CN112654037A - Industrial network security encryption processing method based on 5G communication technology - Google Patents

Industrial network security encryption processing method based on 5G communication technology Download PDF

Info

Publication number
CN112654037A
CN112654037A CN202011494138.3A CN202011494138A CN112654037A CN 112654037 A CN112654037 A CN 112654037A CN 202011494138 A CN202011494138 A CN 202011494138A CN 112654037 A CN112654037 A CN 112654037A
Authority
CN
China
Prior art keywords
key
stream
encryption
synchronization
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011494138.3A
Other languages
Chinese (zh)
Inventor
汪春侠
刘焕晓
赵跃东
阚涛
孙多润
郭警中
李新慈
王迪
傅成林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Wdt Industrial Automation Co ltd
Original Assignee
Anhui Wdt Industrial Automation Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Wdt Industrial Automation Co ltd filed Critical Anhui Wdt Industrial Automation Co ltd
Priority to CN202011494138.3A priority Critical patent/CN112654037A/en
Publication of CN112654037A publication Critical patent/CN112654037A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

The invention discloses an industrial network security encryption processing method based on a 5G communication technology, which belongs to the field of industrial network security encryption processing methods, and is based on data encryption requirement analysis of a 5G factory data transmission system, a stream encryption algorithm with a simple structure and high encryption strength is adopted, and a low-delay stream encryption system is designed based on an FPGA (field programmable gate array); a key updating scheme is designed based on the key stream generator, the key stream generator is used for generating an updated key, the key of the key stream generator is updated regularly, the safety of the stream encryption system is guaranteed, and the factory data encryption transmission system does not need to generate and distribute the key in the data transmission process.

Description

Industrial network security encryption processing method based on 5G communication technology
Technical Field
The invention relates to the field of industrial network security encryption processing methods, in particular to an industrial network security encryption processing method based on a 5G communication technology.
Background
The network security refers to that the hardware, software and data in the system of the network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates, and the network service is not interrupted.
The existing technology for solving network security generally has the following three problems: different encryption security algorithms exist among various company departments, and are integrated in respective software modules before, so that repeated development and quality difference to a great extent exist, the coupling degree with application software is very high, and the security degree is different.
The existing common encryption transmission method has some disadvantages of different degrees, such as: when the certificate is transmitted in a certificate mode, the certificate can be sniffed and found and forged through a network, and meanwhile, certain cost is required for manufacturing the certificate.
The existing security gateway is often used to implement the transportation of high and low security areas of data, which is expensive and troublesome to deploy.
Disclosure of Invention
The invention provides an industrial network security encryption processing method based on a 5G communication technology to solve the problems.
In order to achieve the purpose, the invention adopts the following technical scheme:
an industrial network security encryption processing method based on 5G communication technology comprises the following steps:
s1, encoding and decoding the data by adopting an industrial data encoding and decoding chip, and completing data scheduling and multi-mode self-adaptive transmission;
s2, encrypting and decrypting the data in real time through an encryption algorithm, and updating the key and the initialization vector of the key stream generator by the key updating module according to the initial key generated by the software;
the encryption algorithm adopts a 128-bit key and a 96-bit initialization vector IV, and the internal state is 256 bits; the encryption algorithm mainly comprises a Linear Feedback Shift Register (LFSR), a Nonlinear Feedback Shift Register (NFSR) and a pre-output function;
wherein the LFSR's primitive feedback polynomial is:
f(x)=1+x32+x47+x58+x90+x121+x128
the state update function for the corresponding LFSR is:
si+128=si+si+7+si+38+si+70+si+81+si+96
the nonlinear feedback polynomial g (x) of NFSR is:
Figure BDA0002841582610000021
the state update function for the corresponding NFSR is:
Figure BDA0002841582610000022
the nonlinear filter function h (x) has 9 variables, 7 from the LFSR and 2 from the NFSR, as follows:
h(x)=x0x1+x2x3+x4x5+x6x7+x0x4x8
wherein the variable x0,Λ,x8Corresponding to the state variables:
bi+12,si+8,si+13,si+20,bi+95,si+42,si+60,si+79and si+94The pre-output function is expressed as:
yi=h+si+93+bi+2+bi+15+bi+36+bi+45+bi+64+bi+73+bi+89
and S3, starting a key synchronization function when the data are encrypted and decrypted by adopting an encryption algorithm, wherein the key synchronization function comprises a key synchronization signal insertion module at an encryption end, a key synchronization signal extraction module at a decryption end and a key stream synchronization module, and is responsible for recovering key stream synchronization under the condition of data packet loss.
Preferably, the algorithm supports two different working modes when encrypting: an encryption mode and an authentication encryption mode; by setting the last IV of the IV0When IV is below the threshold value to determine the mode of operation of the algorithm0When the value is equal to 0, the algorithm is in an encryption mode; when IV0When the algorithm is 1, the algorithm is in an authentication encryption mode, and the output of a pre-output function y (x) is required to be input as a message authentication code; the message authentication code module mainly comprises 1 32-bit accumulator and 1 32-bit shift register.
Preferably, when the key is updated, the key is divided into three levels of a master key, a key encryption key and a session key; the master key is a key at the highest level in a key hierarchy and is used for encrypting a key encryption key or deriving other keys;
the key encryption key is positioned between the master key and the session key in the key hierarchy and is used for encrypting the session key or the lower layer key thereof so as to ensure the confidentiality of the keys in the distribution or storage process; the key encryption key can be generated by a true random number generator or a pseudo random number generator, and can also be determined by a password administrator;
the session key is positioned at the bottommost layer of the key hierarchy and is used for encrypting communication data of two communication parties; the key life cycle of the session key is short, one session key can only be used once in principle, two communication parties use different session keys for data encryption in each communication session, and the used session key is destroyed after the communication is finished; the session key may be distributed by a key distribution center or generated by a key agreement, and also generated by a key encryption key controlling some encryption algorithm.
Preferably, the master key is a high quality true random sequence that can be generated from a reliable random source including mechanical or electronic based noise sources, and pole and coin throws.
Preferably, the key stream synchronization method adopts a method of regularly inserting a synchronization identifier into a key stream based on the synchronization identifier, so as to solve the key stream synchronization problem under the condition of data packet loss; including insertion of synchronization identifier, extraction of synchronization identifier and key stream synchronization
Preferably, the insertion of the synchronization identifier: the encryption module inserts a synchronous identifier in the output ciphertext stream at regular intervals; the synchronous identifier is composed of at least two parts, one part is a starting mark of the synchronous identifier and is used for identifying the beginning of the synchronous identifier; the other part is a synchronous serial number used for marking the position state of the ciphertext flow;
extraction of the synchronization identifier: at a decryption end, the synchronous identifier in the ciphertext stream is extracted, and then the ciphertext stream after the synchronous identifier is extracted is decrypted. In the synchronous identifier extraction module, continuously detecting the input ciphertext stream, if the input data is found to be the initial mark of the synchronous identifier, extracting the synchronous identifier according to the initial mark, and outputting the synchronous serial number to the key stream synchronization module; if the input data is the ciphertext, outputting the ciphertext to the data decryption module;
synchronization of the keystream: when the synchronous serial number is extracted from the ciphertext stream, comparing the position of the ciphertext stream recorded by the synchronous serial number with the position of the decryption key stream, if the positions are the same, indicating that the key stream is in a synchronous state, and normally performing decryption; if the positions are different, the key stream is identified to be in an out-of-synchronization state, whether the synchronization sequence numbers in the two synchronization identifiers are continuous or not can be compared, if the synchronization sequence numbers are discontinuous, the ciphertext stream data packet loss is shown, and the number of the lost ciphertext stream data packets can be known according to the difference value of the two synchronization sequence numbers; when the key stream is in the desynchronized state, the position of the decryption key stream is adjusted according to the length of the lost ciphertext stream, so that the positions of the ciphertext stream and the decryption key stream are aligned, and the key stream synchronization is recovered.
Compared with the prior art, the invention provides an industrial network security encryption processing method based on a 5G communication technology, which has the following beneficial effects:
1. the invention has the beneficial effects that: the invention analyzes the data encryption requirement based on a 5G factory data transmission system, adopts a stream encryption algorithm with simple structure and high encryption strength, and designs a low-delay stream encryption system based on FPGA; a key updating scheme is designed based on the key stream generator, the key stream generator is used for generating an updated key, the key of the key stream generator is updated regularly, the safety of the stream encryption system is guaranteed, and the factory data encryption transmission system does not need to generate and distribute the key in the data transmission process. Aiming at the application characteristic that a factory data encryption transmission system based on a 5G mobile network has data packet loss in the data transmission process, a key stream synchronization scheme is designed based on a synchronization identifier, the key stream synchronization can be recovered under the condition of data packet loss, and the normal decryption of a subsequent ciphertext stream is ensured. Analyzing the data packet loss condition of the mobile network according to the Gilbert packet loss model, determining parameters of the key stream synchronization scheme, and simulating the performance of the key stream synchronization scheme.
Drawings
Fig. 1 is a flowchart of an embodiment of a method for processing industrial network security encryption based on 5G communication technology according to the present invention;
fig. 2 is an algorithm flowchart of an embodiment of an industrial network security encryption processing method based on the 5G communication technology according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention.
Example 1:
referring to fig. 1-2, an industrial network security encryption processing method based on 5G communication technology includes the following steps:
s1, encoding and decoding the data by adopting an industrial data encoding and decoding chip, and completing data scheduling and multi-mode self-adaptive transmission;
s2, encrypting and decrypting the data in real time through an encryption algorithm, and updating the key and the initialization vector of the key stream generator by the key updating module according to the initial key generated by the software;
the encryption algorithm adopts a 128-bit key and a 96-bit initialization vector IV, and the internal state is 256 bits; the encryption algorithm mainly comprises a Linear Feedback Shift Register (LFSR), a Nonlinear Feedback Shift Register (NFSR) and a pre-output function;
wherein the LFSR's primitive feedback polynomial is:
f(x)=1+x32+x47+x58+x90+x121+x128
the state update function for the corresponding LFSR is:
si+128=si+si+7+si+38+si+70+si+81+si+96
the nonlinear feedback polynomial g (x) of NFSR is:
Figure BDA0002841582610000071
the state update function for the corresponding NFSR is:
Figure BDA0002841582610000072
the nonlinear filter function h (x) has 9 variables, 7 from the LFSR and 2 from the NFSR, as follows:
h(x)=x0x1+x2x3+x4x5+x6x7+x0x4x8
wherein the variable x0,Λ,x8Corresponding to the state variables:
bi+12,si+8,si+13,si+20,bi+95,si+42,si+60,si+79and si+94The pre-output function is expressed as:
yi=h+si+93+bi+2+bi+15+bi+36+bi+45+bi+64+bi+73+bi+89
and S3, starting a key synchronization function when the data are encrypted and decrypted by adopting an encryption algorithm, wherein the key synchronization function comprises a key synchronization signal insertion module at an encryption end, a key synchronization signal extraction module at a decryption end and a key stream synchronization module, and is responsible for recovering key stream synchronization under the condition of data packet loss.
Further, preferably, the algorithm supports two different operation modes when encrypting: an encryption mode and an authentication encryption mode; by setting the last IV of the IV0When IV is below the threshold value to determine the mode of operation of the algorithm0When the value is equal to 0, the algorithm is in an encryption mode; when IV0When the algorithm is 1, the algorithm is in an authentication encryption mode, and the output of a pre-output function y (x) is required to be input as a message authentication code; the message authentication code module mainly comprises 1 32-bit accumulator and 1 32-bit shift register.
Further, preferably, when the key is updated, the key is divided into three layers of a master key, a key encryption key and a session key; the master key is a key at the highest level in a key hierarchy and is used for encrypting a key encryption key or deriving other keys;
the key encryption key is positioned between the master key and the session key in the key hierarchy and is used for encrypting the session key or the lower layer key thereof so as to ensure the confidentiality of the keys in the distribution or storage process; the key encryption key can be generated by a true random number generator or a pseudo random number generator, and can also be determined by a password administrator;
the session key is positioned at the bottommost layer of the key hierarchy and is used for encrypting communication data of two communication parties; the key life cycle of the session key is short, one session key can only be used once in principle, two communication parties use different session keys for data encryption in each communication session, and the used session key is destroyed after the communication is finished; the session key may be distributed by a key distribution center or generated by a key agreement, and also generated by a key encryption key controlling some encryption algorithm.
Further, preferably, the master key is a high quality true random sequence that can be generated from a reliable random source, including mechanical or electronic based noise sources, including a true random sequence generated by a throw of a thigh and a throw of a coin.
Further, preferably, the key stream synchronization method adopts a method of regularly inserting a synchronization identifier into a key stream based on the synchronization identifier, so as to solve the key stream synchronization problem under the condition of data packet loss; including insertion of synchronization identifier, extraction of synchronization identifier and key stream synchronization
Further, preferably, the insertion of the synchronization identifier: the encryption module inserts a synchronous identifier in the output ciphertext stream at regular intervals; the synchronous identifier is composed of at least two parts, one part is a starting mark of the synchronous identifier and is used for identifying the beginning of the synchronous identifier; the other part is a synchronous serial number used for marking the position state of the ciphertext flow;
extraction of the synchronization identifier: at a decryption end, the synchronous identifier in the ciphertext stream is extracted, and then the ciphertext stream after the synchronous identifier is extracted is decrypted. In the synchronous identifier extraction module, continuously detecting the input ciphertext stream, if the input data is found to be the initial mark of the synchronous identifier, extracting the synchronous identifier according to the initial mark, and outputting the synchronous serial number to the key stream synchronization module; if the input data is the ciphertext, outputting the ciphertext to the data decryption module;
synchronization of the keystream: when the synchronous serial number is extracted from the ciphertext stream, comparing the position of the ciphertext stream recorded by the synchronous serial number with the position of the decryption key stream, if the positions are the same, indicating that the key stream is in a synchronous state, and normally performing decryption; if the positions are different, the key stream is identified to be in an out-of-synchronization state, whether the synchronization sequence numbers in the two synchronization identifiers are continuous or not can be compared, if the synchronization sequence numbers are discontinuous, the ciphertext stream data packet loss is shown, and the number of the lost ciphertext stream data packets can be known according to the difference value of the two synchronization sequence numbers; when the key stream is in the desynchronized state, the position of the decryption key stream is adjusted according to the length of the lost ciphertext stream, so that the positions of the ciphertext stream and the decryption key stream are aligned, and the key stream synchronization is recovered.
Example 2: the difference is based on example 1;
when the data encryption test is carried out, the bitmap data of the BMP format picture of the factory monitoring image is used as test data. During testing, binary bitmap data are extracted from a picture file in a BMP format as test data, and a file header, a bitmap information header and palette data are reserved. For a stream encryption system that employs a completely independent key stream synchronization scheme, the UDP packet size is uncertain, where the UDP packet size is set to 1024 bytes. During testing, a serial port transceiving program sends bitmap data to an encryption module through a serial port to be encrypted to obtain ciphertext data, the obtained ciphertext data are divided into a series of data packets according to 1024 bytes, the data packets are subjected to packet loss analysis through a Gilbert model, and packet loss of the data packets is recorded during Gilbert packet loss analysis. And then sending the data packets which are analyzed to be lost and not lost to be decrypted to a decryption module one by one through the serial port, and synthesizing the obtained plaintext data into total bitmap data. And comparing the total bitmap data with the original test bitmap data, referring to packet loss position information, and filling and replacing the missing and decryption error parts of the bitmap data caused by packet loss by 0. And finally, regenerating the picture in the BMP format by the obtained total bitmap data together with the original file header, the bitmap information header and the palette data, thereby obtaining the picture after the encryption test. And black lines in the picture after the encryption test are data loss and ciphertext decryption error parts caused by data packet loss. For a stream encryption system using a UDP-based key stream synchronization scheme, the length of the valid ciphertext in the UDP packet is equal to the synchronization identifier interval, which is equal to 1024 bytes. And dividing the test bitmap data into 1024-byte data packets, and sequentially sending the data packets to an encryption module for encryption to obtain corresponding ciphertext data packets. And after Gilbert packet loss analysis is carried out on the ciphertext data packet, sending the ciphertext data packet without packet loss to a decryption module for decryption, and obtaining total bitmap data. And finally, packing the total bitmap data and the original bitmap data, referring to packet loss position information, and filling and replacing all bit data loss and decryption error parts caused by packet loss by 0. And finally, regenerating the picture in the BMP format by the obtained total bitmap data together with the original file header, the bitmap information header and the palette data, thereby obtaining the picture after the encryption test. When a Gilbert packet loss model is used for packet loss analysis, packet loss analysis of various network environments is respectively carried out, and the used parameters of the Gilbert model are shown in a table 1.
TABLE 1 model parameters for different network environments
Figure BDA0002841582610000111
As can be seen from comparison between the network 1 and the network 3 in table 1, when the average packet loss rate is higher, the density of black lines in the picture after the encryption and decryption test is higher, which indicates that more packet loss events occur; as can be seen from comparison between the network 1 and the network 2, when the Gilbert parameter q is smaller, the thicker black lines in the picture after the encryption and decryption test are more, which indicates that more packet loss events with continuous packet loss occur. The contents of other pictures except the black line can be normally displayed, which shows that the key stream synchronization scheme can recover the key stream synchronization after the data packet is lost, and ensure that the data encryption and decryption are normally carried out after the data packet is lost.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (6)

1. A5G communication technology-based industrial network security encryption processing method is characterized by comprising the following steps:
s1, encoding and decoding the data by adopting an industrial data encoding and decoding chip, and completing data scheduling and multi-mode self-adaptive transmission;
s2, encrypting and decrypting the data in real time through an encryption algorithm, and updating the key and the initialization vector of the key stream generator by the key updating module according to the initial key generated by the software;
the encryption algorithm adopts a 128-bit key and a 96-bit initialization vector IV, and the internal state is 256 bits; the encryption algorithm mainly comprises a Linear Feedback Shift Register (LFSR), a Nonlinear Feedback Shift Register (NFSR) and a pre-output function;
wherein the LFSR's primitive feedback polynomial is:
f(x)=1+x32+x47+x58+x90+x121+x128
the state update function for the corresponding LFSR is:
si+128=si+si+7+si+38+si+70+si+81+si+96
the nonlinear feedback polynomial g (x) of NFSR is:
Figure FDA0002841582600000011
the state update function for the corresponding NFSR is:
Figure FDA0002841582600000012
the nonlinear filter function h (x) has 9 variables, 7 from the LFSR and 2 from the NFSR, as follows:
h(x)=x0x1+x2x3+x4x5+x6x7+x0x4x8
wherein the variable x0,Λ,x8Corresponding to the state variables:
bi+12,si+8,si+13,si+20,bi+95,si+42,si+60,si+79and si+94The pre-output function is expressed as:
yi=h+si+93+bi+2+bi+15+bi+36+bi+45+bi+64+bi+73+bi+89
and S3, starting a key synchronization function when the data are encrypted and decrypted by adopting an encryption algorithm, wherein the key synchronization function comprises a key synchronization signal insertion module at an encryption end, a key synchronization signal extraction module at a decryption end and a key stream synchronization module, and is responsible for recovering key stream synchronization under the condition of data packet loss.
2. The industrial network security encryption processing method based on the 5G communication technology as claimed in claim 1, wherein: the algorithm supports two different working modes during encryption: an encryption mode and an authentication encryption mode; by setting the last IV of the IV0When IV is below the threshold value to determine the mode of operation of the algorithm0When 0, the algorithm is additionA secret mode; when IV0When the algorithm is 1, the algorithm is in an authentication encryption mode, and the output of a pre-output function y (x) is required to be input as a message authentication code; the message authentication code module mainly comprises 1 32-bit accumulator and 1 32-bit shift register.
3. The industrial network security encryption processing method based on the 5G communication technology as claimed in claim 1, wherein: when the key is updated, the key is divided into three levels of a main key, a key encryption key and a session key; the master key is a key at the highest level in a key hierarchy and is used for encrypting a key encryption key or deriving other keys;
the key encryption key is positioned between the master key and the session key in the key hierarchy and is used for encrypting the session key or the lower layer key thereof so as to ensure the confidentiality of the keys in the distribution or storage process; the key encryption key can be generated by a true random number generator or a pseudo random number generator, and can also be determined by a password administrator;
the session key is positioned at the bottommost layer of the key hierarchy and is used for encrypting communication data of two communication parties; the key life cycle of the session key is short, one session key can only be used once in principle, two communication parties use different session keys for data encryption in each communication session, and the used session key is destroyed after the communication is finished; the session key may be distributed by a key distribution center or generated by a key agreement, and also generated by a key encryption key controlling some encryption algorithm.
4. The industrial network security encryption processing method based on the 5G communication technology as claimed in claim 3, wherein: the master key is a high quality true random sequence that can be generated from a reliable random source including mechanical or electronic based noise sources, thigh throws, and coin throws.
5. The industrial network security encryption processing method based on the 5G communication technology as claimed in claim 1, wherein: the key stream synchronization method adopts a method of regularly inserting synchronous identifiers into the key stream based on the synchronous identifiers, so as to solve the key stream synchronization problem under the condition of data packet loss; including the insertion of the synchronization identifier, the extraction of the synchronization identifier and the key stream synchronization.
6. The industrial network security encryption processing method based on the 5G communication technology according to claim 5, characterized in that: insertion of the synchronization identifier: the encryption module inserts a synchronous identifier in the output ciphertext stream at regular intervals; the synchronous identifier is composed of at least two parts, one part is a starting mark of the synchronous identifier and is used for identifying the beginning of the synchronous identifier; the other part is a synchronous serial number used for marking the position state of the ciphertext flow;
extraction of the synchronization identifier: at a decryption end, the synchronous identifier in the ciphertext stream is extracted, and then the ciphertext stream after the synchronous identifier is extracted is decrypted. In the synchronous identifier extraction module, continuously detecting the input ciphertext stream, if the input data is found to be the initial mark of the synchronous identifier, extracting the synchronous identifier according to the initial mark, and outputting the synchronous serial number to the key stream synchronization module; if the input data is the ciphertext, outputting the ciphertext to the data decryption module;
synchronization of the keystream: when the synchronous serial number is extracted from the ciphertext stream, comparing the position of the ciphertext stream recorded by the synchronous serial number with the position of the decryption key stream, if the positions are the same, indicating that the key stream is in a synchronous state, and normally performing decryption; if the positions are different, the key stream is identified to be in an out-of-synchronization state, whether the synchronization sequence numbers in the two synchronization identifiers are continuous or not can be compared, if the synchronization sequence numbers are discontinuous, the ciphertext stream data packet loss is shown, and the number of the lost ciphertext stream data packets can be known according to the difference value of the two synchronization sequence numbers; when the key stream is in the desynchronized state, the position of the decryption key stream is adjusted according to the length of the lost ciphertext stream, so that the positions of the ciphertext stream and the decryption key stream are aligned, and the key stream synchronization is recovered.
CN202011494138.3A 2020-12-17 2020-12-17 Industrial network security encryption processing method based on 5G communication technology Pending CN112654037A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011494138.3A CN112654037A (en) 2020-12-17 2020-12-17 Industrial network security encryption processing method based on 5G communication technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011494138.3A CN112654037A (en) 2020-12-17 2020-12-17 Industrial network security encryption processing method based on 5G communication technology

Publications (1)

Publication Number Publication Date
CN112654037A true CN112654037A (en) 2021-04-13

Family

ID=75355445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011494138.3A Pending CN112654037A (en) 2020-12-17 2020-12-17 Industrial network security encryption processing method based on 5G communication technology

Country Status (1)

Country Link
CN (1) CN112654037A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113852956A (en) * 2021-09-28 2021-12-28 上海威固信息技术股份有限公司 Encryption type transmission method for digital information transmission based on 5G network
CN114501435A (en) * 2021-12-28 2022-05-13 中国航天空气动力技术研究院 Communication link encryption system and method suitable for unmanned aerial vehicle
CN115208553A (en) * 2022-07-15 2022-10-18 山东大学 Chip implementation device and method for TRIAD lightweight stream cipher encryption algorithm

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020083438A1 (en) * 2000-10-26 2002-06-27 So Nicol Chung Pang System for securely delivering encrypted content on demand with access contrl

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020083438A1 (en) * 2000-10-26 2002-06-27 So Nicol Chung Pang System for securely delivering encrypted content on demand with access contrl

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄荫钊: "基于FPGA的低延迟Grain-128a算法设计与实现", 《中国优秀硕士学位论文全文数据库》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113852956A (en) * 2021-09-28 2021-12-28 上海威固信息技术股份有限公司 Encryption type transmission method for digital information transmission based on 5G network
CN114501435A (en) * 2021-12-28 2022-05-13 中国航天空气动力技术研究院 Communication link encryption system and method suitable for unmanned aerial vehicle
CN115208553A (en) * 2022-07-15 2022-10-18 山东大学 Chip implementation device and method for TRIAD lightweight stream cipher encryption algorithm
CN115208553B (en) * 2022-07-15 2024-02-27 山东大学 Chip implementation device and method for TRIAD lightweight stream cipher encryption algorithm

Similar Documents

Publication Publication Date Title
CN112654037A (en) Industrial network security encryption processing method based on 5G communication technology
US8687800B2 (en) Encryption method for message authentication
CN109218825B (en) Video encryption system
Mare et al. Secret data communication system using Steganography, AES and RSA
CN101789866B (en) High-reliability safety isolation and information exchange method
CN109151508B (en) Video encryption method
US6891952B1 (en) Dynamic key generation and confidential synchronization of encryption components
JP4650267B2 (en) Transmitting apparatus and method, receiving apparatus and method, data transmission system, and data transmission method
US11784985B2 (en) Network security devices and method
CN104639561A (en) Method for safely obtaining secret key
CN113872762B (en) Quantum encryption communication system based on power distribution terminal equipment and use method thereof
CN103428204A (en) Data security implementation method capable of resisting timing attacks and devices
CN105610837A (en) Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system
KR100546375B1 (en) Interdependent parallel processing hardware cryptographic engine providing for enhanced self fault-detecting and hardware encryption processing method thereof
CN114915396B (en) Hopping key digital communication encryption system and method based on national encryption algorithm
CN117395474B (en) Locally stored tamper-resistant video evidence obtaining and storing method and system
CN114697082A (en) Production and application method of encryption and decryption device in server-free environment
Liu et al. A data-aware confidential tunnel for wireless sensor media networks
Suganya et al. Medical image integrity control using joint encryption and watermarking techniques
CN115834026A (en) Safety encryption method based on industrial protocol
CN114189359B (en) Internet of things equipment capable of avoiding data tampering, data safety transmission method and system
CN106878004B (en) Verification method and device for preventing video inter-cut tampering
CN114244635A (en) Encryption type data coding method of communication equipment
CN100544248C (en) The key data receiving/transmission method
CN112907247A (en) Block chain authorization calculation control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210413