CN111490984A - Network data coding and encryption algorithm thereof - Google Patents
Network data coding and encryption algorithm thereof Download PDFInfo
- Publication number
- CN111490984A CN111490984A CN202010258815.5A CN202010258815A CN111490984A CN 111490984 A CN111490984 A CN 111490984A CN 202010258815 A CN202010258815 A CN 202010258815A CN 111490984 A CN111490984 A CN 111490984A
- Authority
- CN
- China
- Prior art keywords
- data
- private
- bits
- code
- encoding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/04—Protocols for data compression, e.g. ROHC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
Abstract
The invention discloses a network data coding and encrypting method, which at least comprises the steps of establishing a private coding table by a data sending end, determining data bits and segmentation codes of the coding table, compressing original data to be transmitted during transmission, reserving effective data in the transmitted data, mapping the effective data into the private coding table, segmenting the effective data through the segmentation codes of the private coding table, receiving the recoded data by a data receiving end, decoding and remapping the recoded data into the original data.
Description
Technical Field
The invention discloses a computer data compression and encryption technology, and particularly relates to a network data coding and encryption algorithm thereof.
Background
Data compression technology, that is, technology for representing signals by using minimum numbers; the basic process of the encryption algorithm is to process the original plaintext file or data according to a certain algorithm to make the original plaintext file or data become an unreadable segment of code, which is generally called as "ciphertext", so that the original content can be displayed only after a corresponding key is input, and the purpose of protecting the data from being stolen and read by an illegal person is achieved through the way. Current data compression and encryption algorithms are well-established, but have a number of problems, such as: most of the current algorithms are complex in calculation and have high requirements on the performance of hardware; the data volume increases after encryption; currently, the compression algorithm and the encryption algorithm are independent, so that the operation cost is increased, and based on the problems, the existing compression and encryption algorithms are difficult to operate on a low-end processor or operate at high efficiency, so that the response capability of the embedded component is greatly influenced.
In addition, the technical scheme in the current market pursues multiple application scenes and multi-language access, so that the corresponding algorithm is increasingly bloated and the calculation is increasingly complex, the format of the current data is mostly sent by JSON, XM L and other protocols, the content is sent in a Key-Value form, the readability is enhanced, but the data size and the complexity of a processing program are greatly increased.
Therefore, in view of the defects of the prior art, those skilled in the art are devoted to developing a network data encoding and its encryption algorithm to achieve simultaneous data compression and encryption, and reduce the amount of transmitted data, so that the network data encoding and its encryption algorithm can be applied to high-end processor devices and low-end processor devices.
Disclosure of Invention
The present invention aims to provide a network data encoding and its encryption algorithm, based on the network data encoding and its encryption method, the present invention aims to implement simultaneous data compression and encryption, reduce the amount of data to be transmitted, and can be implemented in multiple languages, and simultaneously applied to high-end processor devices and low-end processor devices, so as to solve the above problems in the prior art.
The purpose of the invention is realized by the following technical scheme:
a network data coding and encrypting method at least comprises the following steps:
step 1: a data sending end creates a private coding table and determines data bits and segmentation codes of the coding table;
step 2: during transmission, compressing original data to be transmitted, and reserving effective data in the transmitted data;
step 3: mapping the effective data in Step2 to the private coding table created in Step1, and partitioning the effective data through the partition codes of the private coding table;
step 4: the data receiving end receives the data re-encoded in Step3, decodes the data, and re-maps the data to the original data.
Further, in Step1, a private code sheet was created using the same eight bit bits to express 128 characters, with reference to the standard ASC LL (american standard code for information exchange, a computer code system based on latin letters, mainly used to display modern english and other western european languages, being the most common standard for information exchange, and being equivalent to the international standard ISO/IEC 646).
Further, in the private coding table, the last seven bits (bit 1-7 bits) of the eight bits represent data characters, and the first bit (bit0 bit) divides the code to express the continuity of the data.
Furthermore, the number and the types of the characters of the private coding table are the same as those of the ASC LL table of the original data referred by the private coding table, and in order to increase the difficulty of data cracking, the same set of corresponding tables of the scrambled characters and the indexes are used for encrypting the communication data at the data sending end and the data receiving end of program communication.
Furthermore, each data communication transmission is a different private code table.
Furthermore, the Byte (Byte, a measurement unit used in computer information technology to measure storage capacity, 1Byte ═ 8bit) split codes of the same data are represented by the same data, and the split code of the Byte of the next data is the inverse value of the split code of the previous data.
Further, when Step2 compresses data, since both the data sending end and the data receiving end of the program communication are defined, there is data known in both the programs of the data sending end and the data receiving end, the data known by both the ends of the program communication do not need to be transmitted repeatedly, and the data unknown by both the ends of the program communication are transmitted as effective data for transmission.
Further, the private encoding table may be compatible with the ASC LL encoding table.
Based on the above network data encoding and encrypting method, the present invention also provides a computer readable storage medium in which a program is stored, which when executed can perform the above network data encoding and encrypting method.
By implementing the network data coding and the encryption method thereof, the following beneficial effects are achieved:
1. the private coding table created by the technical scheme can be compatible with ASC LL codes to ensure the universality of the technical scheme and can be compatible with the current common data communication protocol mode;
2. the technical scheme of the invention optimizes protocol data coding, compresses data, adopts a data compression mode for removing known data at two ends of program communication and reserving other data during transmission, reduces data transmission quantity and reduces the transmission pressure of a processor;
3. the technical scheme of the invention encrypts data while compressing the data, and realizes the data compression and encryption functions by one-time calculation;
4. the technical scheme of the invention has simple and reliable principle, can be realized in multiple languages, and can be simultaneously applied to high-end processor equipment and low-end processor equipment.
Drawings
FIG. 1 is a table of standard ASC LL in an embodiment of the present invention;
FIG. 2 is a private code sheet created by an embodiment of the present invention;
FIG. 3 is a table of data compression and encryption comparisons according to an embodiment of the present invention;
FIG. 4 is a table of valid data and segmented codes according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A network data coding and encrypting method at least comprises the following steps:
step 1: a data sending end creates a private coding table and determines data bits and segmentation codes of the coding table;
step 2: during transmission, compressing original data to be transmitted, and reserving effective data in the transmitted data;
step 3: mapping the effective data in Step2 to the private coding table created in Step1, and partitioning the effective data through the partition codes of the private coding table;
step 4: the data receiving end receives the data re-encoded in Step3, decodes the data, and re-maps the data to the original data.
Based on the above steps, the following examples are used for specific explanation.
Fig. 1 is a current general standard ASC LL table, and the general standard ASC LL table expresses 128 characters by eight bits, wherein, the first 7 bits (bit0-6 bits) express data, and the last bit (bit 7 bits) is used as parity bits, in this embodiment, the technical solution of the present embodiment is adjusted by taking the standard ASC LL table in fig. 1 as reference, the last seven bits (bit 1-7 bits) express ASC LL characters, and the first bit (bit0 bit) partition code expresses data continuity, as shown in fig. 2.
The number and type of characters of the new private coding table are the same as those of ASC LL of original data referred by the new private coding table, so as to increase the difficulty of data cracking, the same set of corresponding tables of scrambled characters and indexes are used at the data sending end and the data receiving end of program communication to encrypt communication data.
As shown in fig. 3, when the format of the current data is mostly sent in the JSON, XM L, etc., the content is sent in the form of Key-Value, in the data transmission, because both ends of the communication protocol are defined, the "Key" data in the data belongs to the data known by both ends of the communication protocol, and there is no need to repeat the transmission, and the "Value" data unknown by both ends of the communication protocol is encoded as the effective data for data transmission.
As shown in fig. 4, the Byte (Byte, a unit of measurement used in computer information technology to measure storage capacity, and 1Byte ═ 8bit) of the same data is represented by the same data, and the Byte of the next data is the inverse of the previous data.
And the data receiving end decodes the recoded data after receiving the recoded data and remaps the recoded data into original data.
In order to enable the private code table in the present technical solution to be efficiently applied to the current mature technical framework, the private code table in the present technical solution is designed to be compatible with the ASC LL code table, that is, the data in the ASC LL table of the original data is shifted to the new private code table by one bit to the left, such as:
byte date=0b01010101;
date=date<<1;
transcoding can be done for 32 bits of data by:
byte[]bs=new byte[4];
byte a=(byte)(number>>24);
byte b=(byte)((number&0xff0000)>>16);
byte c=(byte)((number&0xff00)>>8);
byte d=(byte)(number&0xff);
bs[0]=a;bs[1]=b;bs[2]=c;bs[3]=d;
for(int i in bs)
{
Bs[i]=Bs[i]<<1;
the data compression and data encryption processes are the same as the functions of realizing data compression and encryption through the BYTE BYTE coding and remapping mode described above, and redundant description is not repeated here.
It is to be understood that unless otherwise defined, technical or scientific terms used herein have the ordinary meaning as understood by one of ordinary skill in the art to which this invention belongs. Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any uses or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the present invention is not limited to the structures that have been described above and shown in the drawings, and that various modifications and changes can be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.
Claims (9)
1. A network data coding and its encryption method is characterized by at least comprising the following steps:
step 1: a data sending end creates a private coding table and determines data bits and segmentation codes of the coding table;
step 2: during transmission, compressing original data to be transmitted, and reserving effective data in the transmitted data;
step 3: mapping the effective data in Step2 to the private coding table created in Step1, and partitioning the effective data through the partition codes of the private coding table;
step 4: the data receiving end receives the data re-encoded in Step3, decodes the data, and re-maps the data to the original data.
2. The network data encoding and encryption method as claimed in claim 1, wherein in Step1, the creation of private encoding table uses standard ASC LL table as reference, and uses the same eight bits to express 128 characters.
3. The network data encoding and encrypting method of claim 2, wherein in the private code table, the last seven bits (bit 1-7 bits) of the eight bits represent data characters, and the first bit (bit0 bit) is a partition code to express the continuity of the data.
4. A method for encoding and encrypting data according to claim 3, wherein the number and type of the characters in the private code table are the same as the ASC LL table of the original data to which the private code table refers, and in order to increase the difficulty of cracking the data, the same set of the corresponding tables of the scrambled characters and the index is used at the data transmitting end and the data receiving end of the program communication to encrypt the communication data.
5. The method as claimed in claim 4, wherein each data communication transmission is a different private code table.
6. The method as claimed in claim 3, wherein the Byte (1 Byte) split codes of the same data are represented by the same data, and the Byte split code of the next data is the inverse value of the previous data split code.
7. The method as claimed in claim 1, wherein when Step2 compresses the data, since the data sender and data receiver of the program communication are defined, so that there is data known in both programs of the data sender and data receiver, the data known in both ends of the program communication need not be transmitted repeatedly, and the data unknown in both ends of the program communication is transmitted as the effective data for transmission.
8. The network data encoding and encryption method as claimed in claim 1, wherein the private code sheet is compatible with ASC LL code sheet.
9. A computer-readable storage medium in which a program is stored, wherein the program is executed to perform the network data encoding and encryption method of any one of the preceding claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010258815.5A CN111490984B (en) | 2020-04-03 | 2020-04-03 | Network data coding and encryption algorithm thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010258815.5A CN111490984B (en) | 2020-04-03 | 2020-04-03 | Network data coding and encryption algorithm thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111490984A true CN111490984A (en) | 2020-08-04 |
CN111490984B CN111490984B (en) | 2022-03-29 |
Family
ID=71812500
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010258815.5A Active CN111490984B (en) | 2020-04-03 | 2020-04-03 | Network data coding and encryption algorithm thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111490984B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112788051A (en) * | 2021-01-25 | 2021-05-11 | 高新兴讯美科技股份有限公司 | Https dynamic encryption transmission method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1531209A (en) * | 2003-03-11 | 2004-09-22 | 佳能株式会社 | Coding method and coder, computer programm and memory medium |
CN1863302A (en) * | 2005-11-03 | 2006-11-15 | 华为技术有限公司 | Multimedia communication method and terminal thereof |
KR20080045701A (en) * | 2005-10-05 | 2008-05-23 | 엘지전자 주식회사 | Method and apparatus for signal processing and encoding and decoding method, and apparatus therefor |
CN105868194A (en) * | 2015-01-19 | 2016-08-17 | 阿里巴巴集团控股有限公司 | Methods and devices for text data compression and decompression |
WO2018082286A1 (en) * | 2016-11-04 | 2018-05-11 | 深圳国人通信股份有限公司 | Encoding and decoding method and apparatus for serial communication system based on serdes technology |
CN109257048A (en) * | 2013-04-08 | 2019-01-22 | 索尼公司 | Method, data deciphering device and the video receiver of decoding data value sequence |
-
2020
- 2020-04-03 CN CN202010258815.5A patent/CN111490984B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1531209A (en) * | 2003-03-11 | 2004-09-22 | 佳能株式会社 | Coding method and coder, computer programm and memory medium |
KR20080045701A (en) * | 2005-10-05 | 2008-05-23 | 엘지전자 주식회사 | Method and apparatus for signal processing and encoding and decoding method, and apparatus therefor |
CN1863302A (en) * | 2005-11-03 | 2006-11-15 | 华为技术有限公司 | Multimedia communication method and terminal thereof |
CN109257048A (en) * | 2013-04-08 | 2019-01-22 | 索尼公司 | Method, data deciphering device and the video receiver of decoding data value sequence |
CN105868194A (en) * | 2015-01-19 | 2016-08-17 | 阿里巴巴集团控股有限公司 | Methods and devices for text data compression and decompression |
WO2018082286A1 (en) * | 2016-11-04 | 2018-05-11 | 深圳国人通信股份有限公司 | Encoding and decoding method and apparatus for serial communication system based on serdes technology |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112788051A (en) * | 2021-01-25 | 2021-05-11 | 高新兴讯美科技股份有限公司 | Https dynamic encryption transmission method |
Also Published As
Publication number | Publication date |
---|---|
CN111490984B (en) | 2022-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109167645B (en) | Data structure for physical layer encapsulation, data structure generating apparatus and method thereof | |
US8688621B2 (en) | Systems and methods for information compression | |
CN103534968B (en) | The coding of a kind of ethernet physical layer, coding/decoding method and device | |
JP2002027023A (en) | Device and method for wireless data transmitting/ receiving | |
CN1675842B (en) | Method and apparatus arithmetic coding, and related decoding method | |
JP2016519527A (en) | Method and apparatus for compressing packet header | |
CN102821275A (en) | Data compression method, data compression device, data decompression method and data decompression device | |
CN105227962B (en) | A kind of lossless information concealing method based on data difference | |
US20240098310A1 (en) | Encoding method, real-time communication method, apparatus, device, and storage medium | |
CN106656195A (en) | Data compression decompression method and data compression decompression system | |
CN111490984B (en) | Network data coding and encryption algorithm thereof | |
US20060120400A1 (en) | Bidirectional communication control apparatus, terminal apparatus, and bidirectional communication control method | |
CN103873868A (en) | Bitmap data compression method | |
CN111432242B (en) | Encrypted video call method, device, equipment and storage medium | |
CN108235022A (en) | A kind of computer video data processing method | |
US6385341B1 (en) | Technique for decoding variable length data codes | |
CN102821489A (en) | Base station and data compression method on base station side | |
WO2023024832A1 (en) | Data processing method and apparatus, computer device and storage medium | |
CN113259621B (en) | Cloud conference step-by-step recording method and system | |
CN112486885B (en) | Data frame generation method, storage medium and computer equipment | |
JP4043073B2 (en) | Outline video signal decoding method and outline video signal decoding apparatus | |
CN114900555A (en) | Data distribution method and device based on lossless compression algorithm | |
CN102547267B (en) | Video data decoding method and system | |
CN116527916A (en) | Video processing method, medium, device and computing equipment | |
CN116033113B (en) | Video conference auxiliary information transmission method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |