CN111490984A - Network data coding and encryption algorithm thereof - Google Patents

Network data coding and encryption algorithm thereof Download PDF

Info

Publication number
CN111490984A
CN111490984A CN202010258815.5A CN202010258815A CN111490984A CN 111490984 A CN111490984 A CN 111490984A CN 202010258815 A CN202010258815 A CN 202010258815A CN 111490984 A CN111490984 A CN 111490984A
Authority
CN
China
Prior art keywords
data
private
bits
code
encoding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010258815.5A
Other languages
Chinese (zh)
Other versions
CN111490984B (en
Inventor
张东
李丹
王景夏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Kuanchuang International Culture Technology Co ltd
Original Assignee
Shanghai Kuanchuang International Culture Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Kuanchuang International Culture Technology Co ltd filed Critical Shanghai Kuanchuang International Culture Technology Co ltd
Priority to CN202010258815.5A priority Critical patent/CN111490984B/en
Publication of CN111490984A publication Critical patent/CN111490984A/en
Application granted granted Critical
Publication of CN111490984B publication Critical patent/CN111490984B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)

Abstract

The invention discloses a network data coding and encrypting method, which at least comprises the steps of establishing a private coding table by a data sending end, determining data bits and segmentation codes of the coding table, compressing original data to be transmitted during transmission, reserving effective data in the transmitted data, mapping the effective data into the private coding table, segmenting the effective data through the segmentation codes of the private coding table, receiving the recoded data by a data receiving end, decoding and remapping the recoded data into the original data.

Description

Network data coding and encryption algorithm thereof
Technical Field
The invention discloses a computer data compression and encryption technology, and particularly relates to a network data coding and encryption algorithm thereof.
Background
Data compression technology, that is, technology for representing signals by using minimum numbers; the basic process of the encryption algorithm is to process the original plaintext file or data according to a certain algorithm to make the original plaintext file or data become an unreadable segment of code, which is generally called as "ciphertext", so that the original content can be displayed only after a corresponding key is input, and the purpose of protecting the data from being stolen and read by an illegal person is achieved through the way. Current data compression and encryption algorithms are well-established, but have a number of problems, such as: most of the current algorithms are complex in calculation and have high requirements on the performance of hardware; the data volume increases after encryption; currently, the compression algorithm and the encryption algorithm are independent, so that the operation cost is increased, and based on the problems, the existing compression and encryption algorithms are difficult to operate on a low-end processor or operate at high efficiency, so that the response capability of the embedded component is greatly influenced.
In addition, the technical scheme in the current market pursues multiple application scenes and multi-language access, so that the corresponding algorithm is increasingly bloated and the calculation is increasingly complex, the format of the current data is mostly sent by JSON, XM L and other protocols, the content is sent in a Key-Value form, the readability is enhanced, but the data size and the complexity of a processing program are greatly increased.
Therefore, in view of the defects of the prior art, those skilled in the art are devoted to developing a network data encoding and its encryption algorithm to achieve simultaneous data compression and encryption, and reduce the amount of transmitted data, so that the network data encoding and its encryption algorithm can be applied to high-end processor devices and low-end processor devices.
Disclosure of Invention
The present invention aims to provide a network data encoding and its encryption algorithm, based on the network data encoding and its encryption method, the present invention aims to implement simultaneous data compression and encryption, reduce the amount of data to be transmitted, and can be implemented in multiple languages, and simultaneously applied to high-end processor devices and low-end processor devices, so as to solve the above problems in the prior art.
The purpose of the invention is realized by the following technical scheme:
a network data coding and encrypting method at least comprises the following steps:
step 1: a data sending end creates a private coding table and determines data bits and segmentation codes of the coding table;
step 2: during transmission, compressing original data to be transmitted, and reserving effective data in the transmitted data;
step 3: mapping the effective data in Step2 to the private coding table created in Step1, and partitioning the effective data through the partition codes of the private coding table;
step 4: the data receiving end receives the data re-encoded in Step3, decodes the data, and re-maps the data to the original data.
Further, in Step1, a private code sheet was created using the same eight bit bits to express 128 characters, with reference to the standard ASC LL (american standard code for information exchange, a computer code system based on latin letters, mainly used to display modern english and other western european languages, being the most common standard for information exchange, and being equivalent to the international standard ISO/IEC 646).
Further, in the private coding table, the last seven bits (bit 1-7 bits) of the eight bits represent data characters, and the first bit (bit0 bit) divides the code to express the continuity of the data.
Furthermore, the number and the types of the characters of the private coding table are the same as those of the ASC LL table of the original data referred by the private coding table, and in order to increase the difficulty of data cracking, the same set of corresponding tables of the scrambled characters and the indexes are used for encrypting the communication data at the data sending end and the data receiving end of program communication.
Furthermore, each data communication transmission is a different private code table.
Furthermore, the Byte (Byte, a measurement unit used in computer information technology to measure storage capacity, 1Byte ═ 8bit) split codes of the same data are represented by the same data, and the split code of the Byte of the next data is the inverse value of the split code of the previous data.
Further, when Step2 compresses data, since both the data sending end and the data receiving end of the program communication are defined, there is data known in both the programs of the data sending end and the data receiving end, the data known by both the ends of the program communication do not need to be transmitted repeatedly, and the data unknown by both the ends of the program communication are transmitted as effective data for transmission.
Further, the private encoding table may be compatible with the ASC LL encoding table.
Based on the above network data encoding and encrypting method, the present invention also provides a computer readable storage medium in which a program is stored, which when executed can perform the above network data encoding and encrypting method.
By implementing the network data coding and the encryption method thereof, the following beneficial effects are achieved:
1. the private coding table created by the technical scheme can be compatible with ASC LL codes to ensure the universality of the technical scheme and can be compatible with the current common data communication protocol mode;
2. the technical scheme of the invention optimizes protocol data coding, compresses data, adopts a data compression mode for removing known data at two ends of program communication and reserving other data during transmission, reduces data transmission quantity and reduces the transmission pressure of a processor;
3. the technical scheme of the invention encrypts data while compressing the data, and realizes the data compression and encryption functions by one-time calculation;
4. the technical scheme of the invention has simple and reliable principle, can be realized in multiple languages, and can be simultaneously applied to high-end processor equipment and low-end processor equipment.
Drawings
FIG. 1 is a table of standard ASC LL in an embodiment of the present invention;
FIG. 2 is a private code sheet created by an embodiment of the present invention;
FIG. 3 is a table of data compression and encryption comparisons according to an embodiment of the present invention;
FIG. 4 is a table of valid data and segmented codes according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A network data coding and encrypting method at least comprises the following steps:
step 1: a data sending end creates a private coding table and determines data bits and segmentation codes of the coding table;
step 2: during transmission, compressing original data to be transmitted, and reserving effective data in the transmitted data;
step 3: mapping the effective data in Step2 to the private coding table created in Step1, and partitioning the effective data through the partition codes of the private coding table;
step 4: the data receiving end receives the data re-encoded in Step3, decodes the data, and re-maps the data to the original data.
Based on the above steps, the following examples are used for specific explanation.
Fig. 1 is a current general standard ASC LL table, and the general standard ASC LL table expresses 128 characters by eight bits, wherein, the first 7 bits (bit0-6 bits) express data, and the last bit (bit 7 bits) is used as parity bits, in this embodiment, the technical solution of the present embodiment is adjusted by taking the standard ASC LL table in fig. 1 as reference, the last seven bits (bit 1-7 bits) express ASC LL characters, and the first bit (bit0 bit) partition code expresses data continuity, as shown in fig. 2.
The number and type of characters of the new private coding table are the same as those of ASC LL of original data referred by the new private coding table, so as to increase the difficulty of data cracking, the same set of corresponding tables of scrambled characters and indexes are used at the data sending end and the data receiving end of program communication to encrypt communication data.
As shown in fig. 3, when the format of the current data is mostly sent in the JSON, XM L, etc., the content is sent in the form of Key-Value, in the data transmission, because both ends of the communication protocol are defined, the "Key" data in the data belongs to the data known by both ends of the communication protocol, and there is no need to repeat the transmission, and the "Value" data unknown by both ends of the communication protocol is encoded as the effective data for data transmission.
As shown in fig. 4, the Byte (Byte, a unit of measurement used in computer information technology to measure storage capacity, and 1Byte ═ 8bit) of the same data is represented by the same data, and the Byte of the next data is the inverse of the previous data.
And the data receiving end decodes the recoded data after receiving the recoded data and remaps the recoded data into original data.
In order to enable the private code table in the present technical solution to be efficiently applied to the current mature technical framework, the private code table in the present technical solution is designed to be compatible with the ASC LL code table, that is, the data in the ASC LL table of the original data is shifted to the new private code table by one bit to the left, such as:
byte date=0b01010101;
date=date<<1;
transcoding can be done for 32 bits of data by:
byte[]bs=new byte[4];
byte a=(byte)(number>>24);
byte b=(byte)((number&0xff0000)>>16);
byte c=(byte)((number&0xff00)>>8);
byte d=(byte)(number&0xff);
bs[0]=a;bs[1]=b;bs[2]=c;bs[3]=d;
for(int i in bs)
{
Bs[i]=Bs[i]<<1;
the data compression and data encryption processes are the same as the functions of realizing data compression and encryption through the BYTE BYTE coding and remapping mode described above, and redundant description is not repeated here.
It is to be understood that unless otherwise defined, technical or scientific terms used herein have the ordinary meaning as understood by one of ordinary skill in the art to which this invention belongs. Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any uses or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the present invention is not limited to the structures that have been described above and shown in the drawings, and that various modifications and changes can be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (9)

1. A network data coding and its encryption method is characterized by at least comprising the following steps:
step 1: a data sending end creates a private coding table and determines data bits and segmentation codes of the coding table;
step 2: during transmission, compressing original data to be transmitted, and reserving effective data in the transmitted data;
step 3: mapping the effective data in Step2 to the private coding table created in Step1, and partitioning the effective data through the partition codes of the private coding table;
step 4: the data receiving end receives the data re-encoded in Step3, decodes the data, and re-maps the data to the original data.
2. The network data encoding and encryption method as claimed in claim 1, wherein in Step1, the creation of private encoding table uses standard ASC LL table as reference, and uses the same eight bits to express 128 characters.
3. The network data encoding and encrypting method of claim 2, wherein in the private code table, the last seven bits (bit 1-7 bits) of the eight bits represent data characters, and the first bit (bit0 bit) is a partition code to express the continuity of the data.
4. A method for encoding and encrypting data according to claim 3, wherein the number and type of the characters in the private code table are the same as the ASC LL table of the original data to which the private code table refers, and in order to increase the difficulty of cracking the data, the same set of the corresponding tables of the scrambled characters and the index is used at the data transmitting end and the data receiving end of the program communication to encrypt the communication data.
5. The method as claimed in claim 4, wherein each data communication transmission is a different private code table.
6. The method as claimed in claim 3, wherein the Byte (1 Byte) split codes of the same data are represented by the same data, and the Byte split code of the next data is the inverse value of the previous data split code.
7. The method as claimed in claim 1, wherein when Step2 compresses the data, since the data sender and data receiver of the program communication are defined, so that there is data known in both programs of the data sender and data receiver, the data known in both ends of the program communication need not be transmitted repeatedly, and the data unknown in both ends of the program communication is transmitted as the effective data for transmission.
8. The network data encoding and encryption method as claimed in claim 1, wherein the private code sheet is compatible with ASC LL code sheet.
9. A computer-readable storage medium in which a program is stored, wherein the program is executed to perform the network data encoding and encryption method of any one of the preceding claims 1 to 8.
CN202010258815.5A 2020-04-03 2020-04-03 Network data coding and encryption algorithm thereof Active CN111490984B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010258815.5A CN111490984B (en) 2020-04-03 2020-04-03 Network data coding and encryption algorithm thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010258815.5A CN111490984B (en) 2020-04-03 2020-04-03 Network data coding and encryption algorithm thereof

Publications (2)

Publication Number Publication Date
CN111490984A true CN111490984A (en) 2020-08-04
CN111490984B CN111490984B (en) 2022-03-29

Family

ID=71812500

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010258815.5A Active CN111490984B (en) 2020-04-03 2020-04-03 Network data coding and encryption algorithm thereof

Country Status (1)

Country Link
CN (1) CN111490984B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112788051A (en) * 2021-01-25 2021-05-11 高新兴讯美科技股份有限公司 Https dynamic encryption transmission method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1531209A (en) * 2003-03-11 2004-09-22 佳能株式会社 Coding method and coder, computer programm and memory medium
CN1863302A (en) * 2005-11-03 2006-11-15 华为技术有限公司 Multimedia communication method and terminal thereof
KR20080045701A (en) * 2005-10-05 2008-05-23 엘지전자 주식회사 Method and apparatus for signal processing and encoding and decoding method, and apparatus therefor
CN105868194A (en) * 2015-01-19 2016-08-17 阿里巴巴集团控股有限公司 Methods and devices for text data compression and decompression
WO2018082286A1 (en) * 2016-11-04 2018-05-11 深圳国人通信股份有限公司 Encoding and decoding method and apparatus for serial communication system based on serdes technology
CN109257048A (en) * 2013-04-08 2019-01-22 索尼公司 Method, data deciphering device and the video receiver of decoding data value sequence

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1531209A (en) * 2003-03-11 2004-09-22 佳能株式会社 Coding method and coder, computer programm and memory medium
KR20080045701A (en) * 2005-10-05 2008-05-23 엘지전자 주식회사 Method and apparatus for signal processing and encoding and decoding method, and apparatus therefor
CN1863302A (en) * 2005-11-03 2006-11-15 华为技术有限公司 Multimedia communication method and terminal thereof
CN109257048A (en) * 2013-04-08 2019-01-22 索尼公司 Method, data deciphering device and the video receiver of decoding data value sequence
CN105868194A (en) * 2015-01-19 2016-08-17 阿里巴巴集团控股有限公司 Methods and devices for text data compression and decompression
WO2018082286A1 (en) * 2016-11-04 2018-05-11 深圳国人通信股份有限公司 Encoding and decoding method and apparatus for serial communication system based on serdes technology

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112788051A (en) * 2021-01-25 2021-05-11 高新兴讯美科技股份有限公司 Https dynamic encryption transmission method

Also Published As

Publication number Publication date
CN111490984B (en) 2022-03-29

Similar Documents

Publication Publication Date Title
CN109167645B (en) Data structure for physical layer encapsulation, data structure generating apparatus and method thereof
US8688621B2 (en) Systems and methods for information compression
CN103534968B (en) The coding of a kind of ethernet physical layer, coding/decoding method and device
JP2002027023A (en) Device and method for wireless data transmitting/ receiving
CN1675842B (en) Method and apparatus arithmetic coding, and related decoding method
JP2016519527A (en) Method and apparatus for compressing packet header
CN102821275A (en) Data compression method, data compression device, data decompression method and data decompression device
CN105227962B (en) A kind of lossless information concealing method based on data difference
US20240098310A1 (en) Encoding method, real-time communication method, apparatus, device, and storage medium
CN106656195A (en) Data compression decompression method and data compression decompression system
CN111490984B (en) Network data coding and encryption algorithm thereof
US20060120400A1 (en) Bidirectional communication control apparatus, terminal apparatus, and bidirectional communication control method
CN103873868A (en) Bitmap data compression method
CN111432242B (en) Encrypted video call method, device, equipment and storage medium
CN108235022A (en) A kind of computer video data processing method
US6385341B1 (en) Technique for decoding variable length data codes
CN102821489A (en) Base station and data compression method on base station side
WO2023024832A1 (en) Data processing method and apparatus, computer device and storage medium
CN113259621B (en) Cloud conference step-by-step recording method and system
CN112486885B (en) Data frame generation method, storage medium and computer equipment
JP4043073B2 (en) Outline video signal decoding method and outline video signal decoding apparatus
CN114900555A (en) Data distribution method and device based on lossless compression algorithm
CN102547267B (en) Video data decoding method and system
CN116527916A (en) Video processing method, medium, device and computing equipment
CN116033113B (en) Video conference auxiliary information transmission method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant