CN111970237B - Encryption and decryption method, system and medium based on water depth measurement data - Google Patents

Encryption and decryption method, system and medium based on water depth measurement data Download PDF

Info

Publication number
CN111970237B
CN111970237B CN202010655100.3A CN202010655100A CN111970237B CN 111970237 B CN111970237 B CN 111970237B CN 202010655100 A CN202010655100 A CN 202010655100A CN 111970237 B CN111970237 B CN 111970237B
Authority
CN
China
Prior art keywords
data
water depth
data packet
format
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010655100.3A
Other languages
Chinese (zh)
Other versions
CN111970237A (en
Inventor
曾利梅
聂旭清
李波
蒋威
耿富强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Bangxin Data Technology Co ltd
Original Assignee
Guangdong Bangxin Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Bangxin Data Technology Co ltd filed Critical Guangdong Bangxin Data Technology Co ltd
Priority to CN202010655100.3A priority Critical patent/CN111970237B/en
Publication of CN111970237A publication Critical patent/CN111970237A/en
Application granted granted Critical
Publication of CN111970237B publication Critical patent/CN111970237B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an encryption and decryption method, system and medium based on water depth measurement data, wherein the method comprises the following steps: acquiring original water depth measurement data and generating a basic data file; checking the format of the basic data file, and analyzing the basic data file into a data packet according to a checking result; formatting the data packet to obtain a first format data packet; converting the data in the water depth format to obtain a second format data packet; encrypting the second format data packet to obtain a ciphertext; through the steps of checking the format, formatting, data conversion, encryption and the like, the text file of the readable water depth measurement data in the plaintext is converted into the text file interfered by the encryption algorithm technology, so that the safety guarantee is provided for further expanding and applying the basic water depth measurement data, the risks of malicious interception, loss or tampering and the like of the water depth measurement data are avoided, and the method can be widely applied to the technical field of computer software.

Description

Encryption and decryption method, system and medium based on water depth measurement data
Technical Field
The invention relates to the technical field of computer software, in particular to an encryption and decryption method, system, device and medium based on water depth measurement data.
Background
The noun explains: WGS84 refers to the World Geodetic System 1984, which is a coordinate System established for use by the GPS global positioning System.
AES is Advanced Encryption Standard (AES) in cryptography, also called Rijndael Encryption method, and is a block Encryption Standard.
The application of the current river and sea water depth measurement data processing and mapping in behaviors is unprecedented, and is in the blank of the industry, the traditional water depth measurement data is mainly derived by third-party software and then directly transmitted by using an intermediate medium, the derived format is DAT, DXF, SHAPE and the like, and the main intermediate medium is optical disk, U disk, hard disk, network transmission and the like. Such a data processing mode involves a certain security risk, the data is legible, the data transmission may be lost or intercepted, and the data is easy to copy or tamper with.
Disclosure of Invention
In view of the above, to at least partially solve one of the above technical problems, embodiments of the present invention provide an encryption and decryption method based on bathymetric data with high security and high processing efficiency, and a system, an apparatus and a storage medium capable of correspondingly implementing the encryption and decryption method based on bathymetric data.
In a first aspect, the present invention provides an encryption and decryption method based on water depth measurement data, including the following steps:
acquiring original water depth measurement data and generating a basic data file;
checking the file format of the basic data, and analyzing the basic data file into a data packet according to a checking result;
formatting the data packet to obtain a first format data packet, wherein data in the first format data packet comprises at least one of the following three: latitude and longitude data, water depth data and a water depth value;
converting data in the first format data packet to obtain a second format data packet;
and encrypting the second format data packet to obtain a ciphertext.
In some embodiments of the present invention, the step of converting the data in the first format data packet to obtain the second format data packet specifically includes one of the following steps:
extracting longitude and latitude data in the first format data packet; converting the coordinate system of the longitude and latitude data into a WGS84 coordinate system;
and extracting the water depth data and/or the water depth value in the first format data packet, and converting the water depth data and/or the water depth value into negative format data.
In some embodiments of the present invention, the step of encrypting the second format data packet to obtain the ciphertext specifically includes:
generating an AES key according to the second format data packet; generating a combined character string according to the encryption algorithm model;
encrypting according to the AES key and the combined character string, wherein the encryption process comprises at least one of the following: encrypting the data in the second format data packet; the data in the combined string is encrypted.
In some embodiments of the present invention, the step of generating the combined character string according to the encryption algorithm model specifically includes:
generating a natural number array and a letter combination; acquiring a timestamp of the current time;
and generating a combined character string according to the natural number combination, the letter combination and the time stamp.
In some embodiments of the present invention, the encryption and decryption method based on the water depth measurement data further includes: obtaining a ciphertext; analyzing the ciphertext to obtain a water depth data packet; and updating the text file according to the data in the water depth data packet.
In some embodiments of the present invention, the step of analyzing the ciphertext to obtain the water depth data packet specifically includes:
acquiring an encrypted combined character string and a key;
decrypting according to the encrypted combined character string and the secret key to obtain a combined character string; decrypting the ciphertext according to the combined character string;
wherein, the decryption of the ciphertext according to the combined character string comprises at least one of: decrypting the encrypted file; and decrypting the encrypted data packet.
In some embodiments of the invention, the raw bathymetric data comprises: single beam scanning data and multi-beam scanning data.
In a second aspect, the technical solution of the present invention further provides an encryption and decryption system based on the water depth measurement data, including an encryption unit and a decryption unit;
the encryption unit comprises a data acquisition module, a data verification module, a data formatting module and an encryption conversion module;
the data acquisition module is used for acquiring original water depth measurement data and generating a basic data file;
the data checking module is used for checking the file format of the basic data and analyzing the basic data file into a data packet according to a checking result;
the data formatting module is used for formatting the data packet to obtain a first format data packet, wherein the data in the first format data packet comprises longitude and latitude data, water depth data and a water depth value;
the encryption conversion module is used for converting the data in the first format data packet to obtain a second format data packet; encrypting the second format data packet to obtain a ciphertext;
the decryption unit comprises a ciphertext acquisition module and a plaintext generation module;
the ciphertext acquisition module is used for acquiring a ciphertext and a key;
the plaintext generation module is used for analyzing the ciphertext to obtain a water depth data packet; and updating the text file according to the data in the water depth data packet.
In a third aspect, a technical solution of the present invention further provides an encryption and decryption system based on water depth measurement data, including:
at least one processor;
at least one memory for storing at least one program;
when the at least one program is executed by the at least one processor, the at least one processor may implement a method for encryption and decryption based on the water depth measurement data according to the first aspect.
In a fourth aspect, the present invention also provides a storage medium in which a processor-executable program is stored, the processor-executable program being configured to implement the method as in the first aspect when executed by a processor.
Advantages and benefits of the present invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention:
according to the method, through the steps of original water depth measurement data, checking, formatting, data conversion, encryption and the like on the format of the original water depth measurement data, a text file of the readable water depth measurement data in a plaintext is converted into a text file interfered by an encryption algorithm technology, so that safety guarantee is provided for further expanding and applying the basic water depth measurement data, and risks of maliciously intercepting, losing or tampering the water depth measurement data and the like are avoided.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flowchart illustrating steps of a method for encrypting data based on depth measurements according to an embodiment of the present invention;
FIG. 2 is a detailed logic flow diagram of the formatting in the steps of a method for encrypting data based on depth measurements according to an embodiment of the present invention;
FIG. 3 is a logic flow diagram of an encryption step of a method for encrypting data based on water depth measurements according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating the steps of a method for deciphering based on bathymetric survey data according to an embodiment of the present invention;
fig. 5 is a logic flow diagram illustrating a detailed decryption method based on bathymetric survey data according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention. The step numbers in the following embodiments are provided only for convenience of illustration, the order between the steps is not limited at all, and the execution order of each step in the embodiments can be adapted according to the understanding of those skilled in the art.
The technical scheme of the invention provides the following ideas: the method is characterized by optimizing on the basis of the original work, encrypting and decrypting a data file exported by third-party software, forming an encryption and decryption algorithm model based on water depth data by adopting a combined encryption algorithm of 'symmetric encryption, AES, random number and timestamp' and combining specific service coding logic, converting a readable water depth measurement data text file of a plaintext into a messy code text file interfered by an encryption algorithm technology, and backing up and storing an interfered result file. When downloading or viewing, in the authority range, the decryption algorithm technology is also utilized for decryption to obtain the original file.
In a first aspect, as shown in fig. 1, this embodiment provides an encryption and decryption method based on depth measurement data, which includes steps S01 to S05:
s01, acquiring original water depth measurement data and generating a basic data file; specifically, the original data acquisition is the initial step of the method, and the data acquisition range includes water depth data derived by mature application software in the industry, a data production terminal and a result of manually processing the water depth data. Generating a corresponding basic data file according to the obtained original water depth measurement data and a preset file format, wherein the format of the basic data file comprises: DAT, DXF, shale, DWG, etc.; in this embodiment, the water depth data files in DAT and SHAPE formats are mainly selected for encryption and decryption, and the corresponding data types include single-beam scanning data and multi-beam scanning data.
S02, checking the format of the basic data file, and analyzing the basic data file into a data packet according to a checking result; specifically, referring to fig. 2, first, the format of the technical data file generated in step S01 is checked, and it is determined that the technical data file belongs to one of preset file formats; in this embodiment, the selected file formats are DAT and SHAPE, and in the verification process, if the file format is correct, the subsequent processing flow may be executed; and the format of the base data file is not DAT or shale, the translation and encryption process is terminated. After the verification is completed, the basic data file is analyzed into a data packet form, and the generated data packet is input to a data conversion processing model through a file stream transmission mode and file stream I/O processing.
S03, formatting the data packet to obtain a first format data packet, wherein the data in the first format data packet comprises longitude and latitude data, water depth data and a water depth value; specifically, when the data conversion processing model obtains the input of the data packet, the water depth data packet is analyzed, the data in the data packet is read, the data format and the content are checked, and the data in the data packet is determined to be correct, effective and available. And then formatting the data in the water depth data packet, unifying the data formats in the data packet, and obtaining the data packet which is the data packet in the first format. After the data packet is formatted, subsequent storage and query operations are facilitated.
S04, converting the data in the water depth format to obtain a second format data packet; specifically, referring to fig. 2, the data classes after the verification in the data packet are converted, where the data classes include longitude and latitude data, water depth data, and a water depth value. And transmitting the water depth data packet after data conversion to a data encryption algorithm model, and completing encryption by the encryption algorithm model or locally storing the converted data packet. In addition, as a backup, the raw bathymetric data may be stored locally. In some embodiments, more specifically, step S04 may further include step S041 and step S042:
s041, extracting longitude and latitude data in the first format data packet; the coordinate system of the latitude and longitude data is converted into a WGS84 coordinate system.
S042, extracting the water depth data and/or the water depth value in the first format data packet, and converting the water depth data and/or the water depth value into negative format data.
And after the conversion of the longitude and latitude coordinates and the conversion of the water depth data and the water depth value are completed, integrating the converted data to obtain a data packet in a second format. In the embodiment, the process behavior data of the integrated data packet is correspondingly generated and stored locally, so that subsequent inspection and verification are facilitated.
S05, encrypting the second format data packet to obtain a ciphertext; specifically, referring to fig. 3, by using a "symmetric cryptography + AES + random number + timestamp" combined encryption algorithm, the random number generation rule is: generating a secret key (128 bits) by AES (advanced encryption Standard), encrypting and storing a random number, finally modifying and encrypting the content of the file by the random number, abandoning the traditional fixed encryption mode, and adopting a random encryption technical mode combined with service data, wherein the random encryption technical mode specifically comprises the following steps of S051 and S052:
s051, generating an AES key according to the second format data packet; generating a combined character string according to the encryption algorithm model; the method specifically comprises the following steps:
s0511, obtaining the data packet after step S04, namely the data packet in the second format, and generating a 128-bit AES key according to the AES encryption standard and the symmetric block cipher mechanism.
S0512, generating a natural number array and a letter combination through a random number algorithm model; generating a timestamp of the current time; generating a random number combination character string according to the natural number combination, the letter combination and the time stamp; in the present embodiment, a 5-bit random number is first generated from natural numbers 0 to 9; secondly, randomly generating 2-bit random character strings from 26-bit English lower case letters and 26-bit English upper case letters; then obtaining the time stamp of the current time, wherein the data format is 'year-month-day-hour-minute-second'; and finally, generating a regular random number combination character string according to the 5-bit random number, the 2-bit random character string and the time stamp.
S052, encrypting according to the AES secret key and the combined character string, wherein the encrypting process comprises at least one of the following steps: encrypting the data in the second format data packet; encrypting data in the combined character string; specifically, according to the generated AES secret key, the random number combination character string is read and loaded into an AES encryption algorithm model, and the water depth data in the second format data packet is encrypted to obtain a ciphertext, namely an encrypted data block; meanwhile, encryption of the random number combination character string is completed; wherein, the data encryption formula is as follows:
C=E(K,P,X)
in the formula, the parameter P is original data, K is a secret key, X is a random number combination character string, and C is encrypted data. And finally, storing the AES key, the encrypted data block and the encrypted random number combination character string.
In some other embodiments, steps S02-S4 may be skipped, and the base data file that is not formatted and converted may be directly encrypted to obtain the water depth encrypted file.
In addition, in the encryption and decryption method based on the water depth measurement data according to the embodiment, referring to fig. 4, the decryption method includes:
s06, obtaining the ciphertext; analyzing the ciphertext to obtain a water depth data packet; specifically, referring to fig. 5, acquiring water depth upload data information according to a requirement, reading the water depth upload data information, processing, loading and analyzing through a file stream I/O according to attribute information in the data information to obtain a ciphertext of original water depth measurement data, that is, an encrypted data block, simultaneously calling an associated AES key and an encrypted random number combination character string, loading the encrypted data block, the AES key and the encrypted random number combination character string into an AES decryption algorithm model, and decrypting to obtain a plaintext and a water depth data packet, where an AES decryption function is set as D, the method includes:
P=D(K,C)
wherein C is a cipher text, K is a secret key, and P is a plaintext; that is, the ciphertext C and the key K are input as parameters of the decryption function, and the decryption function outputs the plaintext P. And in the process of completing decryption, decrypting the water depth encrypted file and decrypting the water depth encrypted data packet.
S07, updating a text file according to the data in the water depth data packet; and writing the generated water depth data plaintext packet into a text file, namely completing the encryption and decryption processes of the whole water depth measurement data. In some embodiments, in the process of completing the decryption of the water depth data packet, behavior data of a decryption process is correspondingly generated and stored locally, so that subsequent inspection and verification are facilitated.
In a second aspect, the present embodiment provides an encryption and decryption system based on water depth measurement data, which includes an encryption unit and a decryption unit.
The encryption unit comprises a data acquisition module, a data verification module, a data formatting module and an encryption conversion module;
the data acquisition module is used for acquiring original water depth measurement data and generating a basic data file;
the data checking module is used for checking the format of the basic data file and analyzing the basic data file into a data packet according to a checking result;
the data formatting module is used for formatting the data packet to obtain a first format data packet, wherein the data in the first format data packet comprises longitude and latitude data, water depth data and a water depth value;
the encryption conversion module is used for converting the data in the water depth format to obtain a second format data packet; encrypting the second format data packet to obtain a ciphertext; in the encryption conversion module, algorithm models such as the data conversion processing model and the encryption algorithm model mentioned in the first aspect are included;
the decryption unit comprises a ciphertext acquisition module and a plaintext generation module;
the ciphertext acquisition module is used for acquiring a ciphertext and a key;
the plaintext generation module is used for analyzing the ciphertext to obtain a water depth data packet; and updating the text file according to the data in the water depth data packet.
In a third aspect, an embodiment of the present invention further provides a hardware system for encryption and decryption based on water depth measurement data, which includes at least one processor; at least one memory for storing at least one program; when the at least one program is executed by the at least one processor, the at least one processor may implement a method for encryption and decryption based on the water depth measurement data according to the first aspect.
An embodiment of the present invention further provides a storage medium storing a program, where the program is executed by a processor as the method in the first aspect.
From the above specific implementation process, it can be concluded that the technical solution provided by the present invention has the following advantages or advantages compared to the prior art:
1. the technical scheme of the invention can make up for data security loopholes of water depth data acquisition, processing, transmission and storage in the industry, and effectively ensure the security of data transmission, the timeliness of data processing and the high efficiency of data conversion.
2. The technical scheme of the invention can save the data production cost, and can get through the full life cycle flow of water depth data acquisition, processing, transmission and storage, downloading and recycling.
3. The technical scheme of the invention provides the data online processing rule, and can further promote the development of the single-beam or multi-beam water depth data processing technology while fully ensuring the safety of user data.
In alternative embodiments, the functions/acts noted in the block diagrams may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Furthermore, the embodiments presented and described in the flow charts of the present invention are provided by way of example in order to provide a more comprehensive understanding of the technology. The disclosed methods are not limited to the operations and logic flows presented herein. Alternative embodiments are contemplated in which the order of various operations is changed and in which sub-operations described as part of larger operations are performed independently.
Furthermore, although the present invention is described in the context of functional modules, it should be understood that, unless otherwise stated to the contrary, one or more of the functions and/or features may be integrated in a single physical device and/or software module, or one or more of the functions and/or features may be implemented in a separate physical device or software module. It will also be understood that a detailed discussion of the actual implementation of each module is not necessary for an understanding of the present invention. Rather, the actual implementation of the various functional modules in the apparatus disclosed herein will be understood within the ordinary skill of an engineer given the nature, function, and interrelationships of the modules. Accordingly, those skilled in the art can, using ordinary skill, practice the invention as set forth in the claims without undue experimentation. It is also to be understood that the specific concepts disclosed are merely illustrative of and not intended to limit the scope of the invention, which is to be determined from the appended claims along with their full scope of equivalents.
Wherein the functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Further, the computer readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
In the description of the specification, reference to the description of "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
While the preferred embodiments of the present invention have been illustrated and described, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. An encryption and decryption method based on water depth measurement data is characterized by comprising the following steps:
acquiring original water depth measurement data and generating a basic data file;
the format of the basic data file is verified, and the basic data file is analyzed into a data packet according to a verification result;
formatting the data packet to obtain a first format data packet, wherein data in the first format data packet comprises at least one of the following three: longitude and latitude data, water depth data and a water depth value;
converting the data in the first format data packet to obtain a second format data packet;
encrypting the second format data packet to obtain a ciphertext;
the step of converting the data in the first format data packet to obtain a second format data packet specifically includes one of the following steps:
extracting longitude and latitude data in the first format data packet; converting the coordinate system of the longitude and latitude data into a WGS84 coordinate system; extracting water depth data and/or water depth values in the first format data packet, and converting the water depth data and/or the water depth values into negative format data;
the step of encrypting the second format data packet to obtain a ciphertext specifically includes:
generating an AES key according to the second format data packet; generating a combined character string according to the encryption algorithm model;
encrypting according to the AES key and the combined character string, wherein the encryption process comprises at least one of the following: encrypting data in the second format data packet; and encrypting the data in the combined character string.
2. The encryption and decryption method based on the water depth measurement data according to claim 1, wherein the step of generating the combined character string according to the encryption algorithm model specifically comprises:
generating a natural number combination and a letter combination; acquiring a timestamp of the current time;
and generating a combined character string according to the natural number combination, the letter combination and the time stamp.
3. The encryption and decryption method based on the water depth measurement data according to claim 1, wherein the method further comprises:
obtaining the ciphertext; analyzing the ciphertext to obtain a water depth data packet;
and updating the text file according to the data in the water depth data packet.
4. The encryption and decryption method based on the water depth measurement data according to claim 3, wherein the step of analyzing the ciphertext to obtain the water depth data packet specifically comprises:
acquiring an encrypted combined character string and a key;
decrypting according to the encrypted combined character string and the secret key to obtain a combined character string; decrypting the ciphertext according to the combined character string;
wherein, the decryption of the ciphertext according to the composite string comprises at least one of: decrypting the encrypted file; and decrypting the encrypted data packet.
5. The encryption and decryption method based on bathymetric data according to any one of claims 1-4, characterized in that the original bathymetric data comprises: single beam scanning data and multi-beam scanning data.
6. An encryption and decryption system based on water depth measurement data is characterized by comprising an encryption unit and a decryption unit;
the encryption unit comprises a data acquisition module, a data verification module, a data formatting module and an encryption conversion module;
the data acquisition module is used for acquiring original water depth measurement data and generating a basic data file;
the data verification module is used for verifying the file format of the basic data and analyzing the basic data file into a data packet according to a verification result;
the data formatting module is used for formatting the data packet to obtain a first format data packet, wherein data in the first format data packet comprises longitude and latitude data, water depth data and a water depth value;
the encryption conversion module is used for converting the data in the first format data packet to obtain a second format data packet; encrypting the second format data packet to obtain a ciphertext;
the decryption unit comprises a ciphertext acquisition module and a plaintext generation module;
the ciphertext acquisition module is used for acquiring the ciphertext and the key;
the plaintext generation module is used for analyzing the ciphertext to obtain a water depth data packet; updating a text file according to the data in the water depth data packet;
converting the data in the first format data packet to obtain a second format data packet, which specifically includes one of the following:
extracting longitude and latitude data in the first format data packet; converting the coordinate system of the longitude and latitude data into a WGS84 coordinate system; extracting water depth data and/or water depth values in the first format data packet, and converting the water depth data and/or the water depth values into negative format data;
the step of encrypting the second format data packet to obtain a ciphertext specifically includes:
generating an AES key according to the second format data packet; generating a combined character string according to the encryption algorithm model;
encrypting according to the AES key and the combined character string, wherein the encryption process comprises at least one of the following: encrypting data in the second format data packet; and encrypting the data in the combined character string.
7. An encryption and decryption system based on water depth measurement data, comprising:
at least one processor;
at least one memory for storing at least one program;
when executed by the at least one processor, the at least one program causes the at least one processor to implement a method of encryption and decryption based on water depth measurement data according to any one of claims 1 to 5.
8. A storage medium having stored therein a program executable by a processor, characterized in that: the processor executable program when executed by a processor is for implementing a method of encryption and decryption based on water depth measurement data as claimed in any one of claims 1 to 5.
CN202010655100.3A 2020-07-09 2020-07-09 Encryption and decryption method, system and medium based on water depth measurement data Active CN111970237B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010655100.3A CN111970237B (en) 2020-07-09 2020-07-09 Encryption and decryption method, system and medium based on water depth measurement data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010655100.3A CN111970237B (en) 2020-07-09 2020-07-09 Encryption and decryption method, system and medium based on water depth measurement data

Publications (2)

Publication Number Publication Date
CN111970237A CN111970237A (en) 2020-11-20
CN111970237B true CN111970237B (en) 2023-02-03

Family

ID=73362118

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010655100.3A Active CN111970237B (en) 2020-07-09 2020-07-09 Encryption and decryption method, system and medium based on water depth measurement data

Country Status (1)

Country Link
CN (1) CN111970237B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114896313B (en) * 2022-04-13 2023-03-24 北京月新时代科技股份有限公司 Data transmission method, device, equipment and medium
CN116842535A (en) * 2023-04-19 2023-10-03 武汉大学 Encryption and decryption method, system and medium based on aviation magnetic measurement data

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381046A (en) * 2019-07-10 2019-10-25 广东星舆科技有限公司 A kind of encrypted transmission method of GNSS data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8194858B2 (en) * 2009-02-19 2012-06-05 Physical Optics Corporation Chaotic cipher system and method for secure communication
CN110926459A (en) * 2019-10-17 2020-03-27 广州南方卫星导航仪器有限公司 Method and equipment for processing multi-beam data and storage medium thereof
CN110868287B (en) * 2019-10-24 2023-06-30 广州江南科友科技股份有限公司 Authentication encryption ciphertext coding method, system, device and storage medium
CN111211891B (en) * 2020-01-13 2023-04-28 广东跑合中药材电子商务有限公司 Multi-dimensional AES symmetric encryption and decryption method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381046A (en) * 2019-07-10 2019-10-25 广东星舆科技有限公司 A kind of encrypted transmission method of GNSS data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于动态密钥的智能电网无线通信数据加密传输方案;黎妹红等;《信息网络安全》;20191210(第12期);全文 *

Also Published As

Publication number Publication date
CN111970237A (en) 2020-11-20

Similar Documents

Publication Publication Date Title
CN110535662B (en) Method and system for realizing user operation record based on block chain data certificate storage service
CN106788995B (en) File encryption method and device
CN108667595B (en) Compression encryption method for big data file
CN110753226B (en) High-capacity ciphertext domain image reversible data hiding method
CN111970237B (en) Encryption and decryption method, system and medium based on water depth measurement data
US10938574B2 (en) Cryptographic font script with integrated signature for verification
CN110084599B (en) Key processing method, device, equipment and storage medium
CN104680077A (en) Picture encryption method and picture checking method, system and terminal
CN109981266B (en) Method and device for storing and reading key and sensitive information
CN104244235A (en) Method and system for encryption and decryption of sensitive information of telecommunication call bill
US8631235B2 (en) System and method for storing data using a virtual worm file system
CN114186264A (en) Data random encryption and decryption method, device and system
CN104881838A (en) A meaningful non-augmented image storage and reconstruction method based on GF (23) (K, N)
CN116389137A (en) Data encryption method and system based on network information security
CN112235101B (en) Coding method and device based on hybrid coding mechanism, decoding method and device
CN104794243B (en) Third party's cipher text retrieval method based on filename
CN116506230B (en) Data acquisition method and system based on RSA asymmetric encryption
CN112528309A (en) Data storage encryption and decryption method and device
CN112989434A (en) Electronic document encryption tamper-proof decryption verification method
CN112260822B (en) Structured digital watermark encryption method and device
CN115834239B (en) Information security processing system and method based on cryptographic algorithm
CN113259438B (en) Method and device for sending model file and method and device for receiving model file
JP2006506025A5 (en)
CN113489698B (en) Internet of things data secret reading method and system based on block chain
CN115859341B (en) Intelligent on-line file reading system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant