CN111327417A - Data encryption system, method and device - Google Patents

Data encryption system, method and device Download PDF

Info

Publication number
CN111327417A
CN111327417A CN202010062588.9A CN202010062588A CN111327417A CN 111327417 A CN111327417 A CN 111327417A CN 202010062588 A CN202010062588 A CN 202010062588A CN 111327417 A CN111327417 A CN 111327417A
Authority
CN
China
Prior art keywords
encryption
analysis
parameter
data
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010062588.9A
Other languages
Chinese (zh)
Inventor
宋国训
魏磊
仲伟付
杨秀红
刘曌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010062588.9A priority Critical patent/CN111327417A/en
Publication of CN111327417A publication Critical patent/CN111327417A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/17Systems in which incident light is modified in accordance with the properties of the material investigated
    • G01N21/25Colour; Spectral properties, i.e. comparison of effect of material on the light at two or more different wavelengths or wavelength bands
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Chemical & Material Sciences (AREA)
  • Biochemistry (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Immunology (AREA)
  • Pathology (AREA)
  • Analytical Chemistry (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Investigating Or Analysing Materials By Optical Means (AREA)

Abstract

The invention belongs to the technical field of data encryption, and particularly relates to a data encryption system, method and device, wherein the system comprises: the spectrum key generation device is used for performing spectrum analysis on the liquid reagent and generating an encryption key according to a parameter result obtained by the analysis; encrypting means for encrypting data based on the generated key; the method has the advantages of high data security, high encryption efficiency and high cracking difficulty.

Description

Data encryption system, method and device
Technical Field
The invention belongs to the technical field of data encryption, and particularly relates to a data encryption system, method and device.
Background
Data encryption is a long-history technology, which means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, and decryption is realized by recovering the ciphertext into plaintext through a decryption algorithm and a decryption key. Its core is cryptography.
Data encryption is still the most reliable way for computer systems to protect information. The information is encrypted by utilizing a cryptographic technology, so that the information is concealed, and the effect of protecting the safety of the information is achieved.
The data encryption technology used in cooperation with a firewall is one of the main technical means adopted for improving the security and confidentiality of an information system and data and preventing secret data from being decoded by the outside. Technically, measures are taken from two aspects of software and hardware respectively. According to different roles, data encryption technologies can be classified into data transmission encryption technologies, data storage encryption technologies, authentication technologies for data integrity, and key management technologies.
The purpose of data transmission encryption technology is to encrypt data stream in transmission, and there are two kinds of encryption, line encryption and end-to-end encryption. The line encryption focuses on the line without considering the information source and the information sink, and the security protection is provided for the secret information through different encryption keys of each line. The end-end encryption means that information is automatically encrypted by a sending end, data packet encapsulation is carried out by TCP/IP, then the information passes through the Internet as unreadable and unidentifiable data, and when the information reaches a destination, the information is automatically recombined and decrypted to form readable data.
The data storage encryption technology aims to prevent data from being decrypted in a storage link, and can be divided into ciphertext storage and access control. The former is generally realized by methods such as encryption algorithm conversion, additional encryption codes, encryption modules and the like; the latter is to examine and limit the user qualification and authority to prevent illegal users from accessing data or legal users from unauthorized accessing data.
The purpose of data integrity authentication techniques is to verify the identity of the person involved in the transfer, access and processing of information and the content of the associated data, typically including the authentication of passwords, keys, identities, data and the like. The system realizes the safety protection of data by comparing whether the characteristic value input by the verification object conforms to the preset parameter.
The key management technology comprises security measures in all links of key generation, distribution, storage, replacement, destruction and the like.
The existing encryption technology is roughly divided into symmetric encryption and asymmetric encryption, the generation and management of a key are transmitted together with encrypted data, and the risk of cracking is high. It would be desirable to develop an encryption system that completely separates the encryption key from the encrypted data. And the encrypted key generation does not depend on the encryption system of the computer system, and the data security of the computer system is greatly improved.
Disclosure of Invention
The invention mainly aims to provide a data encryption system, method and device, which have the advantages of high data security, high encryption efficiency and high cracking difficulty.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
a system for data encryption based on spectral analysis, the system comprising: the spectrum key generation device is used for performing spectrum analysis on the liquid reagent and generating an encryption key according to a parameter result obtained by the analysis; encrypting means for encrypting data based on the generated key; the spectral key generation device performs spectral analysis on the liquid reagent, and the method for generating the encrypted key according to the parameter result obtained by the analysis executes the following steps: step 1: carrying out spectral analysis on the liquid reagent, and setting the obtained parameter result set as follows according to the parameter result obtained by analysis: (a, b, c …); step 2: generating a random encrypted sequence template Sm(ii) a And step 3: two parameters are selected from the obtained parameter result set to generate an encryption sequence
Figure BDA0002374970270000031
Wherein f isLThe method is chaotic mapping and is used for generating an encryption driving sequence, namely an initial value of the sequence at the encryption starting moment; a and b are respectively a driving parameter and a control parameter of chaotic mapping; f. ofTIn order to be a conjugate chaotic map,
Figure BDA0002374970270000032
the value of the ith sequence at the moment n is shown, and the value range of i is a natural number; lambda is an adjusting parameter, and the value range is (1-5); adjusting coefficient of epsilon bit, takingThe value range is (0.2-0.8).
Further, the step 1: performing spectral analysis on the liquid reagent, and executing the following steps according to a parameter result obtained by the analysis: extracting a liquid reagent required for encryption, and mixing another reaction reagent of the liquid reagent to prepare a sample for encryption; receiving the sample, and generating an optical signal by scattered light generated under the irradiation of a light source; processing the scattered light reception signals from the light detection means and generating therefrom measurement signals, performing an analysis on the measurement signals to obtain parameter information of the sample, the parameter information being used as a parameter result of the analysis.
Further, the encryption device is configured to perform the following steps according to the generated key: step 1: carrying out data transformation on data needing to be encrypted to obtain transformed data, and finishing a transformation process by using the following formula:
Figure BDA0002374970270000033
wherein, the DFD represents discrete Fresnel transformation, j is complex unit, T is transformed encrypted data, A0Is the key sequence value at the starting moment; k is a first transformed sequence value and is a natural number; Δ x is the first transformation step, Δ y is the second transformation step, N is the second transformation sequence value, and the lower limit of the organization range is: k + 1; step 2: performing convolution operation on the key and the transformed encrypted data to obtain a final encrypted ciphertext:
Figure BDA0002374970270000041
further, the spectral key generation apparatus includes: the sample preparation device is used for extracting a liquid reagent required for encryption and mixing another reaction reagent of the liquid reagent to prepare a sample for encryption; the light detection device is used for receiving the sample, scattering light generated under the irradiation of the light source and generating a light signal; and the control device is used for processing the scattered light receiving signals from the light detection device to generate measuring signals, analyzing according to the measuring signals to obtain parameter information of the sample, and taking the parameter information as a parameter result obtained by analysis.
Further, the sample preparation device comprises: a mixing device for preparing a sample containing a liquid reagent for encryption and a reaction reagent; a flow chamber for flowing the sample; a light source for illuminating the sample flowing in the flow cell; the light detection device is used for receiving scattered light generated by the sample under the irradiation of the light source and generating a light signal; the control device includes: a signal processing section and an optical signal analyzing section; the signal processing part is used for processing a scattered light receiving signal from the light detection device and generating a measuring signal according to the scattered light receiving signal, and the measuring signal comprises; the optical signal analyzing section includes: weighting means for weighting the optical signal by a spectral weighting function; detection means for detecting the weighted optical signal; the optical signal comprising a principal component and a further component, the measured weighted optical signal comprising a portion related to the amplitude of the principal component and a further portion related to a further amplitude of the further component, analysis means for modulating the measured weighted optical signal, the difference between the modulated measured weighted optical signal and the measured weighted optical signal being related to the amplitude of the principal component, determining the amplitude of the principal component of the optical signal on the basis of the modulation result, obtaining an analysis result on the basis of the amplitude of the principal component; the electric signal analysis part is used for generating corresponding waveforms according to the electric signals, obtaining analysis results according to the waveforms, obtaining sample parameter information according to the analysis results, and using the parameter information as a key for encryption.
A method of data encryption based on spectral analysis, the method performing the steps of: carrying out spectral analysis on the liquid reagent, and generating an encryption key according to a parameter result obtained by the analysis; and encrypting the data according to the generated key.
Further, the spectral key generation device performs spectral analysis on the liquid reagent, and the method for generating the encryption key according to the parameter result obtained by the analysis performs the following steps: step 1: spectroscopic analysis of liquid reagentsAnd according to the parameter result obtained by analysis, setting the obtained parameter result set as: (a, b, c …); step 2: generating a random encrypted sequence template Sm(ii) a And step 3: two parameters are selected from the obtained parameter result set to generate an encryption sequence
Figure BDA0002374970270000051
Wherein f isLThe method is chaotic mapping and is used for generating an encryption driving sequence, namely an initial value of the sequence at the encryption starting moment; a and b are respectively a driving parameter and a control parameter of chaotic mapping; f. ofTIn order to be a conjugate chaotic map,
Figure BDA0002374970270000052
the value of the ith sequence at the moment n is shown, and the value range of i is a natural number; lambda is an adjusting parameter, and the value range is (1-5); and the epsilon adjusting coefficient has a value range of (0.2-0.8).
Further, the step 1: performing spectral analysis on the liquid reagent, and executing the following steps according to a parameter result obtained by the analysis: extracting a liquid reagent required for encryption, and mixing another reaction reagent of the liquid reagent to prepare a sample for encryption; receiving the sample, and generating an optical signal by scattered light generated under the irradiation of a light source; processing the scattered light reception signals from the light detection means and generating therefrom measurement signals, performing an analysis on the measurement signals to obtain parameter information of the sample, the parameter information being used as a parameter result of the analysis.
Further, the encryption device is configured to perform the following steps according to the generated key: step 1: carrying out data transformation on data needing to be encrypted to obtain transformed data, and finishing a transformation process by using the following formula:
Figure BDA0002374970270000061
wherein, the DFD represents discrete Fresnel transformation, j is complex unit, T is transformed encrypted data, S0To openA key sequence value at the starting time; k is a first transformed sequence value and is a natural number; Δ x is the first transformation step, Δ y is the second transformation step, N is the second transformation sequence value, and the lower limit of the organization range is: k + 1; step 2: performing convolution operation on the key and the transformed encrypted data to obtain a final encrypted ciphertext:
Figure BDA0002374970270000062
a data encryption apparatus based on spectral analysis, the apparatus being a non-transitory computer readable storage medium storing computing instructions comprising: carrying out spectral analysis on the liquid reagent, and generating a code segment for encrypting a secret key according to a parameter result obtained by analysis; and a code segment for encrypting the data according to the generated key.
The data encryption system and method based on spectral analysis have the following beneficial effects: according to the invention, after the liquid reagents are reacted, the liquid reagents are subjected to spectral analysis, and because the physical characteristics of each liquid reagent are different and are influenced by the components of the liquid reagents, the pH value, the temperature and the geographical position of the reagent, the result obtained by the spectral analysis cannot be predicted. The unpredictable parameters obtained through spectral analysis are used as parameter results for encryption and can not be predicted, an innovative chaotic mapping encryption algorithm is adopted in the encryption process, the generation process of an encryption sequence is also based on a new algorithm formula, a generated key is produced in a mode completely different from the prior art, and the cracking difficulty is increased. In the encryption process, data transformation is carried out on the encrypted data, so that the encrypted data subjected to data transformation and the encrypted key can be coupled, the encrypted information can be decrypted by the receiving end, and the encryption efficiency of the transformed data is higher.
Drawings
Fig. 1 is a schematic system structure diagram of a data encryption system based on spectral analysis according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of a method for data encryption based on spectral analysis according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating the experimental effect of comparing the cracking rate of encrypted data with the cracking rate of encrypted data in the prior art in the data encryption system, method and device based on spectral analysis according to the embodiment of the present invention.
1-experimental curve schematic diagram of prior art, 2-experimental curve schematic diagram of the invention for processing high quality voice.
Detailed Description
The method of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments of the invention.
Example 1
As shown in fig. 1, a system for data encryption based on spectral analysis, the system comprising: the spectrum key generation device is used for performing spectrum analysis on the liquid reagent and generating an encryption key according to a parameter result obtained by the analysis; encrypting means for encrypting data based on the generated key; the spectral key generation device performs spectral analysis on the liquid reagent, and the method for generating the encrypted key according to the parameter result obtained by the analysis executes the following steps: step 1: carrying out spectral analysis on the liquid reagent, and setting the obtained parameter result set as follows according to the parameter result obtained by analysis: (a, b, c …); step 2: generating a random encrypted sequence template Sm(ii) a And step 3: two parameters are selected from the obtained parameter result set to generate an encryption sequence
Figure BDA0002374970270000071
Wherein f isLThe method is chaotic mapping and is used for generating an encryption driving sequence, namely an initial value of the sequence at the encryption starting moment; a and b are respectively a driving parameter and a control parameter of chaotic mapping; f. ofTIn order to be a conjugate chaotic map,
Figure BDA0002374970270000081
the value of the ith sequence at the moment n is shown, and the value range of i is a natural number; lambda is an adjusting parameter, and the value range is (1-5); adjusting coefficient of epsilon position, and value rangeIs (0.2 to 0.8).
By adopting the technical scheme, the liquid reagents are subjected to spectral analysis after reaction, and the results obtained by spectral analysis cannot be predicted because the physical characteristics of each liquid reagent are different and are influenced by the components of the liquid reagents and also are related to the pH value, the temperature and the geographical position of the reagent. The unpredictable parameters obtained through spectral analysis are used as parameter results for encryption and can not be predicted, an innovative chaotic mapping encryption algorithm is adopted in the encryption process, the generation process of an encryption sequence is also based on a new algorithm formula, a generated key is produced in a mode completely different from the prior art, and the cracking difficulty is increased. In the encryption process, data transformation is carried out on the encrypted data, so that the encrypted data subjected to data transformation and the encrypted key can be coupled, the encrypted information can be decrypted by the receiving end, and the encryption efficiency of the transformed data is higher.
Example 2
On the basis of the above embodiment, the step 1: performing spectral analysis on the liquid reagent, and executing the following steps according to a parameter result obtained by the analysis: extracting a liquid reagent required for encryption, and mixing another reaction reagent of the liquid reagent to prepare a sample for encryption; receiving the sample, and generating an optical signal by scattered light generated under the irradiation of a light source; processing the scattered light reception signals from the light detection means and generating therefrom measurement signals, performing an analysis on the measurement signals to obtain parameter information of the sample, the parameter information being used as a parameter result of the analysis.
The method for identifying the substance and determining the chemical composition and relative content of the substance according to the spectrum of the substance is called spectral analysis, which has the advantages of sensitivity and rapidness, historically, a plurality of new elements such as rubidium, cesium, helium and the like are discovered through spectral analysis, and spectral analysis can be divided into emission spectral analysis and absorption spectral analysis according to the analysis principle; the analysis can be divided into atomic spectrum analysis and molecular spectrum analysis according to the form of the component to be measured. The spectral analysis is called atomic spectrum when the measured component is an atom, and molecular spectrum when the measured component is a molecule.
The method is called spectral analysis, where emission spectra and absorption spectra are used, and has the advantage of being very sensitive and rapid, and where the content of a certain element in a substance is 10^ -10 (minus 10 th power of 10) grams, it can be found from the spectra and thus examined, spectral analysis has found wide application in scientific technology, for example, where the semiconductor material silicon and germanium are examined to meet high purity requirements, it has been used historically, and has helped to find many new elements, for example, rubidium and cesium have been found from spectra, which have been useful for studying the chemical composition of celestial bodies, the nineteenth century, when the solar spectrum is studied, it is found that there are many dark lines in its continuous spectrum. It is known that the atmosphere of the sun contains dozens of elements such as hydrogen, helium, nitrogen, carbon, oxygen, iron, magnesium, silicon, calcium, sodium, etc. by carefully analyzing the dark lines and comparing the dark lines with characteristic lines of various atoms.
Example 3
On the basis of the above embodiment, the encryption device, the method for encrypting data according to the generated key, performs the following steps: step 1: carrying out data transformation on data needing to be encrypted to obtain transformed data, and finishing a transformation process by using the following formula:
Figure BDA0002374970270000101
wherein, the DFD represents discrete Fresnel transformation, j is complex unit, T is transformed encrypted data, S0Is the key sequence value at the starting moment; k is a first transformed sequence value and is a natural number; Δ x is the first transformation step, Δ y is the second transformation step, N is the second transformation sequence value, and the lower limit of the organization range is: k + 1; step 2: performing convolution operation on the key and the transformed encrypted data to obtain a final encrypted ciphertext:
Figure BDA0002374970270000102
by adopting the technical scheme, the data transformation of the invention uses Fresnel transformation to obtain the discrete data of the encrypted data, so that the efficiency of the encryption process is higher. Fresnel transformation is a special case of linear standard transformation, which is widely used in the optical field, and mainly for describing the propagation condition of electromagnetic waves in the near field region in air, it can also be obtained by approximation through the schiff diffraction formula.
Example 4
On the basis of the above embodiment, the spectral key generation apparatus includes: the sample preparation device is used for extracting a liquid reagent required for encryption and mixing another reaction reagent of the liquid reagent to prepare a sample for encryption; the light detection device is used for receiving the sample, scattering light generated under the irradiation of the light source and generating a light signal; and the control device is used for processing the scattered light receiving signals from the light detection device to generate measuring signals, analyzing according to the measuring signals to obtain parameter information of the sample, and taking the parameter information as a parameter result obtained by analysis.
Example 5
On the basis of the above embodiment, the sample preparation apparatus includes: a mixing device for preparing a sample containing a liquid reagent for encryption and a reaction reagent; a flow chamber for flowing the sample; a light source for illuminating the sample flowing in the flow cell; the light detection device is used for receiving scattered light generated by the sample under the irradiation of the light source and generating a light signal; the control device includes: a signal processing section and an optical signal analyzing section; the signal processing part is used for processing a scattered light receiving signal from the light detection device and generating a measuring signal according to the scattered light receiving signal, and the measuring signal comprises; the optical signal analyzing section includes: weighting means for weighting the optical signal by a spectral weighting function; detection means for detecting the weighted optical signal; the optical signal comprising a principal component and a further component, the measured weighted optical signal comprising a portion related to the amplitude of the principal component and a further portion related to a further amplitude of the further component, analysis means for modulating the measured weighted optical signal, the difference between the modulated measured weighted optical signal and the measured weighted optical signal being related to the amplitude of the principal component, determining the amplitude of the principal component of the optical signal on the basis of the modulation result, obtaining an analysis result on the basis of the amplitude of the principal component; the electric signal analysis part is used for generating corresponding waveforms according to the electric signals, obtaining analysis results according to the waveforms, obtaining sample parameter information according to the analysis results, and using the parameter information as a key for encryption.
By adopting the technical scheme, the absorption or emission spectrum (from ultraviolet to far infrared to microwave spectrum) generated by the change of the internal motion state of the molecule is generated. Molecular motion includes rotation of the whole molecule, vibration of atoms in the molecule at equilibrium positions, and movement of electrons within the molecule, and thus, molecular spectra are generally of three types: rotational spectra, vibrational spectra, and electronic spectra. The transition of electrons in molecules at different energy levels produces an electron spectrum. They are also known as the ultraviolet-visible spectrum because they are in the ultraviolet and visible regions. The electronic transition is often accompanied by a vibrational transition of lesser energy, so it is a band spectrum. Corresponding to the different vibrational energy level transitions of the same electronic energy state is the vibrational spectrum, which is in the infrared region and is called the infrared spectrum. The vibration is accompanied with the transition of the rotation energy level, so that the spectrum of the part also has more dense spectral lines, which is also called as a vibration-transition spectrum. The spectrum produced purely by transitions between molecular rotation energy levels is called the rotation spectrum. This portion of the spectrum is generally in the far infrared and microwave regions of relatively long wavelength and is referred to as the far infrared spectrum or microwave spectrum.
Example 6
A method of data encryption based on spectral analysis, the method performing the steps of: carrying out spectral analysis on the liquid reagent, and generating an encryption key according to a parameter result obtained by the analysis; and encrypting the data according to the generated key.
Example 7
On the basis of the last embodiment, the spectral key generation device performs spectral analysis on the liquid reagent, and the method for generating the encryption key according to the parameter result obtained by the analysis performs the following steps: step 1: carrying out spectral analysis on the liquid reagent, and setting the obtained parameter result set as follows according to the parameter result obtained by analysis: (a, b, c …); step 2: generating a random encrypted sequence template Sm(ii) a And step 3: two parameters are selected from the obtained parameter result set to generate an encryption sequence
Figure BDA0002374970270000121
Wherein f isLThe method is chaotic mapping and is used for generating an encryption driving sequence, namely an initial value of the sequence at the encryption starting moment; a and b are respectively a driving parameter and a control parameter of chaotic mapping; f. ofTIn order to be a conjugate chaotic map,
Figure BDA0002374970270000122
the value of the ith sequence at the moment n is shown, and the value range of i is a natural number; lambda is an adjusting parameter, and the value range is (1-5); and the epsilon adjusting coefficient has a value range of (0.2-0.8).
Example 8
On the basis of the above embodiment, the step 1: performing spectral analysis on the liquid reagent, and executing the following steps according to a parameter result obtained by the analysis: extracting a liquid reagent required for encryption, and mixing another reaction reagent of the liquid reagent to prepare a sample for encryption; receiving the sample, and generating an optical signal by scattered light generated under the irradiation of a light source; processing the scattered light reception signals from the light detection means and generating therefrom measurement signals, performing an analysis on the measurement signals to obtain parameter information of the sample, the parameter information being used as a parameter result of the analysis.
Example 9
On the basis of the above embodiment, the encryption device, the method for encrypting data according to the generated key, performs the following steps: step 1: carrying out data transformation on data needing to be encrypted to obtain transformed data, and finishing a transformation process by using the following formula:
Figure BDA0002374970270000131
wherein, the DFD represents discrete Fresnel transformation, j is complex unit, T is transformed encrypted data, S0Is the key sequence value at the starting moment; k is a first transformed sequence value and is a natural number; Δ x is the first transformation step, Δ y is the second transformation step, N is the second transformation sequence value, and the lower limit of the organization range is: k + 1; step 2: performing convolution operation on the key and the transformed encrypted data to obtain a final encrypted ciphertext:
Figure BDA0002374970270000132
example 10
A data encryption apparatus based on spectral analysis, the apparatus being a non-transitory computer readable storage medium storing computing instructions comprising: carrying out spectral analysis on the liquid reagent, and generating a code segment for encrypting a secret key according to a parameter result obtained by analysis; and a code segment for encrypting the data according to the generated key.
The above description is only an embodiment of the present invention, but not intended to limit the scope of the present invention, and any structural changes made according to the present invention should be considered as being limited within the scope of the present invention without departing from the spirit of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional modules, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the modules or steps in the embodiment of the present invention are further decomposed or combined, for example, the modules in the foregoing embodiment may be combined into one module, or may be further split into multiple sub-modules, so as to complete all or part of the functions described above. The names of the modules and steps involved in the embodiments of the present invention are only for distinguishing the modules or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage device and the processing device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art would appreciate that the various illustrative modules, method steps, and modules described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the software modules, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing or implying a particular order or sequence.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (10)

1. A data encryption system, the system comprising: the spectrum key generation device is used for performing spectrum analysis on the liquid reagent and generating an encryption key according to a parameter result obtained by the analysis; encrypting means for encrypting data based on the generated key; the method is characterized in that the spectral key generation device performs spectral analysis on the liquid reagent, and generates the encrypted key according to the parameter result obtained by the analysis, and the method comprises the following steps: step 1: carrying out spectral analysis on the liquid reagent, and setting the obtained parameter result set as follows according to the parameter result obtained by analysis: (a, b, c …); step 2: generating a random encrypted sequence template Sm(ii) a And step 3: two parameters are selected from the obtained parameter result set to generate an encryption sequence
Figure FDA0002374970260000011
Wherein f isLThe method is chaotic mapping and is used for generating an encryption driving sequence, namely an initial value of the sequence at the encryption starting moment; a and b are respectively a driving parameter and a control parameter of chaotic mapping; f. ofTIn order to be a conjugate chaotic map,
Figure FDA0002374970260000012
the value of the ith sequence at the moment n is shown, and the value range of i is a natural number; lambda is an adjusting parameter, and the value range is (1-5); and the epsilon adjusting coefficient has a value range of (0.2-0.8).
2. The system of claim 1, wherein the step 1: performing spectral analysis on the liquid reagent, and executing the following steps according to a parameter result obtained by the analysis: extracting a liquid reagent required for encryption, and mixing another reaction reagent of the liquid reagent to prepare a sample for encryption; receiving the sample, and generating an optical signal by scattered light generated under the irradiation of a light source; processing the scattered light reception signals from the light detection means and generating therefrom measurement signals, performing an analysis on the measurement signals to obtain parameter information of the sample, the parameter information being used as a parameter result of the analysis.
3. The system of claim 2, wherein the encryption means, the method for encrypting data based on the generated key, performs the steps of: step 1: carrying out data transformation on data needing to be encrypted to obtain transformed data, and finishing a transformation process by using the following formula:
Figure FDA0002374970260000021
wherein, the DFD represents discrete Fresnel transformation, j is complex unit, T is transformed encrypted data, S0Is the key sequence value at the starting moment; k is a first transformed sequence value and is a natural number; Δ x is the first transformation step, Δ y is the second transformation step, N is the second transformation sequence value, and the lower limit of the organization range is: k + 1; step 2: performing convolution operation on the key and the transformed encrypted data to obtain a final encrypted ciphertext:
Figure FDA0002374970260000022
4. the system of claim 3, wherein the spectral key generation apparatus comprises: the sample preparation device is used for extracting a liquid reagent required for encryption and mixing another reaction reagent of the liquid reagent to prepare a sample for encryption; the light detection device is used for receiving the sample, scattering light generated under the irradiation of the light source and generating a light signal; and the control device is used for processing the scattered light receiving signals from the light detection device to generate measuring signals, analyzing according to the measuring signals to obtain parameter information of the sample, and taking the parameter information as a parameter result obtained by analysis.
5. The system of claim 4, wherein the sample preparation device comprises: a mixing device for preparing a sample containing a liquid reagent for encryption and a reaction reagent; a flow chamber for flowing the sample; a light source for illuminating the sample flowing in the flow cell; the light detection device is used for receiving scattered light generated by the sample under the irradiation of the light source and generating a light signal; the control device includes: a signal processing section and an optical signal analyzing section; the signal processing part is used for processing a scattered light receiving signal from the light detection device and generating a measuring signal according to the scattered light receiving signal, and the measuring signal comprises; the optical signal analyzing section includes: weighting means for weighting the optical signal by a spectral weighting function; detection means for detecting the weighted optical signal; the optical signal comprising a principal component and a further component, the measured weighted optical signal comprising a portion related to the amplitude of the principal component and a further portion related to a further amplitude of the further component, analysis means for modulating the measured weighted optical signal, the difference between the modulated measured weighted optical signal and the measured weighted optical signal being related to the amplitude of the principal component, determining the amplitude of the principal component of the optical signal on the basis of the modulation result, obtaining an analysis result on the basis of the amplitude of the principal component; the electric signal analysis part is used for generating corresponding waveforms according to the electric signals, obtaining analysis results according to the waveforms, obtaining sample parameter information according to the analysis results, and using the parameter information as a key for encryption.
6. Data encryption method based on the system of one of claims 1 to 5, characterized in that it performs the following steps: carrying out spectral analysis on the liquid reagent, and generating an encryption key according to a parameter result obtained by the analysis; and encrypting the data according to the generated key.
7. The method of claim 6, wherein the spectral key generation device performs a spectral analysis of the liquid reagent, and wherein the method of generating the cryptographic key based on the parameter results from the analysis performs the steps of: step 1: carrying out spectral analysis on the liquid reagent, and setting the obtained parameter result set as follows according to the parameter result obtained by analysis: (a, b, c …); step 2: generating a random encrypted sequence template Sm(ii) a And step 3: two parameters are selected from the obtained parameter result set to generate an encryption sequence
Figure FDA0002374970260000031
Wherein f isLThe method is chaotic mapping and is used for generating an encryption driving sequence, namely an initial value of the sequence at the encryption starting moment; a and b are respectively a driving parameter and a control parameter of chaotic mapping; f. ofTIn order to be a conjugate chaotic map,
Figure FDA0002374970260000032
the value of the ith sequence at the moment n is shown, and the value range of i is a natural number; lambda is an adjusting parameter, and the value range is (1-5); and the epsilon adjusting coefficient has a value range of (0.2-0.8).
8. The method of claim 7, wherein the step 1: performing spectral analysis on the liquid reagent, and executing the following steps according to a parameter result obtained by the analysis: extracting a liquid reagent required for encryption, and mixing another reaction reagent of the liquid reagent to prepare a sample for encryption; receiving the sample, and generating an optical signal by scattered light generated under the irradiation of a light source; processing the scattered light reception signals from the light detection means and generating therefrom measurement signals, performing an analysis on the measurement signals to obtain parameter information of the sample, the parameter information being used as a parameter result of the analysis.
9. The method of claim 8, wherein the encryption means, the method for encrypting data based on the generated key, performs the steps of: step 1: carrying out data transformation on data needing to be encrypted to obtain transformed data, and finishing a transformation process by using the following formula:
Figure FDA0002374970260000041
wherein, the DFD represents discrete Fresnel transformation, j is complex unit, T is transformed encrypted data, S0Is the key sequence value at the starting moment; k is a first transformed sequence value and is a natural number; Δ x is the first transformation step, Δ y is the second transformation step, N is the second transformation sequence value, and the lower limit of the organization range is: k + 1; step 2: performing convolution operation on the key and the transformed encrypted data to obtain a final encrypted ciphertext:
Figure FDA0002374970260000042
10. a data encryption apparatus based on the method of any one of claims 6 to 9, characterized in that the apparatus is a non-transitory computer-readable storage medium storing computing instructions comprising: carrying out spectral analysis on the liquid reagent, and generating a code segment for encrypting a secret key according to a parameter result obtained by analysis; and a code segment for encrypting the data according to the generated key.
CN202010062588.9A 2020-01-20 2020-01-20 Data encryption system, method and device Pending CN111327417A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010062588.9A CN111327417A (en) 2020-01-20 2020-01-20 Data encryption system, method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010062588.9A CN111327417A (en) 2020-01-20 2020-01-20 Data encryption system, method and device

Publications (1)

Publication Number Publication Date
CN111327417A true CN111327417A (en) 2020-06-23

Family

ID=71170917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010062588.9A Pending CN111327417A (en) 2020-01-20 2020-01-20 Data encryption system, method and device

Country Status (1)

Country Link
CN (1) CN111327417A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113484281A (en) * 2021-05-28 2021-10-08 太原理工大学 Optical encryption device and method based on unique light scattering characteristics of biological tissues

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006097426A (en) * 2004-09-30 2006-04-13 Nikon Corp Optical key system
CN102664727A (en) * 2012-04-11 2012-09-12 南京邮电大学 Virtual optical encryption method based on chaotic mapping
CN105117653A (en) * 2015-07-23 2015-12-02 王家俊 Near infrared spectrum data encryption method
CN110581765A (en) * 2019-09-17 2019-12-17 温州海发智能科技有限公司 Data transmission system, method and device based on molecular encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006097426A (en) * 2004-09-30 2006-04-13 Nikon Corp Optical key system
CN102664727A (en) * 2012-04-11 2012-09-12 南京邮电大学 Virtual optical encryption method based on chaotic mapping
CN105117653A (en) * 2015-07-23 2015-12-02 王家俊 Near infrared spectrum data encryption method
CN110581765A (en) * 2019-09-17 2019-12-17 温州海发智能科技有限公司 Data transmission system, method and device based on molecular encryption

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113484281A (en) * 2021-05-28 2021-10-08 太原理工大学 Optical encryption device and method based on unique light scattering characteristics of biological tissues
CN113484281B (en) * 2021-05-28 2023-03-14 太原理工大学 Optical encryption device and method based on unique light scattering characteristics of biological tissues

Similar Documents

Publication Publication Date Title
US9647834B2 (en) Systems and methods with cryptography and tamper resistance software security
CN104917617B (en) A kind of encryption group ranking obscures method
CN110581765A (en) Data transmission system, method and device based on molecular encryption
CN111327417A (en) Data encryption system, method and device
Aslan et al. Energy consumption analysis of lightweight cryptographic algorithms that can be used in the security of Internet of Things applications
Hamed et al. Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption.
CN112528309A (en) Data storage encryption and decryption method and device
Alshehri et al. A review paper for the role of cryptography in network security
Bangera et al. A hybrid encryption approach for secured authentication and enhancement in confidentiality of data
Shirole et al. Review paper on data security in cloud computing environment
CN112000981B (en) Computer encryption system and method based on molecular encryption
Ucci et al. Near-real-time anomaly detection in encrypted traffic using machine learning techniques
Abdulkarim et al. An enhanced cloud based security system using RSA as digital signature and image steganography
CN105812122A (en) Method for establishing correlativity of Hamming weight and optical radiation of cipher chip
Anusha et al. Cryptography: The Sciene of Secure Communication
Pandey et al. Data security using various cryptography Techniques: A Recent Survey
Mekinda et al. Securing light source SCADA systems
Sai et al. A Survey on IoT Security Using Cryptographic Algorithms
Sai et al. Hybrid encryption for medical applications using advanced algorithms in internet of things
CN115296809B (en) Data transmission method of intelligent engineering construction information system supporting asynchronous decryption at two ends
KR102527443B1 (en) Energy cloud system using energy object data
Gowtham Akshaya Kumaran et al. Real-time segregation of encrypted data using entropy
Fadel et al. Secured Water Quality Monitoring System based on IOT
TW201839673A (en) SYSTEM FOR GENERATing AND decrypting two-dimensional codeS AND method THEREOF
Hilal et al. Enhanced Data Security in IoT-Cloud Communication: Using Lightweight Cryptography Approach

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200623