CN111246251A - Encryption transmission method, terminal, system and application of video stream data - Google Patents
Encryption transmission method, terminal, system and application of video stream data Download PDFInfo
- Publication number
- CN111246251A CN111246251A CN202010070889.6A CN202010070889A CN111246251A CN 111246251 A CN111246251 A CN 111246251A CN 202010070889 A CN202010070889 A CN 202010070889A CN 111246251 A CN111246251 A CN 111246251A
- Authority
- CN
- China
- Prior art keywords
- video stream
- terminal
- stream data
- random
- superlattice
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 88
- 230000005540 biological transmission Effects 0.000 title claims abstract description 68
- 230000006854 communication Effects 0.000 claims description 35
- 238000004891 communication Methods 0.000 claims description 33
- 239000004065 semiconductor Substances 0.000 claims description 8
- 238000005516 engineering process Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 238000004519 manufacturing process Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 3
- 230000010355 oscillation Effects 0.000 description 3
- 230000005284 excitation Effects 0.000 description 2
- 238000005070 sampling Methods 0.000 description 2
- 239000003362 semiconductor superlattice Substances 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000000704 physical effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses an encryption transmission method of video stream data. The encryption transmission method of the video stream data comprises the following steps: generating a random output signal by using a superlattice password device; and encrypting and decrypting the video stream data according to the random output signal. The invention also discloses a terminal and a system for carrying out the encrypted transmission of the video stream data. The invention further discloses application of the superlattice password device in the process of encrypting and transmitting video stream data. The invention can ensure the complete encryption of the video stream data by the superlattice password equipment by adopting the superlattice password equipment, can ensure the one-time pad encryption of the video stream data by enough key amount, has higher speed and smaller time delay compared with other encryption methods, and has smaller consumption of a hardware platform.
Description
Technical Field
The invention relates to the technical field of information security, in particular to an encryption transmission method, a terminal, a system and application of video stream data.
Background
With the rapid development of network technologies, real-time video communication systems are increasingly widely applied in various production and living scenes, such as mobile-end instant messaging software, video conference systems inside enterprises and governments, and the like. The protection of privacy and sensitive information in the video communication process is also gradually paid attention and paid attention. In order to ensure that the sensitive content of video communication is not leaked or stolen in the transmission process, various encryption technologies are used in the existing video communication system to different degrees according to specific scenes and the degree of the requirement on safety.
However, in the current video encryption technology, due to the small amount of keys generated by the conventional cryptographic equipment, the low key generation rate, and the like, the video cannot be encrypted and transmitted in real time, and the "one-time pad" encryption of the video content cannot be achieved. Therefore, due to the limitation of the amount of the secret key, the secret key can only be selectively encrypted or applied in groups for a plurality of times, so that the risk of the secret key being cracked is greatly increased, and the video communication system has information safety hidden danger.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides an encryption transmission method, a terminal, a system and an application of video stream data.
According to a first aspect of the present invention, there is provided a method of encrypted transmission of video stream data. The encryption transmission method of the video stream data comprises the following steps: generating a random output signal by using a superlattice password device; and encrypting and decrypting the video stream data according to the random output signal.
Optionally, in the method for encrypted transmission of video stream data according to the first aspect of the present invention, the method for encrypting video stream data according to the random output signal includes: generating a random encryption key and configuration information according to the random output signal; encrypting video stream data by using the random encryption key; wherein the configuration information is used for ensuring that the random decryption key generated in the decryption can be recovered to a random key completely consistent with the random encryption key generated in the encryption within a preset error.
Alternatively, in the encrypted transmission method of video stream data according to the first aspect of the present invention, the method of decrypting video stream data according to the random output signal includes: generating a corresponding random decryption key according to the random output signal and the configuration information; and decrypting the encrypted video stream data by using the random decryption key.
According to a second aspect of the present invention, there is provided an encrypted transmission method of video stream data. The encryption transmission method of the video stream data comprises the following steps: the first terminal generates a first random output signal by using the first superlattice password device; the first terminal encrypts video stream data according to the first random output signal to obtain encrypted video stream data; the first terminal sends the encrypted video stream data to the second terminal through a public channel; wherein the second terminal is configured with a second superlattice cryptographic device that matches the first superlattice cryptographic device.
Optionally, in the method for encrypted transmission of video stream data according to the second aspect of the present invention, the method for the first terminal to encrypt the video stream data according to the first random output signal to obtain encrypted video stream data includes: the first terminal generates a random encryption key and configuration information according to the first random output signal; the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; and the first terminal encrypts the video stream data by using the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information.
According to a third aspect of the present invention, there is provided an encrypted transmission method of video stream data. The encryption transmission method of the video stream data comprises the following steps: the second terminal receiving the encrypted video stream data transmitted by the first terminal from the common channel; the first terminal encrypts video stream data according to a first random output signal generated by the first superlattice password device to obtain encrypted video stream data; the second terminal generates a second random output signal by using a second superlattice password device matched with the first superlattice password device; and the second terminal decrypts the encrypted video stream data according to the second random output signal.
Optionally, in the method for encrypted transmission of video stream data according to the third aspect of the present invention, the method for decrypting, by the second terminal, encrypted video stream data according to the second random output signal includes: the second terminal generates a corresponding random decryption key according to the second random output signal and the configuration information; the configuration information is generated by the first terminal according to a first random output signal generated by the first superlattice password device, and is used for ensuring that a random decryption key generated in decryption can be restored to a random key completely consistent with a random encryption key generated in encryption within a preset error; the second terminal decrypts the encrypted video stream data by using the random decryption key; the encrypted video stream data is formed when the first terminal encrypts the video stream data by using the first superlattice password device, and the encrypted video stream data and the configuration information form the encrypted video stream data.
Optionally, in the method for encrypted transmission of video stream data according to the first aspect, the second aspect, or the third aspect of the present invention, the first superlattice password device and the second superlattice password device have the same structure and are fabricated by the same process, and are fabricated in adjacent positions of the same semiconductor wafer.
According to a fourth aspect of the present invention, there is provided an encrypted transmission method of video stream data. The encryption transmission method of the video stream data comprises the following steps: the first terminal encrypts video stream data according to a first random output signal generated by the first superlattice password device to obtain encrypted video stream data; the first terminal sends encrypted video stream data through a public channel; the second terminal receiving the encrypted video stream data transmitted by the first terminal from the common channel; and the second terminal decrypts the encrypted video stream data according to a second random output signal generated by a second superlattice password device, wherein the second superlattice password device is matched with the first superlattice password device.
Alternatively, in the encrypted transmission method of video stream data according to the fourth aspect of the present invention, the method for the first terminal to encrypt the video stream data according to the first random output signal generated by the first superlattice cipher device to obtain encrypted video stream data includes: the first terminal generates a random encryption key and configuration information according to a first random output signal generated by the first superlattice password device; the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; and the first terminal encrypts the video stream data by using the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information.
Alternatively, in the encrypted transmission method of the video stream data according to the fourth aspect of the present invention, the method in which the second terminal decrypts the encrypted video stream data according to the second random output signal generated by the second superlattice cipher device includes: the second terminal generates a corresponding random decryption key according to a second random output signal generated by the second superlattice password device and the configuration information; and the second terminal decrypts the encrypted video stream data by using the random decryption key.
Optionally, in the method for encrypted transmission of video stream data according to the first aspect, the second aspect, the third aspect, or the fourth aspect of the present invention, the first superlattice password device and the second superlattice password device have the same structure and are fabricated by the same process, and are fabricated in adjacent positions of the same semiconductor wafer.
According to a fifth aspect of the present invention, a terminal is provided. The terminal comprises a superlattice cryptographic device, wherein the terminal is configured to: generating a random output signal by using a superlattice password device; encrypting video stream data according to the random output signal to obtain encrypted video stream data; transmitting the encrypted video stream data to another terminal through a common channel; wherein the other terminal is configured with another superlattice cryptographic device that matches the superlattice cryptographic device of the terminal.
Optionally, in a terminal provided according to the fifth aspect of the present invention, the terminal is further configured to: generating a random encryption key and configuration information according to the random output signal; the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; and encrypting the video stream data by using the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information.
According to a sixth aspect of the present invention, a terminal is provided. The terminal comprises a superlattice cryptographic device, wherein the terminal is configured to: receiving encrypted video stream data transmitted by another terminal from a common channel; wherein the other terminal encrypts video stream data according to another random output signal generated by another superlattice cipher device to obtain encrypted video stream data; decrypting the encrypted video stream data in accordance with a random output signal generated by a superlattice cryptographic device matched with the other superlattice cryptographic device.
Optionally, in a terminal provided according to a sixth aspect of the present invention, the terminal is further configured to: generating a corresponding random decryption key according to the random output signal and the configuration information; wherein the configuration information is generated by another terminal according to another random output signal generated by another superlattice cipher device, and the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error; decrypting the encrypted video stream data by using the random decryption key; wherein the encrypted video stream data is formed when another terminal encrypts video stream data according to another random output signal generated by another superlattice cipher device, the encrypted video stream data and the configuration information forming the encrypted video stream data.
Optionally, in the terminal provided by the fifth or sixth aspect of the present invention, the superlattice password device and the another superlattice password device have the same structure and are manufactured by the same manufacturing process and are located at adjacent positions of the same semiconductor wafer.
According to a seventh aspect of the invention, a system is provided. The system comprises a first terminal and a second terminal, wherein the first terminal comprises a first superlattice password device, the second terminal comprises a second superlattice password device, and the first superlattice password device and the second superlattice password device are matched with each other; the first terminal is used for generating a first random output signal by using a first superlattice password device, encrypting video stream data according to the first random output signal to obtain encrypted video stream data, and sending the encrypted video stream data through a public channel; the second terminal is used for receiving the encrypted video stream data sent by the first terminal from the public channel, generating a second random output signal by using the second superlattice cipher device, and decrypting the encrypted video stream data according to the second random output signal.
Optionally, in a system provided in accordance with the seventh aspect of the present invention, the first terminal is further configured to generate a random encryption key and configuration information according to the first random output signal, and encrypt the video stream data with the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information; wherein the configuration information is used for ensuring that the random decryption key generated in the decryption can be recovered to a random key completely consistent with the random encryption key generated in the encryption within a preset error.
Optionally, in the system provided in the seventh aspect of the present invention, the second terminal is further configured to generate a corresponding random decryption key according to the second random output signal and the configuration information, and decrypt the encrypted video stream data by using the random decryption key.
Optionally, in the system provided by the seventh aspect of the present invention, the first superlattice password device and the second superlattice password device have the same structure and are manufactured by the same process and are located at adjacent positions of the same semiconductor wafer.
According to an eighth aspect of the present invention, there is provided an application of a superlattice cryptographic device in a video stream data encryption transmission process, where the superlattice cryptographic device includes a set of matched superlattice cryptographic devices, the set of matched superlattice cryptographic devices are respectively applied to a first terminal as a communication sender and a second terminal as a receiver, and the same random keys are respectively locally generated at the first terminal and the second terminal according to random output signals respectively generated by the set of matched superlattice cryptographic devices, so as to complete encryption transmission of video stream data.
The invention has the beneficial effects that: the invention can ensure the complete encryption of the video stream data by the superlattice password equipment by adopting the superlattice password equipment, can ensure the one-time pad encryption of the video stream data by enough key amount, has higher speed and smaller time delay compared with other encryption methods, and has smaller consumption of a hardware platform.
In addition, a plurality of superlattice password devices with similar properties can be obtained through the multiple phenomena of the semiconductor superlattice password device, and the superlattice password equipment made of the plurality of superlattice password devices can carry out multi-party video real-time communication.
In addition, when the video information is encrypted, the video information is encrypted after being not required to be compressed, so that the consumption of resources is reduced, and the video information is not required to be compressed, so that the video quality can be reduced, and the user experience of video communication is improved.
Drawings
The above and other aspects, features and advantages of embodiments of the present invention will become more apparent from the following description taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a schematic diagram of an alternative application environment for various embodiments of the present invention;
fig. 2 is an architecture diagram of a terminal device according to an embodiment of the present invention;
fig. 3 is a flowchart of an encrypted transmission method of video stream data according to an embodiment of the present invention;
FIG. 4 is a detailed flow diagram of a symmetric encrypted transmission of video stream data according to an embodiment of the present invention;
fig. 5 is a flowchart of an encrypted transmission method of video stream data according to another embodiment of the present invention;
fig. 6 is a flowchart of an encrypted transmission method of video stream data according to still another embodiment of the present invention;
fig. 7 is a flowchart of an encrypted transmission method of video stream data according to still another embodiment of the present invention.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the specific embodiments set forth herein. Rather, these embodiments are provided to explain the principles of the invention and its practical application to thereby enable others skilled in the art to understand the invention for various embodiments and with various modifications as are suited to the particular use contemplated.
FIG. 1 is a schematic diagram of an alternative application environment for various embodiments of the present invention.
Referring to fig. 1, the embodiments of the present invention can be applied to, but not limited to, an encryption system (which may also be referred to as a symmetric encryption system because the encryption of the present invention belongs to symmetric encryption) 1 consisting of a common channel 11, a first terminal 12 and a second terminal 13. The encryption system 1 is used for information transmission by encryption technology.
The common channel 11 may be an optical fiber, a broadband fixed network, a mobile network, an optical disc, a mobile hard disk, and the like, and is used for issuing and transmitting information.
The first terminal 12 and the second terminal 13 may be fixed or movable terminal devices having information transmission and encryption/decryption functions. The first terminal 12 and the second terminal 13 are communicatively connected via the common channel 11. The first terminal 12 and the second terminal 13 respectively serve as two parties of information transmission, wherein a transmitting party is used for encrypting and transmitting information, and a receiving party is used for receiving and decrypting information. In the following embodiments, the first terminal 12 is taken as a transmitting side, and the second terminal 13 is taken as a receiving side. It is understood that, in other embodiments, the second terminal 13 may be used as a sender, the first terminal 12 may be used as a receiver, and the second terminal 13 may send information to the first terminal 12 by using the same method.
Thus, the environment in which the various embodiments of the present invention are implemented has been described in detail. Hereinafter, various embodiments of the present invention will be described in detail based on the above application environments.
Fig. 2 is an architecture diagram of a terminal device according to an embodiment of the present invention. Referring to fig. 2, an embodiment of the present invention proposes a terminal device 2. It is to be understood that the terminal device 2 may be the first terminal 12 or the second terminal 13 described above. The terminal device 2 includes but is not limited to: superlattice cipher device 20, key generation module 21, encryption/decryption module 22, and communication module 23.
The superlattice password device 20 is configured to generate an output signal driven by a particular type of signal, where the output signal is a truly random signal. In this context, the output signal may be referred to as a true random signal or a random output signal, which are equivalent in meaning.
The key generation module 21 is configured to process the output signal to generate a random key and, at the same time, to generate configuration information. Here, in order to ensure the reliability of encryption and decryption by the terminal device 2, it generates corresponding configuration information at the same time as the random key, the configuration information being used to ensure that the random key generated at the time of decryption (may also be referred to as a random decryption key) can be restored to a random key that completely coincides with the random key generated at the time of encryption (may also be referred to as a random encryption key) within a predetermined error. The configuration information is generated by using a general technique related to error correction codes, and thus is used to explain the practicability and reliability of the terminal device 2.
The encryption and decryption module 22 is configured to symmetrically encrypt or decrypt data to be transmitted by using the random key, for example, a plaintext may be encrypted to obtain a ciphertext, and the ciphertext may also be decrypted to obtain the plaintext. If the random keys used for encryption and decryption (i.e., the random encryption key and the random decryption key) are the same, the decrypted plaintext is the same as the original plaintext.
The communication module 23 is used for information transmission of symmetric encrypted information (ciphertext) between the sender and the receiver.
It will be appreciated by a person skilled in the art that the structure shown in fig. 2 does not constitute a limitation of the terminal device 2, and that the terminal device 2 may also comprise other necessary components, or combine certain components, or a different arrangement of components.
In addition, each module may be an integrated circuit including a Micro Controller Unit (MCU). As is well known to those skilled in the art, a microcontroller may include a Central Processing Unit (CPU), a Read-Only Memory (ROM), a Random Access Memory (RAM), a timing module, a digital-to-analog conversion (a/D Converter), and several input/output ports. Of course, the modules may also be Integrated Circuits in other forms, such as Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), and the like.
It should be noted that the following descriptions of the embodiments are all described in terms of the application environment shown in fig. 1 and the terminal device architecture shown in fig. 2.
< first embodiment >
Fig. 3 is a flowchart of an encrypted transmission method of video stream data according to an embodiment of the present invention. Therein, the encryption transmission method of video stream data according to the embodiment of the present invention is applied to the encryption system 1. In this embodiment, the execution order of the steps in the flowchart shown in fig. 3 may be changed and some steps may be omitted according to different requirements.
Referring to fig. 3, the encrypted transmission method of video stream data according to an embodiment of the present invention includes the steps of:
s310, a random output signal is generated using the superlattice cryptographic device 20.
Specifically, in order to ensure that the keys generated by the first terminal 12 and the second terminal 13 are the same (or the keys are the same to the greatest extent possible) so that the keys do not need to be transmitted between the transmitting side and the receiving side, it is necessary to ensure that the driving signals of the specific forms used by the first terminal 12 and the second terminal 13 are the same, which is ensured by the first terminal 12 and the second terminal 13 receiving the driving signals of the specific forms transmitted from the public channel 11 respectively.
In this embodiment, the driving signal of a specific form may be generated by the first terminal 12, the second terminal 13, or a third party and then issued to the common channel 11 by a generator of the driving signal of a specific form. The drive signal of the particular form may propagate through the common channel 11 and therefore have the advantage of public key encryption. The first terminal 12 and the second terminal 13 respectively download the driving signal of the specific form to the local (so the first terminal 12 and the second terminal 13 may have a memory), and store the driving signal of the specific form to the local. The specific form of drive signal is used to provide excitation to a subsequent superlattice excitation source, but the specific form of drive signal has no correlation with the superlattice random output signal. Therefore, the requirement for a particular type of drive signal is simply that it has certain characteristics, and very good randomness is not required. Moreover, since the driving signal of the specific form has no correlation with the superlattice random output signal, the driving signal of the specific form can be transmitted through the common channel 11 without worrying about breaking the characteristics of the superlattice random output signal after being intercepted. The particular form of drive signal for the first terminal 12 and the particular form of drive signal for the second terminal 13 are identical, differing only in the physical location where the particular form of drive signal for the first terminal 12 is located at the first terminal 12 and the particular form of drive signal for the second terminal 13 is located at the second terminal 13. The first terminal 12 and the second terminal 13 may not be at the same location, and may be distributed at any distance, as long as the first terminal 12 and the second terminal 13 can respectively receive the driving signal of the specific form.
The specific form of the driving signal, even if acquired by an attacker, cannot infer the random keys of the first terminal 12 and the second terminal 13.
Further, the manager of the encrypted communication sends the matched first superlattice password device (such as the superlattice password device 20 of the first terminal 12) and the second superlattice password device (such as the superlattice password device 20 of the second terminal 13) to the sender and the receiver of the communication respectively, and the first superlattice password device and the second superlattice password device can be used as identification and authentication marks for secret communication of the sender and the receiver respectively. The first terminal 12 and the second terminal 13 respectively read out a local specific form of driving signal, and drive the local superlattice cipher device 20 with the driving signal to obtain a superlattice random output signal (i.e., a first random output signal of the first terminal 12 and a second random output signal of the second terminal 13), which is a true random analog signal.
The superlattice password devices 22 in the first terminal 12 and the second terminal 13 must be matched superlattice password devices 20, and synchronous chaotic oscillation will occur under the drive of a local specific form of drive signal, and the oscillation is a physical true random effect, and the generated oscillation signal is a true random signal. Also, since the drive signals of a particular form are identical, the true random signals generated in this case are also identical (the two signals may be offset in time).
The matched superlattice password devices 20 mean that the superlattice password devices 20 have the same structure and the same manufacturing process, are positioned at the adjacent positions of the same semiconductor wafer during manufacturing, and have extremely similar physical properties and operating characteristics. The superlattice password devices 20 contained in the first terminal 12 and the second terminal 13 can be used as identification marks of both parties in secure communication, so that the problems of identification and authentication of both parties in the secure communication are automatically solved. The number of the paired superlattice password devices 20 is controlled by the manufacturer of the password device, and may be 2 or more, if there are a plurality of paired superlattice password devices 20 sent to a plurality of communication parties, then the encrypted communication of the plurality of parties may be completed, and the method for encrypted transmission of video stream data described in this embodiment is applicable to each of the plurality of parties. These mated superlattice password devices 20 are non-duplicable, as determined by the fabrication and operating principles of the superlattice password devices 20. Thus, an attacker cannot obtain a matched superlattice cryptographic device 20, except for the limited number of paired superlattice cryptographic devices 20 that are controlled by the cryptographic device manufacturer as described above.
Since the first terminal 12 and the second terminal 13 match the local superlattice cryptographic device 20 with physical unclonable characteristics, it is only possible to obtain the same batch of local superlattice cryptographic devices 20 as the first terminal 10 and the second terminal 13. In addition to this, it is impossible to obtain a superlattice cryptographic device that matches the first terminal 12 and the second terminal 13, and therefore an attacker cannot generate the same key as the first terminal 12 and the second terminal 13 even if a particular form of driving signal is intercepted. Thus, a specific form of drive signal can be transmitted over the open channel without fear of the same key being copied as the first and second terminals 12, 13 after interception.
And S320, encrypting and decrypting the video stream data according to the random output signal.
Specifically, when encrypting video stream data, the first terminal 12 generates a random encryption key and configuration information after processing (e.g., processing including sampling and analog-to-digital conversion) the superlattice random output signal. Here, the configuration information is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error. The first terminal 12 then encrypts the video stream data with a random encryption key.
When decrypting the video stream data, the second terminal 13 processes (for example, including sampling and analog-to-digital conversion) the superlattice random output signal, and generates a corresponding random decryption key according to the processed superlattice random output signal and the configuration information. Next, the second terminal 13 decrypts the encrypted video stream data using the random decryption key.
The random decryption key and the random encryption key are the same (in this embodiment, can be corrected by configuration information so that they are the same), which is determined by the design of the two steps and the operating principle of the superlattice cryptographic device 20. Therefore, when the video stream data encryption information is performed by using the symmetric encryption algorithm, the random decryption key and the random encryption key can be used as the decryption key and the encryption key of the video stream data, respectively.
The first terminal 12 and the second terminal 13 may perform the above operations at different times, respectively, and not necessarily at the same time, that is, the generation of the random decryption key and the random encryption key may be temporally non-simultaneous.
Fig. 4 is a detailed flow diagram of symmetric encrypted transmission of video stream data according to an embodiment of the present invention. Referring to fig. 4, the symmetric encryption transmission of video stream data according to the embodiment of the present invention specifically includes the steps of:
s410, the first terminal 12 encrypts the plaintext (to-be-encrypted video stream data) P by using the random encryption key to obtain the ciphertext (encrypted video stream data) C.
Specifically, the first terminal 12 encrypts the information plaintext P to be encrypted by using the generated random encryption key to obtain the ciphertext C.
S420, the first terminal 12 sends the ciphertext C to the second terminal 13.
Specifically, the first terminal 12 sends the encrypted ciphertext C to the second terminal 13 through the common channel 11.
S430, the second terminal 13 receives the ciphertext C sent by the first terminal 12.
Specifically, the second terminal 13 receives the ciphertext C from the common channel 11.
S440, the second terminal 13 decrypts the ciphertext C by using the random decryption key to obtain the plaintext P.
Specifically, the second terminal 13 decrypts the ciphertext C using the generated random decryption key. Since the keys generated by the first terminal 12 and the second terminal 13 are guaranteed to be the same, the first terminal 12 can encrypt the plaintext P using a well-established symmetric encryption algorithm. Both parties of the communication do not need to pass a key, and can use the locally generated key for encryption and decryption of information. The method combines the advantages of the asymmetric encryption technology (no transmission key is needed) and the advantages of the symmetric encryption technology (high performance), and is suitable for information transmission with large data volume.
The video stream data encryption transmission method provided by the embodiment can combine the advantages of the asymmetric encryption technology and the symmetric encryption technology, only transmits a drive signal in a specific form without transmitting a real encryption key (private key), can ensure higher processing performance, and is suitable for information transmission with large data volume. Since the local superlattice cryptographic devices 20 that match the first and second terminals 12, 13 have a physical unclonable characteristic, they are only possible when manufactured in the same batch as the local superlattice cryptographic devices of the first and second terminals 12, 13. In addition to this, it is impossible to obtain a superlattice password device 20 matched with the first terminal 12 and the second terminal 13, and therefore an attacker cannot generate the same key (private key) as the first terminal 12 and the second terminal 13 even if a particular form of driving signal is intercepted. Thus, a specific form of the driving signal can be transmitted over the public channel without worrying about the same private key being copied as the first terminal 12 and the second terminal 13 after being intercepted.
The following further describes the encryption transmission method of the video stream data, taking the transmitting side (i.e., the first terminal 12), the receiving side (i.e., the second terminal 13), and the system side (the encryption system 1) as the starting points.
< second embodiment >
Fig. 5 is a flowchart of an encrypted transmission method of video stream data according to another embodiment of the present invention. In the detailed description of the present embodiment, the sender (i.e., the first terminal 12) is taken as a starting point. Referring to fig. 5, an encrypted transmission method of video stream data according to another embodiment of the present invention includes the steps of:
s510, the superlattice cryptographic device 20 of the first terminal 12 generates a random output signal.
Here, the superlattice cryptographic device 20 of the first terminal 12 is capable of generating a first random output signal driven by a particular form of signal, the first random output signal being a true random signal.
S520, the first terminal 12 encrypts the video stream data according to the first random output signal to obtain encrypted video stream data.
Specifically, first, the key generation module 21 of the first terminal 12 generates a random encryption key and configuration information according to the first random output signal. Here, as described above, the configuration information is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
Next, the encryption/decryption module 22 of the first terminal 12 encrypts the video stream data by using the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information.
S530, the communication module 23 of the first terminal 12 transmits the encrypted video stream data to the second terminal 13 through the common channel 11. Here, the second terminal 13 is configured with a superlattice password device 20 that matches the superlattice password device 20 of the first terminal 12.
< third embodiment >
Fig. 6 is a flowchart of an encrypted transmission method of video stream data according to still another embodiment of the present invention. In the detailed description of the present embodiment, the receiving side (i.e., the first terminal 13) is taken as a starting point. Referring to fig. 6, an encrypted transmission method of video stream data according to still another embodiment of the present invention includes the steps of:
s610, the communication module 23 of the second terminal 13 receives the encrypted video stream data transmitted by the first terminal 12 from the common channel 11.
Of course, here, as described above, the first terminal 12 encrypts the video stream data according to the first random output signal generated by its superlattice cipher device 20 to obtain encrypted video stream data, and specifically, reference may be made to the above description.
S620, the key generation module 21 of the second terminal 13 decrypts the encrypted video stream data according to the second random output signal generated by the superlattice cipher device 20 of the second terminal 13.
Here, the signal that drives the particular form of the first random output signal generated by the superlattice password device 20 of the first terminal 12 is the same as the signal that drives the particular form of the second random output signal generated by the superlattice password device 20 of the second terminal 13. This is to ensure that the keys generated by the first terminal 12 and the second terminal 13 are the same as possible (of course, the error may be corrected by the configuration information), and there is no need to transfer the key between the sender and the receiver, so that the key may be prevented from being intercepted, thereby improving security.
Specifically, first, the key generation module 21 generates a corresponding random decryption key according to the second random output signal and the configuration information. Here, as described above, the configuration information is formed when the first terminal 12 encrypts the video stream data in accordance with the first random output signal generated by its superlattice cipher device 20, and is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
Next, the encryption/decryption module 22 of the second terminal 13 decrypts the encrypted video stream data by using the random decryption key. Here, as described above, the encrypted video stream data is formed when the first terminal 12 encrypts the video stream data according to the first random output signal generated by its superlattice cipher device 20, the encrypted video stream data and the configuration information forming the encrypted video stream data.
< fourth embodiment >
Fig. 7 is a flowchart of an encrypted transmission method of video stream data according to still another embodiment of the present invention. In the detailed description of the present embodiment, the encryption system 1 (i.e., the encryption system constituted by the first terminal 12, the common channel 11, and the first terminal 13) is taken as a starting point. Referring to fig. 7, an encrypted transmission method of video stream data according to still another embodiment of the present invention includes the steps of:
s710, the superlattice cryptographic device 20 of the first terminal 12 generates a random output signal.
Here, the superlattice cryptographic device 20 of the first terminal 12 is capable of generating a first random output signal driven by a particular form of signal, the first random output signal being a true random signal.
S720, the first terminal 12 encrypts the video stream data according to the first random output signal to obtain encrypted video stream data.
Specifically, first, the key generation module 21 of the first terminal 12 generates a random encryption key and configuration information according to the first random output signal. Here, as described above, the configuration information is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
Next, the encryption/decryption module 22 of the first terminal 12 encrypts the video stream data by using the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information.
S730, the communication module 23 of the first terminal 12 transmits the encrypted video stream data to the second terminal 13 through the common channel 11. Here, the second terminal 13 is configured with a superlattice password device 20 that matches the superlattice password device 20 of the first terminal 12.
S740, the communication module 23 of the second terminal 13 receives the encrypted video stream data transmitted by the first terminal 12 from the common channel 11.
S750, a second random output signal generated by the superlattice password device 20 of the second terminal 13.
Here, the superlattice password device 20 of the second terminal 13 is capable of generating a second random output signal driven by the particular form of signal, the second random output signal being a true random signal. Further, the particular form of signal that the superlattice password device 20 driving the first terminal 12 generates the first random output signal is the same as the particular form of signal that the superlattice password device 20 driving the second terminal 13 generates the second random output signal. This is to ensure that the keys generated by the first terminal 12 and the second terminal 13 are the same as possible (of course, if there is an error, it is corrected by the configuration information), and there is no need to transfer the keys between the sender and the receiver, so that the keys can be prevented from being intercepted, thereby improving security.
S760, the key generation module 21 of the second terminal 13 decrypts the encrypted video stream data according to the second random output signal.
Specifically, first, the key generation module 21 generates a corresponding random decryption key according to the second random output signal and the configuration information.
Next, the encryption/decryption module 22 of the second terminal 13 decrypts the encrypted video stream data by using the random decryption key.
The following describes in detail the process of encrypted transmission of video stream data by each of the sender (i.e., the first terminal 12), the receiver (i.e., the second terminal 13), and the system side (the encryption system 1).
< fifth embodiment >
As an embodiment, the first terminal 12 may perform video stream data encryption when performing secure communication such as video stream data. The method comprises the following specific steps:
the superlattice cryptographic device 20 of the first terminal 12 generates a random output signal.
The superlattice password device 20 of the first terminal 12 is capable of generating a first random output signal driven by a particular form of signal, the first random output signal being a true random signal.
The first terminal 12 encrypts the video stream data according to the first random output signal to obtain encrypted video stream data.
Specifically, the key generation module 21 of the first terminal 12 generates a random encryption key and configuration information according to the first random output signal. Here, as described above, the configuration information is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
The encryption and decryption module 22 of the first terminal 12 encrypts the video stream data by using the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information.
The communication module 23 of the first terminal 12 transmits the encrypted video stream data to the second terminal 13 through the common channel 11. Here, the second terminal 13 is configured with a superlattice password device 20 that matches the superlattice password device 20 of the first terminal 12.
< sixth embodiment >
As an embodiment, the second terminal 13 may perform video stream data decryption when performing secure communication such as video stream data. The method comprises the following specific steps:
the communication module 23 of the second terminal 13 receives the encrypted video stream data transmitted by the first terminal 12 from the common channel 11.
Of course, here, as described above, the first terminal 12 encrypts the video stream data according to the first random output signal generated by its superlattice cipher device 20 to obtain encrypted video stream data, and specifically, reference may be made to the above description.
The key generation module 21 of the second terminal 13 decrypts the encrypted video stream data in accordance with the second random output signal generated by the superlattice cipher device 20 of the second terminal 13.
Here, the signal that drives the particular form of the first random output signal generated by the superlattice password device 20 of the first terminal 12 is the same as the signal that drives the particular form of the second random output signal generated by the superlattice password device 20 of the second terminal 13. This is to ensure that the keys generated by the first terminal 12 and the second terminal 13 are the same as possible (of course, if there is an error, the error can be corrected by the configuration information), and there is no need to transfer the keys between the sender and the receiver, so that the keys can be prevented from being intercepted, thereby improving security.
Specifically, the key generation module 21 of the second terminal 13 generates a corresponding random decryption key according to the second random output signal and the configuration information. Here, as described above, the configuration information is formed when the first terminal 12 encrypts the video stream data in accordance with the first random output signal generated by its superlattice cipher device 20, and is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error.
The encryption and decryption module 22 of the second terminal 13 decrypts the encrypted video stream data by using the random decryption key. Here, as described above, the encrypted video stream data is formed when the first terminal 12 encrypts the video stream data according to the first random output signal generated by its superlattice cipher device 20, the encrypted video stream data and the configuration information forming the encrypted video stream data.
< seventh embodiment >
As an embodiment, the encryption system 1 may perform encryption and decryption transmission of video stream data when performing secure communication of, for example, video stream data. The method comprises the following specific steps:
the superlattice cryptographic device 20 of the first terminal 12 generates a random output signal.
Here, the superlattice cryptographic device 20 of the first terminal 12 is capable of generating a first random output signal driven by a particular form of signal, the first random output signal being a true random signal.
The first terminal 12 encrypts the video stream data according to the first random output signal to obtain encrypted video stream data.
Specifically, the key generation module 21 of the first terminal 12 generates a random encryption key and configuration information according to the first random output signal. Here, as described above, the configuration information is used to ensure that the random decryption key generated at the time of decryption can be restored to a random key that completely coincides with the random encryption key generated at the time of encryption within a predetermined error. The encryption and decryption module 22 of the first terminal 12 encrypts the video stream data by using the random encryption key to obtain encrypted video stream data formed by packaging the encrypted video stream data and the configuration information.
The communication module 23 of the first terminal 12 transmits the encrypted video stream data to the second terminal 13 through the common channel 11. Here, the second terminal 13 is configured with a superlattice password device 20 that matches the superlattice password device 20 of the first terminal 12.
The communication module 23 of the second terminal 13 receives the encrypted video stream data transmitted by the first terminal 12 from the common channel 11.
The superlattice cryptographic device 20 of the second terminal 13 generates a second random output signal.
Here, the superlattice password device 20 of the second terminal 13 is capable of generating a second random output signal driven by the particular form of signal, the second random output signal being a true random signal. Further, the particular form of signal that the superlattice password device 20 driving the first terminal 12 generates the first random output signal is the same as the particular form of signal that the superlattice password device 20 driving the second terminal 13 generates the second random output signal. This is to ensure that the keys generated by the first terminal 12 and the second terminal 13 are the same as possible (of course, if there is an error, it is corrected by the configuration information), and there is no need to transfer the keys between the sender and the receiver, so that the keys can be prevented from being intercepted, thereby improving security.
The key generation module 21 of the second terminal 13 decrypts the encrypted video stream data according to the second random output signal.
Specifically, the key generation module 21 generates a corresponding random decryption key according to the second random output signal and the configuration information. The encryption and decryption module 22 of the second terminal 13 decrypts the encrypted video stream data by using the random decryption key.
In addition, the invention further provides an application of the superlattice password device in the process of encrypting and transmitting video stream data. In application, the superlattice cipher device includes a set of matched superlattice cipher devices 20 (please refer to the above description for matching process), the set of matched superlattice cipher devices 20 are respectively applied to a first terminal 12 as a communication sender and a second terminal 13 as a receiver, and the same random keys are locally generated at the first terminal 12 and the second terminal 13 respectively according to random output signals respectively generated by the set of matched superlattice cipher devices 20, so as to complete encrypted transmission of video stream data.
In the video communication process, the transmitted content often includes audio and video information, the transmitted data volume is huge, the superlattice password device (namely the first terminal 12 and/or the second terminal 13) can generate a key with a rate of up to 50Mbit/s, so that the superlattice password device can completely encrypt the video communication information, enough key volume can ensure one-time encryption of video stream data, and compared with other encryption methods, the rate is higher, the time delay is smaller, and the consumption of a hardware platform is smaller.
In addition, a plurality of superlattice password devices with similar properties can be obtained through the multiple phenomena of the semiconductor superlattice password device, and the superlattice password equipment made of the plurality of superlattice password devices can carry out multi-party video real-time communication.
In addition, when the video information is encrypted, the video information is encrypted after being not required to be compressed, so that resources consumed by compression are reduced, and the video information is not required to be compressed, so that the video quality cannot be reduced, and the user experience of video communication is improved.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The numbers of the embodiments or examples of the present invention are merely for description and do not represent the merits of the examples.
While the invention has been shown and described with reference to certain embodiments, those skilled in the art will understand that: various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims and their equivalents.
Claims (21)
1. An encrypted transmission method of video stream data, comprising:
generating a random output signal by using a superlattice password device;
and encrypting and decrypting the video stream data according to the random output signal.
2. The encryption transmission method according to claim 1, wherein the method of encrypting the video stream data based on the random output signal comprises:
generating a random encryption key and configuration information according to the random output signal;
encrypting video stream data by using the random encryption key;
wherein the configuration information is used for ensuring that the random decryption key generated in the decryption can be recovered to a random key completely consistent with the random encryption key generated in the encryption within a preset error.
3. The encrypted transmission method according to claim 2, wherein the method of decrypting the video stream data based on the random output signal comprises:
generating a corresponding random decryption key according to the random output signal and the configuration information;
and decrypting the encrypted video stream data by using the random decryption key.
4. An encrypted transmission method of video stream data, comprising:
the first terminal generates a first random output signal by using the first superlattice password device;
the first terminal encrypts video stream data according to the first random output signal to obtain encrypted video stream data;
the first terminal sends the encrypted video stream data and the configuration information to the second terminal through a public channel; wherein the second terminal is configured with a second superlattice cryptographic device that is matched to the first superlattice cryptographic device.
5. The encrypted transmission method according to claim 4, wherein the method for the first terminal to encrypt the video stream data according to the first random output signal to obtain the encrypted video stream data comprises:
the first terminal generates a random encryption key and configuration information according to the first random output signal; the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error;
and the first terminal encrypts the video stream data by using the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information.
6. An encrypted transmission method of video stream data, comprising:
the second terminal receiving the encrypted video stream data transmitted by the first terminal from the common channel; the first terminal encrypts video stream data according to a first random output signal generated by the first superlattice password device to obtain encrypted video stream data;
the second terminal generates a second random output signal by using a second superlattice password device matched with the first superlattice password device;
and the second terminal decrypts the encrypted video stream data according to the second random output signal.
7. The encrypted transmission method according to claim 6, wherein the method for the second terminal to decrypt the encrypted video stream data based on the second random output signal includes:
the second terminal generates a corresponding random decryption key according to the second random output signal and the configuration information; the configuration information is generated by the first terminal according to a first random output signal generated by the first superlattice password device, and is used for ensuring that a random decryption key generated in decryption can be restored to a random key completely consistent with a random encryption key generated in encryption within a preset error;
the second terminal decrypts the encrypted video stream data by using the random decryption key; the encrypted video stream data is formed when the first terminal encrypts the video stream data by using the first superlattice password device, and the encrypted video stream data and the configuration information form the encrypted video stream data.
8. An encrypted transmission method of video stream data, comprising:
the first terminal encrypts video stream data according to a first random output signal generated by the first superlattice password device to obtain encrypted video stream data;
the first terminal sends encrypted video stream data through a public channel;
the second terminal receiving the encrypted video stream data transmitted by the first terminal from the common channel;
and the second terminal decrypts the encrypted video stream data according to a second random output signal generated by a second superlattice password device, wherein the second superlattice password device is matched with the first superlattice password device.
9. The encrypted transmission method according to claim 8, wherein the method for the first terminal to encrypt the video stream data according to the first random output signal generated by the first superlattice cipher device to obtain the encrypted video stream data comprises:
the first terminal generates a random encryption key and configuration information according to a first random output signal generated by the first superlattice password device; the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error;
and the first terminal encrypts the video stream data by using the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information.
10. The encrypted transmission method according to claim 9, wherein the method for the second terminal to decrypt the encrypted video stream data based on the second random output signal generated by the second superlattice crypto device comprises:
the second terminal generates a corresponding random decryption key according to a second random output signal generated by the second superlattice password device and the configuration information;
and the second terminal decrypts the encrypted video stream data by using the random decryption key.
11. The encryption transmission method according to any one of claims 1 to 10, wherein the first superlattice password device and the second superlattice password device have the same structure and are manufactured by the same process and are located at adjacent positions of the same semiconductor wafer.
12. A terminal, comprising a superlattice cryptographic device, wherein the terminal is configured to:
generating a random output signal by using a superlattice password device;
encrypting video stream data according to the random output signal to obtain encrypted video stream data;
transmitting the encrypted video stream data to another terminal through a common channel; wherein the other terminal is provided with another superlattice password device matched with the superlattice password device of the terminal.
13. The terminal of claim 12, wherein the terminal is further configured to:
generating a random encryption key and configuration information according to the random output signal; the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error;
and encrypting the video stream data by using the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information.
14. A terminal, comprising a superlattice cryptographic device, wherein the terminal is configured to:
receiving encrypted video stream data transmitted by another terminal from a common channel; wherein the other terminal encrypts video stream data according to another random output signal generated by another superlattice cipher device to obtain encrypted video stream data;
the encrypted video stream data is decrypted based on a random output signal generated by a superlattice cryptographic device that is matched to the other superlattice cryptographic device.
15. The terminal of claim 14, wherein the terminal is further configured to:
generating a corresponding random decryption key according to the random output signal and the configuration information; wherein the configuration information is generated by another terminal according to another random output signal generated by another superlattice cipher device, and the configuration information is used for ensuring that the random decryption key generated in decryption can be recovered to a random key completely consistent with the random encryption key generated in encryption within a preset error;
decrypting the encrypted video stream data by using the random decryption key; the encrypted video stream data is formed by encrypting the video stream data by another terminal according to another random output signal generated by another superlattice password device, and the encrypted video stream data and the configuration information form the encrypted video stream data.
16. A terminal as claimed in any one of claims 12 to 15, wherein the superlattice password device and the further superlattice password device are identical in structure and manufactured by the same process and are located adjacent to the same semiconductor wafer.
17. A system comprising a first terminal and a second terminal, the first terminal comprising a first superlattice cryptographic device and the second terminal comprising a second superlattice cryptographic device, the first superlattice cryptographic device and the second superlattice cryptographic device being matched to one another; wherein,
the first terminal is used for generating a first random output signal by using the first superlattice password device, encrypting video stream data according to the first random output signal to obtain encrypted video stream data, and sending the encrypted video stream data through a public channel;
the second terminal is used for receiving the encrypted video stream data sent by the first terminal from the public channel, generating a second random output signal by using the second superlattice cipher device, and decrypting the encrypted video stream data according to the second random output signal.
18. The system of claim 17,
the first terminal is further used for generating a random encryption key and configuration information according to the first random output signal, and encrypting video stream data by using the random encryption key to obtain encrypted video stream data formed by the encrypted video stream data and the configuration information;
wherein the configuration information is used for ensuring that the random decryption key generated in the decryption can be recovered to a random key completely consistent with the random encryption key generated in the encryption within a preset error.
19. The system of claim 18,
the second terminal is further configured to generate a corresponding random decryption key according to the second random output signal and the configuration information, and decrypt the encrypted video stream data using the random decryption key.
20. The system of any of claims 17 to 19, wherein the first superlattice password device and the second superlattice password device are identical in structure and manufactured by the same process, and are manufactured in adjacent positions on the same semiconductor wafer.
21. The application of the superlattice password device in the video stream data encryption transmission process is characterized in that the superlattice password device comprises a group of superlattice password devices which are matched with each other, the group of superlattice password devices which are matched with each other are respectively applied to a first terminal which is used as a communication sender and a second terminal which is used as a receiver, and the same random keys are respectively generated locally at the first terminal and the second terminal according to random output signals respectively generated by the group of superlattice password devices which are matched with each other, so that the video stream data encryption transmission is completed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010070889.6A CN111246251A (en) | 2020-01-21 | 2020-01-21 | Encryption transmission method, terminal, system and application of video stream data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010070889.6A CN111246251A (en) | 2020-01-21 | 2020-01-21 | Encryption transmission method, terminal, system and application of video stream data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111246251A true CN111246251A (en) | 2020-06-05 |
Family
ID=70872939
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010070889.6A Pending CN111246251A (en) | 2020-01-21 | 2020-01-21 | Encryption transmission method, terminal, system and application of video stream data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111246251A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111741268A (en) * | 2020-06-30 | 2020-10-02 | 中国建设银行股份有限公司 | Video transmission method, device, server, equipment and medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103354494A (en) * | 2013-07-05 | 2013-10-16 | 中国科学院苏州纳米技术与纳米仿生研究所 | Communication system based on superlattice chaotic synchronization |
US20140327095A1 (en) * | 2013-05-03 | 2014-11-06 | Young-Hyun Kim | Magnetic device |
CN105007159A (en) * | 2015-07-24 | 2015-10-28 | 苏州矗联电子技术有限公司 | Secret key distribution device based on chaotic synchronization |
CN105071930A (en) * | 2015-07-24 | 2015-11-18 | 苏州矗联电子技术有限公司 | Low-cost security key distribution device |
CN109782148A (en) * | 2019-01-23 | 2019-05-21 | 中国科学院苏州纳米技术与纳米仿生研究所 | Signal processing apparatus and signal processing method based on semiconductor superlattice device |
CN110519036A (en) * | 2018-05-22 | 2019-11-29 | 中国科学院苏州纳米技术与纳米仿生研究所 | The application method of data encryption and transmission method, terminal device and superlattices chaos device |
CN110519210A (en) * | 2018-05-22 | 2019-11-29 | 中国科学院苏州纳米技术与纳米仿生研究所 | Cryptographic key distribution method and terminal device |
-
2020
- 2020-01-21 CN CN202010070889.6A patent/CN111246251A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140327095A1 (en) * | 2013-05-03 | 2014-11-06 | Young-Hyun Kim | Magnetic device |
CN103354494A (en) * | 2013-07-05 | 2013-10-16 | 中国科学院苏州纳米技术与纳米仿生研究所 | Communication system based on superlattice chaotic synchronization |
CN105007159A (en) * | 2015-07-24 | 2015-10-28 | 苏州矗联电子技术有限公司 | Secret key distribution device based on chaotic synchronization |
CN105071930A (en) * | 2015-07-24 | 2015-11-18 | 苏州矗联电子技术有限公司 | Low-cost security key distribution device |
CN110519036A (en) * | 2018-05-22 | 2019-11-29 | 中国科学院苏州纳米技术与纳米仿生研究所 | The application method of data encryption and transmission method, terminal device and superlattices chaos device |
CN110519210A (en) * | 2018-05-22 | 2019-11-29 | 中国科学院苏州纳米技术与纳米仿生研究所 | Cryptographic key distribution method and terminal device |
CN109782148A (en) * | 2019-01-23 | 2019-05-21 | 中国科学院苏州纳米技术与纳米仿生研究所 | Signal processing apparatus and signal processing method based on semiconductor superlattice device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111741268A (en) * | 2020-06-30 | 2020-10-02 | 中国建设银行股份有限公司 | Video transmission method, device, server, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101088420B1 (en) | Method and apparatus for cryptographically processing data | |
US9246674B2 (en) | Generation of cryptographic keys | |
WO2019223583A1 (en) | Data encryption transmission method, terminal device and method for using superlattice chaotic device | |
EP3476078B1 (en) | Systems and methods for authenticating communications using a single message exchange and symmetric key | |
EP2416524A2 (en) | System and method for secure transaction of data between wireless communication device and server | |
CN102025505A (en) | Advanced encryption standard (AES) algorithm-based encryption/decryption method and device | |
US11438316B2 (en) | Sharing encrypted items with participants verification | |
KR101608815B1 (en) | Method and system for providing service encryption in closed type network | |
CN111490871A (en) | SM9 key authentication method and system based on quantum key cloud and storage medium | |
US6640303B1 (en) | System and method for encryption using transparent keys | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
WO2019223624A1 (en) | Key distribution method and terminal device | |
WO2012129929A1 (en) | Method, system and appararus for secure transmission of media message | |
CN111314065A (en) | Data encryption transmission method, server and system based on virtual private network | |
CN112532648A (en) | Security access method and system based on hybrid cryptosystem | |
JPH10107832A (en) | Cipher multi-address mail system | |
CN111246251A (en) | Encryption transmission method, terminal, system and application of video stream data | |
CN111510294A (en) | Method for improving office system security by using secret key | |
TW202347208A (en) | Methods and systems for performing secure transactions | |
CN108173641B (en) | Zigbee safety communication method based on RSA | |
KR102304831B1 (en) | Encryption systems and method using permutaion group based cryptographic techniques | |
WO2012129945A1 (en) | Method and system for secure transmission of media messages | |
CN111324899A (en) | Method, device and system for storing/reading data | |
CN112187460A (en) | Master-slave network-oriented root key hidden symmetric encryption algorithm | |
JPH0777933A (en) | Network data ciphering device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200605 |