CN112398834A - Voice secret communication method, device and system - Google Patents

Voice secret communication method, device and system Download PDF

Info

Publication number
CN112398834A
CN112398834A CN202011218087.1A CN202011218087A CN112398834A CN 112398834 A CN112398834 A CN 112398834A CN 202011218087 A CN202011218087 A CN 202011218087A CN 112398834 A CN112398834 A CN 112398834A
Authority
CN
China
Prior art keywords
key
voice
server
voice data
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011218087.1A
Other languages
Chinese (zh)
Inventor
王玉龙
解正来
孙正明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Nuoka Internet Of Things Technology Co ltd
Original Assignee
Hefei Nuoka Internet Of Things Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Nuoka Internet Of Things Technology Co ltd filed Critical Hefei Nuoka Internet Of Things Technology Co ltd
Priority to CN202011218087.1A priority Critical patent/CN112398834A/en
Publication of CN112398834A publication Critical patent/CN112398834A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to the technical field of communication safety, and discloses a voice secret communication method, a device and a system, wherein the method comprises the following steps: the invention can conveniently and reliably carry out secrecy on voice communication, realizes the identification of both data transmission parties and the effective unification of data secrecy transmission, prevents secret data from being subjected to malicious eavesdropping or impersonation attack, and has better practical value.

Description

Voice secret communication method, device and system
Technical Field
The invention relates to the technical field of radio frequency identification, in particular to a voice secret communication method.
Background
With the continuous development of the technology, mobile or wireless communication is widely used as a convenient communication mode, and with the increasing popularization of the wireless or mobile communication technology, the communication security problem is highlighted, which becomes an important issue of attention.
In conventional communication, in order to realize secure communication, secure conversation, that is, encryption of communication data is also performed frequently. In the secret communication, in the call establishment process of each secret call, key agreement is generally required between a terminal and a network or between the terminal and the terminal, so that two communication parties obtain a key of the secret call, the key obtained in the call establishment process is used for encrypting communication data sent out by the communication parties in the call establishment process, and the received encrypted communication data is decrypted.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a voice secret communication method for solving the problems in the background technology.
The technical scheme adopted by the invention for solving the technical problems is as follows:
the invention provides a voice secret communication method, which comprises the following steps:
the voice receiving terminal converts the acquired analog voice data into digital voice data through a digital-to-analog conversion module, then compresses the digital voice data, and sends the compressed voice data to a corresponding client;
respectively setting a unique identifier ID for each client, and setting a corresponding identity Key under each identifierdAnd transmission Key KeytSimultaneously storing the data in a background database;
client passes identity Key KeydEncrypting the identifier ID, transmitting the identifier ID to a server, and calling the identity Key stored in a background database by the serverdSequentially decrypting, reading the identifier ID if the decryption is successful, and obtaining the transmission Key Keyt
Server randomly generating session KeysTransfer Key KeytSession Key using 3DES algorithmsCarrying out encryption transmission to the client;
client side transmission KeytDecrypting to obtain the session Keys
Establishing an encryption session between the client and the server, sending the compressed voice data into the server by using a session key through an AES algorithm for decryption operation, and completing data encryption transmission;
and after receiving the encrypted voice data, the server decrypts the encrypted voice data, decompresses the decrypted voice data through the voice decompression module, and restores the voice through the digital-to-analog conversion module to complete communication.
Preferably, if the server calls the identity Key stored in the background databasedAnd if the encrypted ID fails to be decrypted in sequence or the decrypted ID number does not exist in the background database, the server stops responding to the client.
Preferably, a period counter corresponding to each identifier is set in the server, when the encryption session between the client corresponding to the identifier and the server is ended, the period counter is incremented, and when the period counter exceeds a threshold value, the transmission Key corresponding to the identifier is updatedt
Preferably, the encrypted voice data is further processed as follows before being encrypted:
splitting the encrypted voice data into K minimum encryption units, generating a random number with K digits by a client side for encryption processing, carrying out XOR operation on each digit of the K random number and the lowest digit of the K minimum encryption units in sequence, and carrying out XOR operation on the K minimum encryption units after the operation is finished by utilizing a session Key KeysAdopts AES algorithm to encrypt, and simultaneously utilizes the transmission Key Key to the random numbertAnd encrypting and sending the encrypted data to a server to be received and decrypted together.
Preferably, when the encrypted voice data cannot be split into K minimum encryption units, bit complementing operation is performed, the number N of bit complementing bits is connected with the random number, and a transmission Key Key is adoptedtThe encryption is sent to a server to be received and decrypted together, the server to be received and decrypted decrypts the received encrypted random number to obtain a K-bit random number and a complementary bit number, and the K-bit random number is used for decrypting the K most decrypted random numbersThe minimum of the small encryption units is to perform reverse operation and perform splicing to remove the complementary digit to obtain encrypted voice data.
Preferably, the server to be received and decrypted decrypts the received encrypted random number to obtain a K-bit random number, and then performs inverse operation on the lowest of the K minimum decrypted encryption units by using the K-bit random number, and performs concatenation to obtain the encrypted voice data.
Preferably, the client and the server perform data transmission by wireless network, wireless short-range radio frequency technology, bluetooth or wired network.
The invention also provides a voice secret communication device, comprising:
a voice receiving terminal;
a client;
a background database;
a server;
the voice receiving terminal is used for converting the acquired analog voice data into digital voice data through the digital-to-analog conversion module, then compressing the digital voice data and sending the compressed voice data to the corresponding client;
the client stores corresponding unique identifier ID and corresponding identity Key set under each identifierdAnd transmission Key KeytFor passing identity KeydEncrypting the identifier ID, transmitting to the server, and utilizing the transmission Key Key by the clienttDecrypting to obtain the session Keys
The background database is used for storing that each client end respectively sets a unique identifier ID and sets a corresponding identity Key under each identifierdAnd transmission Key Keyt
The server is used for calling the identity Key stored in the background databasedSequentially decrypting, reading the identifier ID if the decryption is successful, and obtaining the transmission Key Keyt(ii) a Random generation of session KeysTransfer Key KeytSession Key using 3DES algorithmsCarrying out encryption transmission to the client; receivingAfter the encrypted voice data is obtained, the encrypted voice data is decrypted, then the decrypted voice data is decompressed through a voice decompression module, and then the voice is restored through a digital-to-analog conversion module to complete communication;
the client establishes an encrypted session with the server, decrypts the encrypted voice data, decompresses the decrypted voice data through the voice decompression module, and restores the voice through the digital-to-analog conversion module to complete communication.
The invention also provides a voice secret communication system, comprising:
one or more processors;
storage means for storing one or more programs;
a voice secure communication device;
when the one or more programs are executed by the one or more processors, the voice secure communication apparatus is enabled to cooperate with the one or more processors to implement the voice secure communication method as described above.
The present invention also provides a storage medium having a computer program stored thereon, the computer program, when executed by a processor, performing the steps of the voice secure communication as described above.
Compared with the prior art, the invention has the following beneficial effects:
the invention preprocesses the voice information in advance, including converting the voice information into digital information, compressing the digital information, encrypting and transmitting the digital information, and establishing a fixed mapping relation between the encrypted voice and the client, thereby realizing the effects of effective transmission and quick encryption, resisting any malicious eavesdropping and cracking, and efficiently avoiding various potential safety hazards;
according to the invention, the identity key, the transmission key and the session key are set as the leading of the session key, the ID, the identity key, the transmission key and the session key are not interacted or transmitted in an encryption mode in the whole interaction process, the danger brought by plaintext transmission is reduced, meanwhile, through the mutual cooperation of the identity key, the ID and the transmission key, the double authentication of the identity is realized, the session key is randomly generated at last, the bidirectional encryption and decryption is carried out, one session and one secret are realized, and the possibility of malicious attack and secret stealing is effectively prevented.
Further salient features and significant advances with respect to the present invention over the prior art are described in further detail in the examples section.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that certain names are used throughout the specification and claims to refer to particular components. It will be understood that one of ordinary skill in the art may refer to the same component by different names. The present specification and claims do not intend to distinguish between components that differ in name but not function. As used in the specification and claims of this application, the terms "comprises" and "comprising" are intended to be open-ended terms that should be interpreted as "including, but not limited to," or "including, but not limited to. The embodiments described in the detailed description are preferred embodiments of the present invention and are not intended to limit the scope of the present invention.
Moreover, those skilled in the art will appreciate that aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, various aspects of the present invention may be embodied in a combination of hardware and software, which may be referred to herein generally as a "circuit," module "or" system. Furthermore, in some embodiments, various aspects of the invention may also be embodied in the form of a computer program product in one or more microcontroller-readable media having microcontroller-readable program code embodied therein.
The voice secret communication method of the embodiment comprises the following steps:
the voice receiving terminal converts the acquired analog voice data into digital voice data through a digital-to-analog conversion module, then compresses the digital voice data, and sends the compressed voice data to a corresponding client;
respectively setting a unique identifier ID for each client, and setting a corresponding identity Key under each identifierdAnd transmission Key KeytSimultaneously storing the data in a background database;
client passes identity Key KeydEncrypting the identifier ID, transmitting the identifier ID to a server, and calling the identity Key stored in a background database by the serverdSequentially decrypting, reading the identifier ID if the decryption is successful, and obtaining the transmission Key Keyt
Server randomly generating session KeysTransfer Key KeytSession Key using 3DES algorithmsCarrying out encryption transmission to the client;
the 3DES is also called Triple DES, and the 3DES is a generic term of Triple Data Encryption (TDEA) block cipher, and is an Algorithm scheme that can be used in reverse. . It is equivalent to applying the DES encryption algorithm three times per block. The length of the secret key is 128 bits and 192 bits (bit), and if the number of the secret bits is less than or equal to 64 bits, the encryption result is the same as DES;
the concrete implementation is as follows: let Ek () and Dk () represent the encryption and decryption process of the DES algorithm, K represents the key used by the DES algorithm, M represents the plaintext, C represents the ciphertext, such that:
the 3DES encryption process is as follows: c ═ Ek3(Dk2(Ek1(M)))
The 3DES decryption process is as follows: M-Dk 1(EK2(Dk3(C)))
Client side transmission KeytDecrypting to obtain the session Keys
Establishing an encryption session between the client and the server, sending the compressed voice data into the server by using a session key through an AES algorithm for decryption operation, and completing data encryption transmission;
and after receiving the encrypted voice data, the server decrypts the encrypted voice data, decompresses the decrypted voice data through the voice decompression module, and restores the voice through the digital-to-analog conversion module to complete communication.
The AES is a block cipher, belonging to the field of symmetric ciphers, the module of the AES algorithm is frequently used in the field of symmetric ciphers, especially in the field of block ciphers, the AES encryption algorithm relates to 4 operations: byte substitution (SubBytes), row shifting (ShiftRows), column obfuscation (MixColumns), and round key addition (AddRoundKey), for AES in this embodiment, plaintext and ciphertext are in one-to-one correspondence over the entire input space with the keys fixed. Therefore, each component of the algorithm is also reversible, the operation sequence of each component is designed to be reversible, the ciphertext can be correctly decrypted, the AES encryption algorithm can be divided into 128 bits, 192 bits and 256 bits according to different key lengths, and in the embodiment, the randomly generated session key can be paired and selected to be 128 bits, 192 bits or 256 bits according to needs.
In this embodiment, a period counter corresponding to each identifier is set in the server, when the encryption session between the client and the server corresponding to the identifier is ended, the period counter is incremented, and when the period counter exceeds a threshold, the transmission Key corresponding to the identifier is updatedt
In this embodiment, the following processing is performed on the encrypted voice data before encryption:
splitting the encrypted voice data into K minimum encryption units, generating a random number with K digits by a client side for encryption processing, carrying out XOR operation on each digit of the K random number and the lowest digit of the K minimum encryption units in sequence, and carrying out XOR operation on the K minimum encryption units after the operation is finished by utilizing a session Key KeysAdopts AES algorithm to encrypt, and utilizes transmission Key Key to make random numbertAnd encrypting and sending the encrypted data to a server to be received and decrypted together.
In this embodiment, the server to be received and decrypted decrypts the received encrypted random number to obtain a K-bit random number, performs reverse operation on the lowest of the K minimum decrypted encryption units using the K-bit random number, and performs concatenation to obtain encrypted voice data.
The invention also creatively carries out fragmentation and recombination on the encrypted voice data, further enhances the safety of the data, and ensures that a malicious attacker is difficult to confirm the confidential data on the premise of ensuring lower calculation complexity and hardware burden increase by carrying out low-order reversible operation on the minimum encryption unit matched with a random number, thereby ensuring the safety of data transmission in a real sense.
In this embodiment, the data transmission between the client and the server is performed through a wireless network, a wireless short-range radio frequency technology, a bluetooth or a wired network.
In this embodiment, if the server retrieves the identity Key stored in the background databasedAnd if the encrypted ID fails to be decrypted in sequence or the decrypted ID number does not exist in the background database, the server stops responding to the client.
In this embodiment, when the encrypted voice data cannot be split into K minimum encryption units, bit padding operation is performed, the number N of bit padding bits is connected to the random number, and a transmission Key is usedtAnd the encryption is jointly transmitted to a server to be received and decrypted, the server to be received and decrypted decrypts the received encrypted random number to obtain a K-bit random number and a complementary bit number, the K-bit random number is used for carrying out reverse operation on the lowest of K minimum decrypted encryption units, and the K-bit random number is spliced to remove the complementary bit number to obtain encrypted voice data.
The adoption of the bit complementing mode can keep the consistency of the algorithm, reduce the complexity of the algorithm and ensure the fluency and the integrity of data transmission.
The present embodiment further provides a voice security communication device, including:
a voice receiving terminal;
a client;
a background database;
a server;
the voice receiving terminal is used for converting the acquired analog voice data into digital voice data through the digital-to-analog conversion module, then compressing the digital voice data and sending the compressed voice data to the corresponding client;
the client stores corresponding unique identifier ID and corresponding identity Key set under each identifierdAnd transmission Key KeytFor passing identity KeydEncrypting the identifier ID, transmitting to the server, and utilizing the transmission Key Key by the clienttDecrypting to obtain the session Keys
The background database is used for storing that each client end respectively sets a unique identifier ID and sets a corresponding identity Key under each identifierdAnd transmission Key Keyt
The server is used for calling the identity Key stored in the background databasedSequentially decrypting, reading the identifier ID if the decryption is successful, and obtaining the transmission Key Keyt(ii) a Random generation of session KeysTransfer Key KeytSession Key using 3DES algorithmsCarrying out encryption transmission to the client; after receiving the encrypted voice data, decrypting the encrypted voice data, decompressing the decrypted voice data through a voice decompressing module, and restoring the voice through a digital-to-analog conversion module to complete communication;
the client establishes an encrypted session with the server, decrypts the encrypted voice data, decompresses the decrypted voice data through the voice decompression module, and restores the voice through the digital-to-analog conversion module to complete communication.
The embodiment provides a voice secure communication system, which comprises:
one or more processors;
storage means for storing one or more programs;
a voice secure communication device;
when the one or more programs are executed by the one or more processors, the voice secure communication apparatus is enabled to cooperate with the one or more processors to implement the voice secure communication method as described above.
The present embodiment also provides a storage medium, which stores a computer program, and the computer program is executed by a processor to perform the steps of the voice secure communication.
The voice secret communication method, the voice secret communication device and the voice secret communication system can carry out secret communication conveniently, reliably and effectively, realize the identification of both data transmission parties and the effective unification of data secret transmission, prevent secret data from being attacked by malicious eavesdropping or counterfeiting, and have better practical value.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (10)

1. A voice secret communication method is characterized by comprising the following steps:
the voice receiving terminal converts the acquired analog voice data into digital voice data through a digital-to-analog conversion module, then compresses the digital voice data, and sends the compressed voice data to a corresponding client;
respectively setting a unique identifier ID for each client, and setting a corresponding identity Key under each identifierdAnd transmission Key KeytSimultaneously storing the data in a background database;
client passes identity Key KeydEncrypting the identifier ID, transmitting the identifier ID to a server, and calling the identity Key stored in a background database by the serverdSequentially decrypting, reading the identifier ID if the decryption is successful, and obtaining the transmission Key Keyt
Server randomly generating session KeysTransfer Key KeytSession Key using 3DES algorithmsCarrying out encryption transmission to the client;
client side transmission KeytDecrypting to obtain the session Keys
Establishing an encryption session between the client and the server, sending the compressed voice data into the server by using a session key through an AES algorithm for decryption operation, and completing data encryption transmission;
and after receiving the encrypted voice data, the server decrypts the encrypted voice data, decompresses the decrypted voice data through the voice decompression module, and restores the voice through the digital-to-analog conversion module to complete communication.
2. The voice secure communication method according to claim 1, wherein if the server retrieves the identity Key stored in the background databasedAnd if the encrypted ID fails to be decrypted in sequence or the decrypted ID number does not exist in the background database, the server stops responding to the client.
3. The voice secure communication method according to claim 1, wherein a period counter corresponding to each identifier is set in the server, when the encryption session between the client corresponding to the identifier and the server is ended, the period counter is incremented by one, and when the period counter exceeds a threshold value, the transmission Key corresponding to the identifier is updatedt
4. The secure voice communication method according to claim 1, wherein the encrypted voice data is further processed as follows before being encrypted:
splitting the encrypted voice data into K minimum encryption units, generating a random number with K digits by a client side for encryption processing, carrying out XOR operation on each digit of the K random number and the lowest digit of the K minimum encryption units in sequence, and carrying out XOR operation on the K minimum encryption units after the operation is finished by utilizing a session Key KeysAdopts AES algorithm to encrypt, and simultaneously utilizes the transmission Key Key to the random numbertAnd encrypting and sending the encrypted data to a server to be received and decrypted together.
5. The method according to claim 4, wherein the bit-padding operation is performed when the encrypted voice data cannot be split into K minimum encryption units, and the number N of bit-padding bits is connected to the random number, and the transmission Key Key is usedtAnd the encryption is jointly transmitted to a server to be received and decrypted, the server to be received and decrypted decrypts the received encrypted random number to obtain a K-bit random number and a complementary bit number, the K-bit random number is used for carrying out reverse operation on the lowest of K minimum decrypted encryption units, and the K-bit random number is spliced to remove the complementary bit number to obtain encrypted voice data.
6. The method according to claim 4, wherein the server to be decrypted decrypts the received encrypted random number to obtain a K-bit random number, and then performs inverse operation on the lowest of the K minimum decrypted encryption units using the K-bit random number, and performs concatenation to obtain the encrypted voice data.
7. The secure voice communication method as claimed in claim 1, wherein the data transmission between the client and the server is performed through a wireless network, a wireless short-range radio frequency technology, bluetooth, or a wired network.
8. A voice privacy communication device, comprising:
a voice receiving terminal;
a client;
a background database;
a server;
the voice receiving terminal is used for converting the acquired analog voice data into digital voice data through the digital-to-analog conversion module, then compressing the digital voice data and sending the compressed voice data to the corresponding client;
the client stores corresponding unique identifier ID and corresponding identity Key set under each identifierdAnd transmission Key KeytFor passing identity KeydEncrypting the identifier ID, transmitting to the server, and utilizing the transmission Key Key by the clienttDecrypting to obtain the session Keys
The background database is used for storing that each client end respectively sets a unique identifier ID and sets a corresponding identity Key under each identifierdAnd transmission Key Keyt
The server is used for calling the identity Key stored in the background databasedSequentially decrypting, reading the identifier ID if the decryption is successful, and obtaining the transmission Key Keyt(ii) a Random generation of session KeysTransfer Key KeytSession Key using 3DES algorithmsCarrying out encryption transmission to the client; after receiving the encrypted voice data, decrypting the encrypted voice data, decompressing the decrypted voice data through a voice decompressing module, and restoring the voice through a digital-to-analog conversion module to complete communication;
the client establishes an encrypted session with the server, decrypts the encrypted voice data, decompresses the decrypted voice data through the voice decompression module, and restores the voice through the digital-to-analog conversion module to complete communication.
9. A voice privacy communication system, comprising:
one or more processors;
storage means for storing one or more programs;
a voice secure communication device;
the one or more programs, when executed by the one or more processors, cause the voice secure communication device to implement, in cooperation with the one or more processors, the voice secure communication method as recited in any one of claims 1 to 7.
10. A storage medium having stored thereon a computer program for performing the steps of secure voice communication according to any one of claims 1 to 7 when executed by a processor.
CN202011218087.1A 2020-11-04 2020-11-04 Voice secret communication method, device and system Withdrawn CN112398834A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011218087.1A CN112398834A (en) 2020-11-04 2020-11-04 Voice secret communication method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011218087.1A CN112398834A (en) 2020-11-04 2020-11-04 Voice secret communication method, device and system

Publications (1)

Publication Number Publication Date
CN112398834A true CN112398834A (en) 2021-02-23

Family

ID=74598807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011218087.1A Withdrawn CN112398834A (en) 2020-11-04 2020-11-04 Voice secret communication method, device and system

Country Status (1)

Country Link
CN (1) CN112398834A (en)

Similar Documents

Publication Publication Date Title
CA2283304C (en) Method of and apparatus for encrypting signals for transmission
CN105376261B (en) Encryption method and system for instant messaging message
CN111130803A (en) Method, system and device for digital signature
CN101707767B (en) Data transmission method and devices
US6640303B1 (en) System and method for encryption using transparent keys
CN111884802B (en) Media stream encryption transmission method, system, terminal and electronic equipment
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN111988301A (en) Secure communication method for preventing client from hacker violence attack
JPH09312643A (en) Key sharing method and ciphering communication method
CN112532384B (en) Method for quickly encrypting and decrypting transmission key based on packet key mode
JP2005244534A (en) Device and method for cipher communication
CN103458401A (en) Voice encryption communication system and voice encryption communication method
US20170041133A1 (en) Encryption method, program, and system
CN106878277B (en) Method and device for realizing voice encryption based on DMR standard
CN111049641A (en) Bidirectional authentication based image multiple secret transmission method, device and system
CN112235789A (en) Interrupt recoverable secret communication processing method, device and system
CN116248316A (en) File encryption method, file decryption method, device and storage medium
CN105827601A (en) Data encryption application method and system of mobile device
JP3902144B2 (en) Method for encrypting messages in a call handled by a communication device
CN112398834A (en) Voice secret communication method, device and system
CN1237752C (en) Methods and apparatus for enhanced security expansion of secret key into lookup table for improved security for wireless telephone messages
KR20040083794A (en) encryption/decryption method of application data
CN112235790A (en) Anti-collision interruptible recovery voice secret transmission method, device and system
CN112398831A (en) Bidirectional authentication multi-channel voice encryption communication method, device and system
CN113596054A (en) Information intersystem transmission soft frequency hopping encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210223