a matrix double encryption method based on signature comprises a data encryption method and a data decryption method; the data encryption method comprises the steps of generating a secret key, and encrypting original data by using the secret key, so that the original data is converted into encrypted data; after the data plaintext is encrypted, the data decryption can be performed after the signature data is converted by the key matrix; the signature is matrixed, and the matrixing process is the same as above, so that a converted matrix is obtained; the signature data is a data string obtained by converting a key and a key matrix, and is transmitted together with the ciphertext; the key matrix is a digital matrix obtained after the key data is coded and converted, and the key matrix is a matrix agreed by an encryption end and a decryption end and is used for analyzing intermediate data of a real key.
Specifically, the key data is transcoded to 0 to 9 and the letters a to z are correspondingly converted to the corresponding numbers.
Specifically, in the data encryption method, a 128-bit key is generated, and the original data is subjected to AES encryption by using the key.
More specifically, in the data encryption method, the key needs to be subjected to matrix conversion, after a matrix key matrix is obtained, the matrix is multiplied by a decryption matrix agreed with a decryption end, so that the 128-bit key is subjected to encryption processing, and the signature obtained after the key encryption is random.
Specifically, when the data is decrypted, the agreed matrix is inverted, the inverted matrix is multiplied by the signature matrix to obtain the key original matrix, and the 128-bit key can be reversely obtained through the inversion coding of the key original matrix.
More specifically, the inversely solved key is carried into the AES decryption algorithm to parse out the original data of the ciphertext.
The beneficial effects are that: compared with the prior art, the invention has the advantages that: in the data transmission process, the data security is ensured, the possibility of information leakage is reduced, and the method adopts twice encryption to greatly increase the security of encrypted ciphertext; and the agreed decryption matrix and the agreed matrix conversion coding are adopted, so that the possibility that the signature password is converted into a matrix key is reduced.
Drawings
Fig. 1 is a flow chart of the encryption of the present invention.
Fig. 2 is a decryption flow chart of the present invention.
Detailed Description
The invention is further elucidated below in connection with the drawings and the detailed description.
As shown in fig. 1, a signature-based matrix double encryption method includes a data encryption method and a data decryption method; the data encryption method comprises the steps of generating a secret key, and encrypting original data by using the secret key, so that the original data is converted into encrypted data; after the data plaintext is encrypted, the data decryption can be performed after the signature data is converted by the key matrix; the signature is matrixed, and the matrixing process is the same as above, so that a converted matrix is obtained; the signature data is a data string obtained by converting a key and a key matrix, and is transmitted together with the ciphertext; the key matrix is a digital matrix obtained after the key data is coded and converted, and the key matrix is a matrix agreed by an encryption end and a decryption end and is used for analyzing intermediate data of a real key.
In terms of the process, the encryption flow is used in the data transmission stage, the decryption flow is used in the data completion stage, and in order to prevent the leakage of the novel data in the transmission process, the decryption can be normally used for returning the data to the original state.
The specific operation is as follows:
in the encryption stage, a 128-bit key is first randomly generated, and the original data is AES-encrypted with the key, whereby the original data is converted into encrypted data. In addition, the key is converted into matrix, the conversion condition is that each character of the matrix key is digitized, the digital conversion is that a coding table is used for converting the characters into digits, such as 0 to 9 and a character a into an integer set of corresponding set bits (-18, 18), and the matrix corresponding to the 128-bit key is 16 multiplied by 8.
In the decryption stage, firstly, the signature is matrixed and matrixed process is the same as the above to obtain a converted matrix, the agreed matrix is inverted, then the inverted matrix is multiplied by the signature matrix to obtain a key original matrix, and the key of 128 bits can be reversely obtained through the inversion coding of the key original matrix; and finally, the secret key is brought into an AES decryption algorithm to analyze the original data of the ciphertext.
By the encryption method and the decryption method, plaintext and original data are encrypted and packaged when the data are transmitted, and a receiving end decrypts the data by a decryption method after receiving the data, so that the safety of the data in the transmission process is effectively ensured.

Claims (2)

1. A matrix double encryption method based on signature is characterized in that: in the encryption stage, firstly, randomly generating a 128-bit key, carrying out AES encryption on original data by using the key, so that the original data is converted into encrypted data, carrying out matrix conversion on the key, wherein the conversion condition is that each character of the matrix key is digitized, the digitalization is that the character is converted into a number by using an encoding table, the matrix corresponding to the 128-bit key is 16 multiplied by 8, after the matrix of the key after the matrixing is obtained, the matrix is multiplied by a decryption matrix agreed with a decryption end, the 128-bit key is subjected to encryption processing, and because the key is randomly generated, the signature after the key encryption is obtained is different, and finally, the signature data and the encrypted ciphertext are transmitted together; in the decryption stage, firstly, the signature is matrixed and matrixed process is the same as the above to obtain a converted matrix, the agreed matrix is inverted, then the inverted matrix is multiplied by the signature matrix to obtain a key original matrix, and the key of 128 bits can be reversely obtained through the inversion coding of the key original matrix; and finally, the secret key is brought into an AES decryption algorithm to analyze the original data of the ciphertext.
2. A signature-based matrix double encryption method according to claim 1, characterized in that:
the key data is transcoded to 0 to 9 and the letters a to z are correspondingly converted to corresponding numbers.
CN201911394658.4A 2019-12-30 2019-12-30 Matrix double encryption method based on signature Active CN111130755B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911394658.4A CN111130755B (en) 2019-12-30 2019-12-30 Matrix double encryption method based on signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911394658.4A CN111130755B (en) 2019-12-30 2019-12-30 Matrix double encryption method based on signature

Publications (2)

Publication Number Publication Date
CN111130755A CN111130755A (en) 2020-05-08
CN111130755B true CN111130755B (en) 2023-05-09

Family

ID=70505033

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911394658.4A Active CN111130755B (en) 2019-12-30 2019-12-30 Matrix double encryption method based on signature

Country Status (1)

Country Link
CN (1) CN111130755B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117440372A (en) * 2023-12-20 2024-01-23 商飞智能技术有限公司 Zero trust authentication method and device for wireless network

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060034456A1 (en) * 2002-02-01 2006-02-16 Secure Choice Llc Method and system for performing perfectly secure key exchange and authenticated messaging
US20150326392A1 (en) * 2014-05-06 2015-11-12 Cavalry Storage, Inc. Matrix-based cryptosystem
CN106921485A (en) * 2015-12-24 2017-07-04 航天信息股份有限公司 Encrypting and decrypting method based on matrix operation
CN110071794B (en) * 2019-04-28 2022-06-07 苏州国芯科技股份有限公司 AES algorithm-based information encryption method, system and related components
CN110266481B (en) * 2019-06-14 2022-05-20 深圳职业技术学院 Post-quantum encryption and decryption method and device based on matrix

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Hill密码加密解密时矩阵的求法;徐小华;黎民英;;电脑与信息技术(第02期) *
自可逆矩阵在Hill密码算法中的应用;杨录峰;;高师理科学刊(第11期) *

Also Published As

Publication number Publication date
CN111130755A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
WO2018153317A1 (en) Chaotic map-based digital chaotic encryption method
CN104468090B (en) Character cipher coding method based on image pixel coordinates
EP3178190B1 (en) Encoder, decoder and method
CN105681025A (en) Security white box realizing method and device for national cipher standard algorithm SM4
CN102664740B (en) Remote-authorization-based bidding document encryption and decryption method
CN109005027B (en) Random data encryption and decryption method, device and system
CN105812816B (en) A kind of compression encryption certification joint coding method
CN104378198A (en) Voice encryption method based on block cipher system
GB2526636A (en) Encoder, decoder and methods employing partial data encryption
CN109547663B (en) Improved LSB image steganography method combined with cryptography
CN110149200A (en) A kind of color image encrypting method based on dynamic DNA and 4D chaos
CN103942500B (en) Hash ciphertext re-encryption method based on noise and decryption method after re-encryption
CN111884802B (en) Media stream encryption transmission method, system, terminal and electronic equipment
Gandhi et al. A study on current scenario of audio encryption
CN111130755B (en) Matrix double encryption method based on signature
CN117278324B (en) Message encryption transmission method and system
US20170041133A1 (en) Encryption method, program, and system
CN111314270B (en) Data encryption and decryption method based on validity period uniform distribution symmetric algorithm
CN104038337A (en) Data encryption method based on AES128
Suresh et al. Separable reversible data hiding using Rc4 algorithm
CN105704499B (en) A kind of selective satellite image compression encryption method based on ChaCha20 and CCSDS
CN113852456A (en) Image encryption system based on Matlab chaotic mapping and feature extraction
CN107276746A (en) A kind of Chinese character encipher-decipher method
CN111314052B (en) Data encryption and decryption method
CN110581759A (en) UOEC-HEX symmetric encryption algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant