CN113556332A - Data encryption transmission method - Google Patents

Data encryption transmission method Download PDF

Info

Publication number
CN113556332A
CN113556332A CN202110780278.5A CN202110780278A CN113556332A CN 113556332 A CN113556332 A CN 113556332A CN 202110780278 A CN202110780278 A CN 202110780278A CN 113556332 A CN113556332 A CN 113556332A
Authority
CN
China
Prior art keywords
data
key
server
client
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110780278.5A
Other languages
Chinese (zh)
Inventor
黄永权
李锦基
袁立雄
龙泽
杨青
涂悦
符伟杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gold Sea Comm Corp
Original Assignee
Gold Sea Comm Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gold Sea Comm Corp filed Critical Gold Sea Comm Corp
Priority to CN202110780278.5A priority Critical patent/CN113556332A/en
Publication of CN113556332A publication Critical patent/CN113556332A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Abstract

The invention relates to the technical field of data encryption and discloses a data encryption transmission method, which comprises the following steps: the server identity code generating device sends the generated identity code to the client identity receiving device, the server secret key generating device generates a group of secret keys, the group of secret keys are sent to the client along with the server identity code, the client receives the data sent by the server, the client identity verifying device verifies the identity code in the data sent by the server, and when the client identity verifying device verifies the identity code in the data sent by the server without errors. In the invention, the server sends the generated identity code to the client, and the client can determine whether the sending end is the same server end or not through the received identity code, thereby avoiding the occurrence of data sending errors caused by the fact that the client cannot distinguish different server ends, and achieving the effect of improving the safety.

Description

Data encryption transmission method
Technical Field
The invention relates to the technical field of data encryption, in particular to a data encryption transmission method.
Background
Data encryption is a long-history technology, which means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, and decryption is realized by recovering the ciphertext into plaintext through a decryption algorithm and a decryption key. Its core is cryptography. Data encryption is still the most reliable way for computer systems to protect information. The information is encrypted by utilizing a cryptographic technology, so that the information is concealed, and the effect of protecting the safety of the information is achieved.
In the existing data transmission process in the market at present, other data may disturb the client and the server, and if the data is not processed, the data received by the server or the client is not the original data, and the security during data transmission is low.
To this end, we propose a data encryption transmission method.
Disclosure of Invention
The present invention mainly solves the technical problems existing in the prior art, and provides a data encryption transmission method.
In order to achieve the above object, the present invention adopts the following technical solution, and a data encryption transmission method includes the following steps:
s1: the server identity code generating equipment sends the generated identity code to the client identity receiving equipment;
s2: the server key generation device generates a group of keys, and the group of keys is sent to the client along with the server identity code;
s3: the client receives the data sent by the server, and the identity code in the data sent by the server is verified through the client identity verification equipment;
s4: after the client identity verification equipment verifies the identity code in the data sent by the server, the client key receiving equipment receives the key sent together with the identity code;
s5: the client encrypts the data to be encrypted through the received key by the data encryption equipment;
s6: sending the encrypted data to the server together with the server identity code through the data sending equipment;
s7: after the server receives the data of the client, verifying the part containing the identity code in the data sent by the client through identity verification equipment on the server;
s8: and when the part containing the identity code sent by the client is confirmed to be correct, the data sent by the client is decrypted by the decryption equipment at the server side.
Preferably, a server identity code generation device is used for generating a side mixed random number, the mixed random number generator is a method for combining a plurality of independent random number generators to generate random numbers with longer period and better statistical property, a random number sequence generated by one random number generator is taken as a base, another random number generator is used for rearranging the random number sequence, an obtained new random number sequence is taken as an actually used random number, the basic idea of the algorithm is to use a second linear congruence generator to 'scramble' the random number generated by the first linear congruence generator, and the server sends the generated identity code to a client, so that the client recognizes the server and facilitates the verification of subsequent data.
Preferably, the key generation algorithm is an algorithm for generating a key through an online or offline interactive negotiation manner (such as a cryptographic protocol, etc.), and a key with a longer length is calculated through the key generation algorithm, generally speaking, the larger the key length is, the larger the corresponding key space is, the greater the difficulty for an attacker to use an exhaustive guess of a password is, and for a public key cryptosystem, the more difficult the key generation is, because the key must satisfy some mathematical characteristics, and the key generation may be realized through an online or offline interactive negotiation manner, such as a cryptographic protocol, etc.
Preferably, the same key is shared for secure communication using a symmetric encryption algorithm, typically a member of the system first selects a secret key and then transmits it to another member or members, and the X9.17 standard describes two keys: the key encryption key encrypts other keys to be distributed; while the data key only encrypts the information stream, the key encryption key is typically distributed manually, or the key may be divided into many different portions and transmitted over different channels to enhance security.
Preferably, the identity code in the data sent by the server is directly compared with the identity code received in the first step to see if they are identical, and in the data communication network, the telecommunication facilities connecting two or more data stations according to the technical requirements of a link protocol, called data link, data link for short, so-called "link protocol", refers to a set of rules for establishing, maintaining and releasing a logical data link and for transmitting data via the link, the data being transmitted over a certain physical medium, such as a telephone line, microwave or optical cable.
Preferably, the traditional encryption method has two kinds, namely, substitution and replacement, the data encryption standard (data encryption standard, DES for short) adopts the combination algorithm, data is encrypted by the DES encryption method, and the working principle of the DES is as follows: the plaintext is divided into a plurality of 64-bit blocks, each block is encrypted by a 64-bit key, actually, the key consists of 56-bit data bits and 8-bit parity bits, so that only 56 possible ciphers are provided instead of 64, each block is firstly encrypted by an initial substitution method, then 16 times of complex substitutions are continuously performed, and finally the inverse of the initial substitution is applied to the block, the substitution at the step i is not directly performed by using the original key K, but the key Ki calculated by K and i, DES has the characteristic that the decryption algorithm is the same as the encryption algorithm except that the application sequence of the key Ki is opposite.
Preferably, the low-voltage differential signaling (LVDS) is adopted for transmission, the LVDS is a communication technology for transmitting signals on a differential PCB (printed circuit board) line or a balanced cable with very low voltage swing (about 350mV), and the main characteristics of the LVDS are that a current mode and low swing mean that data can be transmitted at high speed and with low power consumption; the number of parallel transmission lines is small, and the electromagnetic radiation interference is small; the electromagnetic interference between lines can be partially compensated, and the common mode noise rejection is strong; the end resistor matched with the transmission line characteristic impedance reduces signal reflection; and the standard CMOS process is realized, and the cost is low.
Preferably, the transmitter based on the LVDS standard is composed of 4 channels and used for converting 28-bit parallel red, green and blue data and control signals into 4 channels of parallel data transmission, a system clock is 32 MHz-112 MHz, so that the maximum data transmission rate of each channel is 784Mb/s, the requirements of multiple display modes such as SVGA, XGA, SXGA and the like are met, few parallel transmission lines (only 5 pairs of cables) and data low-voltage swing serial transmission (7 channels of parallel data serialization) are adopted, electromagnetic interference and power consumption are reduced, and the data transmission rate is improved.
Preferably, the CRC is used for checking the data sent by the client, and error detection is carried out by utilizing the principles of division and remainder; if not, it indicates that the transmission is in error, and the crc check has automatic error correction capability.
Preferably, the encryption method is a DES encryption method, the DES decryption algorithm is the same as the encryption algorithm, and the key for encrypting the data is encrypted by the key generated by the key generation device on the server, so that the server stores the key, and the data can be decrypted mechanically without the client sending the key, thereby facilitating the decryption of the data.
Advantageous effects
The invention provides a data encryption transmission method. The method has the following beneficial effects:
(1) according to the data encryption transmission method, the mixed random number at one side is generated through the server identity code generation device, and the mixed random number generator is a method for combining a plurality of independent random number generators to generate the random number with a longer period and better statistical property. Usually, a random number sequence generated by one random number generator is used as a base, another random number generator is used to rearrange the random number sequence, and the obtained new random number sequence is used as an actually used random number. The basic idea of the algorithm is that a second linear congruence generator is used for scrambling random numbers generated by the first linear congruence generator, the server sends generated identity codes to the client, so that the client and the server are connected, the client can determine whether the sending end is the same server end or not through the received identity codes, the situation that the client cannot distinguish different server ends to cause data sending errors is avoided, and the effect of improving safety is achieved.
(2) The data encryption transmission method is an algorithm for generating a key through a key generation algorithm and an online or offline interactive negotiation mode (such as a cryptographic protocol). The key with a long length is calculated through a key generation algorithm, generally, the larger the key length is, the larger the corresponding key space is, and the greater the difficulty of an attacker in guessing the password by exhaustive guessing. Key generation is more difficult for public key cryptosystems because the keys must satisfy certain mathematical characteristics. The key generation can be realized by an online or offline interactive negotiation mode, such as a password protocol, and the like, so that the effect of improving the use range of the key is achieved while the security of the key is improved.
(3) The data encryption transmission method adopts a symmetric encryption algorithm to carry out secret communication, and the same secret key needs to be shared. Typically, a member of the system first selects a secret key and then transmits it to another member or members. The X9.17 standard describes two keys: a key encryption key and a data key. The key encryption key encrypts other keys to be distributed; whereas the data key only encrypts the information stream. Key encryption keys are typically distributed manually. In order to enhance the confidentiality, the secret key can be divided into a plurality of different parts and then sent out by using different channels, so that the effect of improving the safety of the key transmission process is achieved.
(4) The data encryption transmission method directly compares the identity code in the data sent by the server with the identity code received in the first step to see whether the identity codes are completely the same or not, avoids other problems in operation, and improves the safety and accuracy.
(5) The data encryption transmission method is characterized in that data is encrypted by a DES encryption mode, a plaintext is divided into a plurality of blocks with the size of 64 bits, each block is encrypted by a 64-bit key, and actually, the key consists of 56 bit data bits and 8 bit parity bits, so that only 56 possible passwords are available instead of 64. Each block is encrypted by the initial permutation method, followed by 16 consecutive complex permutations, and finally the inverse of the initial permutation is applied thereto. The substitution in step i does not directly use the original key K, but the key Ki calculated from K and i. The DES has the characteristic that the decryption algorithm is the same as the encryption algorithm, so that the effect of facilitating the encryption and decryption of data is achieved.
(6) The data encryption transmission method adopts low-voltage differential signaling (LVDS) for transmission, the LVDS is a communication technology for transmitting signals on a differential PCB (printed circuit board) line or a balanced cable with very low voltage swing (about 350mV), and the most important characteristics are that the current mode and the low swing mean that data can be transmitted at high speed and with low power consumption; the number of parallel transmission lines is small, and the electromagnetic radiation interference is small; the electromagnetic interference between lines can be partially compensated, and the common mode noise rejection is strong; the end resistor matched with the transmission line characteristic impedance reduces signal reflection; and the standard CMOS process is realized, and the cost is low.
(7) The transmitter based on the LVDS standard is composed of 4 channels and used for converting 28-bit parallel red, green and blue data and control signals into 4 channels of parallel data transmission, a system clock is 32 MHz-112 MHz, the maximum data transmission rate of each channel is 784Mb/s, and the requirements of multiple display modes such as SVGA, XGA and SXGA are met. Few parallel transmission lines (only 5 pairs of cables) and low-voltage swing amplitude serial data transmission (7-path parallel data serialization) are adopted, so that the electromagnetic interference and the power consumption are reduced, and the effect of improving the data transmission rate is achieved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions that the present invention can be implemented, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the effects and the achievable by the present invention, should still fall within the range that the technical contents disclosed in the present invention can cover.
FIG. 1 is a flow chart of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example (b): a data encryption transmission method, as shown in fig. 1, includes the following steps:
s1: the server identity code generating device transmits the generated identity code to the client identity receiving device.
The method is characterized in that a random number sequence generated by one random number generator is taken as a base, another random number generator is used for rearranging the random number sequence, and the obtained new random number sequence is taken as an actually used random number.
S2: the server key generation device generates a set of keys and this set of keys is sent to the client along with the server identity code.
The key generation algorithm is an algorithm for generating a key through an online or offline interactive negotiation mode (such as a cryptographic protocol), and the key with a longer length is calculated through the key generation algorithm.
Secure communication using symmetric encryption algorithms requires sharing of the same key, usually a member of the system first selects a secret key and then transmits it to another member or members, and the X9.17 standard describes two keys: the key encryption key encrypts other keys to be distributed; while the data key only encrypts the information stream, the key encryption key is typically distributed manually, or the key may be divided into many different portions and transmitted over different channels to enhance security.
S3: the client receives the data sent by the server, and the identity code in the data sent by the server is verified through the client identity verification equipment.
And directly comparing the identity code in the data sent by the server with the identity code received in the first step to see whether the identity codes are identical or not, so that other problems in operation are avoided, and the safety and the accuracy are improved.
S4: when the client identity verification device verifies the identity code in the data sent by the server without errors, the client key receiving device receives the key sent together with the identity code.
In a data communication network, the telecommunication facilities connecting two or more data stations according to the specifications of a link protocol, called data links, data links for short, the "link protocol", refers to a set of rules for establishing, maintaining and releasing a logical data link and for transmitting data via the link, the data being intended to be transmitted over a certain physical medium, such as telephone lines, microwave or optical cables.
S5: and the client encrypts the data to be encrypted through the received key by the data encryption equipment.
The traditional encryption method has two kinds, namely replacement and replacement, the data encryption standard (DES for short) adopts the combination algorithm, data is encrypted by a DES encryption mode, and the working principle of the DES is as follows: the plaintext is divided into a plurality of 64-bit blocks, each block is encrypted by a 64-bit key, actually, the key consists of 56-bit data bits and 8-bit parity bits, so that only 56 possible ciphers are provided instead of 64, each block is firstly encrypted by an initial substitution method, then 16 times of complex substitutions are continuously performed, and finally the inverse of the initial substitution is applied to the block, the substitution at the step i is not directly performed by using the original key K, but the key Ki calculated by K and i, DES has the characteristic that the decryption algorithm is the same as the encryption algorithm except that the application sequence of the key Ki is opposite.
S6: and sending the encrypted data to the server together with the server identity code through the data sending equipment.
The low-voltage differential signaling (LVDS) is a communication technology for transmitting signals on a differential PCB (printed circuit board) line or a balanced cable with very low voltage swing (about 350mV), and has the main characteristics that a current mode and low swing mean that data can be transmitted at high speed and with low power consumption; the number of parallel transmission lines is small, and the electromagnetic radiation interference is small; the electromagnetic interference between lines can be partially compensated, and the common mode noise rejection is strong; the end resistor matched with the transmission line characteristic impedance reduces signal reflection; and the standard CMOS process is realized, and the cost is low.
The transmitter based on the LVDS standard is composed of 4 channels and used for converting 28-bit parallel red, green and blue data and control signals into 4 channels of parallel data transmission, a system clock is 32 MHz-112 MHz, so that the maximum data transmission rate of each channel is 784Mb/s, the requirements of multiple display modes such as SVGA, XGA, SXGA and the like are met, few parallel transmission lines (only 5 pairs of cables) and data low-voltage swing amplitude serial transmission (7 channels of parallel data serialization) are adopted, electromagnetic interference and power consumption are reduced, and the data transmission rate is improved.
S7: after the server receives the data of the client, the identity verification equipment on the server verifies the part containing the identity code in the data sent by the client.
The data sent by the client is checked by a CRC (cyclic redundancy check) method, which utilizes the principles of division and remainder to carry out error detection; if not, it indicates that the transmission is in error, and the crc check has automatic error correction capability.
S8: and when the part containing the identity code sent by the client is confirmed to be correct, the data sent by the client is decrypted by the decryption equipment at the server side.
Because the encryption mode adopts a DES encryption mode, and a DES decryption algorithm is the same as the encryption algorithm, and a key for encrypting data is encrypted by a key generated by a key generation device on the server, the server stores the key, and the mechanical energy of the data can be decrypted without sending the key by a client, so that the data can be decrypted conveniently.
The working principle of the invention is as follows:
in use, a side hybrid random number is generated by the server identity code generation device, and the hybrid random number generator is a method for combining a plurality of independent random number generators to generate random numbers with longer period and better statistical property. Usually, a random number sequence generated by one random number generator is used as a base, another random number generator is used to rearrange the random number sequence, and the obtained new random number sequence is used as an actually used random number. The basic idea of the algorithm is that a second linear congruence generator is used for scrambling random numbers generated by the first linear congruence generator, the server sends generated identity codes to the client, so that the client and the server are connected, the client can determine whether the sending end is the same server end or not through the received identity codes, the situation that the client cannot distinguish different server ends to cause data sending errors is avoided, and the effect of improving safety is achieved.
The key generation algorithm is an algorithm for generating a key through an online or offline interactive negotiation mode (such as a cryptographic protocol). The key with a long length is calculated through a key generation algorithm, generally, the larger the key length is, the larger the corresponding key space is, and the greater the difficulty of an attacker in guessing the password by exhaustive guessing. Key generation is more difficult for public key cryptosystems because the keys must satisfy certain mathematical characteristics. The key generation can be realized by an online or offline interactive negotiation mode, such as a password protocol, and the like, so that the effect of improving the security of the key and the application range of the key is achieved.
The same secret key needs to be shared for secret communication by adopting a symmetric encryption algorithm. Typically, a member of the system first selects a secret key and then transmits it to another member or members. The X9.17 standard describes two keys: a key encryption key and a data key. The key encryption key encrypts other keys to be distributed; whereas the data key only encrypts the information stream. Key encryption keys are typically distributed manually. In order to enhance the confidentiality, the secret key can be divided into a plurality of different parts and then sent out by using different channels, so that the effect of improving the safety of the key transmission process is achieved.
The identity code in the data sent by the server is directly compared with the identity code received in the first step to see whether the identity codes are identical or not, so that other problems in operation are avoided, and the safety and the accuracy are improved.
Data is encrypted by DES encryption, the plaintext is divided into a number of 64-bit-sized blocks, each block is encrypted with a 64-bit key, which in practice consists of 56-bit data bits and 8-bit parity bits, so that there are only 56 possible ciphers instead of 64. Each block is encrypted by the initial permutation method, followed by 16 consecutive complex permutations, and finally the inverse of the initial permutation is applied thereto. The substitution in step i does not directly use the original key K, but the key Ki calculated from K and i. The DES has the characteristic that the decryption algorithm is the same as the encryption algorithm, so that the effect of facilitating the encryption and decryption of data is achieved.
The data transmission adopts low-voltage differential signaling LVDS for transmission, the low-voltage differential signaling LVDS is a communication technology for transmitting signals on a differential PCB line or a balance cable with very low voltage swing (about 350mV), and the most important characteristics are that the current mode and the low swing mean that data can be transmitted at high speed and with low power consumption; the number of parallel transmission lines is small, and the electromagnetic radiation interference is small; the electromagnetic interference between lines can be partially compensated, and the common mode noise rejection is strong; the end resistor matched with the transmission line characteristic impedance reduces signal reflection; and the standard CMOS process is realized, and the cost is low.
The transmitter based on the LVDS standard is composed of 4 channels and used for converting 28-bit parallel red, green and blue data and control signals into 4 channels of parallel data transmission, the system clock is 32 MHz-112 MHz, so that the maximum data transmission rate of each channel is 784Mb/s, and the requirements of multiple display modes such as SVGA, XGA, SXGA and the like are met. Few parallel transmission lines (only 5 pairs of cables) and low-voltage swing amplitude serial data transmission (7-path parallel data serialization) are adopted, so that the electromagnetic interference and the power consumption are reduced, and the effect of improving the data transmission rate is achieved.
The foregoing shows and describes the general principles and broad features of the present invention and advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (10)

1. A data encryption transmission method is characterized in that: the method comprises the following steps:
s1: the server identity code generating equipment sends the generated identity code to the client identity receiving equipment;
s2: the server key generation device generates a group of keys, and the group of keys is sent to the client along with the server identity code;
s3: the client receives the data sent by the server, and the identity code in the data sent by the server is verified through the client identity verification equipment;
s4: after the client identity verification equipment verifies the identity code in the data sent by the server, the client key receiving equipment receives the key sent together with the identity code;
s5: the client encrypts the data to be encrypted through the received key by the data encryption equipment;
s6: sending the encrypted data to the server together with the server identity code through the data sending equipment;
s7: after the server receives the data of the client, verifying the part containing the identity code in the data sent by the client through identity verification equipment on the server;
s8: and when the part containing the identity code sent by the client is confirmed to be correct, the data sent by the client is decrypted by the decryption equipment at the server side.
2. A data encryption transmission method according to claim 1, characterized in that: the method is characterized in that a random number sequence generated by one random number generator is taken as a base, another random number generator is used for rearranging the random number sequence, and the obtained new random number sequence is taken as an actually used random number.
3. A data encryption transmission method according to claim 1, characterized in that: the key generation algorithm is an algorithm for generating a key through an online or offline interactive negotiation mode (such as a cryptographic protocol), and the key with a longer length is calculated through the key generation algorithm.
4. A data encryption transmission method according to claim 3, characterized in that: secure communication using symmetric encryption algorithms requires sharing of the same key, one member of the system first selects a secret key and then transmits it to the other member or members, the X9.17 standard describes two keys: the key encryption key encrypts other keys to be distributed; the data key only encrypts the information stream, and the key encryption key is manually distributed, so that the secret key can be divided into a plurality of different parts and then sent out by different channels for enhancing the confidentiality.
5. A data encryption transmission method according to claim 1, characterized in that: the identity code in the data sent by the server is directly compared with the identity code received in the first step to see if they are identical, and in a data communication network, the telecommunication facilities connecting two or more data stations according to the technical requirements of a link protocol, called data link, data link for short, so-called "link protocol", refers to a set of rules for establishing, maintaining and releasing a logical data link and for transmitting data via the link, the data being transmitted over a certain physical medium, such as a telephone line, microwave or optical cable.
6. A data encryption transmission method according to claim 1, characterized in that: the traditional encryption method has two kinds, namely replacement and replacement, the combined algorithm is adopted in the data encryption standard, data is encrypted in a DES encryption mode, and the working principle of the DES is as follows: the plaintext is divided into a plurality of 64-bit blocks, each block is encrypted by a 64-bit key, actually, the key consists of 56-bit data bits and 8-bit parity bits, so that only 56 possible ciphers are provided instead of 64, each block is firstly encrypted by an initial substitution method, then 16 times of complex substitutions are continuously performed, and finally the inverse of the initial substitution is applied to the block, the substitution at the step i is not directly performed by using the original key K, but the key Ki calculated by K and i, DES has the characteristic that the decryption algorithm is the same as the encryption algorithm except that the application sequence of the key Ki is opposite.
7. A data encryption transmission method according to claim 1, characterized in that: the low-voltage differential signaling (LVDS) is a communication technology for transmitting signals on a differential PCB (printed circuit board) line or a balanced cable with very low voltage swing (about 350mV), and has the main characteristics that a current mode and low swing mean that data can be transmitted at high speed and with low power consumption; the number of parallel transmission lines is small, and the electromagnetic radiation interference is small; the electromagnetic interference between lines can be partially compensated, and the common mode noise rejection is strong; the end resistor matched with the transmission line characteristic impedance reduces signal reflection; and the standard CMOS process is realized, and the cost is low.
8. A data encryption transmission method according to claim 7, characterized in that: the transmitter based on the LVDS standard is composed of 4 channels and used for converting 28-bit parallel red, green and blue data and control signals into 4 channels of parallel data transmission, a system clock is 32 MHz-112 MHz, so that the maximum data transmission rate of each channel is 784Mb/s, the requirements of multiple display modes of SVGA, XGA and SXGA are met, few parallel transmission lines (only 5 pairs of cables) and data low-voltage swing amplitude serial transmission (7 channels of parallel data serialization) are adopted, electromagnetic interference and power consumption are reduced, and the data transmission rate is improved.
9. A data encryption transmission method according to claim 1, characterized in that: the data sent by the client is checked by a CRC (cyclic redundancy check) method, which utilizes the principles of division and remainder to carry out error detection; if not, it indicates that the transmission is in error, and the crc check has automatic error correction capability.
10. A data encryption transmission method according to claim 6, characterized in that: because the encryption mode adopts a DES encryption mode, and a DES decryption algorithm is the same as the encryption algorithm, and a key for encrypting data is encrypted by a key generated by a key generation device on the server, the server stores the key, and the mechanical energy of the data can be decrypted without sending the key by a client, so that the data can be decrypted conveniently.
CN202110780278.5A 2021-07-09 2021-07-09 Data encryption transmission method Pending CN113556332A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110780278.5A CN113556332A (en) 2021-07-09 2021-07-09 Data encryption transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110780278.5A CN113556332A (en) 2021-07-09 2021-07-09 Data encryption transmission method

Publications (1)

Publication Number Publication Date
CN113556332A true CN113556332A (en) 2021-10-26

Family

ID=78131508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110780278.5A Pending CN113556332A (en) 2021-07-09 2021-07-09 Data encryption transmission method

Country Status (1)

Country Link
CN (1) CN113556332A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI808902B (en) * 2021-12-21 2023-07-11 慧榮科技股份有限公司 Apparatus for detecting errors during data encryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667913A (en) * 2009-09-18 2010-03-10 重庆邮电大学 Authenticated encryption method and encryption system based on symmetric encryption
CN103297224A (en) * 2012-02-23 2013-09-11 中国移动通信集团公司 Encryption key information distribution method and related device
JP2016180853A (en) * 2015-03-24 2016-10-13 株式会社メガチップス Receiver and image transmission system
CN107948183A (en) * 2017-12-06 2018-04-20 深圳数字电视国家工程实验室股份有限公司 A kind of method for distributing key and system suitable for Internet of Things
US20210144004A1 (en) * 2019-11-11 2021-05-13 International Business Machines Corporation Forward secrecy in Transport Layer Security (TLS) using ephemeral keys

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667913A (en) * 2009-09-18 2010-03-10 重庆邮电大学 Authenticated encryption method and encryption system based on symmetric encryption
CN103297224A (en) * 2012-02-23 2013-09-11 中国移动通信集团公司 Encryption key information distribution method and related device
JP2016180853A (en) * 2015-03-24 2016-10-13 株式会社メガチップス Receiver and image transmission system
CN107948183A (en) * 2017-12-06 2018-04-20 深圳数字电视国家工程实验室股份有限公司 A kind of method for distributing key and system suitable for Internet of Things
US20210144004A1 (en) * 2019-11-11 2021-05-13 International Business Machines Corporation Forward secrecy in Transport Layer Security (TLS) using ephemeral keys

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
""数据加密"", pages 1, Retrieved from the Internet <URL:https://web.archive.org/web/20180831002216/https://baike.baidu.com/item/%E6%95%B0%E6%8D%AE%E5%8A%A0%E5%AF%86/11048982> *
邱洪云, 邓礼全: "军事通信数据链路", 空间电子技术, no. 02, pages 536 - 544 *
长颈鹿: "信息安全工程师教程学习笔记之密钥管理", pages 1, Retrieved from the Internet <URL:htttps://www.educity.cn/rk/1776385.html> *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI808902B (en) * 2021-12-21 2023-07-11 慧榮科技股份有限公司 Apparatus for detecting errors during data encryption

Similar Documents

Publication Publication Date Title
US7571320B2 (en) Circuit and method for providing secure communications between devices
EP0998799B1 (en) Security method and system for transmissions in telecommunication networks
US4160120A (en) Link encryption device
AU648433B2 (en) A cryptographic protocol for secure communications
US7131004B1 (en) Method and apparatus for encrypting data transmitted over a serial link
EP0651533B1 (en) Method and apparatus for privacy and authentication in a mobile wireless network
US7649992B2 (en) Apparatuses for encoding, decoding, and authenticating data in cipher block chaining messaging authentication code
US5544245A (en) Mutual authentication/cipher key delivery system
US4172213A (en) Byte stream selective encryption/decryption device
KR101093359B1 (en) Combinational combiner cryptographic method
US5345507A (en) Secure message authentication for binary additive stream cipher systems
KR100770485B1 (en) Automatic resynchronization of crypto-sync information
Wright et al. Low-latency cryptographic protection for SCADA communications
JPH07288517A (en) Ciphering communication system and ciphering communication method
JPH0324107B2 (en)
Jueneman Analysis of certain aspects of output feedback mode
CN108599925A (en) A kind of modified AKA identity authorization systems and method based on quantum communication network
IE80441B1 (en) Method for algorithm independent cryptographic key management
JPH08503569A (en) Cryptographic apparatus having feedback register with selectable taps and method thereof
US6640303B1 (en) System and method for encryption using transparent keys
CN105871550A (en) System for realizing digital signal encryption transmission
US4805216A (en) Method and apparatus for continuously acknowledged link encrypting
JPH09312643A (en) Key sharing method and ciphering communication method
CN113556332A (en) Data encryption transmission method
Kent Encryption-based protection for interactive user/computer communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination